最近电脑频繁死机

Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\091722-6671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff804`21a00000 PsLoadedModuleList = 0xfffff804`226297b0
Debug session time: Sat Sep 17 16:22:25.659 2022 (UTC + 8:00)
System Uptime: 1 days 15:04:31.312
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`21e1acf0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa681`4090bde0=0000000000000133
5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80422705330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1780

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4764

    Key  : Analysis.Init.CPU.mSec
    Value: 327

    Key  : Analysis.Init.Elapsed.mSec
    Value: 32969

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133

    Key  : Bugcheck.Code.Register
    Value: 0x133

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  091722-6671-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80422705330

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LeagueClientUx

STACK_TEXT: 
ffffa681`4090bdd8 fffff804`21cd7e7f     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`22705330 : nt!KeBugCheckEx
ffffa681`4090bde0 fffff804`21cd7a91     : 00017390`5e2da859 ffffa681`4089f180 00000000`00000246 fffff804`21cd321e : nt!KeAccumulateTicks+0x20f
ffffa681`4090be50 fffff804`21cd5c7a     : ffffa681`408a8200 ffffbb8d`0d66f970 ffffa681`408a83d8 00000000`00000000 : nt!KiUpdateRunTime+0x61
ffffa681`4090beb0 fffff804`21cd5a66     : ffffe782`75133600 ffffe782`751336b0 ffffe782`00000001 00000000`00000000 : nt!KeClockInterruptNotify+0x11a
ffffa681`4090bf40 fffff804`21c0d2d0     : 00000147`3f328cfc ffffe782`75133720 00000000`00000001 ffffe782`7512f040 : nt!HalpTimerClockIpiRoutine+0x16
ffffa681`4090bf70 fffff804`21e1c8fa     : ffffbb8d`0d66f9f0 ffffe782`75133600 00000000`00000000 ffffa681`408af000 : nt!KiCallInterruptServiceRoutine+0xa0
ffffa681`4090bfb0 fffff804`21e1cec7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbb8d`0d66f970 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37


SYMBOL_NAME:  nt!KeAccumulateTicks+20f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.978

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  20f

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

5: kd> lmvm nt
Browse full module list
start             end                 module name
fffff804`21a00000 fffff804`22a47000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\3A8B1DB835728BA8FCE9470C0A20BAD71\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\8E35B2131047000\ntkrnlmp.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        8E35B213 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00B35F75
    ImageSize:        01047000
    File version:     10.0.22000.978
    Product version:  10.0.22000.978
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.22000.978
        FileVersion:      10.0.22000.978 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'

Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\092222-7890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802`4ae00000 PsLoadedModuleList = 0xfffff802`4ba297b0
Debug session time: Thu Sep 22 09:38:51.868 2022 (UTC + 8:00)
System Uptime: 4 days 17:16:11.985
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`4b21acf0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffad81`304979f0=0000000000000133
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8024bb05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2093

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16025

    Key  : Analysis.Init.CPU.mSec
    Value: 327

    Key  : Analysis.Init.Elapsed.mSec
    Value: 30499

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 95

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133

    Key  : Bugcheck.Code.Register
    Value: 0x133

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  092222-7890-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8024bb05330

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1
<365>CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffad81`304979e8 fffff802`4b0d800e     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffad81`304979f0 fffff802`4b0d7a91     : 00043505`d90c61ca ffffad81`00000500 00000000`00000297 fffff802`4b04f660 : nt!KeAccumulateTicks+0x39e
ffffad81`30497a60 fffff802`4b0d4ac6     : 00000000`018e36ff 00000000`00ed5ac2 000003b5`6b0b189f 00000000`00000000 : nt!KiUpdateRunTime+0x61
ffffad81`30497ac0 fffff802`4b0d5dd2     : fffff90c`2383f180 00000000`00000000 fffff802`4ba2b1e8 00000000`00000000 : nt!KiUpdateTime+0x686
ffffad81`30497eb0 fffff802`4b0d3702     : fffff90c`2383f180 ffffc20f`15f312b0 ffffc20f`00000000 00000000`00000002 : nt!KeClockInterruptNotify+0x272
ffffad81`30497f40 fffff802`4b00d2d0     : 000003b5`6b22992b ffffc20f`15f31200 00000000`00000001 ffffc20f`15f2f040 : nt!HalpTimerClockInterrupt+0xe2
ffffad81`30497f70 fffff802`4b21c8fa     : fffff90c`2383f200 ffffc20f`15f31200 00000000`00000000 ffffc20f`397c6500 : nt!KiCallInterruptServiceRoutine+0xa0
ffffad81`30497fb0 fffff802`4b21cec7     : 00000000`00000000 00000000`00000000 ffffad81`304fb180 fffff802`4b21ced4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff90c`2383f180 fffff802`4b1225fc     : 00000000`00000010 00000000`00000202 fffff90c`2383f338 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff90c`2383f310 fffff802`4b2543ab     : 00000000`00000000 ffffc20f`00000000 00000000`00000000 fffff7a1`0000e448 : nt!KeYieldProcessorEx+0x1c
fffff90c`2383f340 fffff802`4b248211     : 00000000`0000ffff ffffc20f`339cb080 00000000`00000000 00000000`00000000 : nt!KiHeteroChooseTargetProcessor+0x2f5
fffff90c`2383f400 fffff802`4b0b63b7     : ffffad81`30240180 ffffad81`30919000 fffff90c`2383f5a0 fffff90c`2383f638 : nt!KiDeferredReadySingleThread+0x17e651
fffff90c`2383f4f0 fffff802`4b0bb8e5     : 00000000`00000000 00000000`0000f0ff 00000000`00000001 00000000`00000002 : nt!KiExitDispatcher+0x167
fffff90c`2383f5a0 fffff802`4b0bb3e7     : ffffc20f`00000000 00000000`00000002 00000000`00000000 ffffc20f`30b2b740 : nt!IopfCompleteRequest+0x4e5
fffff90c`2383f6b0 fffff802`64e25a7d     : 00000000`00000000 ffffc20f`3a20a010 ffffad81`30240180 00000000`00000000 : nt!IofCompleteRequest+0x17
fffff90c`2383f6e0 fffff802`64e2769e     : 00000000`00000006 ffffad81`30240180 ffffc20f`2c6fa130 fffff90c`2383f829 : afd!AfdCompletePollIrp+0x91
fffff90c`2383f730 fffff802`4b0c8a94     : 00000000`00000000 ffffc20f`00000001 fffff90c`00000000 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffff90c`2383f760 fffff802`4b0c7084     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`4a2cab68 : nt!KiProcessExpiredTimerList+0x204
fffff90c`2383f890 fffff802`4b21ec6e     : 00000000`00000000 ffffad81`30240180 ffffad81`3024c440 ffffc20f`36ef4080 : nt!KiRetireDpcList+0x714
fffff90c`2383fb40 00000000`00000000     : fffff90c`23840000 fffff90c`23839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  afd!AfdCompletePollIrp+91

MODULE_NAME: afd

IMAGE_NAME:  afd.sys

IMAGE_VERSION:  10.0.22000.1030

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  91

FAILURE_BUCKET_ID:  0x133_DPC_afd!AfdCompletePollIrp

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ef73738c-d5c3-cdde-e832-877bfe61e63d}

Followup:     MachineOwner
---------

2: kd> lmvm afd
Browse full module list
start             end                 module name
fffff802`64e10000 fffff802`64eb4000   afd      # (pdb symbols)          C:\ProgramData\Dbg\sym\afd.pdb\1E2569802365B89DD9A43C11728E87BD1\afd.pdb
    Loaded symbol image file: afd.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\afd.sys\525041DFa4000\afd.sys
    Image path: afd.sys
    Image name: afd.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        525041DF (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000AC7BA
    ImageSize:        000A4000
    File version:     10.0.22000.1030
    Product version:  10.0.22000.1030
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     afd.sys
        OriginalFilename: afd.sys
        ProductVersion:   10.0.22000.1030
        FileVersion:      10.0.22000.1030 (WinBuild.160101.0800)
        FileDescription:  Ancillary Function Driver for WinSock
        LegalCopyright:   © Microsoft Corporation. All rights reserved.你好,宇豪郑,感谢联系本站!请问不运行LOL时会蓝屏吗?若是有使用代理,加速器等,建议禁用。(看下是否恢复正常。)若是仍然不行,建议到电脑品牌的更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后在Windows中执行干净启动然后在任务栏搜索框输入cmd,点击右侧的以管理员身份运行,输入:sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicyUsers"(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicy"(按下Enter键)gpupdate/force(按下Enter键)重启电脑。看下是否恢复正常。
你好,宇豪郑,感谢联系本站!请问不运行LOL时会蓝屏吗?若是有使用代理,加速器等,建议禁用。(看下是否恢复正常。)若是仍然不行,建议到电脑品牌的更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后在Windows中执行干净启动然后在任务栏搜索框输入cmd,点击右侧的以管理员身份运行,输入:sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicyUsers"(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicy"(按下Enter键)gpupdate/force(按下Enter键)重启电脑。看下是否恢复正常。
感谢您的,我基本很少玩LOL,蓝屏似乎与LOL无关。我已经按照操作流程执行了,具体结果可能需要看这几天,因为之前平均是1天重启一次。
你好,宇豪郑,可以使用1-2天,看下是否还会蓝屏。

点赞(91) 打赏

评论列表 共有 0 条评论

暂无评论

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部