Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\jose\Desktop\082022-9078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff801`7a200000 PsLoadedModuleList = 0xfffff801`7ae2a230
Debug session time: Sat Aug 20 23:34:01.224 2022 (UTC + 8:00)
System Uptime: 0 days 0:03:33.984
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`7a5f8590 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8380`7a748e20=0000000000000133
7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8017aefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1870

    Key  : Analysis.Init.CPU.mSec
    Value: 405

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9368

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133

    Key  : Bugcheck.Code.Register
    Value: 0x133

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  082022-9078-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8017aefb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MMSSHOST.exe

STACK_TEXT: 
ffff8380`7a748e18 fffff801`7a64d25e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`7aefb320 : nt!KeBugCheckEx
ffff8380`7a748e20 fffff801`7a4aa263     : 00000085`80f1fad5 ffff8380`7a6f6180 00000000`00000000 ffff8380`7a6f6180 : nt!KeAccumulateTicks+0x1a079e
ffff8380`7a748e80 fffff801`7a4a9d4a     : ffffe085`fe8d2ec0 ffffc48f`ab6c6bf0 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff8380`7a748f30 fffff801`7a464785     : ffffe085`fe8d2ec0 fffff801`7a54aef7 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffff8380`7a748f60 fffff801`7a5fa03a     : ffffc48f`ab6c6bf0 ffffe085`fe8d2ec0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8380`7a748fb0 fffff801`7a5fa5a7     : 00000000`bdb0807f ffff8380`7a6f9088 ffffc48f`ab6c6ca1 00000000`00000001 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc48f`ab6c6b70 fffff801`7a493ad0     : fffff801`7ae4f540 ffffc48f`ab6c6d89 00000000`00000001 fffff801`7ae52740 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc48f`ab6c6d00 fffff801`7a53a25e     : 00000000`00000002 00000000`00000000 fffff801`7ae50b00 ffffc48f`ab6c6de0 : nt!KiIpiSendRequestEx+0xb0
ffffc48f`ab6c6d40 fffff801`7a4b1fb4     : 00000000`00000000 ffffc48f`ab6c6f00 00000000`00000001 00000000`00000000 : nt!KxFlushNonGlobalTb+0x9a
ffffc48f`ab6c6d90 fffff801`7a493c00     : ffffc48f`ab6c6ed0 ffffc48f`ab6c6f20 fffff801`7ae50b00 ffffc48f`ab6c6e00 : nt!KeFlushTb+0x154
ffffc48f`ab6c6df0 fffff801`7a4e9a3f     : ffffffff`ffffffff fffff3cd`04d07000 fffff801`7ae50b00 fffff3cd`04d10c00 : nt!MiFlushTbList+0xb0
ffffc48f`ab6c6e20 fffff801`7a4ed19f     : 00000000`00000001 00000000`00000480 ffffc48f`ab6c71e0 00000000`00000000 : nt!MiObtainSystemCacheView+0x38f
ffffc48f`ab6c7030 fffff801`7a4ee62e     : 00000000`00440000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapViewInSystemCache+0xff
ffffc48f`ab6c71b0 fffff801`7a488eba     : 00000000`00440000 00000000`00000000 ffffe086`00000000 00000000`00000000 : nt!CcGetVacbMiss+0xce
ffffc48f`ab6c7240 fffff801`7a85bcf0     : 00000000`00440000 00000000`00000000 ffffc48f`ab6c7380 ffffc48f`ab6c7390 : nt!CcGetVirtualAddress+0x33a
ffffc48f`ab6c72e0 fffff801`7a4884c9     : 00000000`00000000 00000000`00440000 00000000`00000000 00000000`00000001 : nt!CcMapAndCopyFromCache+0x80
ffffc48f`ab6c7380 fffff801`7e7ca7ad     : ffffe086`1ac22040 ffffe086`00000000 ffffc90d`00001000 00000000`00441000 : nt!CcCopyReadEx+0x139
ffffc48f`ab6c7430 fffff801`779077fc     : 00000000`00000000 ffffc48f`ab6c7808 ffffc48f`ab6c77c8 00000000`05c3e710 : Ntfs!NtfsCopyReadA+0x2ed
ffffc48f`ab6c7720 fffff801`7790460a     : ffffc48f`ab6c7830 ffffc48f`ab6c77c8 ffffe086`27f8c110 ffffe086`27f8c010 : FLTMGR!FltpPerformFastIoCall+0x16c
ffffc48f`ab6c7780 fffff801`77939785     : ffffc48f`ab6c8000 ffffc48f`ab6c1000 ffffe086`26f3f080 fffff801`7a7fd16e : FLTMGR!FltpPassThroughFastIo+0x10a
ffffc48f`ab6c7800 fffff801`7a7e38df     : ffffe086`2c495880 00000000`00000000 00000000`00000000 ffffe086`00000000 : FLTMGR!FltpFastIoRead+0x165
ffffc48f`ab6c78b0 fffff801`7a609fb5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x37f
ffffc48f`ab6c7990 00007ffc`0448d004     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`05c3e588 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0448d004


SYMBOL_NAME:  nt!KeAccumulateTicks+1a079e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1826

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1a079e

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwnerhttps://1drv.ms/u/s!Ag_FhimUVq78kdZ7jvvJCm7Dck8Oqw?e=j5kUgR      您好!感谢您联系本站支持平台!了解到您目前遇到Windows操作系统出现蓝屏,您不用担心,此问题一般是由于系统中某些应用所属进程或驱动出现问题导致系统宕机引起的,很抱歉由于网络访问限制的原因,无法下载获取您所上传Link中的dump文件,将向您发送私人信息,您可以在私人信息中将您所收集的dump文件以附件的形式发送过来,以便于协助您解决您所遇到的蓝屏宕机问题。另外,也
        你好,今天出现了新的错误类型,ntoskrnl.wrong.symbols.exe,现在上传dmp文件,可以再看看是什么问题吗?谢谢https://1drv.ms/u/s!Ag_FhimUVq78kdZ-hEBICYdSEU9tAg?e=qcfNzl此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        您好!很抱歉,由于网络访问限制的缘故,无法下载您提供的OneDrive链接中的文件,所以向您发送了私人消息,建议您将您收集到的dump文件通过私人消息的方式,以附件发送过来。您可以查看您的邮箱,看看是否收到私人消息,也可以在当前页面中点击私人消息标签进入页面。期待可以协助您解决您遇到的问题,如果存在疑问或其他问题,也。Yu
        你好·,已经在私人消息里发给你了此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        您好!根据您提供的dump文件分析,可能是以下文件出现问题导致的蓝屏,您可以在您的电脑搜索找到该文件,查看该文件所属应用程序或组件,尝试更新或重新安装它,看看是否可以解决您蓝屏的问题。Yu

点赞(43) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部