Dear All,蓝屏 DPC WATCHDOG VIOLATION 查看日志 是acpi.sys有报错,os:21h1Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Administrator.DESKTOP-KAKPC71\Desktop\MEMORY\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`6ca00000 PsLoadedModuleList = 0xfffff802`6d62a250
Debug session time: Thu Aug 18 20:08:45.892 2022 (UTC + 8:00)
System Uptime: 2 days 1:36:06.719
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
.........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`6cdf88c0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffc201`d42a1e20=0000000000000133
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8026d6fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3343

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3342

    Key  : Analysis.Init.CPU.mSec
    Value: 405

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2768

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 122

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8026d6fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffffd897311a6c0 -- (.trap 0xfffffd897311a6c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff8026e9a1f98
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026ccfacac rsp=fffffd897311a850 rbp=fffffd897311a9a9
 r8=0000000000000000  r9=0000000000040408 r10=fffff8026ccfabf0
r11=ffffaa84a2415ac0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KxWaitForSpinLockAndAcquire+0x2c:
fffff802`6ccfacac 488b07          mov     rax,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

STACK_TEXT: 
ffffc201`d42a1e18 fffff802`6ce2a998     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`6d6fb320 : nt!KeBugCheckEx
ffffc201`d42a1e20 fffff802`6cc4b573     : 00002b5f`a3a445b3 ffffc201`d4288180 00000000`00000000 ffffc201`d4288180 : nt!KeAccumulateTicks+0x1dcbc8
ffffc201`d42a1e80 fffff802`6cc4b05a     : ffffaa84`9e2d3d40 fffffd89`7311a740 00000000`00000000 ffffaa84`9e291040 : nt!KeClockInterruptNotify+0x453
ffffc201`d42a1f30 fffff802`6ccd9405     : ffffaa84`9e2d3d40 fffff802`6cd54877 ffffaa84`9e2d3f00 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffc201`d42a1f60 fffff802`6cdfa36a     : fffffd89`7311a740 ffffaa84`9e2d3d40 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffc201`d42a1fb0 fffff802`6cdfa8d7     : 00000000`c0adaa8d fffff802`6e942580 ffffaa84`b1bd5010 ffffaa84`b1bd5010 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd89`7311a6c0 fffff802`6ccfacac     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd89`7311a850 fffff802`6ccfac78     : fffff802`6e9a1f98 ffffc201`d4288180 00000000`00000000 00000000`00000000 : nt!KxWaitForSpinLockAndAcquire+0x2c
fffffd89`7311a880 fffff802`6e950c9b     : ffffaa84`b1bd5198 00000000`00040408 00000000`00000000 ffffaa84`b1bd5198 : nt!KeAcquireSpinLockRaiseToDpc+0x88
fffffd89`7311a8b0 fffff802`6e925243     : ffffaa84`b1bd5010 ffffaa84`00040408 ffffaa84`b1bd5198 00000000`00000100 : ACPI!ACPIInterruptEventCompletion+0x2b
fffffd89`7311a8e0 fffff802`6e924685     : ffffaa84`9e6dc000 ffffaa84`b1bd5010 00000000`00000000 00000000`00000004 : ACPI!RunContext+0x833
fffffd89`7311aa10 fffff802`6e94a415     : ffffaa84`b1bd5010 00000000`00000080 ffffaa84`b1bd5010 00000000`0000011a : ACPI!InsertReadyQueue+0x2a5
fffffd89`7311aa70 fffff802`6e948d87     : ffffaa84`b1bd5010 00000000`00000000 00000000`00000000 fffffd89`73111c00 : ACPI!RestartCtxtPassive+0x35
fffffd89`7311aaa0 fffff802`6cd58235     : ffffaa84`9e291040 fffff802`6e948c80 00000000`00000000 ffffaa84`9e2c5100 : ACPI!ACPIWorkerThread+0x107
fffffd89`7311ab10 fffff802`6cdfff48     : ffffc201`d4288180 ffffaa84`9e291040 fffff802`6cd581e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd89`7311ab60 00000000`00000000     : fffffd89`7311b000 fffffd89`73114000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  ACPI!ACPIInterruptEventCompletion+2b

MODULE_NAME: ACPI

IMAGE_NAME:  ACPI.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2b

FAILURE_BUCKET_ID:  0x133_ISR_ACPI!ACPIInterruptEventCompletion

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {66ccecbc-0d7a-4186-e177-11481af8fb9f}

Followup:     MachineOwner
---------

Thanks!      欢迎访问本站!。若是有超频,降压等,建议关闭,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下芯片组驱动,显卡驱动,声卡驱动,网卡驱动,硬盘相关的驱动(例如英特尔快速存储技术驱动),电源相关的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。

点赞(31) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部