Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`25800000 PsLoadedModuleList = 0xfffff806`2642a290
Debug session time: Wed Oct 12 13:11:40.284 2022 (UTC + 8:00)
System Uptime: 7 days 0:53:56.875
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000098`feabf018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`25bf8fa0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff806`28eb3e20=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff806264fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3358

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6169

    Key  : Analysis.IO.Other.Mb
    Value: 10

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 1624

    Key  : Analysis.Init.Elapsed.mSec
    Value: 122699

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 98

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133

    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x133

    Key  : Bugcheck.Code.Register
    Value: 0x133

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  MEMORY.DMP

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff806264fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffed0d20295cd0 -- (.trap 0xffffed0d20295cd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000007231
rdx=ffffed0d20296334 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80681e76a70 rsp=ffffed0d20295e68 rbp=fffff80681e758a0
 r8=0000000000000000  r9=ffffd2f8ec73874c r10=0000000000000063
r11=ffffed0d2029633c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
netrtp+0x6a70:
fffff806`81e76a70 6685c9          test    cx,cx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  services.exe

STACK_TEXT: 
fffff806`28eb3e18 fffff806`25c59782     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`264fb320 : nt!KeBugCheckEx
fffff806`28eb3e20 fffff806`25ad2973     : 000153d4`32904c8d fffff806`20843180 00000000`00000000 fffff806`20843180 : nt!KeAccumulateTicks+0x1845b2
fffff806`28eb3e80 fffff806`25ad245a     : fffff806`264f38c0 ffffed0d`20295d50 fffff806`2cdbd800 00000000`0000b201 : nt!KeClockInterruptNotify+0x453
fffff806`28eb3f30 fffff806`25a08a45     : fffff806`264f38c0 fffff806`28eb3f40 00000000`00000010 ffffa8c8`38b1c681 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`28eb3f60 fffff806`25bfaa4a     : ffffed0d`20295d50 fffff806`264f38c0 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`28eb3fb0 fffff806`25bfafb7     : 00000000`00000000 00000000`00000000 fffff806`264f38c0 ffffc006`0ffcdc90 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffed0d`20295cd0 fffff806`81e76a70     : fffff806`81e758bb 00000000`00000010 00000000`00040286 ffffed0d`20295e98 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffed0d`20295e68 fffff806`81e758bb     : 00000000`00000010 00000000`00040286 ffffed0d`20295e98 00000000`00000018 : netrtp+0x6a70
ffffed0d`20295e70 fffff806`81e757c0     : 00000000`00000104 fffff806`81e79340 00000000`00000000 fffff806`81e76c78 : netrtp+0x58bb
ffffed0d`20295ea0 fffff806`81e73a4c     : 00000000`00000104 ffffed0d`20295ff0 ffffc006`0f4c6130 00000000`00000000 : netrtp+0x57c0
ffffed0d`20295ef0 fffff806`25e423af     : ffffed0d`202965b0 ffffed0d`202965b0 ffffed0d`202965b0 ffffc006`394eb080 : netrtp+0x3a4c
ffffed0d`20296570 fffff806`25e3c302     : ffffffff`00000000 ffffed0d`20297350 ffffed0d`20296c01 ffffc006`193476a0 : nt!PspCallProcessNotifyRoutines+0x213
ffffed0d`20296640 fffff806`25e72440     : ffffc006`382dd080 ffffc006`394eb080 ffffed0d`20296dd0 ffffed0d`20296c9c : nt!PspInsertThread+0x68e
ffffed0d`20296700 fffff806`25c0a9b5     : 00000000`00000002 00000000`00000001 00000000`00000000 000001a6`d76c8840 : nt!NtCreateUserProcess+0xde0
ffffed0d`202973d0 00007ff8`33cae8f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000098`8017cb48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`33cae8f4


SYMBOL_NAME:  netrtp+6a70

MODULE_NAME: netrtp

IMAGE_NAME:  netrtp.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  6a70

FAILURE_BUCKET_ID:  0x133_ISR_netrtp!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d1a52398-623d-e4a5-5951-02cd99e33301}

Followup:     MachineOwner
---------      任石你好戴夫,我会帮你的。打印输出表明是Realtek网卡上的设备驱动程序导致系统崩溃。转到制造商网站上的PC支持页面,然后从那里下载并安装他们推荐的Realtek网卡驱动程序版本。___________________________________________________________________PowertotheDeveloper!MSIGV72-17.3",i7-8750H(HexCore),32GBDDR4,4GBGeForceGTX1050Ti,256GBNVMeM2,2TBHDD此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。

点赞(98) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部