Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\091021-8109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`1aa00000 PsLoadedModuleList = 0xfffff801`1b62a190
Debug session time: Fri Sep 10 16:38:44.837 2021 (UTC + 8:00)
System Uptime: 0 days 7:11:00.687
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`1adf71d0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff801`20c7d980=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8011b6fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
Debugger extension ext.analyze execution is cancelled.
      PC: 00007ffd`59894ed9  VA: 00007ffd`011e45f3  R/W: 9  Parameter: 00000000`00000000
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2108.26002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'

Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\091021-8109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`1aa00000 PsLoadedModuleList = 0xfffff801`1b62a190
Debug session time: Fri Sep 10 16:38:44.837 2021 (UTC + 8:00)
System Uptime: 0 days 7:11:00.687
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`1adf71d0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff801`20c7d980=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8011b6fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4796

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 76004

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11031

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8011b6fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff80120c7dcf0 -- (.trap 0xfffff80120c7dcf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8011ad97600 rbx=0000000000000000 rcx=0000000000001886
rdx=0000000000001886 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ad97699 rsp=fffff80120c7de88 rbp=ffffc7890d311a20
 r8=fffff80120c7df00  r9=0000000000000001 r10=fffff8011ad97690
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!HalpAcpiPmRegisterReadPort+0x9:
fffff801`1ad97699 418800          mov     byte ptr [r8],al ds:fffff801`20c7df00=00
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff801`20c7d978 fffff801`1ae1f57e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`1b6fa320 : nt!KeBugCheckEx
fffff801`20c7d980 fffff801`1ac1c53d     : 00001213`72f57cfa fffff801`18a83180 00000000`00000246 00000000`0019412c : nt!KeAccumulateTicks+0x20625e
fffff801`20c7d9e0 fffff801`1ac1cae1     : ffffc789`17fa4000 00000000`000f0d8a fffff801`18a83180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff801`20c7da30 fffff801`1ac16953     : fffff801`18a83180 00000000`00000000 fffff801`1b631448 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff801`20c7db70 fffff801`1ac1f312     : fffff801`20c7dcf0 fffff801`20c7dd70 fffff801`20c7dd00 00000000`0000000b : nt!KeClockInterruptNotify+0x2e3
fffff801`20c7dc20 fffff801`1acde045     : 0000003c`36a735e6 fffff801`1b6f38a0 fffff801`1b6f3950 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
fffff801`20c7dc50 fffff801`1adf8c7a     : fffff801`20c7dd70 fffff801`1b6f38a0 00001213`72f44b39 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`20c7dca0 fffff801`1adf91e7     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff801`20c7dcf0 fffff801`1ad97699     : fffff801`1ad96c69 00000000`00000010 ffffc789`0d4f4000 ffffc789`0d7b0310 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff801`20c7de88 fffff801`1ad96c69     : 00000000`00000010 ffffc789`0d4f4000 ffffc789`0d7b0310 00000000`000006d8 : nt!HalpAcpiPmRegisterReadPort+0x9
fffff801`20c7de90 fffff801`1f74671a     : 00000000`00000006 ffffb481`9d3c6dc0 fffff801`20c7df98 00000000`00000f43 : nt!HalpAcpiPmRegisterRead+0x39
fffff801`20c7dec0 fffff801`1f745c94     : 00000000`00000000 ffffb481`99d3ddc0 00000000`00000f43 fffff801`00400a02 : ACPI!ACPIReadGpeStatusRegister+0x66
fffff801`20c7df00 fffff801`1acde045     : ffffb481`99d3ddc0 ffffc789`0d2ded70 ffffb481`99d3de70 ffffbfa7`262b7abc : ACPI!ACPIInterruptServiceRoutine+0x54
fffff801`20c7df40 fffff801`1adf89ff     : fffff801`20c6e510 ffffb481`99d3ddc0 000011c2`511bc9a2 00001213`72f4483c : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`20c7df90 fffff801`1adf8cc7     : fffff801`20c6e561 fffff801`376688bf ffffc789`17fa4000 fffff801`37668900 : nt!KiInterruptSubDispatch+0x11f
fffff801`20c6e490 fffff801`1ad97699     : fffff801`1ad96c69 fffff801`00000007 ffffc789`14f33000 00000003`01010000 : nt!KiInterruptDispatch+0x37
fffff801`20c6e628 fffff801`1ad96c69     : fffff801`00000007 ffffc789`14f33000 00000003`01010000 fffffff6`00000002 : nt!HalpAcpiPmRegisterReadPort+0x9
fffff801`20c6e630 fffff801`1f74671a     : 00000000`0000000d 00000000`00000007 00000000`00000003 0000003b`ef21adef : nt!HalpAcpiPmRegisterRead+0x39
fffff801`20c6e660 fffff801`1f7464b4     : 00000000`80010000 ffffc789`15a9c0f0 00000000`00000000 00000000`00000001 : ACPI!ACPIReadGpeStatusRegister+0x66
fffff801`20c6e6a0 fffff801`1f745c11     : 00000000`80010000 ffffc789`0d311a20 00000000`80010000 00000000`00000000 : ACPI!ACPIInterruptDispatchEvents+0x5c
fffff801`20c6e730 fffff801`1ac9a3ae     : fffff801`18a86240 fffff801`20c6e860 fffff801`20c6ea20 ffffc789`20b40080 : ACPI!ACPIInterruptServiceRoutineDPC+0xb1
fffff801`20c6e760 fffff801`1ac99694     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff801`20c6e8d0 fffff801`1adfad3e     : 00000000`00000000 fffff801`18a83180 fffff801`1b726a00 ffffc789`24af3080 : nt!KiRetireDpcList+0x1f4
fffff801`20c6eb60 00000000`00000000     : fffff801`20c6f000 fffff801`20c68000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  ACPI!ACPIReadGpeStatusRegister+66

MODULE_NAME: ACPI

IMAGE_NAME:  ACPI.sys

IMAGE_VERSION:  10.0.19041.1110

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  66

FAILURE_BUCKET_ID:  0x133_ISR_ACPI!ACPIReadGpeStatusRegister

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9524459d-2f22-efe5-b0c9-f824c586f42c}

Followup:     MachineOwner
---------      您好!了解到您关于Windows10系统故障的问题,根据您提供的信息,无法准确的判断出蓝屏问题原因的具体所在,需要分析您蓝屏日志文件来了解蓝屏的原因,建议您将您收集到的dump文件通过私信发送给,以便于为您进行分析并解决蓝屏问题。Yu

点赞(85) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部