你好微软官方,win10系统每天运行一段时间基本都会蓝屏! 以下为WinDbg分析情况:Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Minidump\092722-7718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`35800000 PsLoadedModuleList = 0xfffff803`3642a270
Debug session time: Tue Sep 27 22:04:38.335 2022 (UTC + 8:00)
System Uptime: 1 days 23:32:14.182
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`35bf90e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803`3b8b3b10=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803364fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3436
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 244917
Key : Analysis.Init.CPU.mSec
Value: 1124
Key : Analysis.Init.Elapsed.mSec
Value: 1138930
Key : Analysis.Memory.CommitPeak.Mb
Value: 111
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092722-7718-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff803364fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff803`3b8b3b08 fffff803`35c59882 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`364fb320 : nt!KeBugCheckEx
fffff803`3b8b3b10 fffff803`35ad2973 : 00000e39`cd864797 fffff803`33166180 00000000`00000000 fffff803`33166180 : nt!KeAccumulateTicks+0x1846b2
fffff803`3b8b3b70 fffff803`35ad245a : fffff803`364f3940 fffff803`3b8b3d70 00000000`00000000 00000000`00000010 : nt!KeClockInterruptNotify+0x453
fffff803`3b8b3c20 fffff803`35a08a45 : fffff803`364f3940 00000000`00000000 00000000`0000000b 00000010`00000001 : nt!HalpTimerClockIpiRoutine+0x1a
fffff803`3b8b3c50 fffff803`35bfab8a : fffff803`3b8b3d70 fffff803`364f3940 00000e39`cd854eab ffffc38e`57213000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`3b8b3ca0 fffff803`35bfb0f7 : 00000000`00000000 00000000`00000000 00000e39`cd84e644 fffff803`612f66f9 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff803`3b8b3cf0 fffff803`35b985b9 : fffff803`35b97b89 00000000`00000010 ffffc38e`49fff000 ffffc38e`4a1b0310 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff803`3b8b3e88 fffff803`35b97b89 : 00000000`00000010 ffffc38e`49fff000 ffffc38e`4a1b0310 00000000`000003e0 : nt!HalpAcpiPmRegisterReadPort+0x9
fffff803`3b8b3e90 fffff803`39fa680a : 00000000`00000004 ffffb181`a839ddc0 fffff803`3b8b3f98 00000000`00000f43 : nt!HalpAcpiPmRegisterRead+0x39
fffff803`3b8b3ec0 fffff803`39fa5d84 : 00000000`00000000 ffffb181`a63f6dc0 00000000`00000f43 fffff803`00400a02 : ACPI!ACPIReadGpeStatusRegister+0x66
fffff803`3b8b3f00 fffff803`35a08a45 : ffffb181`a63f6dc0 ffffc38e`49cbbd70 ffffb181`a63f6e70 ffff9019`082c5445 : ACPI!ACPIInterrupt<365>Routine+0x54
fffff803`3b8b3f40 fffff803`35bfa90f : fffff803`3b8a3e10 ffffb181`a63f6dc0 00000000`00000002 00000e39`cd854b1d : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`3b8b3f90 fffff803`35bfabd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatch+0x11f
fffff803`3b8a3d90 fffff803`35a1b3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc38e`58d67000 : nt!KiInterruptDispatch+0x37
fffff803`3b8a3f20 fffff803`35a219ff : ffffc38e`58d675b0 fffff803`3b8a3fe9 ffffc38e`58d67000 fffff803`3b8a4100 : nt!KiAcquireKobjectLockSafe+0x14
fffff803`3b8a3f50 fffff803`691e5480 : ffffc38e`00000000 ffffc38e`58d82000 00000000`00000000 00000000`00000001 : nt!KeSetEvent+0x6f
fffff803`3b8a3fe0 fffff803`691e5274 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VidSchiSignalFlipEvents+0x1e0
fffff803`3b8a40d0 fffff803`691e43cf : 00000000`00000032 00000000`00000001 ffffc38e`58d676c0 fffff803`691ed401 : dxgmms2!VidSchiUnreferenceDisplayingAllocations+0x1ac
fffff803`3b8a4150 fffff803`691e651a : fffff803`3b8a4278 ffffc38e`00000032 fffff803`3b8a4390 fffff803`3b8a4260 : dxgmms2!VidSchiProcessVsyncCompletedFlipEntry+0x12f
fffff803`3b8a41f0 fffff803`691e7534 : ffffc38e`58d32000 ffffc38e`58d67000 ffffb181`a839de70 00000000`00000000 : dxgmms2!VidSchiProcessDpcVSyncCookie+0x5ba
fffff803`3b8a4420 fffff803`4e60d5d2 : fffff803`3b8a4519 00000000`00000000 ffffc38e`57216520 00000de8`aa4f22bc : dxgmms2!VidSchDdiNotifyDpc+0x344
fffff803`3b8a44d0 fffff803`60b22a69 : ffffc38e`56e32030 00000000`00000000 ffffc38e`56e32030 ffffc38e`57213000 : dxgkrnl!DxgNotifyDpcCB+0x92
fffff803`3b8a4580 ffffc38e`56e32030 : 00000000`00000000 ffffc38e`56e32030 ffffc38e`57213000 fffff803`60b229ee : nvlddmkm+0x62a69
fffff803`3b8a4588 00000000`00000000 : ffffc38e`56e32030 ffffc38e`57213000 fffff803`60b229ee ffffc38e`57213000 : 0xffffc38e`56e32030
SYMBOL_NAME: ACPI!ACPIReadGpeStatusRegister+66
MODULE_NAME: ACPI
IMAGE_NAME: ACPI.sys
IMAGE_VERSION: 10.0.19041.2060
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 66
FAILURE_BUCKET_ID: 0x133_ISR_ACPI!ACPIReadGpeStatusRegister
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9524459d-2f22-efe5-b0c9-f824c586f42c}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803364fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2561
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2564
Key : Analysis.Init.CPU.mSec
Value: 4577
Key : Analysis.Init.Elapsed.mSec
Value: 1383863
Key : Analysis.Memory.CommitPeak.Mb
Value: 111
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092722-7718-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff803364fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff803`3b8b3b08 fffff803`35c59882 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`364fb320 : nt!KeBugCheckEx
fffff803`3b8b3b10 fffff803`35ad2973 : 00000e39`cd864797 fffff803`33166180 00000000`00000000 fffff803`33166180 : nt!KeAccumulateTicks+0x1846b2
fffff803`3b8b3b70 fffff803`35ad245a : fffff803`364f3940 fffff803`3b8b3d70 00000000`00000000 00000000`00000010 : nt!KeClockInterruptNotify+0x453
fffff803`3b8b3c20 fffff803`35a08a45 : fffff803`364f3940 00000000`00000000 00000000`0000000b 00000010`00000001 : nt!HalpTimerClockIpiRoutine+0x1a
fffff803`3b8b3c50 fffff803`35bfab8a : fffff803`3b8b3d70 fffff803`364f3940 00000e39`cd854eab ffffc38e`57213000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`3b8b3ca0 fffff803`35bfb0f7 : 00000000`00000000 00000000`00000000 00000e39`cd84e644 fffff803`612f66f9 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff803`3b8b3cf0 fffff803`35b985b9 : fffff803`35b97b89 00000000`00000010 ffffc38e`49fff000 ffffc38e`4a1b0310 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff803`3b8b3e88 fffff803`35b97b89 : 00000000`00000010 ffffc38e`49fff000 ffffc38e`4a1b0310 00000000`000003e0 : nt!HalpAcpiPmRegisterReadPort+0x9
fffff803`3b8b3e90 fffff803`39fa680a : 00000000`00000004 ffffb181`a839ddc0 fffff803`3b8b3f98 00000000`00000f43 : nt!HalpAcpiPmRegisterRead+0x39
fffff803`3b8b3ec0 fffff803`39fa5d84 : 00000000`00000000 ffffb181`a63f6dc0 00000000`00000f43 fffff803`00400a02 : ACPI!ACPIReadGpeStatusRegister+0x66
fffff803`3b8b3f00 fffff803`35a08a45 : ffffb181`a63f6dc0 ffffc38e`49cbbd70 ffffb181`a63f6e70 ffff9019`082c5445 : ACPI!ACPIInterruptServiceRoutine+0x54
fffff803`3b8b3f40 fffff803`35bfa90f : fffff803`3b8a3e10 ffffb181`a63f6dc0 00000000`00000002 00000e39`cd854b1d : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`3b8b3f90 fffff803`35bfabd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatch+0x11f
fffff803`3b8a3d90 fffff803`35a1b3c4 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc38e`58d67000 : nt!KiInterruptDispatch+0x37
fffff803`3b8a3f20 fffff803`35a219ff : ffffc38e`58d675b0 fffff803`3b8a3fe9 ffffc38e`58d67000 fffff803`3b8a4100 : nt!KiAcquireKobjectLockSafe+0x14
fffff803`3b8a3f50 fffff803`691e5480 : ffffc38e`00000000 ffffc38e`58d82000 00000000`00000000 00000000`00000001 : nt!KeSetEvent+0x6f
fffff803`3b8a3fe0 fffff803`691e5274 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VidSchiSignalFlipEvents+0x1e0
fffff803`3b8a40d0 fffff803`691e43cf : 00000000`00000032 00000000`00000001 ffffc38e`58d676c0 fffff803`691ed401 : dxgmms2!VidSchiUnreferenceDisplayingAllocations+0x1ac
fffff803`3b8a4150 fffff803`691e651a : fffff803`3b8a4278 ffffc38e`00000032 fffff803`3b8a4390 fffff803`3b8a4260 : dxgmms2!VidSchiProcessVsyncCompletedFlipEntry+0x12f
fffff803`3b8a41f0 fffff803`691e7534 : ffffc38e`58d32000 ffffc38e`58d67000 ffffb181`a839de70 00000000`00000000 : dxgmms2!VidSchiProcessDpcVSyncCookie+0x5ba
fffff803`3b8a4420 fffff803`4e60d5d2 : fffff803`3b8a4519 00000000`00000000 ffffc38e`57216520 00000de8`aa4f22bc : dxgmms2!VidSchDdiNotifyDpc+0x344
fffff803`3b8a44d0 fffff803`60b22a69 : ffffc38e`56e32030 00000000`00000000 ffffc38e`56e32030 ffffc38e`57213000 : dxgkrnl!DxgNotifyDpcCB+0x92
fffff803`3b8a4580 ffffc38e`56e32030 : 00000000`00000000 ffffc38e`56e32030 ffffc38e`57213000 fffff803`60b229ee : nvlddmkm+0x62a69
fffff803`3b8a4588 00000000`00000000 : ffffc38e`56e32030 ffffc38e`57213000 fffff803`60b229ee ffffc38e`57213000 : 0xffffc38e`56e32030
SYMBOL_NAME: ACPI!ACPIReadGpeStatusRegister+66
MODULE_NAME: ACPI
IMAGE_NAME: ACPI.sys
IMAGE_VERSION: 10.0.19041.2060
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 66
FAILURE_BUCKET_ID: 0x133_ISR_ACPI!ACPIReadGpeStatusRegister
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9524459d-2f22-efe5-b0c9-f824c586f42c}
Followup: MachineOwner
--------- 欢迎访问本站!。根据上述的内容。可能是英伟达显卡相关的异常。