最近电脑频繁死机
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091722-6671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff804`21a00000 PsLoadedModuleList = 0xfffff804`226297b0
Debug session time: Sat Sep 17 16:22:25.659 2022 (UTC + 8:00)
System Uptime: 1 days 15:04:31.312
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`21e1acf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa681`4090bde0=0000000000000133
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80422705330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1780
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4764
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 32969
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 091722-6671-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80422705330
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUx
STACK_TEXT:
ffffa681`4090bdd8 fffff804`21cd7e7f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`22705330 : nt!KeBugCheckEx
ffffa681`4090bde0 fffff804`21cd7a91 : 00017390`5e2da859 ffffa681`4089f180 00000000`00000246 fffff804`21cd321e : nt!KeAccumulateTicks+0x20f
ffffa681`4090be50 fffff804`21cd5c7a : ffffa681`408a8200 ffffbb8d`0d66f970 ffffa681`408a83d8 00000000`00000000 : nt!KiUpdateRunTime+0x61
ffffa681`4090beb0 fffff804`21cd5a66 : ffffe782`75133600 ffffe782`751336b0 ffffe782`00000001 00000000`00000000 : nt!KeClockInterruptNotify+0x11a
ffffa681`4090bf40 fffff804`21c0d2d0 : 00000147`3f328cfc ffffe782`75133720 00000000`00000001 ffffe782`7512f040 : nt!HalpTimerClockIpiRoutine+0x16
ffffa681`4090bf70 fffff804`21e1c8fa : ffffbb8d`0d66f9f0 ffffe782`75133600 00000000`00000000 ffffa681`408af000 : nt!KiCallInterruptServiceRoutine+0xa0
ffffa681`4090bfb0 fffff804`21e1cec7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbb8d`0d66f970 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
SYMBOL_NAME: nt!KeAccumulateTicks+20f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.978
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 20f
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
5: kd> lmvm nt
Browse full module list
start end module name
fffff804`21a00000 fffff804`22a47000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\3A8B1DB835728BA8FCE9470C0A20BAD71\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\8E35B2131047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 8E35B213 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00B35F75
ImageSize: 01047000
File version: 10.0.22000.978
Product version: 10.0.22000.978
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.22000.978
FileVersion: 10.0.22000.978 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\092222-7890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802`4ae00000 PsLoadedModuleList = 0xfffff802`4ba297b0
Debug session time: Thu Sep 22 09:38:51.868 2022 (UTC + 8:00)
System Uptime: 4 days 17:16:11.985
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`4b21acf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad81`304979f0=0000000000000133
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8024bb05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2093
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16025
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 30499
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092222-7890-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8024bb05330
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
<365>CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffad81`304979e8 fffff802`4b0d800e : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffad81`304979f0 fffff802`4b0d7a91 : 00043505`d90c61ca ffffad81`00000500 00000000`00000297 fffff802`4b04f660 : nt!KeAccumulateTicks+0x39e
ffffad81`30497a60 fffff802`4b0d4ac6 : 00000000`018e36ff 00000000`00ed5ac2 000003b5`6b0b189f 00000000`00000000 : nt!KiUpdateRunTime+0x61
ffffad81`30497ac0 fffff802`4b0d5dd2 : fffff90c`2383f180 00000000`00000000 fffff802`4ba2b1e8 00000000`00000000 : nt!KiUpdateTime+0x686
ffffad81`30497eb0 fffff802`4b0d3702 : fffff90c`2383f180 ffffc20f`15f312b0 ffffc20f`00000000 00000000`00000002 : nt!KeClockInterruptNotify+0x272
ffffad81`30497f40 fffff802`4b00d2d0 : 000003b5`6b22992b ffffc20f`15f31200 00000000`00000001 ffffc20f`15f2f040 : nt!HalpTimerClockInterrupt+0xe2
ffffad81`30497f70 fffff802`4b21c8fa : fffff90c`2383f200 ffffc20f`15f31200 00000000`00000000 ffffc20f`397c6500 : nt!KiCallInterruptServiceRoutine+0xa0
ffffad81`30497fb0 fffff802`4b21cec7 : 00000000`00000000 00000000`00000000 ffffad81`304fb180 fffff802`4b21ced4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff90c`2383f180 fffff802`4b1225fc : 00000000`00000010 00000000`00000202 fffff90c`2383f338 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff90c`2383f310 fffff802`4b2543ab : 00000000`00000000 ffffc20f`00000000 00000000`00000000 fffff7a1`0000e448 : nt!KeYieldProcessorEx+0x1c
fffff90c`2383f340 fffff802`4b248211 : 00000000`0000ffff ffffc20f`339cb080 00000000`00000000 00000000`00000000 : nt!KiHeteroChooseTargetProcessor+0x2f5
fffff90c`2383f400 fffff802`4b0b63b7 : ffffad81`30240180 ffffad81`30919000 fffff90c`2383f5a0 fffff90c`2383f638 : nt!KiDeferredReadySingleThread+0x17e651
fffff90c`2383f4f0 fffff802`4b0bb8e5 : 00000000`00000000 00000000`0000f0ff 00000000`00000001 00000000`00000002 : nt!KiExitDispatcher+0x167
fffff90c`2383f5a0 fffff802`4b0bb3e7 : ffffc20f`00000000 00000000`00000002 00000000`00000000 ffffc20f`30b2b740 : nt!IopfCompleteRequest+0x4e5
fffff90c`2383f6b0 fffff802`64e25a7d : 00000000`00000000 ffffc20f`3a20a010 ffffad81`30240180 00000000`00000000 : nt!IofCompleteRequest+0x17
fffff90c`2383f6e0 fffff802`64e2769e : 00000000`00000006 ffffad81`30240180 ffffc20f`2c6fa130 fffff90c`2383f829 : afd!AfdCompletePollIrp+0x91
fffff90c`2383f730 fffff802`4b0c8a94 : 00000000`00000000 ffffc20f`00000001 fffff90c`00000000 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
fffff90c`2383f760 fffff802`4b0c7084 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`4a2cab68 : nt!KiProcessExpiredTimerList+0x204
fffff90c`2383f890 fffff802`4b21ec6e : 00000000`00000000 ffffad81`30240180 ffffad81`3024c440 ffffc20f`36ef4080 : nt!KiRetireDpcList+0x714
fffff90c`2383fb40 00000000`00000000 : fffff90c`23840000 fffff90c`23839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: afd!AfdCompletePollIrp+91
MODULE_NAME: afd
IMAGE_NAME: afd.sys
IMAGE_VERSION: 10.0.22000.1030
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 91
FAILURE_BUCKET_ID: 0x133_DPC_afd!AfdCompletePollIrp
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ef73738c-d5c3-cdde-e832-877bfe61e63d}
Followup: MachineOwner
---------
2: kd> lmvm afd
Browse full module list
start end module name
fffff802`64e10000 fffff802`64eb4000 afd # (pdb symbols) C:\ProgramData\Dbg\sym\afd.pdb\1E2569802365B89DD9A43C11728E87BD1\afd.pdb
Loaded symbol image file: afd.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\afd.sys\525041DFa4000\afd.sys
Image path: afd.sys
Image name: afd.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 525041DF (This is a reproducible build file hash, not a timestamp)
CheckSum: 000AC7BA
ImageSize: 000A4000
File version: 10.0.22000.1030
Product version: 10.0.22000.1030
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: afd.sys
OriginalFilename: afd.sys
ProductVersion: 10.0.22000.1030
FileVersion: 10.0.22000.1030 (WinBuild.160101.0800)
FileDescription: Ancillary Function Driver for WinSock
LegalCopyright: © Microsoft Corporation. All rights reserved.你好,宇豪郑,感谢联系本站!请问不运行LOL时会蓝屏吗?若是有使用代理,加速器等,建议禁用。(看下是否恢复正常。)若是仍然不行,建议到电脑品牌的更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后在Windows中执行干净启动然后在任务栏搜索框输入cmd,点击右侧的以管理员身份运行,输入:sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicyUsers"(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicy"(按下Enter键)gpupdate/force(按下Enter键)重启电脑。看下是否恢复正常。
你好,宇豪郑,感谢联系本站!请问不运行LOL时会蓝屏吗?若是有使用代理,加速器等,建议禁用。(看下是否恢复正常。)若是仍然不行,建议到电脑品牌的更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后在Windows中执行干净启动然后在任务栏搜索框输入cmd,点击右侧的以管理员身份运行,输入:sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicyUsers"(按下Enter键)RD/S/Q"%WinDir%\System32\GroupPolicy"(按下Enter键)gpupdate/force(按下Enter键)重启电脑。看下是否恢复正常。
感谢您的,我基本很少玩LOL,蓝屏似乎与LOL无关。我已经按照操作流程执行了,具体结果可能需要看这几天,因为之前平均是1天重启一次。
你好,宇豪郑,可以使用1-2天,看下是否还会蓝屏。