Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.   Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.  Symbol search path is: srv* Executable search path is:  Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff804`2e200000 PsLoadedModuleList = 0xfffff804`2ee2a2d0 Debug session time: Fri Feb 11 19:37:09.591 2022 (UTC + 8:00) System Uptime: 0 days 0:08:07.390 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................................................. Loading User Symbols  Loading unloaded module list .............. For analysis of this file, run !analyze -v 1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending     component can usually be identified with a stack trace. Arg2: 0000000000000501, The DPC time count (in ticks). Arg3: 0000000000000500, The DPC time allotment (in ticks). Arg4: fffff8042eefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains     additional information regarding this single DPC timeout  Debugging Details: ------------------  ************************************************************************* ***                                                                   *** ***                                                                   *** ***    Either you specified an unqualified symbol, or your debugger   *** ***    doesn't have full symbol information.  Unqualified symbol      *** ***    resolution is turned off by default. Please either specify a   *** ***    fully qualified symbol module!symbolname, or enable resolution *** ***    of unqualified symbols by typing ".symopt- 100". Note that     *** ***    enabling unqualified symbol resolution with network symbol     *** ***    server shares in the symbol path may cause the debugger to     *** ***    appear to hang for long periods of time when an incorrect      *** ***    symbol name is typed or the network symbol server is down.     *** ***                                                                   *** ***    For some commands to work properly, your symbol path           *** ***    must point to .pdb files that have full type information.      *** ***                                                                   *** ***    Certain .pdb files (such as the public OS symbols) do not      *** ***    contain the required information.  Contact the group that      *** ***    provided you with these symbols if you need this command to    *** ***    work.                                                          *** ***                                                                   *** ***    Type referenced: TickPeriods                                   *** ***                                                                   *** *************************************************************************  KEY_VALUES_STRING: 1      Key  : Analysis.CPU.mSec     Value: 5702      Key  : Analysis.DebugAnalysisManager     Value: Create      Key  : Analysis.Elapsed.mSec     Value: 57632      Key  : Analysis.Init.CPU.mSec     Value: 1186      Key  : Analysis.Init.Elapsed.mSec     Value: 38246      Key  : Analysis.Memory.CommitPeak.Mb     Value: 86      Key  : WER.OS.Branch     Value: vb_release      Key  : WER.OS.Timestamp     Value: 2019-12-06T14:06:00Z      Key  : WER.OS.Version     Value: 10.0.19041.1   BUGCHECK_CODE:  133  BUGCHECK_P1: 0  BUGCHECK_P2: 501  BUGCHECK_P3: 500  BUGCHECK_P4: fffff8042eefb320  DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED  TRAP_FRAME:  ffffee87da42e700 -- (.trap 0xffffee87da42e700) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000001dcf3a45 rbx=0000000000000000 rcx=ffffee87da42e914 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8042e480c67 rsp=ffffee87da42e890 rbp=ffffee87da42e929  r8=0060000000000000  r9=ffffee87da42e920 r10=0000000000000fff r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0         nv up ei pl nz na pe nc nt!KeYieldProcessorEx+0x17: fffff804`2e480c67 4883c420        add     rsp,20h Resetting default scope  BLACKBOXBSD: 1 (!blackboxbsd)   BLACKBOXNTFS: 1 (!blackboxntfs)   BLACKBOXPNP: 1 (!blackboxpnp)   BLACKBOXWINLOGON: 1  PROCESS_NAME:  System  STACK_TEXT:   ffffc781`233f0e18 fffff804`2e61f5fa     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx ffffc781`233f0e20 fffff804`2e416953     : 0000012a`3e01d096 ffffc781`233d7180 00000000`00000000 ffffc781`233d7180 : nt!KeAccumulateTicks+0x20644a ffffc781`233f0e80 fffff804`2e41643a     : ffffde8c`a3303480 ffffee87`da42e780 fffff804`325a3c00 00000000`0000a201 : nt!KeClockInterruptNotify+0x453 ffffc781`233f0f30 fffff804`2e4de055     : ffffde8c`a3303480 ffffc781`233f0f40 00000000`0000000c ffff14af`d3fd11b0 : nt!HalpTimerClockIpiRoutine+0x1a ffffc781`233f0f60 fffff804`2e5f8d4a     : ffffee87`da42e780 ffffde8c`a3303480 ffffc781`23189180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5 ffffc781`233f0fb0 fffff804`2e5f92b7     : 00000000`00000002 ffffde8c`bfc6c488 ffffc781`233d7180 fffff804`2e5f92c4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffffee87`da42e700 fffff804`2e480c67     : 00000000`00000010 00000000`00000202 ffffee87`da42e8b8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffffee87`da42e890 fffff804`2e71a7ae     : ffffde8c`bfc6c010 fffff804`00000001 00000000`00000000 fffff804`2e48f6f5 : nt!KeYieldProcessorEx+0x17 ffffee87`da42e8c0 fffff804`2e63cc3a     : ffffc781`233d7180 fffff804`325a2f00 ffff36c3`00000000 ffffee87`da42e9cc : nt!KiHeteroChooseTargetProcessor+0x55e ffffee87`da42e990 fffff804`2e487051     : 00000000`0000000a 00000000`00000001 ffffde8c`bfb74080 fffff804`2e4821b9 : nt!KiDeferredReadySingleThread+0x1b592a ffffee87`da42eb80 fffff804`2e4b7c08     : 00000000`00000000 00000000`00000000 ffffde8c`a5a481c0 ffffde8c`a32d5c40 : nt!KiExitDispatcher+0x141 ffffee87`da42ebf0 fffff804`2e5429b8     : ffffde8c`a3272630 00000000`0000000a ffffde8c`c2de1148 ffffde8c`00000000 : nt!ExpQueueWorkItem+0x1d8 ffffee87`da42ec80 fffff804`2e54296b     : 00000000`0000002a 00000000`0000002a 00000000`00000002 00000000`0000000a : nt!ExQueueWorkItemFromIo+0x40 ffffee87`da42ecc0 fffff804`345270a2     : ffffde8c`bf3b5898 ffffde8c`c2de1090 ffffde8c`bfa7f988 00000000`00000000 : nt!IoQueueWorkItemEx+0x1b ffffee87`da42ecf0 fffff804`34559010     : ffffde8c`a5ea3010 ffffde8c`bfc6c000 00000000`00000000 ffffde8c`c2de1090 : fvevol!FvepQueueWorkItem+0x132 ffffee87`da42ed90 fffff804`34551330     : 00000000`00040000 ffffde8c`c2de1090 ffffee87`da42f001 ffffee87`da42f001 : fvevol!FveIoCryptoWorkSchedule+0x120 ffffee87`da42ee20 fffff804`34550ff3     : ffffee87`da42eeb0 ffffde8c`c30c0000 ffffee87`da42f001 ffffde8c`c30c0000 : fvevol!FveCryptoWorkQueue+0x90 ffffee87`da42ee60 fffff804`34550d77     : ffffde8c`cb807010 ffffde8c`cb807203 ffffee87`da42f0a9 00000000`00000000 : fvevol!FveReadCompletionRoutine+0x26f ffffee87`da42eff0 fffff804`2e484f1e     : ffffde8c`a5f82c40 ffffde8c`cb807293 ffffde8c`cb807010 ffffde8c`a5a555c0 : fvevol!ReadCompletionRoutine+0x17 ffffee87`da42f020 fffff804`2e484de7     : 00000000`00000001 ffffde8c`cb807201 ffffde8c`cb807010 ffffde8c`a5fdb040 : nt!IopfCompleteRequest+0x11e ffffee87`da42f110 fffff804`34875843     : ffffde8c`a5fdb040 ffffde8c`cb198150 ffffee87`da42f240 ffffde8c`cb198150 : nt!IofCompleteRequest+0x17 ffffee87`da42f140 fffff804`2e484f1e     : ffffc781`2443c000 00000000`00000000 00000000`00000000 00000000`00000000 : CLASSPNP!TransferPktComplete+0x5e3 ffffee87`da42f350 fffff804`2e484de7     : 00000000`00000000 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!IopfCompleteRequest+0x11e ffffee87`da42f440 fffff804`33879fd1     : ffffde8c`a5aa1d50 00000000`00000000 00000000`00000000 fffff804`2ebb1149 : nt!IofCompleteRequest+0x17 ffffee87`da42f470 fffff804`33879944     : ffffc781`2443c020 ffffc781`2443c020 ffffee87`da42f640 00000000`00000000 : storport!RaidCompleteRequestEx+0x91 ffffee87`da42f540 fffff804`3388ad8c     : ffffee87`da42f720 00000000`00000000 fffff780`00000320 ffffc781`2443c020 : storport!RaidUnitCompleteRequest+0xf64 ffffee87`da42f6c0 fffff804`2e49a24e     : ffffee87`da42fa30 ffffee87`da42f860 00000000`00000000 ffffc781`00000002 : storport!RaidpAdapterRedirectDpcRoutine+0x8c ffffee87`da42f760 fffff804`2e499534     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e ffffee87`da42f8d0 fffff804`2e5fae0e     : ffffffff`00000000 ffffc781`233d7180 ffffc781`233e2340 ffffde8c`cb944080 : nt!KiRetireDpcList+0x1f4 ffffee87`da42fb60 00000000`00000000     : ffffee87`da430000 ffffee87`da429000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e   SYMBOL_NAME:  fvevol!FvepQueueWorkItem+132  MODULE_NAME: fvevol  IMAGE_NAME:  fvevol.sys  STACK_COMMAND:  .thread ; .cxr ; kb  BUCKET_ID_FUNC_OFFSET:  132  FAILURE_BUCKET_ID:  0x133_DPC_fvevol!FvepQueueWorkItem  OS_VERSION:  10.0.19041.1  BUILDLAB_STR:  vb_release  OSPLATFORM_TYPE:  x64  OSNAME:  Windows 10  FAILURE_ID_HASH:  {333ff40d-cefd-5c84-2b3d-2500be4f9bf3}  Followup:     MachineOwner ---------      ,您好!感谢您联系本站支持平台!了解到您目前遇到Windows操作系统出现绿屏,您不用担心,此问题一般是由于系统中某些应用所属进程或驱动出现问题导致系统宕机引起的,需要您提供您的minidump文件本身来分析您系统故障的原因,您可以通过以下方案收集您的dump日志文件:打开控制面板>>系统>>高级系统设置>>高级>>启动和故障恢复>>设置,写入调试信息>>选择“小内存转储(256KB)”,路径选择默认,确定并重启您的计算机。再次异常关机后,前往C:\Windows\Minidump提取即可。再将您收集到的minidump文件通过私信提供给。另外,也
        Microsoft(R)WindowsDebuggerVersion6.11.0001.404X86Copyright(c)MicrosoftCorporation.Allrightsreserved.LoadingDumpFile

点赞(75) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部