WinDbg分析结果:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`4f000000 PsLoadedModuleList = 0xfffff803`4fc2a1b0
Debug session time: Mon Feb 7 11:22:46.720 2022 (UTC + 8:00)
System Uptime: 6 days 18:29:55.266
Loading Kernel Symbols
...............................................................
....Page 3c75cb not present in the dump file. Type ".hh dbgerr004" for details
.......Page 2428fd not present in the dump file. Type ".hh dbgerr004" for details
.....................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
..........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`4f3f73b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9281`8dfbfe20=0000000000000133
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8034fcfa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2490
Key : Analysis.Init.CPU.mSec
Value: 734
Key : Analysis.Init.Elapsed.mSec
Value: 495534
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8034fcfa320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffc307e6c5ef80 -- (.trap 0xffffc307e6c5ef80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc307e6c5f168
rdx=ffffc307eb7e6f50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034f385cb9 rsp=ffffc307e6c5f110 rbp=ffffb28f926df080
r8=ffffc307eb7e6d80 r9=ffffc307eb7e6d90 r10=fffff8034f385c70
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz na po cy
nt!KiSwapDirectoryTableBaseTarget+0x49:
fffff803`4f385cb9 488d4c2458 lea rcx,[rsp+58h]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
STACK_TEXT:
ffff9281`8dfbfe18 fffff803`4f41f6fa : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9281`8dfbfe20 fffff803`4f216953 : 00003db7`2d203482 ffff9281`8df67180 00000000`00000000 ffff9281`8df67180 : nt!KeAccumulateTicks+0x20654a
ffff9281`8dfbfe80 fffff803`4f21643a : ffffb28f`7a8ec9a0 ffffc307`e6c5f000 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff9281`8dfbff30 fffff803`4f2de205 : ffffb28f`7a8ec9a0 00000000`00000000 00000000`00000000 fffff604`586b1144 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9281`8dfbff60 fffff803`4f3f8e5a : ffffc307`e6c5f000 ffffb28f`7a8ec9a0 00000000`80000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9281`8dfbffb0 fffff803`4f3f93c7 : 00000000`0b99cdd0 ffffc307`e6c5f168 ffffc307`eb7e6f50 ffffc307`eb7e6d80 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc307`e6c5ef80 fffff803`4f385cb9 : ffffc307`e6c5f438 ffffc307`e6c5f431 ffffc307`e6c5f460 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc307`e6c5f110 fffff803`4f29a3fe : ffff9281`8df6a240 00000000`0b99f347 ffffb28f`7a899040 00000000`0000002f : nt!KiSwapDirectoryTableBaseTarget+0x49
ffffc307`e6c5f160 fffff803`4f2996e4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffc307`e6c5f2d0 fffff803`4f3faf1e : ffffffff`00000000 ffff9281`8df67180 ffff9281`8df72240 ffffb28f`99b1e080 : nt!KiRetireDpcList+0x1f4
ffffc307`e6c5f560 00000000`00000000 : ffffc307`e6c60000 ffffc307`e6c59000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KeAccumulateTicks+20654a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 20654a
FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}
Followup: MachineOwner
---------
4: kd> lmvm nt
Browse full module list
start end module name
fffff803`4f000000 fffff803`50046000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\3738E78C215998239C905008E2B592BC1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\D2962B561046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: D2962B56 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A59651
ImageSize: 01046000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
看了好多,有说是驱动问题,有说是内存问题,不知道怎么解决?