丨丶孤舟蓑笠翁 2022-02-07 13:39 采纳率: 0%
浏览 62

WIN10频繁蓝屏死机

WinDbg分析结果:

Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`4f000000 PsLoadedModuleList = 0xfffff803`4fc2a1b0
Debug session time: Mon Feb  7 11:22:46.720 2022 (UTC + 8:00)
System Uptime: 6 days 18:29:55.266
Loading Kernel Symbols
...............................................................
....Page 3c75cb not present in the dump file. Type ".hh dbgerr004" for details
.......Page 2428fd not present in the dump file. Type ".hh dbgerr004" for details
.....................................................
................................................................
................
Loading User Symbols

Loading unloaded module list
..........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`4f3f73b0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9281`8dfbfe20=0000000000000133
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8034fcfa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2490

    Key  : Analysis.Init.CPU.mSec
    Value: 734

    Key  : Analysis.Init.Elapsed.mSec
    Value: 495534

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  MEMORY.DMP

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8034fcfa320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffc307e6c5ef80 -- (.trap 0xffffc307e6c5ef80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc307e6c5f168
rdx=ffffc307eb7e6f50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034f385cb9 rsp=ffffc307e6c5f110 rbp=ffffb28f926df080
 r8=ffffc307eb7e6d80  r9=ffffc307eb7e6d90 r10=fffff8034f385c70
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         ov up ei ng nz na po cy
nt!KiSwapDirectoryTableBaseTarget+0x49:
fffff803`4f385cb9 488d4c2458      lea     rcx,[rsp+58h]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

STACK_TEXT:  
ffff9281`8dfbfe18 fffff803`4f41f6fa     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9281`8dfbfe20 fffff803`4f216953     : 00003db7`2d203482 ffff9281`8df67180 00000000`00000000 ffff9281`8df67180 : nt!KeAccumulateTicks+0x20654a
ffff9281`8dfbfe80 fffff803`4f21643a     : ffffb28f`7a8ec9a0 ffffc307`e6c5f000 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff9281`8dfbff30 fffff803`4f2de205     : ffffb28f`7a8ec9a0 00000000`00000000 00000000`00000000 fffff604`586b1144 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9281`8dfbff60 fffff803`4f3f8e5a     : ffffc307`e6c5f000 ffffb28f`7a8ec9a0 00000000`80000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9281`8dfbffb0 fffff803`4f3f93c7     : 00000000`0b99cdd0 ffffc307`e6c5f168 ffffc307`eb7e6f50 ffffc307`eb7e6d80 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc307`e6c5ef80 fffff803`4f385cb9     : ffffc307`e6c5f438 ffffc307`e6c5f431 ffffc307`e6c5f460 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc307`e6c5f110 fffff803`4f29a3fe     : ffff9281`8df6a240 00000000`0b99f347 ffffb28f`7a899040 00000000`0000002f : nt!KiSwapDirectoryTableBaseTarget+0x49
ffffc307`e6c5f160 fffff803`4f2996e4     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffc307`e6c5f2d0 fffff803`4f3faf1e     : ffffffff`00000000 ffff9281`8df67180 ffff9281`8df72240 ffffb28f`99b1e080 : nt!KiRetireDpcList+0x1f4
ffffc307`e6c5f560 00000000`00000000     : ffffc307`e6c60000 ffffc307`e6c59000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+20654a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  20654a

FAILURE_BUCKET_ID:  0x133_DPC_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88dc98ce-f842-4daa-98d0-858621db6b0f}

Followup:     MachineOwner
---------

4: kd> lmvm nt
Browse full module list
start             end                 module name
fffff803`4f000000 fffff803`50046000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\3738E78C215998239C905008E2B592BC1\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\D2962B561046000\ntoskrnl.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        D2962B56 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A59651
    ImageSize:        01046000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:


看了好多,有说是驱动问题,有说是内存问题,不知道怎么解决?

  • 写回答

1条回答 默认 最新

  • →伆谂鈊铵ヤ 2022-02-07 13:54
    关注

    电脑用多久了,是使用某个软件之后才会蓝屏吗?还是就算什么也不干也会蓝屏啊

    评论

报告相同问题?

问题事件

  • 创建了问题 2月7日

悬赏问题

  • ¥15 C语言设计一个简单的自动换档程序
  • ¥15 关于logstash转发日志时发生的部分内容丢失问题
  • ¥17 pro*C预编译“闪回查询”报错SCN不能识别
  • ¥15 微信会员卡接入微信支付商户号收款
  • ¥15 如何获取烟草零售终端数据
  • ¥15 数学建模招标中位数问题
  • ¥15 phython路径名过长报错 不知道什么问题
  • ¥15 深度学习中模型转换该怎么实现
  • ¥15 Stata外部命令安装问题求帮助!
  • ¥15 从键盘随机输入A-H中的一串字符串,用七段数码管方法进行绘制。提交代码及运行截图。