当前位置:   article > 正文

DPC_WATCHDOG_VIOLATION蓝屏求助_************* preparing the environment for debugg

************* preparing the environment for debugger extensions gallery repo

最近总是出现这种蓝屏,有没有大佬指导一下如何解决

************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToV8JsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41 Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\040824-9281-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (24 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff806`54800000 PsLoadedModuleList = 0xfffff806`5542a730 Debug session time: Mon Apr 8 10:19:46.592 2024 (UTC + 8:00) System Uptime: 0 days 0:39:37.485 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ...................... Loading User Symbols PEB is paged out (Peb.Ldr = 0000003c`f6297018). Type ".hh dbgerr001" for details Loading unloaded module list ....... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`54bfd890 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe580`0e8aac90=0000000000000133 22: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. Arg2: 0000000000001e00, The watchdog period (in ticks). Arg3: fffff806554fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2515 Key : Analysis.Elapsed.mSec Value: 11454 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 452 Key : Analysis.Init.Elapsed.mSec Value: 2869 Key : Analysis.Memory.CommitPeak.Mb Value: 97 Key : Bugcheck.Code.LegacyAPI Value: 0x133 Key : Bugcheck.Code.TargetModel Value: 0x133 Key : Failure.Bucket Value: 0x133_ISR_nt!KeAccumulateTicks Key : Failure.Hash Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff806554fb320 BUGCHECK_P4: 0 FILE_IN_CAB: 040824-9281-01.dmp DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: ffffce844a2e6f10 -- (.trap 0xffffce844a2e6f10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=020fbc8c3c9a0000 rdx=00000000000c00e1 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80654ab9101 rsp=ffffce844a2e70a0 rbp=ffffffffffffffff r8=000000000000082f r9=00000000000000e1 r10=0000fffff80654b2 r11=ffffd57ef8600000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!KeFlushProcessWriteBuffers+0xb5: fffff806`54ab9101 ebf2 jmp nt!KeFlushProcessWriteBuffers+0xa9 (fffff806`54ab90f5) Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: ToDesk.exe STACK_TEXT: ffffe580`0e8aac88 fffff806`54c37d96 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`554fb320 : nt!KeBugCheckEx ffffe580`0e8aac90 fffff806`54a5937d : 0000080a`4ec7963a ffffe580`0e890180 00000000`00000246 00000000`0002525f : nt!KeAccumulateTicks+0x1e1c36 ffffe580`0e8aacf0 fffff806`54a518d1 : 00000000`00023400 00000000`00016245 ffffe580`0e890180 00000000`00000001 : nt!KiUpdateRunTime+0x5d ffffe580`0e8aad40 fffff806`54a53793 : ffffe580`0e890180 00000000`00000000 fffff806`55431a40 00000000`00000000 : nt!KiUpdateTime+0x4a1 ffffe580`0e8aae80 fffff806`54a509a2 : ffffce84`4a2e6f10 ffffce84`4a2e6f90 ffffce84`4a2e6f00 00000000`0000000c : nt!KeClockInterruptNotify+0x2e3 ffffe580`0e8aaf30 fffff806`54b00805 : 00000005`89393332 ffffbd0f`d4b46980 ffffbd0f`d4b46a30 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2 ffffe580`0e8aaf60 fffff806`54bff8ca : ffffce84`4a2e6f90 ffffbd0f`d4b46980 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5 ffffe580`0e8aafb0 fffff806`54c000f7 : 00000000`00000000 fffff806`5552f178 fffff806`50b4f5f8 fffff806`54a4f35a : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffffce84`4a2e6f10 fffff806`54ab9101 : ffffce84`4a2e70e8 ffffce84`4a2e70e0 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffffce84`4a2e70a0 fffff806`54e46f63 : 00000000`00000000 ffffce84`4a2e7b40 00000000`00000001 00000000`00000001 : nt!KeFlushProcessWriteBuffers+0xb5 ffffce84`4a2e70e0 fffff806`54e0ffb7 : ffffce84`4a2e7778 ffffce84`00010000 ffffbd0f`f27e4300 00000000`00000000 : nt!ExpGetProcessInformation+0x183 ffffce84`4a2e7740 fffff806`54e0f167 : ffffbd0f`ecc3a080 fffff806`54e8c34f 0aaaaaaa`aaaaaaa9 00000000`00000748 : nt!ExpQuerySystemInformation+0xd07 ffffce84`4a2e7a80 fffff806`54c11578 : ffffbd0f`ecc30000 00000000`00000000 ffffffff`ffff3cb0 00000000`00000000 : nt!NtQuerySystemInformation+0x37 ffffce84`4a2e7ac0 00007ff9`b850d6a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000003c`f79fef18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b850d6a4 SYMBOL_NAME: nt!KeAccumulateTicks+1e1c36 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.4170 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 1e1c36 FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner --------- 22: kd> lmvm nt Browse full module list start end module name fffff806`54800000 fffff806`55846000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\3A3DF78E73ED8201D671C995F240BCDC1\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\3E4EF1D41046000\ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 3E4EF1D4 (This is a reproducible build file hash, not a timestamp) CheckSum: 00A64E43 ImageSize: 01046000 File version: 10.0.19041.4170 Product version: 10.0.19041.4170 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 10.0.19041.4170 FileVersion: 10.0.19041.4170 (WinBuild.160101.0800) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/weixin_40725706/article/detail/651616
推荐阅读
  

闽ICP备14008679号