none
蓝屏求解决,ntkrnlmp.exe 14393.4046 sever2016系统 RRS feed

  • 問題

  • Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [D:\桌面\060921-6718-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available


    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*
    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 14393 MP (16 procs) Free x64
    Product: Server, suite: TerminalServer
    Edition build lab: 14393.4046.amd64fre.rs1_release.201028-1803
    Machine Name:
    Kernel base = 0xfffff802`c5e8c000 PsLoadedModuleList = 0xfffff802`c61900a0
    Debug session time: Wed Jun  9 11:05:42.455 2021 (UTC + 8:00)
    System Uptime: 1 days 2:52:31.360
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    ...........
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff802`c5fe92e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffaa00`b87fcd90=0000000000000133
    10: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DPC_WATCHDOG_VIOLATION (133)
    The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
    or above.
    Arguments:
    Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
    Arg2: 0000000000001e00, The watchdog period.
    Arg3: fffff802c6232540, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
    Arg4: 0000000000000000

    Debugging Details:
    ------------------

    *************************************************************************
    ***                                                                   ***
    ***                                                                   ***
    ***    Either you specified an unqualified symbol, or your debugger   ***
    ***    doesn't have full symbol information.  Unqualified symbol      ***
    ***    resolution is turned off by default. Please either specify a   ***
    ***    fully qualified symbol module!symbolname, or enable resolution ***
    ***    of unqualified symbols by typing ".symopt- 100". Note that     ***
    ***    enabling unqualified symbol resolution with network symbol     ***
    ***    server shares in the symbol path may cause the debugger to     ***
    ***    appear to hang for long periods of time when an incorrect      ***
    ***    symbol name is typed or the network symbol server is down.     ***
    ***                                                                   ***
    ***    For some commands to work properly, your symbol path           ***
    ***    must point to .pdb files that have full type information.      ***
    ***                                                                   ***
    ***    Certain .pdb files (such as the public OS symbols) do not      ***
    ***    contain the required information.  Contact the group that      ***
    ***    provided you with these symbols if you need this command to    ***
    ***    work.                                                          ***
    ***                                                                   ***
    ***    Type referenced: TickPeriods                                   ***
    ***                                                                   ***
    *************************************************************************

    KEY_VALUES_STRING: 1

        Key  : Analysis.CPU.mSec
        Value: 3405

        Key  : Analysis.DebugAnalysisManager
        Value: Create

        Key  : Analysis.Elapsed.mSec
        Value: 11468

        Key  : Analysis.Init.CPU.mSec
        Value: 1859

        Key  : Analysis.Init.Elapsed.mSec
        Value: 8913

        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 69

        Key  : WER.OS.Branch
        Value: rs1_release

        Key  : WER.OS.Timestamp
        Value: 2020-10-28T18:03:00Z

        Key  : WER.OS.Version
        Value: 10.0.14393.4046


    BUGCHECK_CODE:  133

    BUGCHECK_P1: 1

    BUGCHECK_P2: 1e00

    BUGCHECK_P3: fffff802c6232540

    BUGCHECK_P4: 0

    DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

    TRAP_FRAME:  ffffaa00bbc703e0 -- (.trap 0xffffaa00bbc703e0)
    Unable to read trap frame at ffffaa00`bbc703e0

    CUSTOMER_CRASH_COUNT:  1

    PROCESS_NAME:  svchost.exe

    STACK_TEXT:  
    ffffaa00`b87fcd88 fffff802`c5ebf52a     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`c6232540 : nt!KeBugCheckEx
    ffffaa00`b87fcd90 fffff802`c5ebc778     : 0000ff92`314b74bf 00000000`00000000 ffffaa00`bbc706e0 fffff780`00000320 : nt!KeAccumulateTicks+0x42a
    ffffaa00`b87fcdf0 fffff802`c5e134e5     : ffffd303`41d0ec00 ffffd303`41d0ec00 00000000`00000001 ffffd303`41d0ec00 : nt!KeClockInterruptNotify+0xb8
    ffffaa00`b87fcf40 fffff802`c5f373f6     : ffff3ba9`36484b00 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x15
    ffffaa00`b87fcf70 fffff802`c5feaada     : ffffaa00`bbc70460 ffffd303`465634d0 ffffd303`4508e930 ffffd303`465632e0 : nt!KiCallInterruptServiceRoutine+0x106
    ffffaa00`b87fcfb0 fffff802`c5feafc7     : 00000000`00000000 00000000`d2ad4d7c ffffd303`465634d0 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
    ffffaa00`bbc703e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37


    SYMBOL_NAME:  nt!KeAccumulateTicks+42a

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    IMAGE_VERSION:  10.0.14393.4046

    STACK_COMMAND:  .thread ; .cxr ; kb

    BUCKET_ID_FUNC_OFFSET:  42a

    FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

    OS_VERSION:  10.0.14393.4046

    BUILDLAB_STR:  rs1_release

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 10

    FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

    Followup:     MachineOwner
    2021年6月23日 5:53