2023款拯救者Y7000P win11 windbg蓝屏分析日志如下: ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds************* Waiting for Debugger Extensions Gallery to Initialize **************>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 43Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\22386\Desktop\042025-10421-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: srv*Executable search path is: Windows 10 Kernel Version 22621 MP (20 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTS PersonalKernel base = 0xfffff800`5ee00000 PsLoadedModuleList = 0xfffff800`5fa134f0Debug session time: Sun Apr 20 14:25:15.136 2025 (UTC + 8:00)System Uptime: 0 days 23:37:27.812Loading Kernel Symbols.......................................................................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list....................For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff800`5f2148b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffba80`2e3abc90=000000000000013310: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************DPC_WATCHDOG_VIOLATION (133)The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVELor above.Arguments:Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above.Arg2: 0000000000001e00, The watchdog period (in ticks).Arg3: fffff8005fb1c340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeoutArg4: 0000000000000000Debugging Details:------------------**************************************************************************** ****** ****** Either you specified an unqualified symbol, or your debugger ****** doesn't have full symbol information. Unqualified symbol ****** resolution is turned off by default. Please either specify a ****** fully qualified symbol module!symbolname, or enable resolution ****** of unqualified symbols by typing ".symopt- 100". Note that ****** enabling unqualified symbol resolution with network symbol ****** server shares in the symbol path may cause the debugger to ****** appear to hang for long periods of time when an incorrect ****** symbol name is typed or the network symbol server is down. ****** ****** For some commands to work properly, your symbol path ****** must point to .pdb files that have full type information. ****** ****** Certain .pdb files (such as the public OS symbols) do not ****** contain the required information. Contact the group that ****** provided you with these symbols if you need this command to ****** work. ****** ****** Type referenced: TickPeriods ****** ****************************************************************************KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 359 Key : Analysis.Elapsed.mSec Value: 6823 Key : Analysis.IO.Other.Mb Value: 15 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 25 Key : Analysis.Init.CPU.mSec Value: 171 Key : Analysis.Init.Elapsed.mSec Value: 83683 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Analysis.Version.DbgEng Value: 10.0.27793.1000 Key : Analysis.Version.Description Value: 10.2410.02.02 amd64fre Key : Analysis.Version.Ext Value: 1.2410.2.2 Key : Bugcheck.Code.LegacyAPI Value: 0x133 Key : Bugcheck.Code.TargetModel Value: 0x133 Key : Dump.Attributes.AsUlong Value: 0x1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: 0x133_ISR_netrtp!unknown_function Key : Failure.Hash Value: {d1a52398-623d-e4a5-5951-02cd99e33301} Key : Stack.Pointer Value: ISRBUGCHECK_CODE: 133BUGCHECK_P1: 1BUGCHECK_P2: 1e00BUGCHECK_P3: fffff8005fb1c340BUGCHECK_P4: 0FILE_IN_CAB: 042025-10421-01.dmpDUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage DumpFAULTING_THREAD: ffffd183ef655080DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDEDBLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: SystemSTACK_TEXT: ffffba80`2e3abc88 fffff800`5f086129 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`5fb1c340 : nt!KeBugCheckExffffba80`2e3abc90 fffff800`5f085991 : 0000844e`a244ad84 ffffba80`2e3abd58 00000000`00530df3 00000000`00000000 : nt!KeAccumulateTicks+0x239ffffba80`2e3abcf0 fffff800`5f083a21 : 00000000`00000000 00000000`00000000 ffffba80`2e391180 00000000`00000000 : nt!KiUpdateRunTime+0xd1ffffba80`2e3abea0 fffff800`5f08344a : fffff800`5fa5ff88 00000000`00000001 00000000`00000001 00000000`00000002 : nt!KeClockInterruptNotify+0xc1ffffba80`2e3abf40 fffff800`5f11d64c : 000000c6`048c8596 ffffd183`d015b500 ffffd183`d015b5b0 00000000`00000000 : nt!HalpTimerClockInterrupt+0x10affffba80`2e3abf70 fffff800`5f216aba : ffffcd8b`3633f9d0 ffffd183`d015b500 00000000`00000000 00000000`00000004 : nt!KiCallInterruptServiceRoutine+0x9cffffba80`2e3abfb0 fffff800`5f217387 : ffffd183`ef655080 00000000`00000002 ffffba80`2e391180 ffffd183`ef655080 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfaffffcd8b`3633f950 fffff800`adfe67fc : fffff800`adfe91e8 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37ffffcd8b`3633fae0 fffff800`adfe91e8 : 00000000`00000000 00000000`00000004 00000000`00000000 ffffcd8b`40ede490 : netrtp+0x67fcffffcd8b`3633fae8 00000000`00000000 : 00000000`00000004 00000000`00000000 ffffcd8b`40ede490 fffff800`adfe9240 : netrtp+0x91e8SYMBOL_NAME: netrtp+67fcMODULE_NAME: netrtpIMAGE_NAME: netrtp.sysSTACK_COMMAND: .process /r /p 0xffffd183d0153040; .thread 0xffffd183ef655080 ; kbBUCKET_ID_FUNC_OFFSET: 67fcFAILURE_BUCKET_ID: 0x133_ISR_netrtp!unknown_functionOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {d1a52398-623d-e4a5-5951-02cd99e33301}Followup: MachineOwner--------- |