通过以太网连接到互联网时出现 BSOD

通过以太网连接到互联网时出现 BSOD

问题定义

我在联想笔记本电脑上使用 Windows 10,配有 Realtek 网卡。网卡在设备管理器中显示为“Realtek PCIe GbE 系列控制器”,我通常使用以太网连接到互联网。这 3/4 年一直运行良好。几天以来,通过以太网连接到互联网 30 到 90 秒后,我收到 BSOD 并且 PC 重新启动。

我做了什么(并没有解决问题)

  1. 我确信这是一个 IP 地址冲突问题。我有静态 IP 地址,但可以更改为动态。我这样做了,但在典型的 30 到 90 秒后,PC 出现了 BSOD 并重新启动。
  2. 我从供应商网站下载了最新的驱动程序。我现在拥有 2022 年 8 月 24 日的驱动程序版本 10.62.824.2022。
  3. 根据建议莫伊舍·皮皮克博士, 我用了Windows DISM 和 SFC 实用程序检查系统文件问题。DISM 没有发现任何问题。SFC 发现并修复了一些问题,但这并不能解决 BSOD 问题。
  4. 根据建议猎羊犬,我更新到了 Windows 10 22H2。之后,我插上了以太网线。几分钟后……再次出现 BSOD。
  5. 根据建议丹尼尔B我在连接以太网时禁用了 Wi-Fi 卡(Intel 双频 Wireless-AC 3160)。几分钟后……情况还是一样。(您可能注意到,我们现在讨论的是分钟,而不是 30 秒到 90 秒。
  6. 根据建议思凯利我开始更新一些驱动程序。由于我已经更新了以太网卡驱动程序,因此,考虑到丹尼尔B问题可能是由 Wi-Fi 引起的,我决定先更新 Wi-Fi 驱动程序。现在的版本是 2019 年 4 月 29 日的 18.33.17.1,取代了 2016 年的版本。几分钟后... BSOD。
  7. 根据建议约翰,我禁用了以太网卡并通过 USB LAN 网卡连接。同样的故事。

我提取的信息

我执行了 WinDbg(只是因为我读到它很有用)希望有人明白发生了什么:

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`37200000 PsLoadedModuleList = 0xfffff803`37e2a2b0
Debug session time: Wed Nov 23 13:40:22.028 2022 (UTC + 1:00)
System Uptime: 0 days 4:56:48.766
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols

Loading unloaded module list
.......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`375f92d0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff803`3c67ee20=0000000000000133
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80337efb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6936

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 965324

    Key  : Analysis.IO.Other.Mb
    Value: 14

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 1531

    Key  : Analysis.Init.Elapsed.mSec
    Value: 473411

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 110

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133

    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x133

    Key  : Bugcheck.Code.Register
    Value: 0x133

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  MEMORY.DMP

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80337efb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff9a84bf4ae1f0 -- (.trap 0xffff9a84bf4ae1f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001d20c0002 rbx=0000000000000000 rcx=fffff80337e59740
rdx=fffffffffffffff0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80337602907 rsp=ffff9a84bf4ae380 rbp=ffff9a84bf4ae471
 r8=fffffffffffffff0  r9=0000000000000000 r10=fffff80337e59740
r11=ffff8dffc5000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff803`37602907 498b08          mov     rcx,qword ptr [r8] ds:ffffffff`fffffff0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

STACK_TEXT:  
fffff803`3c67ee18 fffff803`3765bf02     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`37efb320 : nt!KeBugCheckEx
fffff803`3c67ee20 fffff803`374d2973     : 00002d47`78984ce4 fffff803`33f87180 00000000`00000000 fffff803`33f87180 : nt!KeAccumulateTicks+0x186d32
fffff803`3c67ee80 fffff803`374d245a     : fffff803`37ef3880 ffff9a84`bf4adf00 fffff803`3ca8d800 00000000`0000a201 : nt!KeClockInterruptNotify+0x453
fffff803`3c67ef30 fffff803`37408a45     : fffff803`37ef3880 fffff803`3c67ef40 00000000`00000010 ffff959c`76c911b0 : nt!HalpTimerClockIpiRoutine+0x1a
fffff803`3c67ef60 fffff803`375fb26a     : ffff9a84`bf4adf00 fffff803`37ef3880 00000000`00000200 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`3c67efb0 fffff803`375fba37     : fffff71b`f5e422c0 fffff803`3752300a ffff9a84`00000000 ffffffff`fffffff0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff9a84`bf4ade80 fffff803`3760d3ad     : 00000000`00000000 ffff9a84`bf4ae270 ffffffff`ffffffd2 fffff803`3743962f : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff9a84`bf4ae010 fffff803`37608ebd     : fffff803`37e59740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x6d
ffff9a84`bf4ae1f0 fffff803`37602907     : fffff803`37e59740 fffff803`37427b0f ffffd607`834c9b20 ffffd607`88b83dc0 : nt!KiPageFault+0x43d
ffff9a84`bf4ae380 fffff803`37427b0f     : ffffd607`834c9b20 ffffd607`88b83dc0 00000000`00000000 ffffd607`8acfb200 : nt!ExpInterlockedPopEntrySListFault
ffff9a84`bf4ae390 fffff803`37bb5094     : 00000000`00000000 ffffd607`8b199a40 00000000`766d6777 00000000`00000000 : nt!ExAllocateHeapPool+0x49f
ffff9a84`bf4ae4d0 fffff803`4f80a9bc     : fffff803`4f89fa00 ffffd607`8ee17010 ffffd607`905c7a10 ffffd607`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff9a84`bf4ae520 fffff803`4f80d7b2     : 00000000`00000000 ffff9a84`bf4ae5b8 ffffd607`8ee17010 00000000`0000000a : nwifi!Dot11AllocateRecvPacket+0x90
ffff9a84`bf4ae560 fffff803`4f80e533     : ffffd607`8a000302 ffffd607`00000030 00000000`00000004 00000000`00000000 : nwifi!Pt6RepackRecvNBL+0xa2
ffff9a84`bf4ae600 fffff803`3bc67ef0     : ffffd607`8f2a3c30 fffff803`4f80e3b0 ffffd607`887d5020 00000000`00000001 : nwifi!Pt6Receive+0x183
ffff9a84`bf4ae660 fffff803`3bc9df58     : ffffd607`8acf8700 ffff9a84`bf4ae731 ffffd607`8acf8530 fffff804`ae77ca8b : ndis!ndisCallReceiveHandler+0x60
ffff9a84`bf4ae6b0 fffff803`3bc64a94     : 00000000`00114631 00000000`00000001 ffffd607`839b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x148
ffff9a84`bf4ae780 fffff804`ae7b1296     : 00000000`00000000 00000000`00000000 ffffd607`8c224d80 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff9a84`bf4ae810 fffff804`ae77d325     : ffffd607`8b8b9118 00000000`00000000 ffff9a84`bf4ae901 ffffd607`8b3c8b10 : Netwbw02!doApiIndicateReceiveNbl+0x92
ffff9a84`bf4ae850 fffff804`ae7c8742     : ffffd607`0000000a 00000029`2f6c5767 ffffd607`90eceb30 00000029`2f6c5767 : Netwbw02!prvRxDataHandlePhyHdrFrames+0x715
ffff9a84`bf4ae8b0 fffff804`ae7c0839     : ffffd607`00000000 ffffd607`8b76b8ff 00000000`00000000 fffff803`374125df : Netwbw02!rfdQueueProcessFragments+0x1e2
ffff9a84`bf4ae950 fffff804`ae7b7598     : 00000000`00000000 ffffd607`8b76b8a0 ffffd607`839b71a0 00000000`00000000 : Netwbw02!isrHandlerRoutine+0x221
ffff9a84`bf4ae9b0 fffff804`ae7a9192     : 00000000`00000000 ffffd607`834a8060 00000000`00000000 ffff9a84`bf4aeaa1 : Netwbw02!alonExInterruptHandlerRoutine+0x1c
ffff9a84`bf4ae9e0 fffff803`3bcc6df8     : 00000000`00000000 ffff9a84`00000000 00000000`00000000 ffffd607`834b5180 : Netwbw02!oscHandleInterrupt+0x12
ffff9a84`bf4aea10 fffff803`3bcc72ec     : ffffd607`8b76bb88 00000000`0000000a 00000000`00000001 00000000`00000000 : ndis!ndisMiniportDpc+0xf0
ffff9a84`bf4aeaa0 fffff803`3bcb7dfb     : ffffd607`834a8040 ffffd607`834a8040 ffff9a84`bf4aeba9 fffff803`3bc97100 : ndis!ndisQueuedMiniportDpcWorkItem+0x11c
ffff9a84`bf4aeb40 fffff803`37471d25     : ffffd607`834b5040 ffffd607`834b5040 fffff803`3bc97130 00000000`00000000 : ndis!ndisReceiveWorkerThread+0x20ccb
ffff9a84`bf4aec10 fffff803`37601f08     : fffff803`33f87180 ffffd607`834b5040 fffff803`37471cd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9a84`bf4aec60 00000000`00000000     : ffff9a84`bf4af000 ffff9a84`bf4a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nwifi!Dot11AllocateRecvPacket+90

MODULE_NAME: nwifi

IMAGE_NAME:  nwifi.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  90

FAILURE_BUCKET_ID:  0x133_ISR_nwifi!Dot11AllocateRecvPacket

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {10acb27e-cf1f-e7d3-8b3d-9ec902e8eafb}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80337efb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5077

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5084

    Key  : Analysis.IO.Other.Mb
    Value: 14

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 8468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1438739

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 113

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133

    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x133

    Key  : Bugcheck.Code.Register
    Value: 0x133

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  MEMORY.DMP

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80337efb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff9a84bf4ae1f0 -- (.trap 0xffff9a84bf4ae1f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001d20c0002 rbx=0000000000000000 rcx=fffff80337e59740
rdx=fffffffffffffff0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80337602907 rsp=ffff9a84bf4ae380 rbp=ffff9a84bf4ae471
 r8=fffffffffffffff0  r9=0000000000000000 r10=fffff80337e59740
r11=ffff8dffc5000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff803`37602907 498b08          mov     rcx,qword ptr [r8] ds:ffffffff`fffffff0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

STACK_TEXT:  
fffff803`3c67ee18 fffff803`3765bf02     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`37efb320 : nt!KeBugCheckEx
fffff803`3c67ee20 fffff803`374d2973     : 00002d47`78984ce4 fffff803`33f87180 00000000`00000000 fffff803`33f87180 : nt!KeAccumulateTicks+0x186d32
fffff803`3c67ee80 fffff803`374d245a     : fffff803`37ef3880 ffff9a84`bf4adf00 fffff803`3ca8d800 00000000`0000a201 : nt!KeClockInterruptNotify+0x453
fffff803`3c67ef30 fffff803`37408a45     : fffff803`37ef3880 fffff803`3c67ef40 00000000`00000010 ffff959c`76c911b0 : nt!HalpTimerClockIpiRoutine+0x1a
fffff803`3c67ef60 fffff803`375fb26a     : ffff9a84`bf4adf00 fffff803`37ef3880 00000000`00000200 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`3c67efb0 fffff803`375fba37     : fffff71b`f5e422c0 fffff803`3752300a ffff9a84`00000000 ffffffff`fffffff0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff9a84`bf4ade80 fffff803`3760d3ad     : 00000000`00000000 ffff9a84`bf4ae270 ffffffff`ffffffd2 fffff803`3743962f : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff9a84`bf4ae010 fffff803`37608ebd     : fffff803`37e59740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x6d
ffff9a84`bf4ae1f0 fffff803`37602907     : fffff803`37e59740 fffff803`37427b0f ffffd607`834c9b20 ffffd607`88b83dc0 : nt!KiPageFault+0x43d
ffff9a84`bf4ae380 fffff803`37427b0f     : ffffd607`834c9b20 ffffd607`88b83dc0 00000000`00000000 ffffd607`8acfb200 : nt!ExpInterlockedPopEntrySListFault
ffff9a84`bf4ae390 fffff803`37bb5094     : 00000000`00000000 ffffd607`8b199a40 00000000`766d6777 00000000`00000000 : nt!ExAllocateHeapPool+0x49f
ffff9a84`bf4ae4d0 fffff803`4f80a9bc     : fffff803`4f89fa00 ffffd607`8ee17010 ffffd607`905c7a10 ffffd607`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff9a84`bf4ae520 fffff803`4f80d7b2     : 00000000`00000000 ffff9a84`bf4ae5b8 ffffd607`8ee17010 00000000`0000000a : nwifi!Dot11AllocateRecvPacket+0x90
ffff9a84`bf4ae560 fffff803`4f80e533     : ffffd607`8a000302 ffffd607`00000030 00000000`00000004 00000000`00000000 : nwifi!Pt6RepackRecvNBL+0xa2
ffff9a84`bf4ae600 fffff803`3bc67ef0     : ffffd607`8f2a3c30 fffff803`4f80e3b0 ffffd607`887d5020 00000000`00000001 : nwifi!Pt6Receive+0x183
ffff9a84`bf4ae660 fffff803`3bc9df58     : ffffd607`8acf8700 ffff9a84`bf4ae731 ffffd607`8acf8530 fffff804`ae77ca8b : ndis!ndisCallReceiveHandler+0x60
ffff9a84`bf4ae6b0 fffff803`3bc64a94     : 00000000`00114631 00000000`00000001 ffffd607`839b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x148
ffff9a84`bf4ae780 fffff804`ae7b1296     : 00000000`00000000 00000000`00000000 ffffd607`8c224d80 00000000`0000000a : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff9a84`bf4ae810 fffff804`ae77d325     : ffffd607`8b8b9118 00000000`00000000 ffff9a84`bf4ae901 ffffd607`8b3c8b10 : Netwbw02!doApiIndicateReceiveNbl+0x92
ffff9a84`bf4ae850 fffff804`ae7c8742     : ffffd607`0000000a 00000029`2f6c5767 ffffd607`90eceb30 00000029`2f6c5767 : Netwbw02!prvRxDataHandlePhyHdrFrames+0x715
ffff9a84`bf4ae8b0 fffff804`ae7c0839     : ffffd607`00000000 ffffd607`8b76b8ff 00000000`00000000 fffff803`374125df : Netwbw02!rfdQueueProcessFragments+0x1e2
ffff9a84`bf4ae950 fffff804`ae7b7598     : 00000000`00000000 ffffd607`8b76b8a0 ffffd607`839b71a0 00000000`00000000 : Netwbw02!isrHandlerRoutine+0x221
ffff9a84`bf4ae9b0 fffff804`ae7a9192     : 00000000`00000000 ffffd607`834a8060 00000000`00000000 ffff9a84`bf4aeaa1 : Netwbw02!alonExInterruptHandlerRoutine+0x1c
ffff9a84`bf4ae9e0 fffff803`3bcc6df8     : 00000000`00000000 ffff9a84`00000000 00000000`00000000 ffffd607`834b5180 : Netwbw02!oscHandleInterrupt+0x12
ffff9a84`bf4aea10 fffff803`3bcc72ec     : ffffd607`8b76bb88 00000000`0000000a 00000000`00000001 00000000`00000000 : ndis!ndisMiniportDpc+0xf0
ffff9a84`bf4aeaa0 fffff803`3bcb7dfb     : ffffd607`834a8040 ffffd607`834a8040 ffff9a84`bf4aeba9 fffff803`3bc97100 : ndis!ndisQueuedMiniportDpcWorkItem+0x11c
ffff9a84`bf4aeb40 fffff803`37471d25     : ffffd607`834b5040 ffffd607`834b5040 fffff803`3bc97130 00000000`00000000 : ndis!ndisReceiveWorkerThread+0x20ccb
ffff9a84`bf4aec10 fffff803`37601f08     : fffff803`33f87180 ffffd607`834b5040 fffff803`37471cd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9a84`bf4aec60 00000000`00000000     : ffff9a84`bf4af000 ffff9a84`bf4a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nwifi!Dot11AllocateRecvPacket+90

MODULE_NAME: nwifi

IMAGE_NAME:  nwifi.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  90

FAILURE_BUCKET_ID:  0x133_ISR_nwifi!Dot11AllocateRecvPacket

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {10acb27e-cf1f-e7d3-8b3d-9ec902e8eafb}

Followup:     MachineOwner
---------

接下来是什么?

好吧,这由你来写。我现在靠 Wi-Fi 生存,它不太稳定。我在双启动机器上,注意到我可以在 Ubuntu 中连接到以太网,所以我可能会切换到 Ubuntu。我喜欢它,但有时当我必须在 Ubuntu 中编辑 word 文档时,我会很恼火。

在调试文件中,我注意到提到了 DPC_Watchdog,因此我在网上查找了如何解决这个问题,并找到了一些建议这里,但在尝试完全随机的事情之前,我想听听是否有人有一些好的建议。

答案1

我解决了这个问题……好吧……或多或少。这意味着我能够让 BSOD 消失,但我不知道到底发生了什么。基本上,在我的工作场所,我们可以使用静态 IP(导致我的 PC 出现 BSOD)、DHCP(导致我的 PC 出现 BSOD)和强制门户。我要求 IT 部门为我激活强制门户的套接字……好吧,我现在通过以太网连接了 2 个小时!我对 IT 了解不够,无法理解原因。我猜导致 BSOD 的问题协议在通过强制门户运行时没有使用。我对这个解决方案很满意(暂时)。如果有人想了解发生了什么,我可以进行一些测试:如果我的 IT 人员没有从我的所有以太网套接字停用 DHCP。

相关内容