*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8073aefa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5749
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-NFPVV9V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 43360
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8073aefa320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffff888af2029630 -- (.trap 0xffff888af2029630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000003ce2ad45 rbx=0000000000000000 rcx=ffff888af2029820
rdx=ffff888af2029840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073a4c3537 rsp=ffff888af20297c0 rbp=ffff888af2029960
r8=ffff9d00f5480280 r9=0000000000000000 r10=0000fffff8073aba
r11=ffff8cfd0d600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff807`3a4c3537 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff9d00`f5474e18 fffff807`3a67955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9d00`f5474e20 fffff807`3a50518d : 000050d1`9f5391cf 00000000`00000000 ffff888a`f2029600 ffff9d00`f5480180 : nt!KeAccumulateTicks+0x17110a
ffff9d00`f5474e80 fffff807`3a50500a : ffff8d0f`aa902480 ffff888a`f20296b0 00000052`0045d66a 0000021b`00000000 : nt!KeClockInterruptNotify+0xbd
ffff9d00`f5474f30 fffff807`3a480795 : ffff8d0f`aa902480 00000000`00000000 00000000`00000000 fffff2c3`e1425134 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9d00`f5474f60 fffff807`3a5f594a : ffff888a`f20296b0 ffff8d0f`aa902480 000050c0`e2902ccb 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9d00`f5474fb0 fffff807`3a5f5eb7 : 00000000`00000000 fffff807`3ea496af ffff888a`f2029840 fffff807`3a5f5ec4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff888a`f2029630 fffff807`3a4c3537 : ffffffff`ffffffd2 fffff807`3abaa75d 00000000`00000010 00000000`00000246 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff888a`f20297c0 fffff807`3abaa769 : 00000000`00000002 00000000`00000000 ffff9d00`f5480180 00000000`00000001 : nt!KeYieldProcessorEx+0x17
ffff888a`f20297f0 fffff807`3aba9045 : 00000000`3ce2ad45 ffff9d00`f5480180 ffff8d0f`b0b4a610 00000000`00000000 : nt!IopLiveDumpProcessCorralStateChange+0x2d
ffff888a`f2029820 fffff807`3a4e9a3e : ffff9d00`f5483240 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopLiveDumpCorralDpc+0x55
ffff888a`f2029860 fffff807`3a4e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffff888a`f20299d0 fffff807`3a5f7a0e : ffffffff`00000000 ffff9d00`f5480180 ffff9d00`f548b340 ffff8d0f`b77d7040 : nt!KiRetireDpcList+0x1f4
ffff888a`f2029c60 00000000`00000000 : ffff888a`f202a000 ffff888a`f2024000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KeAccumulateTicks+17110a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 17110a
FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}
Followup: MachineOwner
---------