*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8055c4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 43593
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8055c4fb320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffbd82a20679a0 -- (.trap 0xffffbd82a20679a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000019621169 rbx=0000000000000000 rcx=ffffbd82a2067bb8
rdx=ffffbd82a34e72a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055babee17 rsp=ffffbd82a2067b30 rbp=00000000ffffffff
r8=ffffbd82a34e70c0 r9=ffffbd82a34e70d0 r10=fffff8055ba7a1e0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff805`5babee17 4883c420 add rsp,20h
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GameCenter.exe
DPC_STACK_BASE: FFFFBD82A2067FB0
STACK_TEXT:
ffffa881`732fee18 fffff805`5bc87a14 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffa881`732fee20 fffff805`5bb26993 : 00000486`f6d6753b ffffa881`732e5180 00000000`00000000 ffffa881`732e5180 : nt!KeAccumulateTicks+0x15dd24
ffffa881`732fee80 fffff805`5bb2647a : ffffdc87`c11059a0 ffffbd82`a2067a20 fffff805`602edf00 00000006`0000a101 : nt!KeClockInterruptNotify+0x453
ffffa881`732fef30 fffff805`5ba2ecd5 : ffffdc87`c11059a0 00000000`00000000 00000000`00000000 ffffeb95`1bdb8dfa : nt!HalpTimerClockIpiRoutine+0x1a
ffffa881`732fef60 fffff805`5bbf604a : ffffbd82`a2067a20 ffffdc87`c11059a0 0000047a`e44011bf 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffa881`732fefb0 fffff805`5bbf65b7 : ffffdc87`c48a11a0 00000000`00000000 00000000`80000000 fffff805`5bbf65c4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbd82`a20679a0 fffff805`5babee17 : ffffffff`ffffffd2 fffff805`5ba7a324 00000000`00000010 00000000`00000a87 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbd82`a2067b30 fffff805`5ba7a329 : ffffdc87`c15ebb10 00000000`00000310 00000000`00000f44 00000000`00400a02 : nt!KeYieldProcessorEx+0x17
ffffbd82`a2067b60 fffff805`5bae549e : ffffa881`732e8240 ffffdc87`19621169 00000000`00000000 ffffbd82`00000002 : nt!ExpGetPoolTagInfoTarget+0x149
ffffbd82`a2067bb0 fffff805`5bae4784 : ffffa881`732e5180 00000000`00000000 00000000`00000008 00000000`0001147e : nt!KiExecuteAllDpcs+0x30e
ffffbd82`a2067d20 fffff805`5bbfb5e5 : 00000000`00000000 ffffa881`732e5180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1f4
ffffbd82`a2067fb0 fffff805`5bbfb3d0 : 00000000`00000000 00000000`0039f000 ffffbd82`a692fa18 fffff805`5bbfac85 : nt!KxRetireDpcList+0x5
ffffbd82`a692f9d0 fffff805`5bbfaa9e : 00000000`00000000 ffffdc87`e814a080 ffffbd82`a692fa18 ffffffff`fff5c6d0 : nt!KiDispatchInterruptContinue
ffffbd82`a692fa00 00000000`11168d80 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee
00000000`0019f760 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x11168d80
SYMBOL_NAME: nt!KeAccumulateTicks+15dd24
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15dd24
FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}
Followup: MachineOwner
---------