DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80276cfa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13424
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff80276cfa320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffc90eee637980 -- (.trap 0xffffc90eee637980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000025fe6f03 rbx=0000000000000000 rcx=ffffc90eee637b70
rdx=ffffc90eee637b90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80276244567 rsp=ffffc90eee637b10 rbp=ffffc90eee637cb0
r8=ffff89806bbe0280 r9=0000000000000000 r10=fffff802769a7f60
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff802`76244567 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
DPC_STACK_BASE: FFFFC90EEE637FB0
STACK_TEXT:
ffff8980`6bde7e18 fffff802`7643a988 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff8980`6bde7e20 fffff802`7626f9a3 : 00000056`b77c841e ffff8980`6bbe0180 00000000`00000000 ffff8980`6bbe0180 : nt!KeAccumulateTicks+0x1c8788
ffff8980`6bde7e80 fffff802`7626f48a : ffffb58e`cb4cb480 ffffc90e`ee637a00 fffff802`7aea7900 00000000`00005301 : nt!KeClockInterruptNotify+0x453
ffff8980`6bde7f30 fffff802`76327ef5 : ffffb58e`cb4cb480 ffff8980`6bde7f40 00000000`00000010 ffff3405`ff39dea9 : nt!HalpTimerClockIpiRoutine+0x1a
ffff8980`6bde7f60 fffff802`763f722a : ffffc90e`ee637a00 ffffb58e`cb4cb480 00000045`7cf25c4e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8980`6bde7fb0 fffff802`763f7797 : 00000000`00000001 fffff802`84d57c72 ffffc90e`ee637b90 fffff802`763f77a4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc90e`ee637980 fffff802`76244567 : 00000000`00000010 00000000`00000246 ffffc90e`ee637b38 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc90e`ee637b10 fffff802`769a96d9 : ffffb58e`cb5fbe80 ffffb58e`cb565040 00000000`00000010 ffffb58e`cb5fb000 : nt!KeYieldProcessorEx+0x17
ffffc90e`ee637b40 fffff802`769a7fb5 : 00000000`25fe6f03 ffff8980`6bbe0180 ffffb58e`da4f29d0 00000045`7cadbdde : nt!IopLiveDumpProcessCorralStateChange+0x2d
ffffc90e`ee637b70 fffff802`7620781e : ffff8980`6bbe3240 ffffb58e`cb620000 00000000`00000000 ffffc90e`00000002 : nt!IopLiveDumpCorralDpc+0x55
ffffc90e`ee637bb0 fffff802`76206b04 : ffff8980`6bbe0180 00f0ffff`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x30e
ffffc90e`ee637d20 fffff802`763fc7c5 : 00000000`00000000 ffff8980`6bbe0180 00000000`00000000 00000000`c0000001 : nt!KiRetireDpcList+0x1f4
ffffc90e`ee637fb0 fffff802`763fc5b0 : 00000000`00000001 00000000`c0000001 00000000`00000000 fffff802`763fbe65 : nt!KxRetireDpcList+0x5
ffffc90e`ee6e6e00 fffff802`763fbc7e : 00000000`00000000 fffff802`7a9658fe ffffb58e`cb5ed398 fffff802`7625e40a : nt!KiDispatchInterruptContinue
ffffc90e`ee6e6e30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee
SYMBOL_NAME: nt!KeAccumulateTicks+1c8788
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c8788
FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}
Followup: MachineOwner
---------