*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff807162fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4781
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25592
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff807162fa320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffbc0a45e29490 -- (.trap 0xffffbc0a45e29490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
rdx=fffff8071586f3e5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80725be1415 rsp=ffffbc0a45e29620 rbp=ffffbc0a45e296b1
r8=ffff800e9e3cc600 r9=ffffbc0a45e29668 r10=fffff8071586b690
r11=ffff95fcb1400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
amdppm!ComputeProcessorEnergyUsingMsr+0x75:
fffff807`25be1415 0fb68770010000 movzx eax,byte ptr [rdi+170h] ds:00000000`00000170=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffa600`ab87ce18 fffff807`15a3a988 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffa600`ab87ce20 fffff807`1586f9a3 : 00000809`4d223fc1 ffffa600`ab880180 00000000`00000000 ffffa600`ab880180 : nt!KeAccumulateTicks+0x1c8788
ffffa600`ab87ce80 fffff807`1586f48a : ffff800e`97ed8480 ffffbc0a`45e29510 fffff807`1fd13e00 00000000`00008302 : nt!KeClockInterruptNotify+0x453
ffffa600`ab87cf30 fffff807`15927ef5 : ffff800e`97ed8480 00000000`00000000 00000000`00000000 fffff03f`40d02380 : nt!HalpTimerClockIpiRoutine+0x1a
ffffa600`ab87cf60 fffff807`159f722a : ffffbc0a`45e29510 ffff800e`97ed8480 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffa600`ab87cfb0 fffff807`159f7797 : ffff800e`9954bae0 ffff800e`9cd85710 fffff807`00000000 00001f80`00d80210 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc0a`45e29490 fffff807`25be1415 : 00000000`00000000 ffff800e`9eae5408 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc0a`45e29620 fffff807`15879142 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`15878b71 : amdppm!ComputeProcessorEnergyUsingMsr+0x75
ffffbc0a`45e29710 fffff807`15878610 : ffffa600`ab883240 ffffbc0a`45e29b30 ffffa600`ab880180 fffff807`16220f00 : nt!PpmCheckComputeEnergy+0x1a2
ffffbc0a`45e297f0 fffff807`1580781e : ffffa600`ab883240 ffff800e`99179000 00000000`00000004 ffffa600`00000002 : nt!PpmCheckRun+0x40
ffffbc0a`45e29860 fffff807`15806b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffbc0a`45e299d0 fffff807`159f92ee : ffffffff`00000000 ffffa600`ab880180 ffffa600`ab88b1c0 ffff800e`a3c72080 : nt!KiRetireDpcList+0x1f4
ffffbc0a`45e29c60 00000000`00000000 : ffffbc0a`45e2a000 ffffbc0a`45e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: amdppm!ComputeProcessorEnergyUsingMsr+75
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
IMAGE_VERSION: 10.0.19041.545
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 75
FAILURE_BUCKET_ID: 0x133_DPC_amdppm!ComputeProcessorEnergyUsingMsr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fe619131-957a-1b34-a16a-187e2a8f3290}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb081048457d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb08104845728, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8094
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb081048457d0
BUGCHECK_P3: ffffb08104845728
BUGCHECK_P4: 0
TRAP_FRAME: ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5
r8=0000000000000000 r9=ffffb08104845a50 r10=fffff80163d27ac0
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb081`048454a8 fffff801`65c07769 : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx
ffffb081`048454b0 fffff801`65c07b90 : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69
ffffb081`048455f0 fffff801`65c05f23 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb081`048457d0 fffff801`65c5fbbd : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb081`04845960 fffff801`65a072ae : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d
ffffb081`048459d0 fffff801`65bf92ee : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e
ffffb081`04845c60 00000000`00000000 : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiRemoveEntryTimer+171f5d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 171f5d
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5cf1a79f-75db-1c81-82ec-116a11522249}
Followup: MachineOwner
---------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8094
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb081048457d0
BUGCHECK_P3: ffffb08104845728
BUGCHECK_P4: 0
TRAP_FRAME: ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5
r8=0000000000000000 r9=ffffb08104845a50 r10=fffff80163d27ac0
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb081`048454a8 fffff801`65c07769 : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx
ffffb081`048454b0 fffff801`65c07b90 : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69
ffffb081`048455f0 fffff801`65c05f23 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb081`048457d0 fffff801`65c5fbbd : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb081`04845960 fffff801`65a072ae : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d
ffffb081`048459d0 fffff801`65bf92ee : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e
ffffb081`04845c60 00000000`00000000 : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiRemoveEntryTimer+171f5d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 171f5d
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5cf1a79f-75db-1c81-82ec-116a11522249}
Followup: MachineOwner
---------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4396
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80772efa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739
r8=0000000000000000 r9=fffff08910587730 r10=000000000000003f
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339 jae nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8a00`4bc3fc88 fffff807`7263aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx
ffff8a00`4bc3fc90 fffff807`7247541d : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c
ffff8a00`4bc3fcf0 fffff807`724759c1 : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8a00`4bc3fd40 fffff807`7246f833 : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8a00`4bc3fe80 fffff807`724781f2 : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8a00`4bc3ff30 fffff807`72527ef5 : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
ffff8a00`4bc3ff60 fffff807`725f722a : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8a00`4bc3ffb0 fffff807`725f7797 : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff089`10587540 fffff807`72719a4e : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff089`105876d0 fffff807`7262c6fc : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e
fffff089`105877a0 fffff807`7244a891 : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac
fffff089`10587990 fffff807`7244a31a : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff089`10587a00 fffff807`727fae1d : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea
fffff089`10587a90 fffff807`726071b8 : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd
fffff089`10587b00 00007ffb`3f40c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`cb1fe5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174
SYMBOL_NAME: nt!KeAccumulateTicks+1c880c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c880c
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2137]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5601
BiosReleaseDate = 07/10/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-C R2.0
BaseBoardVersion = Rev X.0x
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80772efa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
SYMSRV: BYINDEX: 0x13
https://msdl.microsoft.com/download/symbols
win32kbase.sys
5EBD4C642de000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
SYMSRV: BYINDEX: 0x14
https://msdl.microsoft.com/download/symbols
Wdf01000.sys
A9A9D36Ed1000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV: BYINDEX: 0x15
https://msdl.microsoft.com/download/symbols
storport.sys
8566CB6Ab0000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV: BYINDEX: 0x16
https://msdl.microsoft.com/download/symbols
storport.sys
8566CB6Ab0000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV: BYINDEX: 0x17
https://msdl.microsoft.com/download/symbols
Npfs.SYS
9E3E4C731c000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS - mismatched
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4001
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80772efa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739
r8=0000000000000000 r9=fffff08910587730 r10=000000000000003f
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339 jae nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8a00`4bc3fc88 fffff807`7263aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx
ffff8a00`4bc3fc90 fffff807`7247541d : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c
ffff8a00`4bc3fcf0 fffff807`724759c1 : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8a00`4bc3fd40 fffff807`7246f833 : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8a00`4bc3fe80 fffff807`724781f2 : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8a00`4bc3ff30 fffff807`72527ef5 : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
ffff8a00`4bc3ff60 fffff807`725f722a : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8a00`4bc3ffb0 fffff807`725f7797 : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff089`10587540 fffff807`72719a4e : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff089`105876d0 fffff807`7262c6fc : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e
fffff089`105877a0 fffff807`7244a891 : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac
fffff089`10587990 fffff807`7244a31a : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff089`10587a00 fffff807`727fae1d : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea
fffff089`10587a90 fffff807`726071b8 : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd
fffff089`10587b00 00007ffb`3f40c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`cb1fe5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174
SYMBOL_NAME: nt!KeAccumulateTicks+1c880c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c880c
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------