- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DPC_WATCHDOG_VIOLATION (133)
- The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
- or above.
- Arguments:
- Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
- DISPATCH_LEVEL or above. The offending component can usually be
- identified with a stack trace.
- Arg2: 0000000000001e00, The watchdog period.
- Arg3: fffff8072d91c340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
- additional information regarding the cumulative timeout
- Arg4: 0000000000000000
- Debugging Details:
- ------------------
- *************************************************************************
- *** ***
- *** ***
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: TickPeriods ***
- *** ***
- *************************************************************************
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 1
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on DESKTOP-CS068K2
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 1
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 83
- Key : Analysis.System
- Value: CreateObject
- TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
- DUMP_FILE_ATTRIBUTES: 0x1808
- Kernel Generated Triage Dump
- BUGCHECK_CODE: 133
- BUGCHECK_P1: 1
- BUGCHECK_P2: 1e00
- BUGCHECK_P3: fffff8072d91c340
- BUGCHECK_P4: 0
- DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: Code.exe
- STACK_TEXT:
- ffffe681`27ff6c68 fffff807`2ce27b3f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`2d91c340 : nt!KeBugCheckEx
- ffffe681`27ff6c70 fffff807`2ce26984 : 00000ac3`0b8369be ffffe681`27fdc180 00000000`0003320f 00000000`00000000 : nt!KeAccumulateTicks+0x23f
- ffffe681`27ff6cd0 fffff807`2ce24e13 : fffff807`2d85fe28 00000000`00000000 ffffe681`27fdc180 ffffe488`8bc3e290 : nt!KiUpdateRunTime+0xf4
- ffffe681`27ff6e90 fffff807`2ce2429a : fffff807`2d85fe28 ffffbc08`8194cc30 ffffbc08`8194cc30 00000000`00000000 : nt!KeClockInterruptNotify+0x763
- ffffe681`27ff6f40 fffff807`2cf453fe : 00000007`9e6cf803 ffffbc08`8194cb80 ffffe681`27fdc180 00000000`00000000 : nt!HalpTimerClockInterrupt+0x10a
- ffffe681`27ff6f70 fffff807`2d02b55a : ffffe488`8bc3e310 ffffbc08`8194cb80 00000000`00000000 00000000`00000001 : nt!KiCallInterruptServiceRoutine+0x19e
- ffffe681`27ff6fb0 fffff807`2d02bdc7 : ffffe488`8bc3e4e4 00000000`00001cb0 fffff807`2ceba860 fffff807`2d02be54 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
- ffffe488`8bc3e290 fffff807`2ce1b6c2 : 00000000`00000010 00000000`00040282 ffffe488`8bc3e448 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
- ffffe488`8bc3e420 fffff807`2cea1f0d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x12
- ffffe488`8bc3e450 fffff807`2cea10a8 : 00000000`00000400 00000000`00000000 00000000`6f436f49 fffff807`2ced614f : nt!KeRemoveQueueEx+0xa4d
- ffffe488`8bc3e810 fffff807`2d2ca04e : 00000000`00000240 00000000`00000102 00000000`00000002 00000000`00000440 : nt!IoRemoveIoCompletion+0x98
- ffffe488`8bc3e930 fffff807`2d03e1e8 : 00000000`00005d08 00007474`0032c000 00007474`002ec130 00007ff6`c33e4720 : nt!NtRemoveIoCompletionEx+0xfe
- ffffe488`8bc3ea70 00007ff8`93131be4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- 000000ce`e0dfe6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`93131be4
- SYMBOL_NAME: nt!KeAccumulateTicks+23f
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.22621.1413
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 23f
- FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
- Followup: MachineOwner
- ---------