******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff80067b05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* Page 12c3bc not present in the dump file. Type ".hh dbgerr004" for details KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2859 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 6592 Key : Analysis.Init.CPU.mSec Value: 999 Key : Analysis.Init.Elapsed.mSec Value: 42120 Key : Analysis.Memory.CommitPeak.Mb Value: 99 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: MEMORY.DMP DUMP_FILE_ATTRIBUTES: 0x1000 BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff80067b05330 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: ffffd083d52075e0 -- (.trap 0xffffd083d52075e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000002cd4d656 rbx=0000000000000000 rcx=ffffd083d5207800 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8006715787c rsp=ffffd083d5207770 rbp=ffffd083d5207819 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!KeYieldProcessorEx+0x1c: fffff800`6715787c 4883c420 add rsp,20h Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: Corona.Console.exe STACK_TEXT: ffffe700`7e1f8dd8 fffff800`670db5ff : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`67b05330 : nt!KeBugCheckEx ffffe700`7e1f8de0 fffff800`670db211 : 00001ee0`cc503c73 ffffe700`7e1de180 00000000`00000246 fffff800`670d699e : nt!KeAccumulateTicks+0x20f ffffe700`7e1f8e50 fffff800`670d93fa : ffffe700`7e1e7200 ffffd083`d52075e0 ffffe700`7e1e7310 fffff800`67013ccb : nt!KiUpdateRunTime+0x61 ffffe700`7e1f8eb0 fffff800`670d91e6 : ffffc001`3d13c3e0 ffffc001`3d13c490 ffffe700`00000000 00000000`00000461 : nt!KeClockInterruptNotify+0x11a ffffe700`7e1f8f40 fffff800`6708d720 : ffffc001`3d13c3e0 fffff800`6713851c ffffe700`00000000 ffffc001`3d0fe040 : nt!HalpTimerClockIpiRoutine+0x16 ffffe700`7e1f8f70 fffff800`67217e2a : ffffd083`d5207660 ffffc001`3d13c3e0 00000000`00000000 00000000`00000c00 : nt!KiCallInterruptServiceRoutine+0xa0 ffffe700`7e1f8fb0 fffff800`672183f7 : ffffc001`4619fda0 ffffc001`661ac350 ffffe700`7e1de180 fffff800`67218404 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffffd083`d52075e0 fffff800`6715787c : 00000000`00000010 00000000`00040202 ffffd083`d5207798 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffffd083`d5207770 fffff800`67132f4f : ffffc001`fffffffe 00000000`ffffffff 00000000`00000001 ffffc001`582a6260 : nt!KeYieldProcessorEx+0x1c ffffd083`d52077a0 fffff800`671346a9 : ffffc001`00000000 fffff800`670d7047 00000000`00000000 000000d0`b78f1e00 : nt!KiSwapThread+0xaff ffffd083`d5207880 fffff800`67138366 : 00000000`00000000 00000000`00000000 00000000`000000dc 0000001a`ed602b05 : nt!KiCommitThreadWait+0x159 ffffd083`d5207920 fffff800`6758079f : 00000000`03fefda0 00000000`00000010 00000000`00000000 00000000`00000002 : nt!KeDelayExecutionThread+0x416 ffffd083`d52079b0 fffff800`67228775 : ffffc001`60a32080 ffffc001`6174f080 ffffffff`fffe7960 00000000`00000000 : nt!NtDelayExecution+0x5f ffffd083`d52079e0 00000000`773a1cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000000`03feeb08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773a1cf3 SYMBOL_NAME: nt!KeAccumulateTicks+20f MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 20f FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner ---------