How to fix dpc_watchdog_violation

Copper Contributor

PROCESS NAME: System

STACK TEXT:

ffff8c80 3fadze18 fffff800 3a81f5fa

ffff8c80 3fadze20 fffff800 3a616953

ffff8c80° 3fadze80 fffff800' 3a61643a

ffff8c80 3fad2f30 fffff800" 3a6de195

ffff8c80 3fad2f60 fffff800 3a7f8d8a

ffff8c803fadafbo fffff800 3a7f92f7

fffffa85 b6a4f5fo fffff800 3a680c5d

fffffa85 b6a4f780 fffff800 3adaa539

fffffa85 b6a4f7bo fffff800 3adase15

fffffa85 b6a4f7e0 fffff800 3a69a38e

fffffa85 b6a4f820 fffff800 3a699674

fffffa85 b6a4f990 fffff800 3a7fae4e

fffffas5 b6a4f20 00000000: 00000000

00000000 00000133 00000000 00000000 00000000 00000501 00000000 00000500: nt!KeBugCheckEx

00000120 f6117882 ffff8c80 3fa80180 00000000 0000oo ffff8c80 3fa80180

: nt!KeAccumulateTick

ffffdo8a" b5ce5d40 fffff85"64670 77854600

: nt!KeClockInterrupt

ffffde8a" b5ce5d40 00000000 00000000 00000000 0000000o ffffa3da 599aeff3

: nt!HalpTimerClockIp

fffffa85 b6a4f670 ffffdc8a b5ce5d40 00000112-145ccc22 00000000 00000000 : nt!KiCallInterrupts

00000000:00000000 fffff85 b6a4f7e0 fffff800 3a7f9304 : nt!KiInterruptSubDi

: 00000000°00000010 00000000:00000286 fffffa85 b6a4f7a0 00000000 00000018 : nt!KiInterruptDispa

ffffdc8a" bfced318 ffff8c80 3fa80180 ffffdc8a bfced660 fffffa85 b6a4faf4

: nt!KeYieldProcessor

fffffa85° 43ff07d3 ffff8c80' 3fa80180 ffffdesacofzbedo 0000000 00000000

nt!IopLiveDumpProce

: ffff8c80 3fa83240 ffffdc8a b5fdcooo fffffa85 b6a4faeo ffff8c80 00000002 : nt!IopLiveDumpCorra

00000000^ 00000000 fffff800 3a6edc95 00000000 00140001 00000000 00000000 : nt!KiExecuteAlIDpcs

: ffffffff00000000 ffff8c80 3fa80180 ffff8c80 3fasb440 ffffdc8a cbaafoso:nt!KiRetireDpcList+

fffffa85" b6a50000 ffffa85 b6a49000 00000000 00000000 00000000:00000000

: nt!KildleLoop+0x9e

SYMBOL NAME: nt!KeAccumulateTicks+20644a

MODULE NAME: nt

IMAGE NAME: ntkrnlmp.exe

IMAGE VERSION: 10.0.19041.1466

STACK COMMAND: •cxr; •ecxr ; kb

BUCKET ID FUNC OFFSET: 20644a

FAILURE BUCKET ID: 0x133 PC nt!KeAccumulateTicks

OSPLATFORM TYPE: x64

OCNAME• window 10

Browse full module list

start

end

fffff800' 3a400000 fffff800 36446000

module name nt

(pdb symbols)

C: \ProgramData\Dbg\sym\ntkrnImp.pdb\733830ECAFA1A3073FFA9CC3A38FE93C1\ntkrnlmp.pdb

Mapped memory image file: C: \ProgramData\Dbg\sym\ntkrnlmp.exe\272315A81046000\ntkrnlmp.exe

Image path: ntkrnlmp. exe

Image name: ntkrnlmp. exe

Browse all global symbols functions data

Image was built with /Brepro flag.

Timestamp: 272315A8 (This is a reproducible build file hash, not a timestamp)

CheckSum: 00A6202E

ImageSize: 01046000

File version: 10.0.19041.1466

Product version: 10.0.19041.1466

File flags: 0 (Mask 3F)

File OS: 40004 NT Win32

File type: 1.0 App

File date: 00000000.00000000

Translations: 0409.0400

Information from resource tables: 

CompanyName:

Microsoft Corporation

ProductName: Microsoft® windows® Operating System

InternalName: ntkrnlmp. exe

OriginalFilename: ntkrnlmp.exe

Productversion: 10.0.19041.1466

FileVersion: 10.0.19041.1466 (WinBuild.160101.0800)

FileDescription: NT Kernel & System

Legalcopyright: © Microsoft Corporation. All rights reserved.

1 Reply
I have removed your other posts as they appear to be a repeat of the same thing.

This looks like a crash trace from Windows but you have posted it in the Microsoft access community, please could you ask a question relating to this so we can either move it to the correct board or answer it for you?

Thanks