32
1 TopicHow to fix dpc_watchdog_violation
PROCESS NAME: System STACK TEXT: ffff8c80 3fadze18 fffff800 3a81f5fa ffff8c80 3fadze20 fffff800 3a616953 ffff8c80° 3fadze80 fffff800' 3a61643a ffff8c80 3fad2f30 fffff800" 3a6de195 ffff8c80 3fad2f60 fffff800 3a7f8d8a ffff8c803fadafbo fffff800 3a7f92f7 fffffa85 b6a4f5fo fffff800 3a680c5d fffffa85 b6a4f780 fffff800 3adaa539 fffffa85 b6a4f7bo fffff800 3adase15 fffffa85 b6a4f7e0 fffff800 3a69a38e fffffa85 b6a4f820 fffff800 3a699674 fffffa85 b6a4f990 fffff800 3a7fae4e fffffas5 b6a4f20 00000000: 00000000 00000000 00000133 00000000 00000000 00000000 00000501 00000000 00000500: nt!KeBugCheckEx 00000120 f6117882 ffff8c80 3fa80180 00000000 0000oo ffff8c80 3fa80180 : nt!KeAccumulateTick ffffdo8a" b5ce5d40 fffff85"64670 77854600 : nt!KeClockInterrupt ffffde8a" b5ce5d40 00000000 00000000 00000000 0000000o ffffa3da 599aeff3 : nt!HalpTimerClockIp fffffa85 b6a4f670 ffffdc8a b5ce5d40 00000112-145ccc22 00000000 00000000 : nt!KiCallInterrupts 00000000:00000000 fffff85 b6a4f7e0 fffff800 3a7f9304 : nt!KiInterruptSubDi : 00000000°00000010 00000000:00000286 fffffa85 b6a4f7a0 00000000 00000018 : nt!KiInterruptDispa ffffdc8a" bfced318 ffff8c80 3fa80180 ffffdc8a bfced660 fffffa85 b6a4faf4 : nt!KeYieldProcessor fffffa85° 43ff07d3 ffff8c80' 3fa80180 ffffdesacofzbedo 0000000 00000000 nt!IopLiveDumpProce : ffff8c80 3fa83240 ffffdc8a b5fdcooo fffffa85 b6a4faeo ffff8c80 00000002 : nt!IopLiveDumpCorra 00000000^ 00000000 fffff800 3a6edc95 00000000 00140001 00000000 00000000 : nt!KiExecuteAlIDpcs : ffffffff00000000 ffff8c80 3fa80180 ffff8c80 3fasb440 ffffdc8a cbaafoso:nt!KiRetireDpcList+ fffffa85" b6a50000 ffffa85 b6a49000 00000000 00000000 00000000:00000000 : nt!KildleLoop+0x9e SYMBOL NAME: nt!KeAccumulateTicks+20644a MODULE NAME: nt IMAGE NAME: ntkrnlmp.exe IMAGE VERSION: 10.0.19041.1466 STACK COMMAND: •cxr; •ecxr ; kb BUCKET ID FUNC OFFSET: 20644a FAILURE BUCKET ID: 0x133 PC nt!KeAccumulateTicks OSPLATFORM TYPE: x64 OCNAME• window 10 Browse full module list start end fffff800' 3a400000 fffff800 36446000 module name nt (pdb symbols) C: \ProgramData\Dbg\sym\ntkrnImp.pdb\733830ECAFA1A3073FFA9CC3A38FE93C1\ntkrnlmp.pdb Mapped memory image file: C: \ProgramData\Dbg\sym\ntkrnlmp.exe\272315A81046000\ntkrnlmp.exe Image path: ntkrnlmp. exe Image name: ntkrnlmp. exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp:272315A8 (This is a reproducible build file hash, not a timestamp) CheckSum:00A6202E ImageSize:01046000 File version:10.0.19041.1466 Product version: 10.0.19041.1466 File flags:0 (Mask 3F) File OS:40004 NT Win32 File type:1.0 App File date:00000000.00000000 Translations:0409.0400 Information from resource tables: CompanyName: Microsoft Corporation ProductName:Microsoft® windows® Operating System InternalName:ntkrnlmp. exe OriginalFilename: ntkrnlmp.exe Productversion:10.0.19041.1466 FileVersion:10.0.19041.1466 (WinBuild.160101.0800) FileDescription:NT Kernel & System Legalcopyright:© Microsoft Corporation. All rights reserved.1.4KViews0likes1Comment