Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToV8JsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.032 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 29
- Microsoft (R) Windows Debugger Version 10.0.26100.3916 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [F:\042925-6500-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 26100 MP (16 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Kernel base = 0xfffff804`ea400000 PsLoadedModuleList = 0xfffff804`eb2f49c0
- Debug session time: Tue Apr 29 22:44:24.634 2025 (UTC + 1:00)
- System Uptime: 0 days 2:08:28.265
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...............................................................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 0000007c`b2efd018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .........
- For analysis of this file, run !analyze -v
- 7: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DPC_WATCHDOG_VIOLATION (133)
- The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
- or above.
- Arguments:
- Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
- DISPATCH_LEVEL or above.
- Arg2: 0000000000001e00, The watchdog period (in ticks).
- Arg3: fffff804eb3c33b0, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
- additional information regarding the cumulative timeout
- Arg4: 0000000000000000
- Debugging Details:
- ------------------
- *************************************************************************
- *** ***
- *** ***
- *** Either you specified an unqualified symbol, or your debugger ***
- *** doesn't have full symbol information. Unqualified symbol ***
- *** resolution is turned off by default. Please either specify a ***
- *** fully qualified symbol module!symbolname, or enable resolution ***
- *** of unqualified symbols by typing ".symopt- 100". Note that ***
- *** enabling unqualified symbol resolution with network symbol ***
- *** server shares in the symbol path may cause the debugger to ***
- *** appear to hang for long periods of time when an incorrect ***
- *** symbol name is typed or the network symbol server is down. ***
- *** ***
- *** For some commands to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: TickPeriods ***
- *** ***
- *************************************************************************
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1937
- Key : Analysis.Elapsed.mSec
- Value: 2615
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 0
- Key : Analysis.IO.Write.Mb
- Value: 0
- Key : Analysis.Init.CPU.mSec
- Value: 1046
- Key : Analysis.Init.Elapsed.mSec
- Value: 15513
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 93
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x133
- Key : Dump.Attributes.AsUlong
- Value: 21008
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : Failure.Bucket
- Value: 0x133_ISR_nt!KeAccumulateTicks
- Key : Failure.Hash
- Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
- BUGCHECK_CODE: 133
- BUGCHECK_P1: 1
- BUGCHECK_P2: 1e00
- BUGCHECK_P3: fffff804eb3c33b0
- BUGCHECK_P4: 0
- FILE_IN_CAB: 042925-6500-01.dmp
- DUMP_FILE_ATTRIBUTES: 0x21008
- Kernel Generated Triage Dump
- DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: Discord.exe
- STACK_TEXT:
- ffffab01`ffb1cb48 fffff804`ea72eec9 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`eb3c33b0 : nt!KeBugCheckEx
- ffffab01`ffb1cb50 fffff804`ea7a44a1 : 00000000`00000000 00000000`0000000c 00000000`00000000 00000000`00078710 : nt!KeAccumulateTicks+0x589
- ffffab01`ffb1cbc0 fffff804`ea7a4065 : 00000000`00047c9f 00000000`00000000 00000011`f27c08cd 00000000`0000000d : nt!KiUpdateRunTime+0xc9
- ffffab01`ffb1cc40 fffff804`ea68573e : 00000000`0000000d 00000000`00000000 ffffab01`ffb097e8 fffff804`eb320758 : nt!KiUpdateTime+0x2b5
- ffffab01`ffb1cdd0 fffff804`ea6870ed : ffffbd85`4f751fe0 00000000`00000000 ffffbd85`4f752090 fffff804`eb38e168 : nt!KeClockInterruptNotify+0x66e
- ffffab01`ffb1cf50 fffff804`eaa7dade : 00000000`84072c0c ffffbd85`4f751fe0 ffffcd86`e9a0edd0 00000011`f2c684e6 : nt!KiCallInterruptServiceRoutine+0x2ed
- ffffab01`ffb1cfb0 fffff804`eaa7e2ec : 00000011`f2c67151 ffffcd86`e9a0ee50 00000011`f2c6715b 00001a97`ce388d54 : nt!KiInterruptSubDispatchNoLockNoEtw+0x4e
- ffffcd86`e9a0edd0 fffff804`ea73d422 : 00000000`00000404 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x3c
- ffffcd86`e9a0ef60 fffff804`ea73d38b : ffffcd86`e9a0f201 ffffbd85`57cdb410 ffffcd86`e9a0f201 00000000`00000000 : nt!KiIpiStallOnPacketTargetsPrcb+0x32
- ffffcd86`e9a0ef90 fffff804`eadf59d5 : ffffcd86`e9a0f210 ffffcd86`e9a0fb20 ffffbd85`5fc11080 ffffbd85`5fd78080 : nt!KeFlushProcessWriteBuffers+0x10f
- ffffcd86`e9a0eff0 fffff804`eaee840a : 00000000`00000000 0000007c`b37fcde0 ffffbd85`4f6a97d0 00000000`00000001 : nt!PsQueryTotalCycleTimeProcess+0x25
- ffffcd86`e9a0f020 fffff804`eaa8ef58 : ffffbd85`5fc11080 00000000`00000000 ffffcd86`e9a0fb20 00000000`00000000 : nt!NtQueryInformationProcess+0x10e35a
- ffffcd86`e9a0fa30 00007ff8`aca5c2e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- 0000007c`b37fcda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`aca5c2e4
- SYMBOL_NAME: nt!KeAccumulateTicks+589
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.26100.3775
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 589
- FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement