DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: 0000000000000000, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18893
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: 0
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd000`4ce37c88 fffff803`3cbb3cf0 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
ffffd000`4ce37c90 fffff803`3cad79f1 : ffffe000`b5842848 00000000`00005e76 ffffe000`b5842770 ffffe000`00000000 : nt! ?? ::FNODOBFM::`string'+0x35e40
ffffd000`4ce37d20 fffff803`3d1b97b5 : fffff801`d78f628a 00000000`00000000 00000000`00000001 ffffd000`4ce00180 : nt!KeClockInterruptNotify+0x91
ffffd000`4ce37f40 fffff803`3caff4f3 : ffffedd5`90e91f42 00000000`00000000 00000000`00000000 00000000`00000001 : hal!HalpTimerClockIpiRoutine+0x15
ffffd000`4ce37f70 fffff803`3cb6ee2a : fffff803`3d205d00 00000000`0000d610 00000000`00000020 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa3
ffffd000`4ce37fb0 fffff803`3cb6f20f : ffffd000`4ce288a0 fffff801`d7d57e87 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
ffffd000`4ce28850 fffff801`d7937355 : fffff801`d7d515c3 ffffe000`b5a80000 00000000`00000000 ffffe000`b572a010 : nt!KiInterruptDispatchLBControl+0x11f
ffffd000`4ce289e8 fffff801`d7d515c3 : ffffe000`b5a80000 00000000`00000000 ffffe000`b572a010 ffffd000`4ce28b58 : nvlddmkm+0xee355
ffffd000`4ce289f0 ffffe000`b5a80000 : 00000000`00000000 ffffe000`b572a010 ffffd000`4ce28b58 00000000`00000020 : nvlddmkm+0x5085c3
ffffd000`4ce289f8 00000000`00000000 : ffffe000`b572a010 ffffd000`4ce28b58 00000000`00000020 ffffd000`4ce28a30 : 0xffffe000`b5a80000
SYMBOL_NAME: nvlddmkm+ee355
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ee355
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: 0000000000000000, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17426
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: 0
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff800`7b9ffc88 fffff800`79a0ecf0 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
fffff800`7b9ffc90 fffff800`799329f1 : ffffd001`8e9ff0b0 00000000`00002770 ffffe000`5d7aa1a0 fffff800`799c9e2a : nt! ?? ::FNODOBFM::`string'+0x35e40
fffff800`7b9ffd20 fffff800`798107b5 : ffffe000`5d7aa1a0 ffffd001`00000000 00000000`00400700 fffff800`79b7b180 : nt!KeClockInterruptNotify+0x91
fffff800`7b9fff40 fffff800`7995a4f3 : ffff6794`0345731f 00000000`00000000 00000000`00000000 ffffe000`5e83f000 : hal!HalPerformEndOfInterrupt+0x1a5
fffff800`7b9fff70 fffff800`799c9e2a : fffff800`7985c800 00000000`00020780 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa3
fffff800`7b9fffb0 fffff800`799ca20f : fffff800`7b9f7bf0 fffff801`b1348e87 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
fffff800`7b9f7ba0 fffff801`b0f28355 : fffff801`b13425c3 ffffe000`5e83f000 00000000`00000000 ffffe000`5d6c1b40 : nt!KiInterruptDispatchLBControl+0x11f
fffff800`7b9f7d38 fffff801`b13425c3 : ffffe000`5e83f000 00000000`00000000 ffffe000`5d6c1b40 fffff800`7b9f7ea8 : nvlddmkm+0xee355
fffff800`7b9f7d40 ffffe000`5e83f000 : 00000000`00000000 ffffe000`5d6c1b40 fffff800`7b9f7ea8 00000000`00000020 : nvlddmkm+0x5085c3
fffff800`7b9f7d48 00000000`00000000 : ffffe000`5d6c1b40 fffff800`7b9f7ea8 00000000`00000020 fffff800`7b9f7d80 : 0xffffe000`5e83f000
SYMBOL_NAME: nvlddmkm+ee355
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ee355
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------