DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805736fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5155
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 62923
Key : Analysis.Init.CPU.mSec
Value: 702
Key : Analysis.Init.Elapsed.mSec
Value: 9196
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 121021-23859-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff805736fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8057647e150 -- (.trap 0xfffff8057647e150)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000016bf71b2 rbx=0000000000000000 rcx=0000000000002500
rdx=ffffb58c68f95000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80585c22d45 rsp=fffff8057647e2e8 rbp=ffffb58c68f95000
r8=ffffb58c68f95470 r9=0000000000009400 r10=0000000000000000
r11=fffff8057647e340 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nvlddmkm+0x1a2d45:
fffff805`85c22d45 c3 ret
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AISuite3.exe
STACK_TEXT:
fffff805`7647df68 fffff805`72e1f47e : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`736fb320 : nt!KeBugCheckEx
fffff805`7647df70 fffff805`72c16953 : 00000ec0`86837189 fffff805`6e362180 00000000`00000000 fffff805`6e362180 : nt!KeAccumulateTicks+0x2062ce
fffff805`7647dfd0 fffff805`72c1643a : fffff805`736f3840 fffff805`7647e1d0 ffffb58c`68f95400 fffff805`72df8b7a : nt!KeClockInterruptNotify+0x453
fffff805`7647e080 fffff805`72cde135 : fffff805`736f3840 fffff805`72d25efa 00000000`00000000 fffff805`72df90e7 : nt!HalpTimerClockIpiRoutine+0x1a
fffff805`7647e0b0 fffff805`72df8b7a : fffff805`7647e1d0 fffff805`736f3840 ffffb58c`68fa0000 fffff805`72d25efa : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`7647e100 fffff805`72df90e7 : fffff805`7647e340 00001f80`00000700 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff805`7647e150 fffff805`85c22d45 : fffff805`85c9befc ffffb58c`68f95000 ffffb58c`68f95000 ffffb58c`68f118b0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff805`7647e2e8 fffff805`85c9befc : ffffb58c`68f95000 ffffb58c`68f95000 ffffb58c`68f118b0 00000000`00000000 : nvlddmkm+0x1a2d45
fffff805`7647e2f0 ffffb58c`68f95000 : ffffb58c`68f95000 ffffb58c`68f118b0 00000000`00000000 00000000`00000020 : nvlddmkm+0x21befc
fffff805`7647e2f8 ffffb58c`68f95000 : ffffb58c`68f118b0 00000000`00000000 00000000`00000020 fffff805`7647e330 : 0xffffb58c`68f95000
fffff805`7647e300 ffffb58c`68f118b0 : 00000000`00000000 00000000`00000020 fffff805`7647e330 00000000`00000000 : 0xffffb58c`68f95000
fffff805`7647e308 00000000`00000000 : 00000000`00000020 fffff805`7647e330 00000000`00000000 fffff805`85c98fa4 : 0xffffb58c`68f118b0
SYMBOL_NAME: nvlddmkm+1a2d45
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a2d45
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner