DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80673b71358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6780
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 78221
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80673b71358
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff80677a66b90 -- (.trap 0xfffff80677a66b90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a5a5a5a5 rbx=0000000000000000 rcx=0000000000042871
rdx=ffffd68b3b1ab000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067beeb499 rsp=fffff80677a66d28 rbp=0000000000000000
r8=ffffd68b3b1ac1d0 r9=000000000010a1c4 r10=ffffd68b389b28a0
r11=fffff80677a66d00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0xfb499:
fffff806`7beeb499 c3 ret
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff806`77a75b08 fffff806`737fd1a3 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`73b71358 : nt!KeBugCheckEx
fffff806`77a75b10 fffff806`736483dc : 000016a2`4265a539 fffff806`6fc74180 00000000`001a1442 00000000`001a1442 : nt!KeAccumulateTicks+0x1b1983
fffff806`77a75b70 fffff806`7355d567 : 00000000`00000001 fffff806`77a66b90 fffff806`77a66c10 00000000`00000002 : nt!KeClockInterruptNotify+0x98c
fffff806`77a75f30 fffff806`737377d5 : 0000003e`2d9c8183 fffff806`735cc100 fffff806`735cc1b0 ffff99a3`abff57ad : hal!HalpTimerClockInterrupt+0xf7
fffff806`77a75f60 fffff806`737c441a : fffff806`77a66c10 fffff806`735cc100 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`77a75fb0 fffff806`737c4987 : 0005e6c2`5f6621c3 fffff806`73b0f000 5f6621c3`00000000 c0040524`a0a4b129 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`77a66b90 fffff806`7beeb499 : fffff806`7c306ac7 ffffd68b`3b1ab000 00000000`00000000 ffffd68b`38e1b8f0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`77a66d28 fffff806`7c306ac7 : ffffd68b`3b1ab000 00000000`00000000 ffffd68b`38e1b8f0 fffff806`7bf03e1d : nvlddmkm+0xfb499
fffff806`77a66d30 ffffd68b`3b1ab000 : 00000000`00000000 ffffd68b`38e1b8f0 fffff806`7bf03e1d fffff806`00000020 : nvlddmkm+0x516ac7
fffff806`77a66d38 00000000`00000000 : ffffd68b`38e1b8f0 fffff806`7bf03e1d fffff806`00000020 fffff806`77a66d70 : 0xffffd68b`3b1ab000
SYMBOL_NAME: nvlddmkm+fb499
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fb499
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------