DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80484efb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for ks.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 27194
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80484efb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffff910cb5dcf0b0 -- (.trap 0xffff910cb5dcf0b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000446153b0 rbx=0000000000000000 rcx=ffff910cb5dcf450
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804844be0d2 rsp=ffff910cb5dcf240 rbp=ffffcb002496f180
r8=0000000000000000 r9=0000000000000003 r10=fffff804844c49a0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiAcquireKobjectLockSafe+0x32:
fffff804`844be0d2 8b03 mov eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffcb00`249c1e18 fffff804`846873f6 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`84efb320 : nt!KeBugCheckEx
ffffcb00`249c1e20 fffff804`84526853 : 0000048c`2abb4d0e ffffcb00`2496f180 00000000`00000000 ffffcb00`2496f180 : nt!KeAccumulateTicks+0x15e346
ffffcb00`249c1e80 fffff804`8452633a : ffffb60f`348e9260 ffff910c`b5dcf130 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffcb00`249c1f30 fffff804`8442ecd5 : ffffb60f`348e9260 00000000`00000000 00000000`00000000 ffff0a82`9cd77a01 : nt!HalpTimerClockIpiRoutine+0x1a
ffffcb00`249c1f60 fffff804`845f6cba : ffff910c`b5dcf130 ffffb60f`348e9260 00000000`00000000 ff85480e`89c18b02 : nt!KiCallInterruptServiceRoutine+0xa5
ffffcb00`249c1fb0 fffff804`845f7227 : ffff910c`b5dcf450 fffff804`844c7262 ffffb60f`34202340 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff910c`b5dcf0b0 fffff804`844be0d2 : fffff804`a0a1f0e0 fffff804`a5ff20da ffffb60f`343f4c50 ffffb60f`43ee7190 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff910c`b5dcf240 fffff804`844c4a0f : ffff910c`b5dcf450 00000000`41706e50 00000001`00060000 ffff910c`b5dcf288 : nt!KiAcquireKobjectLockSafe+0x32
ffff910c`b5dcf270 fffff804`a0a09378 : 00000000`00000000 ffff910c`b5dcf3b9 ffff9389`97600100 fffff804`844c7262 : nt!KeSetEvent+0x6f
ffff910c`b5dcf300 00000000`00000000 : ffff910c`b5dcf3b9 ffff9389`97600100 fffff804`844c7262 ffff0000`01000340 : ks+0x9378
SYMBOL_NAME: ks+9378
MODULE_NAME: ks
IMAGE_NAME: ks.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9378
FAILURE_BUCKET_ID: 0x133_ISR_ks!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {497117db-72c4-8bef-7a35-681947cdb001}
Followup: MachineOwner
---------