DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80555cfa320
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x133
PROCESS_NAME: System
CURRENT_IRQL: d
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff805554795de to fffff805553f3ea0
STACK_TEXT:
ffff8281`9fab6e18 fffff805`554795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`55cfa320 : nt!KeBugCheckEx
ffff8281`9fab6e20 fffff805`5530518d : 000000a5`344ffab8 00000000`00000000 ffffe908`36737200 ffff8281`9fa9d180 : nt!KeAccumulateTicks+0x17118e
ffff8281`9fab6e80 fffff805`5530500a : ffffc30f`3bcea480 ffffe908`367372d0 ffffc30f`000042fd 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffff8281`9fab6f30 fffff805`55280795 : ffffc30f`3bcea480 fffff805`55264477 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffff8281`9fab6f60 fffff805`553f594a : ffffe908`367372d0 ffffc30f`3bcea480 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8281`9fab6fb0 fffff805`553f5eb7 : ffffc30f`467e4368 ffffc30f`4bdb2900 00000000`00000001 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe908`36737250 fffff805`5528e9a2 : 00000000`00000000 ffffc30f`4d056040 00000000`00000000 ffffc30f`3b602100 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe908`367373e0 fffff805`552c98b5 : 00000000`00000000 ffffe908`367374c1 ffffc30f`4b973000 fffff805`00000000 : nt!KiAcquireKobjectLockSafe+0x32
ffffe908`36737410 fffff805`5520c191 : ffff8281`9fa9d180 00000000`00000000 ffff8281`9fa9d101 fffff805`559b2094 : nt!KiExitDispatcher+0x195
ffffe908`36737480 fffff805`4ee06950 : 00000000`00000200 ffffc30f`4bdb2068 ffffaf09`8764e560 00000000`00000002 : nt!KeInsertQueueApc+0x151
ffffe908`36737520 00000000`00000200 : ffffc30f`4bdb2068 ffffaf09`8764e560 00000000`00000002 00000000`00000000 : BEDaisy+0x306950
ffffe908`36737528 ffffc30f`4bdb2068 : ffffaf09`8764e560 00000000`00000002 00000000`00000000 00000000`00000000 : 0x200
ffffe908`36737530 ffffaf09`8764e560 : 00000000`00000002 00000000`00000000 00000000`00000000 ffff8281`9fa9d100 : 0xffffc30f`4bdb2068
ffffe908`36737538 00000000`00000002 : 00000000`00000000 00000000`00000000 ffff8281`9fa9d100 00000000`00000000 : 0xffffaf09`8764e560
ffffe908`36737540 00000000`00000000 : 00000000`00000000 ffff8281`9fa9d100 00000000`00000000 ffff37db`96233a01 : 0x2
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff80551e8b9fd-fffff80551e8b9fe 2 bytes - FLTMGR!FltpSynchronizedOperationCompletion+d
[ 48 ff:4c 8b ]
fffff80551e8ba04-fffff80551e8ba08 5 bytes - FLTMGR!FltpSynchronizedOperationCompletion+14 (+0x07)
[ 0f 1f 44 00 00:e8 f7 d7 43 03 ]
fffff80551e8ba2b-fffff80551e8ba2c 2 bytes - FLTMGR!FltReleasePushLockEx+b (+0x27)
[ 48 ff:4c 8b ]
fffff80551e8ba32-fffff80551e8ba38 7 bytes - FLTMGR!FltReleasePushLockEx+12 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 19 42 45 03 4c 8b ]
fffff80551e8ba3e-fffff80551e8ba42 5 bytes - FLTMGR!FltReleasePushLockEx+1e (+0x0c)
[ 0f 1f 44 00 00:e8 2d 47 45 03 ]
fffff80551e99a2e-fffff80551e99a2f 2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+6e (+0xdff0)
[ 48 ff:4c 8b ]
fffff80551e99a35-fffff80551e99a39 5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+75 (+0x07)
[ 0f 1f 44 00 00:e8 e6 b3 4d 03 ]
fffff80551e99a51-fffff80551e99a52 2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+91 (+0x1c)
[ 48 ff:4c 8b ]
fffff80551e99a58-fffff80551e99a5c 5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+98 (+0x07)
[ 0f 1f 44 00 00:e8 43 c1 3b 03 ]
fffff80551ebcd05-fffff80551ebcd06 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
[ 48 ff:4c 8b ]
fffff80551ebcd0c-fffff80551ebcd10 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
[ 0f 1f 44 00 00:e8 8f fd 37 03 ]
fffff80551ebcd1a-fffff80551ebcd1b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
[ 48 ff:4c 8b ]
fffff80551ebcd21-fffff80551ebcd25 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
[ 0f 1f 44 00 00:e8 3a 3c 42 03 ]
fffff80551ebcd6a-fffff80551ebcd6b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
[ 48 ff:4c 8b ]
fffff80551ebcd71-fffff80551ebcd77 7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 3a 34 42 03 4c 8b ]
fffff80551ebcd7d-fffff80551ebcd81 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
[ 0f 1f 44 00 00:e8 0e 0f 35 03 ]
63 errors : !FLTMGR (fffff80551e8b9fd-fffff80551ebcd81)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------