DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8020f973358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for P17.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2843
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 75644
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8020f973358
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff80213ab8b90 -- (.trap 0xfffff80213ab8b90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80a3382fabc rsp=fffff80213ab8d28 rbp=ffff888e6a75d000
r8=fffff80213ab8d78 r9=fffff80213ab8d40 r10=0000000000000012
r11=fffff80213ab8ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
P17+0x2fabc:
fffff80a`3382fabc 75f1 jne P17+0x2faaf (fffff80a`3382faaf) [br=1]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff802`13ab8698 fffff802`0f5fcb53 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`0f973358 : nt!KeBugCheckEx
fffff802`13ab86a0 fffff802`0f448657 : 00000183`06a82343 fffff802`0bbe6180 00000000`00000286 fffff802`13ab8b90 : nt!KeAccumulateTicks+0x1b1333
fffff802`13ab8700 fffff802`0f35f28c : ffff888e`6a75d000 fffff802`0f3cc000 fffff802`13ab8c10 fffff802`0f3cc0b0 : nt!KeClockInterruptNotify+0xc07
fffff802`13ab8ac0 fffff802`0f5373a5 : fffff802`0f3cc000 00000000`00000000 00000000`00000000 ffff2177`0ac46847 : hal!HalpTimerClockIpiRoutine+0x1c
fffff802`13ab8af0 fffff802`0f5c3e4a : fffff802`13ab8c10 fffff802`0f3cc000 ffff888e`6559f010 fffff802`0f35f37b : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`13ab8b40 fffff802`0f5c43b7 : 00000000`00000000 fffff802`0f5c43c4 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`13ab8b90 fffff80a`3382fabc : fffff80a`33832713 00000000`0000ffff ffff888e`6559f010 00000300`6a750004 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`13ab8d28 fffff80a`33832713 : 00000000`0000ffff ffff888e`6559f010 00000300`6a750004 00000000`00000000 : P17+0x2fabc
fffff802`13ab8d30 00000000`0000ffff : ffff888e`6559f010 00000300`6a750004 00000000`00000000 ffffffff`13ab0000 : P17+0x32713
fffff802`13ab8d38 ffff888e`6559f010 : 00000300`6a750004 00000000`00000000 ffffffff`13ab0000 00000000`00710000 : 0xffff
fffff802`13ab8d40 00000300`6a750004 : 00000000`00000000 ffffffff`13ab0000 00000000`00710000 00000000`00000001 : 0xffff888e`6559f010
fffff802`13ab8d48 00000000`00000000 : ffffffff`13ab0000 00000000`00710000 00000000`00000001 fffff80a`338163a3 : 0x00000300`6a750004
SYMBOL_NAME: P17+2fabc
MODULE_NAME: P17
IMAGE_NAME: P17.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2fabc
FAILURE_BUCKET_ID: 0x133_ISR_P17!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfd78064-7e41-f809-da18-c1f84bfa620d}
Followup: MachineOwner
---------
0: kd> lmvm P17
Browse full module list
start end module name
fffff80a`33800000 fffff80a`3397f000 P17 T (no symbols)
Loaded symbol image file: P17.sys
Image path: \SystemRoot\system32\drivers\P17.sys
Image name: P17.sys
Browse all global symbols functions data
Timestamp: Tue Apr 21 09:12:47 2009 (49ED63DF)
CheckSum: 0014625D
ImageSize: 0017F000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: