I updated to Windows 10, version 20H2 on 10/31/2020 then on 11/16 or 17 I have gotten multiple DPC_WATCHDOG_VIOLATION (133). Is this software or do I

  • Thread starter Thread starter Shreffey
  • Start date Start date
S

Shreffey

Guest
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\112120-14328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`14200000 PsLoadedModuleList = 0xfffff800`14e2a3b0
Debug session time: Sat Nov 21 12:42:33.141 2020 (UTC - 5:00)
System Uptime: 1 days 19:05:21.234
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
..........................................
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff800`145f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9d80`42478e20=0000000000000133

Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Can't set dump file contexts
MachineInfo::SetContext failed - Thread: 000001C9216EFAE0 Handle: 2 Id: 2 - Error == 0x8000FFFF

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`65200000 PsLoadedModuleList = 0xfffff806`65e2a3b0
Debug session time: Sat Nov 21 12:53:45.471 2020 (UTC - 5:00)
System Uptime: 0 days 0:09:42.241
Loading Kernel Symbols
...............................................................
......Page 44e60f not present in the dump file. Type ".hh dbgerr004" for details
..........................................................
................................................................
.............
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000e8`da64a018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
nt!KeBugCheckEx:
fffff806`655f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff806`69b4ce20=0000000000000133
||1:0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80665efb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2671

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BRUCE11

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2766

Key : Analysis.Memory.CommitPeak.Mb
Value: 108

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80665efb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffc406574deb80 --
(.trap 0xffffc406574deb80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000800
rdx=ffffac562b1587f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80665421762 rsp=ffffc406574ded10 rbp=ffffac7e41200100
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffffd08e76b61080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiLockTransitionLeafPage+0x5a:
fffff806`65421762 85c0 test eax,eax
Resetting default scope

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: CompPkgSrv.exe

STACK_TEXT:
fffff806`69b4ce18 fffff806`656873f6 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`65efb320 : nt!KeBugCheckEx
fffff806`69b4ce20 fffff806`65526853 : 0000018e`f8990651 fffff806`60a49180 00000000`00000000 fffff806`60a49180 : nt!KeAccumulateTicks+0x15e346
fffff806`69b4ce80 fffff806`6552633a : fffff806`65ef38c0 ffffc406`574dec00 fffff806`7b523c00 00000000`00007101 : nt!KeClockInterruptNotify+0x453
fffff806`69b4cf30 fffff806`6542ecd5 : fffff806`65ef38c0 fffff806`69b4cf40 00000000`00000010 ffff2760`f39d7e79 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`69b4cf60 fffff806`655f6cba : ffffc406`574dec00 fffff806`65ef38c0 ffffd08e`76b61700 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`69b4cfb0 fffff806`655f7227 : 00000000`00000800 ffff8703`b52cbd40 00000000`00000000 00001f80`00e202cc : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc406`574deb80 fffff806`65421762 : fffff806`60a49180 fffff806`65543360 00000000`00000000 00000000`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc406`574ded10 fffff806`6542123f : ffffac7e`41200100 00000000`00000000 ffffc406`574dee90 00000001`00000001 : nt!MiLockTransitionLeafPage+0x5a
ffffc406`574ded60 fffff806`65549f2d : fffffc82`401d1000 ffffac7e`41200e88 ffffc406`574df518 ffffc406`574deef0 : nt!MiTryDeleteTransitionPte+0x1f
ffffc406`574ded90 fffff806`6554a91e : 00000000`00000000 ffffc406`574df4a0 ffffac7e`41201000 ffffc406`574df3f0 : nt!MiDeletePteRun+0x157d
ffffc406`574defa0 fffff806`654e9a1d : 00000000`00000000 ffffd08e`76b61700 ffffc406`574df3f0 ffffac7e`41200e90 : nt!MiDeleteVaTail+0x6e
ffffc406`574defd0 fffff806`654e963b : ffffac56`00000000 ffffd08e`76b61700 ffffc406`00000000 ffffc406`574df440 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc406`574df070 fffff806`654e963b : ffffac56`2b1f9048 ffffd08e`76b61700 ffffc406`00000001 ffffc406`574df450 : nt!MiWalkPageTablesRecursively+0x88b
ffffc406`574df110 fffff806`654e963b : ffffac56`2b1f9000 ffffd08e`76b61700 ffffc406`00000002 ffffc406`574df460 : nt!MiWalkPageTablesRecursively+0x88b
ffffc406`574df1b0 fffff806`654d859b : 00000000`00000000 ffffd08e`76b61700 00000000`00000003 ffffc406`574df470 : nt!MiWalkPageTablesRecursively+0x88b
ffffc406`574df250 fffff806`6554b541 : ffffc406`574df3f0 ffffd08e`00000001 fffff806`00000002 fffff806`00000000 : nt!MiWalkPageTables+0x36b
ffffc406`574df350 fffff806`65807104 : 00000000`00040282 fffff806`655590be 00000000`00000000 ffffd08e`6f2d6180 : nt!MiDeletePagablePteRange+0x4f1
ffffc406`574df660 fffff806`65418dc4 : ffffd08e`76b61080 00000000`06d51710 00000000`00000002 fffff806`00000000 : nt!MiDeleteVadBitmap+0x8c
ffffc406`574df6f0 fffff806`65806f80 : ffffd08e`76b61080 ffffd08e`76b617c0 ffffd08e`76b61700 ffffd08e`7d2a9080 : nt!MiDeleteFinalPageTables+0xc8
ffffc406`574df7b0 fffff806`65803b1f : ffffd08e`76b61080 ffffc406`574df870 ffffd08e`7d2a9080 ffffd08e`76b614c8 : nt!MmDeleteProcessAddressSpace+0x64
ffffc406`574df800 fffff806`658bff00 : ffffd08e`76b61050 ffffd08e`76b61050 00000000`00000000 ffffd08e`6f2bd7a0 : nt!PspProcessDelete+0x13f
ffffc406`574df890 fffff806`654db967 : 00000000`00000000 00000000`00000000 ffffd08e`76b614b8 ffffd08e`76b61080 : nt!ObpRemoveObjectRoutine+0x80
ffffc406`574df8f0 fffff806`658430bc : 00000000`00000000 ffffd08e`78ef0568 ffffd08e`78ef0568 ffffd08e`78ef0568 : nt!ObfDereferenceObjectWithTag+0xc7
ffffc406`574df930 fffff806`658bff00 : ffffd08e`78ef0050 ffffd08e`78ef0050 fffff806`65451340 00000000`00000000 : nt!PspThreadDelete+0x33c
ffffc406`574df9a0 fffff806`654db967 : 00000000`00000000 00000000`00000000 fffff806`65451340 ffffd08e`78ef0080 : nt!ObpRemoveObjectRoutine+0x80
ffffc406`574dfa00 fffff806`654513b2 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd08e`78ef04d8 : nt!ObfDereferenceObjectWithTag+0xc7
ffffc406`574dfa40 fffff806`655034b5 : ffffd08e`7d2a9080 ffffd08e`6f2d0c60 ffffd08e`6f2d0c60 ffffd08e`00000000 : nt!PspReaper+0x72
ffffc406`574dfa70 fffff806`654a29a5 : ffffd08e`7d2a9080 00000000`00000080 ffffd08e`6f2d6180 000fa4ef`bd9bbfff : nt!ExpWorkerThread+0x105
ffffc406`574dfb10 fffff806`655fc868 : fffff806`60a49180 ffffd08e`7d2a9080 fffff806`654a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc406`574dfb60 00000000`00000000 : ffffc406`574e0000 ffffc406`574d9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!KeAccumulateTicks+15e346

MODULE_NAME:
nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 15e346

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner
---------



Continue reading...
 
Back
Top