Hello everyone. I am having some issues with a blue screen error DPC_WATCHDOG VIOLATION occurring at random times not associated with any particular software or anything. If anyone can find anything useful in the minidump it would be greatly appreciated.
https://www.dropbox.com/sh/1fdn2hcsfzvwu65/AABMSIongTOyu9rg8I1EIlw1a?dl=0
Loading Dump File [C:\Windows\Minidump\091321-6296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
* Path validation summary **
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
Debug session time: Mon Sep 13 18:37:28.290 2021 (UTC - 4:00)
System Uptime: 2 days 20:13:07.017
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
0: kd> !analyze -v
***
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80570cfa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*
* *
* *
* Either you specified an unqualified symbol, or your debugger *
* doesn't have full symbol information. Unqualified symbol *
* resolution is turned off by default. Please either specify a *
* fully qualified symbol module!symbolname, or enable resolution *
* of unqualified symbols by typing ".symopt- 100". Note that *
* enabling unqualified symbol resolution with network symbol *
* server shares in the symbol path may cause the debugger to *
* appear to hang for long periods of time when an incorrect *
* symbol name is typed or the network symbol server is down. *
* *
* For some commands to work properly, your symbol path *
* must point to .pdb files that have full type information. *
* *
* Certain .pdb files (such as the public OS symbols) do not *
* contain the required information. Contact the group that *
* provided you with these symbols if you need this command to *
* work. *
* *
* Type referenced: TickPeriods *
* *
*
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6843
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 122773
Key : Analysis.Init.CPU.mSec
Value: 311
Key : Analysis.Init.Elapsed.mSec
Value: 11345
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80570cfa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8057466dcf0 -- (.trap 0xfffff8057466dcf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80570397600 rbx=0000000000000000 rcx=0000000000001885
rdx=0000000000001885 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805703976c9 rsp=fffff8057466de88 rbp=ffffb988b22cea20
r8=fffff8057466df00 r9=0000000000000001 r10=fffff805703976c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!HalpAcpiPmRegisterReadPort+0x9:
fffff805
Resetting default scope
BLACKBOXACPI: 1 (!blackboxacpi)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
fffff805
SYMBOL_NAME: ACPI!ACPIReadGpeStatusRegister+66
MODULE_NAME: ACPI
IMAGE_NAME: ACPI.sys
IMAGE_VERSION: 10.0.19041.1110
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 66
FAILURE_BUCKET_ID: 0x133_ISR_ACPI!ACPIReadGpeStatusRegister
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9524459d-2f22-efe5-b0c9-f824c586f42c}
Followup: MachineOwner
---------
https://www.dropbox.com/sh/1fdn2hcsfzvwu65/AABMSIongTOyu9rg8I1EIlw1a?dl=0
Loading Dump File [C:\Windows\Minidump\091321-6296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
* Path validation summary **
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
70000000 PsLoadedModuleList = 0xfffff805
70c2a230Debug session time: Mon Sep 13 18:37:28.290 2021 (UTC - 4:00)
System Uptime: 2 days 20:13:07.017
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
703f71b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805
7466db10=00000000000001330: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80570cfa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*
* *
* *
* Either you specified an unqualified symbol, or your debugger *
* doesn't have full symbol information. Unqualified symbol *
* resolution is turned off by default. Please either specify a *
* fully qualified symbol module!symbolname, or enable resolution *
* of unqualified symbols by typing ".symopt- 100". Note that *
* enabling unqualified symbol resolution with network symbol *
* server shares in the symbol path may cause the debugger to *
* appear to hang for long periods of time when an incorrect *
* symbol name is typed or the network symbol server is down. *
* *
* For some commands to work properly, your symbol path *
* must point to .pdb files that have full type information. *
* *
* Certain .pdb files (such as the public OS symbols) do not *
* contain the required information. Contact the group that *
* provided you with these symbols if you need this command to *
* work. *
* *
* Type referenced: TickPeriods *
* *
*
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6843
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 122773
Key : Analysis.Init.CPU.mSec
Value: 311
Key : Analysis.Init.Elapsed.mSec
Value: 11345
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80570cfa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8057466dcf0 -- (.trap 0xfffff8057466dcf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80570397600 rbx=0000000000000000 rcx=0000000000001885
rdx=0000000000001885 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805703976c9 rsp=fffff8057466de88 rbp=ffffb988b22cea20
r8=fffff8057466df00 r9=0000000000000001 r10=fffff805703976c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!HalpAcpiPmRegisterReadPort+0x9:
fffff805
703976c9 418800 mov byte ptr [r8],al ds:fffff805
7466df00=00Resetting default scope
BLACKBOXACPI: 1 (!blackboxacpi)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff805
7466db08 fffff805
7041f57e : 0000000000000133 00000000
00000001 0000000000001e00 fffff805
70cfa320 : nt!KeBugCheckExfffff805
7466db10 fffff805
70216ac3 : 0000814cb613c9ab fffff805
6b674180 0000000000000000 fffff805
6b674180 : nt!KeAccumulateTicks+0x20625efffff805
7466db70 fffff805
702165aa : fffff80570cf37c0 fffff805
7466dd70 fffff8057466db00 fffff805
8b80c1f0 : nt!KeClockInterruptNotify+0x453fffff805
7466dc20 fffff805
702de045 : fffff80570cf37c0 00000000
00000000 0000000000000000 00000000
00000000 : nt!HalpTimerClockIpiRoutine+0x1afffff805
7466dc50 fffff805
703f8c5a : fffff8057466dd70 fffff805
70cf37c0 0000814cb612bdac 00000000
00000000 : nt!KiCallInterruptServiceRoutine+0xa5fffff805
7466dca0 fffff805
703f91c7 : 0000000000000000 00000000
00000000 0000000000000001 00000000
00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfafffff805
7466dcf0 fffff805
703976c9 : fffff80570396c99 00000000
00000010 ffffb988b24fd000 ffffb988
b26d9310 : nt!KiInterruptDispatchNoLockNoEtw+0x37fffff805
7466de88 fffff805
70396c99 : 0000000000000010 ffffb988
b24fd000 ffffb988b26d9310 00000000
000004f8 : nt!HalpAcpiPmRegisterReadPort+0x9fffff805
7466de90 fffff805
7254671a : 0000000000000005 ffffd500
fefd6280 fffff8057466df98 00000000
00000f43 : nt!HalpAcpiPmRegisterRead+0x39fffff805
7466dec0 fffff805
72545c94 : 0000000000000000 ffffd500
fefd6dc0 0000000000000f43 fffff805
00400a02 : ACPI!ACPIReadGpeStatusRegister+0x66fffff805
7466df00 fffff805
702de045 : ffffd500fefd6dc0 ffffb988
b22e3d70 ffffd500fefd6e70 ffff3a95
f814bbf9 : ACPI!ACPIInterruptServiceRoutine+0x54fffff805
7466df40 fffff805
703f89df : fffff8057465e4a0 ffffd500
fefd6dc0 fffff80572520000 0000814c
b612ba79 : nt!KiCallInterruptServiceRoutine+0xa5fffff805
7466df90 fffff805
703f8ca7 : fffff805725a1860 00000000
00000000 ffffb988cba6f102 00000000
00000000 : nt!KiInterruptSubDispatch+0x11ffffff805
7465e420 fffff805
7037bccc : fffff8057037a6e9 00000000
00000000 ffffb988b7319ef8 fffff805
7465e630 : nt!KiInterruptDispatch+0x37fffff805
7465e5b8 fffff805
7037a6e9 : 0000000000000000 ffffb988
b7319ef8 fffff8057465e630 fffff805
725344f6 : nt!HalpAcpiPmRegisterWritePort+0xcfffff805
7465e5c0 fffff805
7254644b : 0000000000000001 00001fa0
003902c9 fffff80572550b80 00000000
00040408 : nt!HalpAcpiPmRegisterWrite+0x39fffff805
7465e5f0 fffff805
725463b7 : 0000000000000000 fffff805
72520000 0000000000000004 00000000
00000008 : ACPI!ACPIWriteGpeEnableRegister+0x6ffffff805
7465e630 fffff805
72545fcf : 0000000000000010 00000000
00000008 0000000000000000 00000000
00000000 : ACPI!ACPIGpeEnableDisableEvents+0x37fffff805
7465e660 fffff805
7029a3ae : fffff8056b677240 fffff805
7465ea30 fffff8056b674180 fffff805
00000002 : ACPI!ACPIInterruptDispatchEventDpc+0x1bffffff805
7465e760 fffff805
70299694 : 0000000000000000 00000000
00000000 0000000000140001 00000000
00000000 : nt!KiExecuteAllDpcs+0x30efffff805
7465e8d0 fffff805
703fad1e : 0000000000000000 fffff805
6b674180 fffff80570d26a00 ffffb988
ced26080 : nt!KiRetireDpcList+0x1f4fffff805
7465eb60 00000000
00000000 : fffff8057465f000 fffff805
74658000 0000000000000000 00000000
00000000 : nt!KiIdleLoop+0x9eSYMBOL_NAME: ACPI!ACPIReadGpeStatusRegister+66
MODULE_NAME: ACPI
IMAGE_NAME: ACPI.sys
IMAGE_VERSION: 10.0.19041.1110
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 66
FAILURE_BUCKET_ID: 0x133_ISR_ACPI!ACPIReadGpeStatusRegister
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9524459d-2f22-efe5-b0c9-f824c586f42c}
Followup: MachineOwner
---------