Here is the dump file I get when getting watchdog violations using glasswire:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\050822-12218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff80067400000 PsLoadedModuleList = 0xfffff800
6802a290
Debug session time: Sun May 8 22:31:05.095 2022 (UTC - 7:00)
System Uptime: 0 days 0:05:59.812
Loading Kernel Symbols
…
…
…
…
Loading User Symbols
Loading unloaded module list
…
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800677f7d50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff800
6ba2ee20=0000000000000133
0: kd> !analyze -v
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff800680fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn’t have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing “.symopt- 100”. Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** Type referenced: TickPeriods ***
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5546
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27468
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 40682
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 050822-12218-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff800680fb320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8006ba246d0 – (.trap 0xfffff8006ba246d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8d982d7e000 rbx=0000000000000000 rcx=fffff8006ba24bd0
rdx=fffff8fc6cc16bf0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800676a60ce rsp=fffff8006ba24860 rbp=0000000000000001
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=fffff88000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!MiComputePxeWalkAction+0x1e:
fffff800676a60ce 4c89642458 mov qword ptr [rsp+58h],r12 ss:fffff800
6ba248b8=0000000000000001
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ChaosGate.exe
STACK_TEXT:
fffff8006ba24860 fffff800
676a5b8f : 0000000000000001 00000000
00000001 0000000000000000 00000000
00000000 : nt!MiComputePxeWalkAction+0x1e
fffff8006ba248b0 fffff800
676a5c8b : fffff8fc00000000 fffff800
6804f480 0000000000000001 fffff800
6ba24c30 : nt!MiWalkPageTablesRecursively+0x78f
fffff8006ba24950 fffff800
676a5c8b : fffff8fc7e366000 fffff800
6804f480 0000000000000002 fffff800
6ba24c40 : nt!MiWalkPageTablesRecursively+0x88b
fffff8006ba249f0 fffff800
6763f18b : 0000000000000000 fffff800
6804f480 0000000000000003 fffff800
6ba24c50 : nt!MiWalkPageTablesRecursively+0x88b
fffff8006ba24a90 fffff800
6760673f : fffff8006ba24bd0 00000000
00000000 0000000000000002 fffff8fc
00000000 : nt!MiWalkPageTables+0x36b
fffff8006ba24b90 fffff800
67608e5e : ffffb303d86b3e60 ffffb303
d86b3e78 0000000000007200 00000000
00000000 : nt!MiClearNonPagedPtes+0x277
fffff8006ba24dc0 fffff800
67608c82 : ffffb303d86b3e40 fffff800
68054658 0000000000001002 fffff800
68054ef8 : nt!MmFreePoolMemory+0x1aa
fffff8006ba24e40 fffff800
67712788 : ffffb303d86b3e40 fffff800
68054658 0000000000001002 00000003
3059f200 : nt!RtlpHpEnvFreeVA+0x12
fffff8006ba24e70 fffff800
6771263a : 0000000100200000 ffffb305
9f200000 0000000100000001 00000000
00000000 : nt!RtlpHpVaMgrRangeFree+0x54
fffff8006ba24ea0 fffff800
67608c66 : ffffb30472c00000 ffffb304
72a8d4a0 0000000000000000 00000000
00000001 : nt!RtlpHpVaMgrCtxFree+0x6a
fffff8006ba24f00 fffff800
6786adb7 : 0000000000000000 fffff800
6ba25040 ffffb30472c00000 00000000
00000000 : nt!RtlpHpFreeVA+0x8a
fffff8006ba24f40 fffff800
6764bd8f : 0000000000100000 00000001
00000000 0000000100000000 ffffffff
00000000 : nt!RtlpHpLargeAlloc+0x15963b
fffff8006ba250b0 fffff800
67db2094 : ffffb30400000000 00000000
00000001 ffffb30444435747 ffffb304
72b74a90 : nt!ExAllocateHeapPool+0xb0f
fffff8006ba251f0 fffff800
80a1424e : ffffb30472b90390 ffffb304
72b74a90 ffffb3049802bb20 ffffb304
00000000 : nt!ExAllocatePoolWithTag+0x64
fffff8006ba25240 ffffb304
72b90390 : ffffb30472b74a90 ffffb304
9802bb20 ffffb30400000000 00000000
00000000 : gwdrv+0x424e
fffff8006ba25248 ffffb304
72b74a90 : ffffb3049802bb20 ffffb304
00000000 0000000000000000 fffff800
80a125b7 : 0xffffb30472b90390 fffff800
6ba25250 ffffb3049802bb20 : ffffb304
00000000 0000000000000000 fffff800
80a125b7 ffffb30472ba4560 : 0xffffb304
72b74a90
fffff8006ba25258 ffffb304
00000000 : 0000000000000000 fffff800
80a125b7 ffffb30472ba4560 ffffb304
9802bb20 : 0xffffb3049802bb20 fffff800
6ba25260 0000000000000000 : fffff800
80a125b7 ffffb30472ba4560 ffffb304
9802bb20 ffffb3049802bb20 : 0xffffb304
00000000
STACK_COMMAND: .trap 0xfffff8006ba246d0 ; kb
SYMBOL_NAME: gwdrv+424e
MODULE_NAME: gwdrv
IMAGE_NAME: gwdrv.sys
BUCKET_ID_FUNC_OFFSET: 424e
FAILURE_BUCKET_ID: 0x133_DPC_gwdrv!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {229a5753-87e5-3d87-e2b9-50836a10c652}
Followup: MachineOwner