系统: WIN11,CPU:12700H,问题:DPC_WATCHDOG_VIOLATION (133) 蓝屏,似乎是更新驱动后,不停的蓝屏重启,基本每隔1小时多就会蓝屏。停用GLASSWIRE 正常后正常,未现,打开后会马上引起BOSD。
日志内容如下:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\SYS ERR\041122-13140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff80626e00000 PsLoadedModuleList = 0xfffff806
27a29c70
Debug session time: Mon Apr 11 17:30:10.956 2022 (UTC + 8:00)
System Uptime: 0 days 1:27:48.641
Loading Kernel Symbols
…
…
…
…
Loading User Symbols
Loading unloaded module list
…
For analysis of this file, run !analyze -v nt!KeBugCheckEx:
fffff80627216990 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9380
b9fbb9f0=0000000000000133
6: kd> !analyze -v
-
- Bugcheck Analysis *
-
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80627b05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
*** WARNING: Unable to verify timestamp for gwdrv.sys
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn’t have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing “.symopt- 100”. Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** Type referenced: TickPeriods ***
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4437
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 44259
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 5493
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 041122-13140-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff80627b05330
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff90aa3c7c4a0 – (.trap 0xfffff90aa3c7c4a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000807 rbx=0000000000000000 rcx=fffff90aa3c7c950
rdx=ffffe9f4e000cc60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80627126c0b rsp=fffff90aa3c7c630 rbp=0000000000000001
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=fffff90aa3c7c9b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiComputePxeWalkAction+0x1b:
fffff806`27126c0b 83fe03 cmp esi,3
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff90aa3c7c630 fffff806
271260fb : 0000000000000000 fffff90a
a3c7c950 fffff90aa3c7c950 00000000
00000000 : nt!MiComputePxeWalkAction+0x1b
fffff90aa3c7c660 fffff806
27126619 : 0000000000000000 fffff806
27a53c00 fffff90a00000000 00000000
00000010 : nt!MiWalkPageTablesRecursively+0x10b
fffff90aa3c7c6f0 fffff806
27126619 : fffff90aa3c7c950 fffff806
27a53c00 fffff90a00000000 00000000
00000020 : nt!MiWalkPageTablesRecursively+0x629
fffff90aa3c7c780 fffff806
2706b2e1 : 0000000000000002 fffff806
27a53c00 ffffe9f400000000 00000000
00000030 : nt!MiWalkPageTablesRecursively+0x629
fffff90aa3c7c810 fffff806
27012b98 : fffff90aa3c7c950 fffff90a
00000001 0000000000000002 fffff806
00000000 : nt!MiWalkPageTables+0x381
fffff90aa3c7c910 fffff806
2701226f : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!MiDeleteSystemPageTables+0xb0
fffff90aa3c7ca50 fffff806
270f0611 : 0000000000000001 ffff8002
04065ea0 ffff800204065eb8 00000000
00000005 : nt!MiReturnSystemVa+0x13f
fffff90aa3c7cb70 fffff806
270f0442 : fffff80627a5ba78 fffff806
27a5b1d8 0000000000001002 ffff8002
04065e80 : nt!MmFreePoolMemory+0x19d
fffff90aa3c7cbf0 fffff806
2709b2ec : fffff80627a5ba78 fffff806
27a5b1d8 0000000000001002 00000000
0032f400 : nt!RtlpHpEnvFreeVA+0x12
fffff90aa3c7cc20 fffff806
2709b006 : 0000000100200000 ffff8003
2f400000 0000000000000000 00000000
44435747 : nt!RtlpHpVaMgrRangeFree+0x54
fffff90aa3c7cc50 fffff806
270f030a : 0000000000000000 fffff90a
a3c7cde0 0000000100000000 00000000
00000000 : nt!RtlpHpVaMgrCtxFree+0x72
fffff90aa3c7cca0 fffff806
2728b92e : 0000000000000000 fffff90a
a3c7cde0 0000000100000000 ffff8003
04400000 : nt!RtlpHpFreeVA+0x8a
fffff90aa3c7cce0 fffff806
271027af : fffff90a00000001 00000001
00000000 0000000100000000 00000000
00000000 : nt!RtlpHpLargeAlloc+0x1f1ace
fffff90aa3c7ce40 fffff806
2786b964 : ffff800300000000 00000000
00000001 ffffffff44435747 fffff806
2786b910 : nt!ExAllocateHeapPool+0xc2f
fffff90aa3c7cf70 fffff806
3dd6424e : ffff8003273e2150 ffff8003
063e2e40 ffff80032196ed60 ffff8003
00000000 : nt!ExAllocatePoolWithTag+0x64
fffff90aa3c7cfc0 ffff8003
273e2150 : ffff8003063e2e40 ffff8003
2196ed60 ffff800300000000 00000000
00000000 : gwdrv+0x424e
fffff90aa3c7cfc8 ffff8003
063e2e40 : ffff80032196ed60 ffff8003
00000000 0000000000000000 fffff806
3dd625b7 : 0xffff8003273e2150 fffff90a\
a3c7cfd0 ffff80032196ed60 : ffff8003
00000000 0000000000000000 fffff806
3dd625b7 ffff8003273edb90 : 0xffff8003
063e2e40 fffff90a`a3c7cfd8 ffff800300000000 : 00000000
00000000 fffff8063dd625b7 ffff8003
273edb90 ffff80032196ed60 : 0xffff8003
2196ed60 fffff90a`a3c7cfe0 0000000000000000 : fffff806
3dd625b7 ffff8003273edb90 ffff8003
2196ed60 ffff80032196ed60 : 0xffff8003
00000000
STACK_COMMAND: .trap 0xfffff90aa3c7c4a0 ; kb
SYMBOL_NAME: gwdrv+424e
MODULE_NAME: gwdrv IMAGE_NAME: gwdrv.sys
BUCKET_ID_FUNC_OFFSET: 424e
FAILURE_BUCKET_ID: 0x133_DPC_gwdrv!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {229a5753-87e5-3d87-e2b9-50836a10c652}
Followup: MachineOwner