Win 11 bsod dpc_watchdog_violation (133)

系统: WIN11,CPU:12700H,问题:DPC_WATCHDOG_VIOLATION (133) 蓝屏,似乎是更新驱动后,不停的蓝屏重启,基本每隔1小时多就会蓝屏。停用GLASSWIRE 正常后正常,未现,打开后会马上引起BOSD。

日志内容如下:

Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [I:\SYS ERR\041122-13140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff80626e00000 PsLoadedModuleList = 0xfffff80627a29c70
Debug session time: Mon Apr 11 17:30:10.956 2022 (UTC + 8:00)
System Uptime: 0 days 1:27:48.641
Loading Kernel Symbols




Loading User Symbols
Loading unloaded module list

For analysis of this file, run !analyze -v nt!KeBugCheckEx:
fffff80627216990 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9380b9fbb9f0=0000000000000133
6: kd> !analyze -v


  • Bugcheck Analysis *

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80627b05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout

Debugging Details:

*** WARNING: Unable to verify timestamp for gwdrv.sys




*** Either you specified an unqualified symbol, or your debugger ***
*** doesn’t have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing “.symopt- 100”. Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***


*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***


*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***


*** Type referenced: TickPeriods ***



KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 4437

Key  : Analysis.DebugAnalysisManager
Value: Create

Key  : Analysis.Elapsed.mSec
Value: 44259

Key  : Analysis.Init.CPU.mSec
Value: 327

Key  : Analysis.Init.Elapsed.mSec
Value: 5493

Key  : Analysis.Memory.CommitPeak.Mb
Value: 98

Key  : WER.OS.Branch
Value: co_release

Key  : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z

Key  : WER.OS.Version
Value: 10.0.22000.1

FILE_IN_CAB: 041122-13140-01.dmp

BUGCHECK_CODE: 133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff80627b05330

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff90aa3c7c4a0 – (.trap 0xfffff90aa3c7c4a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000807 rbx=0000000000000000 rcx=fffff90aa3c7c950
rdx=ffffe9f4e000cc60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80627126c0b rsp=fffff90aa3c7c630 rbp=0000000000000001
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=fffff90aa3c7c9b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiComputePxeWalkAction+0x1b:
fffff806`27126c0b 83fe03 cmp esi,3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff90aa3c7c630 fffff806271260fb : 0000000000000000 fffff90aa3c7c950 fffff90aa3c7c950 0000000000000000 : nt!MiComputePxeWalkAction+0x1b
fffff90aa3c7c660 fffff80627126619 : 0000000000000000 fffff80627a53c00 fffff90a00000000 0000000000000010 : nt!MiWalkPageTablesRecursively+0x10b
fffff90aa3c7c6f0 fffff80627126619 : fffff90aa3c7c950 fffff80627a53c00 fffff90a00000000 0000000000000020 : nt!MiWalkPageTablesRecursively+0x629
fffff90aa3c7c780 fffff8062706b2e1 : 0000000000000002 fffff80627a53c00 ffffe9f400000000 0000000000000030 : nt!MiWalkPageTablesRecursively+0x629
fffff90aa3c7c810 fffff80627012b98 : fffff90aa3c7c950 fffff90a00000001 0000000000000002 fffff80600000000 : nt!MiWalkPageTables+0x381
fffff90aa3c7c910 fffff8062701226f : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!MiDeleteSystemPageTables+0xb0
fffff90aa3c7ca50 fffff806270f0611 : 0000000000000001 ffff800204065ea0 ffff800204065eb8 0000000000000005 : nt!MiReturnSystemVa+0x13f
fffff90aa3c7cb70 fffff806270f0442 : fffff80627a5ba78 fffff80627a5b1d8 0000000000001002 ffff800204065e80 : nt!MmFreePoolMemory+0x19d
fffff90aa3c7cbf0 fffff8062709b2ec : fffff80627a5ba78 fffff80627a5b1d8 0000000000001002 000000000032f400 : nt!RtlpHpEnvFreeVA+0x12
fffff90aa3c7cc20 fffff8062709b006 : 0000000100200000 ffff80032f400000 0000000000000000 0000000044435747 : nt!RtlpHpVaMgrRangeFree+0x54
fffff90aa3c7cc50 fffff806270f030a : 0000000000000000 fffff90aa3c7cde0 0000000100000000 0000000000000000 : nt!RtlpHpVaMgrCtxFree+0x72
fffff90aa3c7cca0 fffff8062728b92e : 0000000000000000 fffff90aa3c7cde0 0000000100000000 ffff800304400000 : nt!RtlpHpFreeVA+0x8a
fffff90aa3c7cce0 fffff806271027af : fffff90a00000001 0000000100000000 0000000100000000 0000000000000000 : nt!RtlpHpLargeAlloc+0x1f1ace
fffff90aa3c7ce40 fffff8062786b964 : ffff800300000000 0000000000000001 ffffffff44435747 fffff8062786b910 : nt!ExAllocateHeapPool+0xc2f
fffff90aa3c7cf70 fffff8063dd6424e : ffff8003273e2150 ffff8003063e2e40 ffff80032196ed60 ffff800300000000 : nt!ExAllocatePoolWithTag+0x64
fffff90aa3c7cfc0 ffff8003273e2150 : ffff8003063e2e40 ffff80032196ed60 ffff800300000000 0000000000000000 : gwdrv+0x424e
fffff90aa3c7cfc8 ffff8003063e2e40 : ffff80032196ed60 ffff800300000000 0000000000000000 fffff8063dd625b7 : 0xffff8003273e2150 fffff90a\a3c7cfd0 ffff80032196ed60 : ffff800300000000 0000000000000000 fffff8063dd625b7 ffff8003273edb90 : 0xffff8003063e2e40 fffff90a`a3c7cfd8 ffff800300000000 : 0000000000000000 fffff8063dd625b7 ffff8003273edb90 ffff80032196ed60 : 0xffff80032196ed60 fffff90a`a3c7cfe0 0000000000000000 : fffff8063dd625b7 ffff8003273edb90 ffff80032196ed60 ffff80032196ed60 : 0xffff800300000000

STACK_COMMAND: .trap 0xfffff90aa3c7c4a0 ; kb

SYMBOL_NAME: gwdrv+424e

MODULE_NAME: gwdrv IMAGE_NAME: gwdrv.sys

BUCKET_ID_FUNC_OFFSET: 424e

FAILURE_BUCKET_ID: 0x133_DPC_gwdrv!unknown_function

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {229a5753-87e5-3d87-e2b9-50836a10c652}

Followup: MachineOwner

Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [I:\SYS ERR\041122-13312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 22000 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff802`1d400000 PsLoadedModuleList = 0xfffff802`1e029c70
Debug session time: Mon Apr 11 20:36:34.877 2022 (UTC + 8:00)
System Uptime: 0 days 3:06:02.562
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`1d816990 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffad81`5666c9f0=0000000000000133
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
	component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8021e105330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
	additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 43933

    Key  : Analysis.Init.CPU.mSec
    Value: 312

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5310

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 104

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  041122-13312-01.dmp

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8021e105330

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff800c2365f4c0 -- (.trap 0xffff800c2365f4c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000193b833a rbx=0000000000000000 rcx=ffff800c2365f6d8
rdx=ffff800c2825f118 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021d66b9fc rsp=ffff800c2365f650 rbp=00000000ffffffff
 r8=ffff800c2825eed0  r9=ffff800c2825eee0 r10=fffff8021d77f300
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x1c:
fffff802`1d66b9fc 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
ffffad81`5666c9e8 fffff802`1d6549ce     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffad81`5666c9f0 fffff802`1d654451     : 00001b4e`45bb4b46 ffffad81`00000500 00000000`00000297 fffff802`1d798c95 : nt!KeAccumulateTicks+0x39e
ffffad81`5666ca60 fffff802`1d651486     : 00000000`000ae6a4 00000000`00067f59 00000019`fd67df7f 00000000`00000000 : nt!KiUpdateRunTime+0x61
ffffad81`5666cac0 fffff802`1d652792     : ffff800c`2365f4c0 00000000`00000000 fffff802`1e02b750 00000000`00000000 : nt!KiUpdateTime+0x686
ffffad81`5666ceb0 fffff802`1d6500c2     : ffff800c`2365f4c0 ffff8d8e`57121b70 ffff8d8e`00000000 00000000`00000002 : nt!KeClockInterruptNotify+0x272
ffffad81`5666cf40 fffff802`1d621440     : 00000019`fd7fa5c2 ffff8d8e`57121ac0 00000000`00000001 ffff8d8e`5711e040 : nt!HalpTimerClockInterrupt+0xe2
ffffad81`5666cf70 fffff802`1d81859a     : ffff800c`2365f540 ffff8d8e`57121ac0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa0
ffffad81`5666cfb0 fffff802`1d818b67     : 00000000`00000000 00000000`00000000 00000000`80000000 fffff802`1d818b74 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff800c`2365f4c0 fffff802`1d66b9fc     : 00000000`00000010 00000000`00000282 ffff800c`2365f678 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff800c`2365f650 fffff802`1d77f449     : 00000000`00000000 00000000`00000000 ffffad81`566034c0 fffff802`1d649886 : nt!KeYieldProcessorEx+0x1c
ffff800c`2365f680 fffff802`1d6447e1     : ffff800c`2365fa40 ffffad81`193b833a ffff800c`2365f778 00000000`00000000 : nt!ExpGetPoolTagInfoTarget+0x149
ffff800c`2365f6d0 fffff802`1d6437e2     : 00000000`00000008 ffff800c`2365f9d0 ffffad81`56600180 00000000`0000201a : nt!KiExecuteAllDpcs+0x491
ffff800c`2365f8d0 fffff802`1d81a8de     : 00000000`00000000 ffffad81`56600180 ffffad81`5660c540 ffff8d8e`5e12b040 : nt!KiRetireDpcList+0x2a2
ffff800c`2365fb80 00000000`00000000     : ffff800c`23660000 ffff800c`23659000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+39e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22000.593

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  39e

FAILURE_BUCKET_ID:  0x133_DPC_nt!KeAccumulateTicks

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88dc98ce-f842-4daa-98d0-858621db6b0f}

Followup:     MachineOwner

已排查了其它方面的原因,停用GLASSWIRE 后不会出现此问题,开启后就会出现。

Sorry for the issue.

If you uninstall GlassWire, reboot, then reinstall with “clean install” checked, does it solve it?

Unable to resolve, does the DMP file need to be?

Sure, please email it to us using a cloud service like Google Drive, etc…

Please make sure you are using our latest software, if not please don’t email it. Thanks!

I have sent you the BMP file by email,bugs@glasswire.com
The rise is <Win 11 bsod dpc_watchdog_violation>

Make sure you have the latest update on Glasswire and the latest update on Win 11. Also if you have any other Firewalls, put Glasswire on the White List. Hope that helps! :grinning: