Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\$WINDOWS.~BT\Sources\Rollback\setupmem.dmp]
Kernel Bitmap Dump File: Only kernel address space is available
Symbol search path is: srv*C:\_DATA\localsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff801`76400000 PsLoadedModuleList = 0xfffff801`76848150
Debug session time: Mon Jan 27 21:28:20.019 2020 (UTC + 0:00)
System Uptime: 0 days 0:05:32.077
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {1, 1e00, fffff80176973358, 0}
*** ERROR: Module load completed but symbols could not be loaded for mv61xx.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
Probably caused by : mv61xx.sys ( mv61xx+1ba3d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80176973358
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: System
CURRENT_IRQL: d
LAST_CONTROL_TRANSFER: from fffff801765eeac1 to fffff801765c14e0
STACK_TEXT:
fffff801`7c275658 fffff801`765eeac1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`76973358 : nt!KeBugCheckEx
fffff801`7c275660 fffff801`7641f61c : 000000d8`12ae24e2 fffff801`735c7180 00000000`00005304 00000000`00005304 : nt!KeAccumulateTicks+0x1cc061
fffff801`7c2756c0 fffff801`76eb74b2 : 00000000`00000000 fffff801`7c275b50 fffff801`7c275bd0 00000000`00000005 : nt!KeClockInterruptNotify+0x98c
fffff801`7c275a80 fffff801`76402a25 : 00000000`c605f396 fffff801`76f250e0 fffff801`76f25190 fffff801`76f250e0 : hal!HalpTimerClockInterrupt+0xf2
fffff801`7c275ab0 fffff801`765c2f7a : fffff801`7c275bd0 fffff801`76f250e0 00000000`00000001 fffff801`76eb92cb : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`7c275b00 fffff801`765c34e7 : 000000d8`00000000 00000000`00000000 00000000`00000000 ffff8a8a`320974a8 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff801`7c275b50 fffff801`76efdefa : fffff801`76eb7727 00000000`c0700039 00000000`00000020 ffffb800`7c5fed00 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff801`7c275ce8 fffff801`76eb7727 : 00000000`c0700039 00000000`00000020 ffffb800`7c5fed00 00000000`00001388 : hal!HalpTscQueryCounter+0x1a
fffff801`7c275cf0 fffff801`7b08b8db : ffffb800`7c5fed00 ffff8a8a`32097678 00000000`00000004 00000000`00000001 : hal!KeStallExecutionProcessor+0x127
fffff801`7c275d70 fffff801`741dba3d : ffff8a8a`32097678 00000000`00000004 00000000`00000001 ffff8a8a`2eef2000 : SCSIPORT!ScsiPortStallExecution+0xb
fffff801`7c275da0 fffff801`741dc2e0 : fffff801`7c275f00 00000000`00000000 fffff801`00000003 ffff8a8a`320974a8 : mv61xx+0x1ba3d
fffff801`7c275e20 fffff801`741c1f4b : ffff8a8a`320974a8 ffffb800`7c1d4b40 fffff801`00100009 00000000`00100000 : mv61xx+0x1c2e0
fffff801`7c275ec0 fffff801`7b08566b : ffff8a8a`365311b0 ffff8a8a`33b0c4e0 ffffb800`7bd72970 00000000`00000002 : mv61xx+0x1f4b
fffff801`7c275ef0 fffff801`76402a25 : ffffb800`7bd728c0 ffffb800`7bd72970 fffff801`7c275fa8 00000000`00000008 : SCSIPORT!ScsiPortInterrupt+0x3b
fffff801`7c275f20 fffff801`765c2b4c : fffff801`7c2678d0 ffffb800`7c1d4b40 ffffb800`7bd728c0 ffffb800`7c1d4b40 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`7c275f70 fffff801`765c27a7 : ffff8a8a`308b58a0 00000000`000051b2 ffff8a8a`33771050 ffff8a8a`334a9620 : nt!KiScanInterruptObjectList+0x14c
fffff801`7c267850 fffff804`7889117b : 00000000`00000050 fffff804`7889163e 00000000`01000010 00000000`00000282 : nt!KiChainedDispatch+0x37
fffff801`7c2679e0 fffff801`7b881115 : ffff8a8a`337711a0 ffff8a8a`33771050 00000000`00000018 00000000`000000f8 : usbuhci!UhciPollController+0x4b
fffff801`7c267a40 fffff801`7646ba89 : 00000000`00000018 ffff8a8a`33771ac8 00000000`00000020 ffff8a8a`00000002 : USBPORT!USBPORT_DM_TimerDpc+0x105
fffff801`7c267a80 fffff801`7646a7e9 : 00000000`00000006 00000000`00989680 00000000`00001fe0 00000000`000000f8 : nt!KiProcessExpiredTimerList+0x169
fffff801`7c267b70 fffff801`765c5024 : 00000000`00000000 fffff801`735c7180 fffff801`76991400 ffff8a8a`3570a080 : nt!KiRetireDpcList+0x4e9
fffff801`7c267da0 00000000`00000000 : fffff801`7c268000 fffff801`7c262000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
STACK_COMMAND: kb
FOLLOWUP_IP:
mv61xx+1ba3d
fffff801`741dba3d 4c2bf6 sub r14,rsi
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: mv61xx+1ba3d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mv61xx
IMAGE_NAME: mv61xx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d525e51
FAILURE_BUCKET_ID: 0x133_ISR_mv61xx+1ba3d
BUCKET_ID: 0x133_ISR_mv61xx+1ba3d
Followup: MachineOwner
---------