*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {0, 501, 500, 0}
*** WARNING: Unable to verify timestamp for vmnetbridge.sys
*** ERROR: Module load completed but symbols could not be loaded for vmnetbridge.sys
Probably caused by : vmnetbridge.sys ( vmnetbridge+64ff )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: 0000000000000000
Debugging Details:
------------------
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: svchost.exe
CURRENT_IRQL: d
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff802f9572f7c to fffff802f954eca0
STACK_TEXT:
fffff802`fb0b1c58 fffff802`f9572f7c : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff802`fb0b1c60 fffff802`f945581b : 00000000`00000001 fffff802`f96ef180 00000000`00171771 fffff802`f96ef180 : nt! ?? ::FNODOBFM::`string'+0x13ddc
fffff802`fb0b1cf0 fffff802`f945548c : 00000000`00000001 fffff802`fb0b1d70 fffff802`fb0b1e30 fffff802`f969b920 : nt!KiUpdateRunTime+0x57
fffff802`fb0b1d30 fffff802`f95d431c : fffff802`f96cd4b0 fffff802`f945b813 fffff802`f96ef180 00000000`00000002 : nt!KiUpdateTime+0x63c
fffff802`fb0b1f10 fffff802`f9b88e5f : ffffd000`00400a02 00000000`00000001 fffff800`006c0ba0 00000000`0000b201 : nt!KeClockInterruptNotify+0x5c
fffff802`fb0b1f40 fffff802`f9497343 : fffff802`f9bd5900 00000000`00000008 fffff802`fb0b1f50 00000000`00000010 : hal!HalpTimerClockInterrupt+0x4f
fffff802`fb0b1f70 fffff802`f955012a : fffff802`f9bd5900 ffffe000`06c4dd98 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa3
fffff802`fb0b1fb0 fffff802`f955050f : fffff800`000003a1 00000000`00000008 ffff8268`2abc4c67 00000000`000007ff : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
fffff802`fb0a8f30 fffff802`f9495e00 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000018 : nt!KiInterruptDispatchLBControl+0x11f
fffff802`fb0a90c0 fffff802`f9495dc2 : 00000000`00000002 00000000`00000001 fffff802`fb0a9210 fffff800`00ef5eb1 : nt!KxWaitForSpinLockAndAcquire+0x20
fffff802`fb0a90f0 fffff800`030344ff : fffff802`fb0a9600 fffff802`fb0a9850 ffffe000`069733b0 fffff802`fb0a9250 : nt!KeAcquireSpinLockRaiseToDpc+0x32
fffff802`fb0a9120 fffff802`fb0a9600 : fffff802`fb0a9850 ffffe000`069733b0 fffff802`fb0a9250 fffff802`fb0a9850 : vmnetbridge+0x64ff
fffff802`fb0a9128 fffff802`fb0a9850 : ffffe000`069733b0 fffff802`fb0a9250 fffff802`fb0a9850 00000000`00000001 : 0xfffff802`fb0a9600
fffff802`fb0a9130 ffffe000`069733b0 : fffff802`fb0a9250 fffff802`fb0a9850 00000000`00000001 00000000`00000000 : 0xfffff802`fb0a9850
fffff802`fb0a9138 fffff802`fb0a9250 : fffff802`fb0a9850 00000000`00000001 00000000`00000000 ffff37c7`58979509 : 0xffffe000`069733b0
fffff802`fb0a9140 fffff802`fb0a9850 : 00000000`00000001 00000000`00000000 ffff37c7`58979509 ffffd000`2079c101 : 0xfffff802`fb0a9250
fffff802`fb0a9148 00000000`00000001 : 00000000`00000000 ffff37c7`58979509 ffffd000`2079c101 ffffe000`07a3a078 : 0xfffff802`fb0a9850
fffff802`fb0a9150 00000000`00000000 : ffff37c7`58979509 ffffd000`2079c101 ffffe000`07a3a078 fffff802`f96a0100 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
vmnetbridge+64ff
fffff800`030344ff ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: vmnetbridge+64ff
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vmnetbridge
IMAGE_NAME: vmnetbridge.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51e84573
FAILURE_BUCKET_ID: 0x133_DPC_vmnetbridge+64ff
BUCKET_ID: 0x133_DPC_vmnetbridge+64ff
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_dpc_vmnetbridge+64ff
FAILURE_ID_HASH: {c6b257ec-8d80-283e-2111-a85c8869ede0}
Followup: MachineOwner