DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000000784, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
TRIAGER: Could not open triage file : C:\Program Files\Windows Kits\8.0\Debuggers\x86\triage\modclass.ini, error 2
TAG_NOT_DEFINED_202e: 1
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: chrome.exe
CURRENT_IRQL: d
LAST_CONTROL_TRANSFER: from fffff803745d3509 to fffff803745b0140
STACK_TEXT:
fffff880`0d06cf98 fffff803`745d3509 : 00000000`00000133 00000000`00000001 00000000`00000784 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d06cfa0 fffff803`7448e111 : fffff880`0d06d580 fffff803`746e3180 fffff880`0d06d150 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13a79
fffff880`0d06d020 fffff803`7448dcaa : ffffffff`ffd0c260 00000000`00000000 fffff803`74b59502 fffff803`00000003 : nt!KeUpdateRunTime+0x51
fffff880`0d06d050 fffff803`74b2ec0d : ffffffff`ffd0c260 fffff803`74b59502 000004ad`2623a574 fffff880`0d06d270 : nt!KeUpdateTime+0x57a
fffff880`0d06d240 fffff803`745b2f87 : 00000001`a4d39f90 000004ad`2623a574 fffff803`74b59580 00000000`00000000 : hal!HalpTimerClockInterrupt+0x7d
fffff880`0d06d270 fffff803`7447c98a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x1a7
fffff880`0d06d400 fffff880`01b2f2b6 : fffffa80`064354e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlLookupEntryHashTable+0x7a
fffff880`0d06d430 fffff880`01b2f0f7 : 00000000`00000636 fffffa80`06435540 00000000`00000000 00000000`00000000 : NETIO!KfdAleAcquireEndpointContextFromFlow+0xb6
fffff880`0d06d4a0 fffff880`01b347d5 : fffff880`0d06d6a8 fffffa80`04dcda40 fffffa80`04dce101 fffff880`01a182d0 : NETIO!KfdAleGetTableFromHandle+0x27
fffff880`0d06d4d0 fffff880`01b2e277 : fffff880`0d06d801 fffff880`0d06d6e1 00000000`00000108 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x35
fffff880`0d06d520 fffff880`01b26c4e : 00000000`00000014 fffff880`0d06ddc0 00000000`00000001 fffff880`0d06db50 : NETIO!ProcessCallout+0x1e7
fffff880`0d06d5f0 fffff880`01b26417 : 00000000`00000000 fffff880`0d06d830 fffff880`0d06dba0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2ae
fffff880`0d06d730 fffff880`01b60766 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!KfdClassify+0xa28
fffff880`0d06db10 fffff880`01b5b525 : fffffa80`05335b40 fffff880`0d06dd20 fffffa80`05892aa0 fffff880`0d06ddc0 : NETIO!StreamInternalClassify+0xd2
fffff880`0d06dc20 fffff880`01b5b13c : fffffa80`06435540 fffffa80`064354e0 fffff880`0d06de80 00000000`00000000 : NETIO!StreamClassify+0x2b5
fffff880`0d06dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!StreamCommonInspect+0x250
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!KfdAleAcquireEndpointContextFromFlow+b6
fffff880`01b2f2b6 4885c0 test rax,rax
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: NETIO!KfdAleAcquireEndpointContextFromFlow+b6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4f3f29b6
BUCKET_ID_OFFSET: b6
FAILURE_BUCKET_ID: X64_0x133_ISR_NETIO!KfdAleAcquireEndpointContextFromFlow
BUCKET_ID: X64_0x133_ISR_NETIO!KfdAleAcquireEndpointContextFromFlow
Followup: MachineOwner