Windows 8 and 8.1 Forums


DCP_WATCHDOG_VIOLATION bsod

  1. #1


    Chile
    Posts : 1
    Windows 8 - Consumer Preview

    DCP_WATCHDOG_VIOLATION bsod


    I keep getting the bsod with the DCP_WATCHDOG_VIOLATION message, attached is my minidump file.

    Any help would be awesome.

    Thank you in advance :-)
    Attached Files
      My System SpecsSystem Spec

  2. #2


    Posts : 1,851
    8250 x86 + 7 SP1 x86 + Ubuntu 12.04 LTS x86


    You're welcome in advance.

    It's AVG causing failures in networking, like ~ 80% of all the other watchdog Windows 8 bsods.

    Remove it in safe mode with the special tool, reboot, set Windows Firewall and Windows Defender to auto and start them too.

    Enjoy.

    Code:
    DPC_WATCHDOG_VIOLATION (133)
    The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
    or above.
    Arguments:
    Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
        DISPATCH_LEVEL or above. The offending component can usually be
        identified with a stack trace.
    Arg2: 0000000000000784, The watchdog period.
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    TRIAGER: Could not open triage file : C:\Program Files\Windows Kits\8.0\Debuggers\x86\triage\modclass.ini, error 2
    
    TAG_NOT_DEFINED_202e: 1
    
    DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  0x133
    
    PROCESS_NAME:  chrome.exe
    
    CURRENT_IRQL:  d
    
    LAST_CONTROL_TRANSFER:  from fffff803745d3509 to fffff803745b0140
    
    STACK_TEXT:  
    fffff880`0d06cf98 fffff803`745d3509 : 00000000`00000133 00000000`00000001 00000000`00000784 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0d06cfa0 fffff803`7448e111 : fffff880`0d06d580 fffff803`746e3180 fffff880`0d06d150 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13a79
    fffff880`0d06d020 fffff803`7448dcaa : ffffffff`ffd0c260 00000000`00000000 fffff803`74b59502 fffff803`00000003 : nt!KeUpdateRunTime+0x51
    fffff880`0d06d050 fffff803`74b2ec0d : ffffffff`ffd0c260 fffff803`74b59502 000004ad`2623a574 fffff880`0d06d270 : nt!KeUpdateTime+0x57a
    fffff880`0d06d240 fffff803`745b2f87 : 00000001`a4d39f90 000004ad`2623a574 fffff803`74b59580 00000000`00000000 : hal!HalpTimerClockInterrupt+0x7d
    fffff880`0d06d270 fffff803`7447c98a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x1a7
    fffff880`0d06d400 fffff880`01b2f2b6 : fffffa80`064354e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlLookupEntryHashTable+0x7a
    fffff880`0d06d430 fffff880`01b2f0f7 : 00000000`00000636 fffffa80`06435540 00000000`00000000 00000000`00000000 : NETIO!KfdAleAcquireEndpointContextFromFlow+0xb6
    fffff880`0d06d4a0 fffff880`01b347d5 : fffff880`0d06d6a8 fffffa80`04dcda40 fffffa80`04dce101 fffff880`01a182d0 : NETIO!KfdAleGetTableFromHandle+0x27
    fffff880`0d06d4d0 fffff880`01b2e277 : fffff880`0d06d801 fffff880`0d06d6e1 00000000`00000108 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x35
    fffff880`0d06d520 fffff880`01b26c4e : 00000000`00000014 fffff880`0d06ddc0 00000000`00000001 fffff880`0d06db50 : NETIO!ProcessCallout+0x1e7
    fffff880`0d06d5f0 fffff880`01b26417 : 00000000`00000000 fffff880`0d06d830 fffff880`0d06dba0 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2ae
    fffff880`0d06d730 fffff880`01b60766 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!KfdClassify+0xa28
    fffff880`0d06db10 fffff880`01b5b525 : fffffa80`05335b40 fffff880`0d06dd20 fffffa80`05892aa0 fffff880`0d06ddc0 : NETIO!StreamInternalClassify+0xd2
    fffff880`0d06dc20 fffff880`01b5b13c : fffffa80`06435540 fffffa80`064354e0 fffff880`0d06de80 00000000`00000000 : NETIO!StreamClassify+0x2b5
    fffff880`0d06dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!StreamCommonInspect+0x250
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!KfdAleAcquireEndpointContextFromFlow+b6
    fffff880`01b2f2b6 4885c0          test    rax,rax
    
    SYMBOL_STACK_INDEX:  7
    
    SYMBOL_NAME:  NETIO!KfdAleAcquireEndpointContextFromFlow+b6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f3f29b6
    
    BUCKET_ID_OFFSET:  b6
    
    FAILURE_BUCKET_ID:  X64_0x133_ISR_NETIO!KfdAleAcquireEndpointContextFromFlow
    
    BUCKET_ID:  X64_0x133_ISR_NETIO!KfdAleAcquireEndpointContextFromFlow
    
    Followup: MachineOwner
      My System SpecsSystem Spec

DCP_WATCHDOG_VIOLATION bsod
Similar Threads
Thread Forum
Solved Windows 8 CP BSOD - DCP_WATCHDOG_VIOLATION - HELP! BSOD Crashes and Debugging
Solved BSoD BSOD Crashes and Debugging
BSOD BSOD Crashes and Debugging
Eight Forums Android App Eight Forums IOS App Follow us on Facebook