******************************************************************************** *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {0, 283, 282, 0}
Probably caused by : storport.sys ( storport!RaidpAdapterTimerDpcRoutine+59 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000283, The DPC time count (in ticks).
Arg3: 0000000000000282, The DPC time allotment (in ticks).
Arg4: 0000000000000000
Debugging Details:
------------------
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: chrome.exe
CURRENT_IRQL: d
TAG_NOT_DEFINED_c000000f: FFFFF80107665FB0
LAST_CONTROL_TRANSFER: from fffff801079dd143 to fffff80107884340
STACK_TEXT:
fffff801`076656c8 fffff801`079dd143 : 00000000`00000133 00000000`00000000 00000000`00000283 00000000`00000282 : nt!KeBugCheckEx
fffff801`076656d0 fffff801`078af011 : fffff801`07aff180 fffff801`07aff180 fffff801`07665880 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13c4c
fffff801`07665750 fffff801`078afe97 : ffffffff`ffd0a270 fffff801`07f9e502 fffff801`07665880 fffff801`07809000 : nt!KeUpdateRunTime+0x51
fffff801`07665780 fffff801`07f74eca : ffffffff`ffd0a270 fffff801`07f9e502 00000000`006ee210 fffff801`07665e68 : nt!KeUpdateTime+0x3f9
fffff801`07665970 fffff801`0787df0a : 0000000d`1c2b090d 00000000`3368627e fffff801`07f9e580 fffff801`07665b80 : hal!HalpTimerClockInterrupt+0x86
fffff801`076659a0 fffff801`078cff44 : fffffa80`11763540 00000000`00000000 00000000`ffffffff fffff801`079c4608 : nt!KiInterruptDispatchNoLockNoEtw+0x1aa
fffff801`07665b30 fffff880`00a15719 : fffffa80`0fdad1a0 fffffa80`11763540 00000000`00000000 fffff801`07f6ee61 : nt!KxWaitForLockOwnerShip+0x28
fffff801`07665b60 fffff801`078b08e4 : fffff801`07665e70 00000000`017d7840 00000000`00000000 00000000`00000001 : storport!RaidpAdapterTimerDpcRoutine+0x59
fffff801`07665bb0 fffff801`078b0fd5 : fffff801`07b01f00 fffff801`07879708 fffff801`07665e00 00000000`000000a4 : nt!KiProcessExpiredTimerList+0x214
fffff801`07665cf0 fffff801`078b0e88 : fffff801`07aff180 fffff801`07b01f80 00000000`00000001 00000000`0003458c : nt!KiExpireTimerTable+0xa9
fffff801`07665d90 fffff801`078ab2d6 : fffff801`07aff180 0000000d`06e177d7 fffffa80`12d16b00 00000000`00000025 : nt!KiTimerExpiration+0xc8
fffff801`07665e40 fffff801`078aaba5 : 00000000`00000000 fffff801`07aff180 fffff880`08caecc0 fffff801`07f9e580 : nt!KiRetireDpcList+0x1f6
fffff801`07665fb0 fffff801`078aa9a9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`08caec00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
storport!RaidpAdapterTimerDpcRoutine+59
fffff880`00a15719 488b8b18020000 mov rcx,qword ptr [rbx+218h]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: storport!RaidpAdapterTimerDpcRoutine+59
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: storport
IMAGE_NAME: storport.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5010ab51
BUCKET_ID_FUNC_OFFSET: 59
FAILURE_BUCKET_ID: 0x133_DPC_storport!RaidpAdapterTimerDpcRoutine
BUCKET_ID: 0x133_DPC_storport!RaidpAdapterTimerDpcRoutine
Followup: MachineOwner
---------