*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {0, 283, 282, 0}
Probably caused by : NETIO.SYS ( NETIO!StreamInjectRequestsToStack+23e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000283, The DPC time count (in ticks).
Arg3: 0000000000000282, The DPC time allotment (in ticks).
Arg4: 0000000000000000
Debugging Details:
------------------
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: avgnsa.exe
CURRENT_IRQL: d
TAG_NOT_DEFINED_c000000f: FFFFF8800201BFB0
LAST_CONTROL_TRANSFER: from fffff80265a596ef to fffff80265900040
STACK_TEXT:
fffff880`0201b7d8 fffff802`65a596ef : 00000000`00000133 00000000`00000000 00000000`00000283 00000000`00000282 : nt!KeBugCheckEx
fffff880`0201b7e0 fffff802`6592b061 : 00000000`00000000 fffff880`009bf180 fffff880`0201b940 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13c80
fffff880`0201b860 fffff802`6583ce94 : ffffffff`ffd0a270 fffff802`65866902 00000000`01d0e3ae fffffa80`0e02b4e0 : nt!KeUpdateRunTime+0x51
fffff880`0201b890 fffff802`658f9bfa : 00000000`00000000 00000000`7d786fa5 fffff802`658669a0 fffffa80`05dbf000 : hal!HalpTimerClockInterrupt+0x50
fffff880`0201b8c0 fffff802`658ef903 : 00000000`00000001 fffffa80`05d33520 fffff880`05cdf004 fffff802`65836f19 : nt!KiInterruptDispatchNoLockNoEtw+0x1aa
fffff880`0201ba50 fffff802`6592c315 : 00000000`00000002 00000000`00000000 000000bd`10781107 fffff880`054da682 : nt!KxWaitForSpinLockAndAcquire+0x23
fffff880`0201ba80 fffff880`01d6d7c2 : 00000000`000000b3 fffffa80`059fbca0 00000000`00000000 000000bd`10781107 : nt!KeAcquireSpinLockRaiseToDpc+0x35
fffff880`0201bab0 fffff880`01b93626 : 00000000`00000000 fffff880`0201bc30 fffffa80`05d428f0 fffff880`057c9142 : tcpip!TcpEnqueueTcbSend+0x72
fffff880`0201bb80 fffff880`01b9307b : fffffa80`04bdd580 fffffa80`0e02b4e0 00000000`00000000 00000000`ffffffff : NETIO!StreamInjectRequestsToStack+0x23e
fffff880`0201bc60 fffff880`01b92f21 : fffffa80`04bdd580 00000000`00000000 00000000`00000002 fffffa80`042a2000 : NETIO!StreamPermitDataHelper+0x5f
fffff880`0201bc90 fffff802`658f5f38 : fffff880`009c1f00 fffff880`0201be00 fffffa80`083b34d0 00000000`00000000 : NETIO!StreamPermitRemoveDataDpc+0x81
fffff880`0201bd00 fffff802`65926eb0 : fffff880`009bf180 fffff880`0cc4ccc0 fffffa80`063df080 00000000`00000004 : nt!KiExecuteAllDpcs+0x198
fffff880`0201be40 fffff802`659268a5 : 00000000`00000000 fffff880`009bf180 fffff880`0c4992e0 fffffa80`083b34d0 : nt!KiRetireDpcList+0xd0
fffff880`0201bfb0 fffff802`659266a9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`0c499230 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!StreamInjectRequestsToStack+23e
fffff880`01b93626 8bf0 mov esi,eax
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: NETIO!StreamInjectRequestsToStack+23e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 50765624
BUCKET_ID_FUNC_OFFSET: 23e
FAILURE_BUCKET_ID: 0x133_DPC_NETIO!StreamInjectRequestsToStack
BUCKET_ID: 0x133_DPC_NETIO!StreamInjectRequestsToStack
Followup: MachineOwner
---------