*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {0, 283, 282, 0}
*** WARNING: Unable to verify timestamp for netwlv32.sys
*** ERROR: Module load completed but symbols could not be loaded for netwlv32.sys
Probably caused by : netwlv32.sys ( netwlv32+23d6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 00000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 00000283, The DPC time count (in ticks).
Arg3: 00000282, The DPC time allotment (in ticks).
Arg4: 00000000
Debugging Details:
------------------
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: System
CURRENT_IRQL: 1c
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
DPC_STACK_BASE: FFFFFFFF81277000
LAST_CONTROL_TRANSFER: from 81fe7cab to 81f5dcb0
STACK_TEXT:
812736bc 81fe7cab 00000133 00000000 00000283 nt!KeBugCheckEx
81273728 81ef179c 0000c8e9 0000c8ea 00007702 nt! ?? ::FNODOBFM::`string'+0xea93
81273794 81e2dffe 812737ac 81ee2965 91e4dbd0 nt!KeUpdateTime+0x1d8
812737b4 81e3f5fd 81273702 000000d1 81273850 hal!HalpTimerClockInterruptCommon+0x66
812737b4 81ee2965 81273702 000000d1 81273850 hal!HalpTimerClockInterrupt+0x199
8127383c 9181d3d6 82d3b3af 81273890 00002000 nt!KfAcquireSpinLock+0x1f
WARNING: Stack unwind information not available. Following frames may be wrong.
81273850 9181d6aa 91e4dbd0 869770b4 81273894 netwlv32+0x23d6
81273860 9182e84f 81273890 0000000c 00000001 netwlv32+0x26aa
81273894 9182ad3c 869770b4 00002000 86bc7e18 netwlv32+0x1384f
812738ac 918292d9 86bc7e18 8127396c 00000000 netwlv32+0xfd3c
812738c0 918ab5ed 86bc7e18 000000d0 00000000 netwlv32+0xe2d9
81273998 91849ef4 879ce2c8 872780c4 88ed5068 netwlv32+0x905ed
812739cc 9184ab45 872780c4 000000da 81273a18 netwlv32+0x2eef4
812739dc 9184baea 874fec28 872780c4 00000000 netwlv32+0x2fb45
81273a18 9184bd7e 86af9d58 86bc7c18 87278140 netwlv32+0x30aea
81273a7c 9184d2ff 000000e6 86bc7c18 000000ff netwlv32+0x30d7e
81273ab8 918457bc 867d9c01 86bc7c18 81273ad4 netwlv32+0x322ff
81273ac8 91aa6765 86bc7c18 81273b68 82d29985 netwlv32+0x2a7bc
81273ad4 82d29985 8672cc50 00000000 00000000 netwlv32+0x28b765
81273b68 81ec24ab 8759fba4 8759faa8 00000000 ndis!ndisInterruptDpc+0x188
81273c20 81ec20e6 820770c0 81273c68 87f89a40 nt!KiExecuteAllDpcs+0x1f2
81273d40 81fd5eb4 00000000 0000000e 00000000 nt!KiRetireDpcList+0xed
81273d44 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
netwlv32+23d6
9181d3d6 ?? ???
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: netwlv32+23d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netwlv32
IMAGE_NAME: netwlv32.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c694a7c
FAILURE_BUCKET_ID: 0x133_DPC_netwlv32+23d6
BUCKET_ID: 0x133_DPC_netwlv32+23d6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_dpc_netwlv32+23d6
FAILURE_ID_HASH: {5300c0b6-1650-e89d-f076-2c5cbe17e629}
Followup: MachineOwner