deiruch |
07-08-2013 07:05 PM |
BSOD with network cable plugged in
1 Attachment(s)
With the network cable plugged in in my Toshiba Dynadock (PA3927U-1PRP U3.0) and heavy network utilization I regularly get the following BSODs:
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'bthpan' and 'WUDFRd.sys' overlap
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: svchost.exe
CURRENT_IRQL: d
ANALYSIS_VERSION: 6.3.9431.0 (debuggers(dbg).130615-1214) amd64fre
LAST_CONTROL_TRANSFER: from fffff801867f9918 to fffff801867c5da0
STACK_TEXT:
fffff801`87f54c88 fffff801`867f9918 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
fffff801`87f54c90 fffff801`866fe9ee : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x232d8
fffff801`87f54d20 fffff801`8660bf1f : fffff801`86969180 fffff801`86969180 ffffe000`02637b00 00000000`0000b101 : nt!KeClockInterruptNotify+0x73e
fffff801`87f54f40 fffff801`86757cc2 : fffff801`86659900 00000000`00000008 fffff801`87f54f50 00000000`00000010 : hal!HalpTimerClockInterrupt+0x4f
fffff801`87f54f70 fffff801`867c722a : fffff801`86659900 ffffe000`004ba020 00000000`00000002 ffffe000`05326c30 : nt!KiCallInterruptServiceRoutine+0x122
fffff801`87f54fb0 fffff801`867c760f : 00000000`622cead7 ffffe000`00000000 ffffe000`004ba020 fffff800`02291170 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
ffffd000`20728f30 fffff801`86757ee0 : ffffe000`02efd1a0 ffffe000`0263c3d1 ffffe000`02659710 00000000`00000000 : nt!KiInterruptDispatchLBControl+0x11f
ffffd000`207290c0 fffff801`86757ea2 : 00000000`00000002 ffffe000`0265c5a0 00000000`00000001 fffff800`00edb8f0 : nt!KxWaitForSpinLockAndAcquire+0x20
ffffd000`207290f0 fffff800`02380dd4 : ffffe000`05326c01 ffffe000`05326c30 ffffe000`0266e990 ffffe000`026496c8 : nt!KeAcquireSpinLockRaiseToDpc+0x32
ffffd000`20729120 fffff800`0237d349 : ffffe000`05326c30 00000000`00000001 00000000`00000000 ffffe000`05326c30 : dlcdcncm6_x64+0x5dd4
ffffd000`20729170 fffff800`00a5a2c8 : ffffe000`0265f740 00000000`00000001 00000000`00000000 ffffd000`20729168 : dlcdcncm6_x64+0x2349
ffffd000`207291a0 fffff800`00a76579 : 00000000`00000000 fffff800`00000001 ffffe000`05326c30 fffff800`013da100 : ndis!ndisCallSendHandler+0x128
ffffd000`20729250 fffff800`00a5386e : 00000000`00000001 ffffe000`05326c30 ffffe000`0267e010 fffff800`00000000 : ndis!ndisInvokeNextSendHandler+0x1bfa9
ffffd000`207292e0 fffff800`013d69ab : ffffe000`05326c30 00000000`00000000 ffffd000`20729300 00000000`00000001 : ndis!NdisFSendNetBufferLists+0xfe
ffffd000`20729360 fffff800`013d3cf9 : ffffe000`05326c30 00000000`00000000 00000000`00000000 ffffe000`05326c01 : pacer!PcpLineSendNetBufferLists+0x1fb
ffffd000`207293c0 fffff800`013cfdf4 : 00000000`9ad9e16e ffffd000`207294f0 ffffe000`05326c30 ffffe000`0267f750 : pacer!PcpSchedulerBatchAndSendOrDropNblChain+0x89
ffffd000`207293f0 fffff800`00a52adf : 00000000`00000001 00000000`00000000 ffffe000`0265c5a0 fffff800`00a5a100 : pacer! ?? ::FNODOBFM::`string'+0x7fa
ffffd000`20729540 fffff800`0237d6dd : ffffe000`02efd1a0 ffffe000`01c07da0 00000000`000005ea 00000000`00000001 : ndis!NdisMSendNetBufferListsComplete+0x1df
ffffd000`207296b0 fffff800`02380a28 : 00000000`00000000 fffff800`02380739 ffffe000`004ba000 00000000`00000000 : dlcdcncm6_x64+0x26dd
ffffd000`20729720 fffff800`02380df4 : ffffe000`004ba000 00000000`00000002 00000000`00000000 00000000`00000000 : dlcdcncm6_x64+0x5a28
ffffd000`20729760 fffff800`0237d349 : ffffe000`01c07da0 00000000`00000001 00000000`00000000 ffffd000`207298e0 : dlcdcncm6_x64+0x5df4
ffffd000`207297b0 fffff800`00a51bc2 : 00000000`00000000 ffffd000`207298e0 00000000`00000000 ffffe000`011a4a80 : dlcdcncm6_x64+0x2349
ffffd000`207297e0 fffff800`00c52cef : ffffe000`02645c10 ffffe000`09e65c70 ffffe000`00000000 00000000`00000002 : ndis!NdisSendNetBufferLists+0x552
ffffd000`207299a0 fffff800`00c50349 : fffff800`00dc2180 00000000`00000000 ffffe000`04799500 fffff800`013d0800 : tcpip!IppFragmentPackets+0x4df
ffffd000`20729ad0 fffff800`00c4fb54 : fffff800`00dc2180 00000000`00000000 ffffe000`04799600 ffffe000`09e65c00 : tcpip!IppDispatchSendPacketHelper+0x89
ffffd000`20729b80 fffff800`00c4ebdc : 00000000`00000002 00000000`00000002 ffffd000`2072a010 ffffe000`019843b8 : tcpip!IppPacketizeDatagrams+0x2d4
ffffd000`20729d30 fffff800`00c5782e : 00000000`0000ffff 00000000`00000007 fffff800`00dc2180 ffffe000`09096d70 : tcpip!IppSendDatagramsCommon+0x35c
ffffd000`20729f10 fffff800`00c6905c : ffffe000`01199a60 fffff800`00c357e3 ffffe000`01911d40 ffffe000`0f28cd10 : tcpip!IpNlpSendDatagrams+0x3e
ffffd000`20729f50 fffff800`00c4b881 : 00000000`00001002 00000000`00000000 ffffe000`0f28cd10 ffffd000`2072a630 : tcpip!TcpTcbSend+0x74c
ffffd000`2072a270 fffff800`00c4b585 : 00000000`00000000 ffffd000`2072a5a0 00000000`00001000 00000000`00000000 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xa1
ffffd000`2072a2a0 fffff800`00c4b978 : ffffe000`0119f080 ffffa0af`b31ff07f ffffe000`0764ff00 00000000`00000000 : tcpip!TcpEnqueueTcbSend+0x2a5
ffffd000`2072a3a0 fffff801`8670f4af : ffffd000`2072a530 fffff801`866d6c63 00000000`0007b564 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x28
ffffd000`2072a420 fffff800`00c4bc32 : fffff800`00c4b950 ffffd000`2072a5a0 00000000`00000000 00000000`00000002 : nt!KeExpandKernelStackAndCalloutInternal+0xef
ffffd000`2072a570 fffff800`01250312 : ffffe000`0764ff98 ffffe000`05aac5f0 00000000`000005ff ffffe000`0764ff98 : tcpip!TcpTlConnectionSend+0x72
ffffd000`2072a5e0 fffff800`01252435 : 00000000`00000000 ffffd000`2072a911 ffffe000`06cade40 00000000`00000000 : afd!AfdTLStartBufferedVcSend+0x9e
ffffd000`2072a680 fffff800`01244785 : 00000000`ffffffff 00000000`00000002 ffffe000`08beae10 ffffe000`04c72cc0 : afd!AfdSend+0x6e5
ffffd000`2072a830 fffff801`86a418f4 : 00000000`00000001 ffffd000`2072a911 ffffe000`04c72cc0 00000000`00000000 : afd!AfdDispatch+0x115
ffffd000`2072a890 fffff801`86a505f7 : 00000000`00000001 00000000`00000001 ffffe000`00000000 ffffe000`04c72cc0 : nt!IopSynchronousServiceTail+0x164
ffffd000`2072a960 fffff801`867d16b3 : ffffe000`06143001 00000000`000001b9 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x837
ffffd000`2072aa90 00007ffb`5bdcb13a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000a8`6989cb08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`5bdcb13a
STACK_COMMAND: kb
FOLLOWUP_IP:
dlcdcncm6_x64+5dd4
fffff800`02380dd4 4533ff xor r15d,r15d
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: dlcdcncm6_x64+5dd4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dlcdcncm6_x64
IMAGE_NAME: dlcdcncm6_x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 519db8d2
FAILURE_BUCKET_ID: 0x133_ISR_dlcdcncm6_x64+5dd4
BUCKET_ID: 0x133_ISR_dlcdcncm6_x64+5dd4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_isr_dlcdcncm6_x64+5dd4
FAILURE_ID_HASH: {dd86df3e-f8b6-98c8-0ef8-d2890db646fe}
Followup: MachineOwner
---------
It's a gigabit connection and I usually get a BSOD within minutes. I noticed that the network driver has a different version number than the graphics drivers but suspect that is ok. Without a plugged in network cable (like now) the system runs stable for days. Wi-Fi only also works reliable. For some basic troubleshooting I tried to disable power saving for the network adapter, but nothing much else.
I would also like to THANK YOU VERY MUCH for making the 8.1 drivers available early. Awesome!
Cheers,
Simon
|