Forum Home
Press F1
 
Thread ID: 138121 2014-10-07 20:16:00 New Business Desktop dpDesignz (15919) Press F1
Post ID Timestamp Content User
1385835 2014-10-09 04:17:00 Just reading / Analizing the Bug Check -- You may want to uninstall Networx as well ( network Monitor)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x133

PROCESS_NAME: networx.exe


Notice the number 0x133 -- That's the cause of every 0x133 Crash according to the check. Had that happen on my W7 a while back so its been uninstalled.
wainuitech (129)
1385836 2014-10-09 19:30:00 Just reading / Analizing the Bug Check -- You may want to uninstall Networx as well ( network Monitor)


Notice the number 0x133 -- That's the cause of every 0x133 Crash according to the check. Had that happen on my W7 a while back so its been uninstalled.

Oh bugger :(. I use that to monitor the traffic and usage from our staff. Do you know any alternatives you would recommend?
dpDesignz (15919)
1385837 2014-10-09 19:59:00 Oh bugger :(. I use that to monitor the traffic and usage from our staff. Do you know any alternatives you would recommend? Nope, its a bit of a bugger as I used Networx for ages. Then one day I did an update on it and the crashing started. Try removing it and see if the crashing stops.

Went through the following dumps, 20953,17093,27484 all which had the 0x133 message, all say the exact same thing. The only exception is 55781, which has 0x19.

Below are the actual reports or part of.

As you can see by the first, 0x19, its already on its way to crashing - In bold:
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 000000000000000e,
Arg2: ffffd000215f4290
Arg3: fffff8019fa15900
Arg4: 376ba0ac27377022

Debugging Details:
------------------


BUGCHECK_STR: 0x19_e

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 0

And the full report for every 0x133 you posted, look for the crash Error 0x133 and the exe that caused it ( under debugging details - Bug Check and process Name) --- networx.


Bugcheck Analysis *
* *
************************************************** *****************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x133

PROCESS_NAME: networx.exe

CURRENT_IRQL: d

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

LAST_CONTROL_TRANSFER: from fffff8030d391d18 to fffff8030d368ca0

STACK_TEXT:
ffffd001`f1565c98 fffff803`0d391d18 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt! KeBugCheckEx
ffffd001`f1565ca0 fffff803`0d277115 : 00000000`00000000 00000000`00000000 00000000`80000000 fffff803`0d36a500 : nt! ?? ::FNODOBFM::`string'+0x18b68
ffffd001`f1565d30 fffff803`0d9a67b5 : 00000000`00400a02 ffffd001`ed97e470 fffff800`6f1a11c0 ffffd000`00006101 : nt! KeClockInterruptNotify+0x95
ffffd001`f1565f40 fffff803`0d2ee0e3 : ffffd001`f1565f60 00000000`00000008 ffffd001`f1565f50 00000000`0000000c : hal!HalpTimerClockIpiRoutine+0x15
ffffd001`f1565f70 fffff803`0d36a12a : fffff803`0d9f2d00 ffffd000`236122a0 ffffd000`236124c0 00000000`00000000 : nt! KiCallInterruptServiceRoutine+0xa3
ffffd001`f1565fb0 fffff803`0d36a50f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! KiInterruptSubDispatchNoLockNoEtw+0xea
ffffd000`23611e90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! KiInterruptDispatchLBControl+0x11f


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+18b68
fffff803`0d391d18 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+18b68

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 53d0b7c3

IMAGE_VERSION: 6.3.9600.17238

BUCKET_ID_FUNC_OFFSET: 18b68

FAILURE_BUCKET_ID: 0x133_ISR_ nt! _ ?? _::FNODOBFM::_string_

BUCKET_ID: 0x133_ISR_ nt! _ ?? _::FNODOBFM::_string_

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x133_isr_ nt! _ ?? _::fnodobfm::_string_

FAILURE_ID_HASH: {89366ad1-5557-ac2b-d015-8f6ec2fdbf31}

Followup: MachineOwner
---------
wainuitech (129)
1385838 2014-10-09 20:38:00 Would a router with gargoyle on it do what networx does and if so wouldn't that be a better way?
I have never actually played with it but seen it recommended here a lot and looked at some info that makes me think it would do the trick.
Of course that might mean a new router etc.
dugimodo (138)
1385839 2014-10-09 20:41:00 Nope, its a bit of a bugger as I used Networx for ages. Then one day I did an update on it and the crashing started. Try removing it and see if the crashing stops.

Went through the following dumps, 20953,17093,27484 all which had the 0x133 message, all say the exact same thing. The only exception is 55781, which has 0x19.

Below are the actual reports or part of.

As you can see by the first, 0x19, its already on its way to crashing - In bold:

And the full report for every 0x133 you posted, look for the crash Error 0x133 and the exe that caused it ( under debugging details - Bug Check and process Name) --- networx.

Hmm, well that sucks. :(. Weird though as it's deployed across over 20 workstations on site and mine's the only one crashing. Will remove and see how that goes. So far no crashes since 11:30am yesterday so fingers crossed :). I really do appreciate the help!
dpDesignz (15919)
1385840 2014-10-09 20:43:00 Would a router with gargoyle on it do what networx does and if so wouldn't that be a better way?
I have never actually played with it but seen it recommended here a lot and looked at some info that makes me think it would do the trick.
Of course that might mean a new router etc.

Thanks. Will look in to that. Pretty much all I need is to be able to monitor usage per device, how much per app, and a bandwidth monitor.
dpDesignz (15919)
1385841 2014-10-09 20:50:00 Hmm, well that sucks. :(. Weird though as it's deployed across over 20 workstations on site and mine's the only one crashing. Will remove and see how that goes. So far no crashes since 11:30am yesterday so fingers crossed :). I really do appreciate the help!

Looks like I'm not the only one! www.softperfect.com Fingers crossed these fixes help. :)
dpDesignz (15919)
1385842 2014-10-09 22:08:00 Hopefully it is just networx -- When relooking at the previous files posted, 0x19 which was already on its way says:


Caused By Driver : tcpip.sys
Caused By Address : tcpip.sys+147900
File Description : TCP/IP Driver



Networxs of course uses the TCP/IP which would make sense and relate to the 0x133
wainuitech (129)
1385843 2014-10-19 23:59:00 It's happened again :(. 3 times today. Would you be able to check my latest logs please? www.dropbox.com dpDesignz (15919)
1385844 2014-10-20 02:26:00 According to the bug checks / Dumps

18515 error 0x19 was caused by Chrome: ( probably triggered by the others as it says Bad Pool header - The pool is already corrupt at the time of the current request.)



Bugcheck Analysis *
* *
************************************************** *****************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 000000000000000d,
Arg2: ffffd00023f4d290
Arg3: fffff80100000000
Arg4: 4326c8d322c2f6d0

Debugging Details:
------------------


BUGCHECK_STR: 0x19_d

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff800c9f17ced to fffff800c9dd5ca0

22046 & 91859, both the same error 0x133 Caused again By networx.exe -- Under process Name (which would make sense since chrome uses TCPIP protocols and network monitors them --- So if networx is causing troubles, then chrome may have said bugger you I'm going AWOL :) ).


Bugcheck Analysis

************************************************** *****************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x133

PROCESS_NAME: networx.exe

CURRENT_IRQL: d

LAST_CONTROL_TRANSFER: from fffff8008f1f6d18 to fffff8008f1cdca0

STACK_TEXT:
ffffd001`47b8fc98 fffff800`8f1f6d18 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt! KeBugCheckEx
ffffd001`47b8fca0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x18b68


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+18b68
fffff800`8f1f6d18 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+18b68

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 53d0b7c3

FAILURE_BUCKET_ID: X64_0x133_ nt! _ ?? _::FNODOBFM::_string_+18b68

BUCKET_ID: X64_0x133_ nt! _ ?? _::FNODOBFM::_string_+18b68

Followup: MachineOwner
---------
wainuitech (129)
1 2 3 4 5 6