DPC_WATCHDOG_VIOLATION help!

rob9

New Member
Messages
5
Kernel_inpage_data_error help!

Hey guys

Recently got a new laptop running Windows 8. Initially I had a problem "Can not find script file c:\windows\temp\vaio care rescue tool.vbs" but this was solved by doing a system refresh.

Since doing this refresh the laptop has been BSOD'ing on me with 2 messages.

The first was KERNAL_DATA_INPAGE_ERROR, and the second and third time it was DPC_WATCHDOG_VIOLATION.

Any ideas how this can be solved?

Thank you!

The DPC_WATCHDOG_VIOLATION error has now happened for the 3rd time today


Update:

After a long time of running normally, my laptop has BSOD'ed on me again with the error message KERNEL_DATA_INPAGE_ERROR

Any ideas on what to do?

New dump files are now attached

Thanks!
 
Last edited:

My Computer

System One

  • OS
    Windows 8
    System Manufacturer/Model
    Sony VAIO SVE1512W1ESI.CEK
    CPU
    Intel Core i5-3210M @ 2.50Ghz
    Motherboard
    Sony Corporation, VAIO
    Memory
    8139 Mb
    Graphics Card(s)
    AMD Radeon HD 7550M/7650M Graphics, 1024 Mb
Code:
********************************************************************************                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
	DISPATCH_LEVEL or above. The offending component can usually be
	identified with a stack trace.
Arg2: 0000000000000780, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000


Debugging Details:
------------------




DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  0x133


PROCESS_NAME:  System


CURRENT_IRQL:  d


LAST_CONTROL_TRANSFER:  from fffff80189dda8ab to fffff80189c80740


STACK_TEXT:  
fffff880`1b0e4378 fffff801`89dda8ab : 00000000`00000133 00000000`00000001 00000000`00000780 00000000`00000000 : nt!KeBugCheckEx
fffff880`1b0e4380 fffff801`89cabe51 : 00000000`00000002 fffff801`89efc180 fffff880`1b0e44e0 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13ca8
fffff880`1b0e4400 fffff801`8a371e94 : ffffffff`ffd0f9a0 fffff801`8a39b502 fffff880`1b0e46b8 fffff880`03321480 : nt!KeUpdateRunTime+0x51
fffff880`1b0e4430 fffff801`89c79b2e : fffff880`1b0e44e0 00000000`4e0b96ee fffff801`8a39b580 fffff880`03321480 : hal!HalpTimerClockInterrupt+0x50
fffff880`1b0e4460 fffff801`89cccf20 : 00000000`00000000 fffff880`0382e2e1 fffffa80`08061210 fffffa80`1079f100 : nt!KiInterruptDispatchLBControl+0x1ce
fffff880`1b0e45f0 fffff880`0462bcff : fffff880`1b0e4890 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa : nt!KxWaitForLockOwnerShip+0x34
fffff880`1b0e4620 fffff880`1b0e4890 : 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 : IDSvia64+0x19cff
fffff880`1b0e4628 00000000`00000035 : 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 : 0xfffff880`1b0e4890
fffff880`1b0e4630 00000bc5`2ef0f854 : fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 : 0x35
fffff880`1b0e4638 fffff880`01f6d4fa : fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 fffff880`02363126 : 0x00000bc5`2ef0f854
fffff880`1b0e4640 fffff880`01f7c51b : fffffa80`102c8990 00000000`00000000 fffffa80`102c8991 fffff880`01e66302 : NETIO!KfdAleAcquireEndpointContextFromFlow+0x11a
fffff880`1b0e46b0 fffff880`01f680c3 : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x17b
fffff880`1b0e4700 fffff880`01f62e70 : 00000000`00000018 fffff880`1b0e4d48 00000000`00000000 fffffa80`0783b660 : NETIO!ProcessCallout+0x363
fffff880`1b0e47d0 fffff880`01f62684 : fffff880`1b0e4ab8 fffff880`1b0e4fc0 fffff880`1b0e4a10 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2b0
fffff880`1b0e4910 fffff880`0217592f : 00000000`00000000 00000000`00000001 fffff880`1b0e4df0 fffff880`1b0e54b8 : NETIO!KfdClassify+0xa3d
fffff880`1b0e4cf0 fffff880`0211194b : 00000000`00000000 00000000`00000001 00000000`00000008 fffffa80`00000008 : tcpip!WFPDatagramDataShimV4+0x44b
fffff880`1b0e5100 fffff880`021105ea : fffffa80`07dfb5c0 00000000`00000000 fffffa80`1042fdd0 fffffa80`1042fdd0 : tcpip!ProcessALEForTransportPacket+0x65b
fffff880`1b0e52e0 fffff880`02114775 : 0f200000`00000000 fffff880`0387e300 fffffa80`10975210 00000000`fe01a8c0 : tcpip!WfpProcessInTransportStackIndication+0x8fe
fffff880`1b0e58f0 fffff880`02113028 : fffffa80`0783b601 fffff880`0235c3c0 00000000`00000000 fffff880`02305240 : tcpip!InetInspectReceiveDatagram+0x255
fffff880`1b0e5a10 fffff880`0210f41b : fffffa80`1185fc90 fffffa80`09558000 00000000`00000000 fffff880`1b0e5c30 : tcpip!UdpBeginMessageIndication+0x78
fffff880`1b0e5b60 fffff880`0210fa50 : fffffa80`00000001 fffffa80`00000018 fffff880`00000000 fffff880`04d79070 : tcpip!UdpDeliverDatagrams+0x18b
fffff880`1b0e5cf0 fffff880`0210ee5f : fffff880`1b0e6018 00000000`00000001 00000000`00000000 00000000`00000005 : tcpip!UdpReceiveDatagrams+0x270
fffff880`1b0e5e40 fffff880`0210e2a8 : 00000000`00000003 00000000`0000000c 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
fffff880`1b0e5ef0 fffff880`02113cb1 : fffff880`02228b90 fffff880`02228b90 00000000`00000000 fffff880`1b0e6008 : tcpip!IppProcessDeliverList+0x68
fffff880`1b0e5fa0 fffff880`0210d4c4 : fffff880`1b0e60c8 fffffa80`09404880 00000000`00000000 fffff880`02228b90 : tcpip!IppReceiveHeaderBatch+0x211
fffff880`1b0e60d0 fffff880`02118b4c : fffffa80`10678410 00000000`00000000 fffff880`1b0e6001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8d4
fffff880`1b0e62f0 fffff880`02118429 : fffffa80`104df501 fffff880`00000001 fffff880`02118470 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e
fffff880`1b0e63c0 fffff801`89cc1fc5 : 00000000`00000000 fffff880`0233d602 00000000`00000000 fffff880`1b0e66e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
fffff880`1b0e64c0 fffff801`89cc2f55 : fffff880`02118310 fffff880`1b0e6630 fffffa80`0c9e9410 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
fffff880`1b0e65c0 fffff880`021185fe : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`1b0e6600 fffff880`01e67e2e : 00000000`00000000 00000000`00000001 00000000`ffffffff fffff880`1b0e66f0 : tcpip!FlReceiveNetBufferListChain+0xae
fffff880`1b0e6680 fffff880`01e67750 : fffffa80`00000002 fffffa80`07830000 fffffa80`00000000 fffffa80`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x373
fffff880`1b0e6720 fffff880`01e67a05 : fffffa80`0b7f11a0 00000000`00000000 00000000`00000001 fffffa80`0c4ea090 : ndis!ndisInvokeNextReceiveHandler+0x650
fffff880`1b0e67f0 fffff880`05135ff6 : fffffa80`0c50d890 fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc5
fffff880`1b0e6870 fffffa80`0c50d890 : fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 : athw8x+0x247ff6
fffff880`1b0e6878 fffff880`1b0e6aa0 : 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 : 0xfffffa80`0c50d890
fffff880`1b0e6880 00000000`00000000 : fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 00000000`00000000 : 0xfffff880`1b0e6aa0




STACK_COMMAND:  kb


FOLLOWUP_IP: 
IDSvia64+19cff
fffff880`0462bcff ??              ???


SYMBOL_STACK_INDEX:  6


SYMBOL_NAME:  IDSvia64+19cff


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: IDSvia64


IMAGE_NAME:  IDSvia64.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  503d8308


FAILURE_BUCKET_ID:  0x133_ISR_IDSvia64+19cff


BUCKET_ID:  0x133_ISR_IDSvia64+19cff


Followup: MachineOwner
---------


0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
	DISPATCH_LEVEL or above. The offending component can usually be
	identified with a stack trace.
Arg2: 0000000000000780, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000


Debugging Details:
------------------




DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  0x133


PROCESS_NAME:  System


CURRENT_IRQL:  d


LAST_CONTROL_TRANSFER:  from fffff80189dda8ab to fffff80189c80740


STACK_TEXT:  
fffff880`1b0e4378 fffff801`89dda8ab : 00000000`00000133 00000000`00000001 00000000`00000780 00000000`00000000 : nt!KeBugCheckEx
fffff880`1b0e4380 fffff801`89cabe51 : 00000000`00000002 fffff801`89efc180 fffff880`1b0e44e0 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13ca8
fffff880`1b0e4400 fffff801`8a371e94 : ffffffff`ffd0f9a0 fffff801`8a39b502 fffff880`1b0e46b8 fffff880`03321480 : nt!KeUpdateRunTime+0x51
fffff880`1b0e4430 fffff801`89c79b2e : fffff880`1b0e44e0 00000000`4e0b96ee fffff801`8a39b580 fffff880`03321480 : hal!HalpTimerClockInterrupt+0x50
fffff880`1b0e4460 fffff801`89cccf20 : 00000000`00000000 fffff880`0382e2e1 fffffa80`08061210 fffffa80`1079f100 : nt!KiInterruptDispatchLBControl+0x1ce
fffff880`1b0e45f0 fffff880`0462bcff : fffff880`1b0e4890 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa : nt!KxWaitForLockOwnerShip+0x34
fffff880`1b0e4620 fffff880`1b0e4890 : 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 : IDSvia64+0x19cff
fffff880`1b0e4628 00000000`00000035 : 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 : 0xfffff880`1b0e4890
fffff880`1b0e4630 00000bc5`2ef0f854 : fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 : 0x35
fffff880`1b0e4638 fffff880`01f6d4fa : fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 fffff880`02363126 : 0x00000bc5`2ef0f854
fffff880`1b0e4640 fffff880`01f7c51b : fffffa80`102c8990 00000000`00000000 fffffa80`102c8991 fffff880`01e66302 : NETIO!KfdAleAcquireEndpointContextFromFlow+0x11a
fffff880`1b0e46b0 fffff880`01f680c3 : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x17b
fffff880`1b0e4700 fffff880`01f62e70 : 00000000`00000018 fffff880`1b0e4d48 00000000`00000000 fffffa80`0783b660 : NETIO!ProcessCallout+0x363
fffff880`1b0e47d0 fffff880`01f62684 : fffff880`1b0e4ab8 fffff880`1b0e4fc0 fffff880`1b0e4a10 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2b0
fffff880`1b0e4910 fffff880`0217592f : 00000000`00000000 00000000`00000001 fffff880`1b0e4df0 fffff880`1b0e54b8 : NETIO!KfdClassify+0xa3d
fffff880`1b0e4cf0 fffff880`0211194b : 00000000`00000000 00000000`00000001 00000000`00000008 fffffa80`00000008 : tcpip!WFPDatagramDataShimV4+0x44b
fffff880`1b0e5100 fffff880`021105ea : fffffa80`07dfb5c0 00000000`00000000 fffffa80`1042fdd0 fffffa80`1042fdd0 : tcpip!ProcessALEForTransportPacket+0x65b
fffff880`1b0e52e0 fffff880`02114775 : 0f200000`00000000 fffff880`0387e300 fffffa80`10975210 00000000`fe01a8c0 : tcpip!WfpProcessInTransportStackIndication+0x8fe
fffff880`1b0e58f0 fffff880`02113028 : fffffa80`0783b601 fffff880`0235c3c0 00000000`00000000 fffff880`02305240 : tcpip!InetInspectReceiveDatagram+0x255
fffff880`1b0e5a10 fffff880`0210f41b : fffffa80`1185fc90 fffffa80`09558000 00000000`00000000 fffff880`1b0e5c30 : tcpip!UdpBeginMessageIndication+0x78
fffff880`1b0e5b60 fffff880`0210fa50 : fffffa80`00000001 fffffa80`00000018 fffff880`00000000 fffff880`04d79070 : tcpip!UdpDeliverDatagrams+0x18b
fffff880`1b0e5cf0 fffff880`0210ee5f : fffff880`1b0e6018 00000000`00000001 00000000`00000000 00000000`00000005 : tcpip!UdpReceiveDatagrams+0x270
fffff880`1b0e5e40 fffff880`0210e2a8 : 00000000`00000003 00000000`0000000c 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
fffff880`1b0e5ef0 fffff880`02113cb1 : fffff880`02228b90 fffff880`02228b90 00000000`00000000 fffff880`1b0e6008 : tcpip!IppProcessDeliverList+0x68
fffff880`1b0e5fa0 fffff880`0210d4c4 : fffff880`1b0e60c8 fffffa80`09404880 00000000`00000000 fffff880`02228b90 : tcpip!IppReceiveHeaderBatch+0x211
fffff880`1b0e60d0 fffff880`02118b4c : fffffa80`10678410 00000000`00000000 fffff880`1b0e6001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8d4
fffff880`1b0e62f0 fffff880`02118429 : fffffa80`104df501 fffff880`00000001 fffff880`02118470 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e
fffff880`1b0e63c0 fffff801`89cc1fc5 : 00000000`00000000 fffff880`0233d602 00000000`00000000 fffff880`1b0e66e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
fffff880`1b0e64c0 fffff801`89cc2f55 : fffff880`02118310 fffff880`1b0e6630 fffffa80`0c9e9410 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
fffff880`1b0e65c0 fffff880`021185fe : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`1b0e6600 fffff880`01e67e2e : 00000000`00000000 00000000`00000001 00000000`ffffffff fffff880`1b0e66f0 : tcpip!FlReceiveNetBufferListChain+0xae
fffff880`1b0e6680 fffff880`01e67750 : fffffa80`00000002 fffffa80`07830000 fffffa80`00000000 fffffa80`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x373
fffff880`1b0e6720 fffff880`01e67a05 : fffffa80`0b7f11a0 00000000`00000000 00000000`00000001 fffffa80`0c4ea090 : ndis!ndisInvokeNextReceiveHandler+0x650
fffff880`1b0e67f0 fffff880`05135ff6 : fffffa80`0c50d890 fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc5
fffff880`1b0e6870 fffffa80`0c50d890 : fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 : athw8x+0x247ff6
fffff880`1b0e6878 fffff880`1b0e6aa0 : 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 : 0xfffffa80`0c50d890
fffff880`1b0e6880 00000000`00000000 : fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 00000000`00000000 : 0xfffff880`1b0e6aa0




STACK_COMMAND:  kb


FOLLOWUP_IP: 
IDSvia64+19cff
fffff880`0462bcff ??              ???


SYMBOL_STACK_INDEX:  6


SYMBOL_NAME:  IDSvia64+19cff


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: IDSvia64


IMAGE_NAME:  IDSvia64.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  503d8308


FAILURE_BUCKET_ID:  0x133_ISR_IDSvia64+19cff


BUCKET_ID:  0x133_ISR_IDSvia64+19cff


Followup: MachineOwner
---------


0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************


DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
	DISPATCH_LEVEL or above. The offending component can usually be
	identified with a stack trace.
Arg2: 0000000000000780, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000


Debugging Details:
------------------




DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  0x133


PROCESS_NAME:  System


CURRENT_IRQL:  d


LAST_CONTROL_TRANSFER:  from fffff80189dda8ab to fffff80189c80740


STACK_TEXT:  
fffff880`1b0e4378 fffff801`89dda8ab : 00000000`00000133 00000000`00000001 00000000`00000780 00000000`00000000 : nt!KeBugCheckEx
fffff880`1b0e4380 fffff801`89cabe51 : 00000000`00000002 fffff801`89efc180 fffff880`1b0e44e0 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13ca8
fffff880`1b0e4400 fffff801`8a371e94 : ffffffff`ffd0f9a0 fffff801`8a39b502 fffff880`1b0e46b8 fffff880`03321480 : nt!KeUpdateRunTime+0x51
fffff880`1b0e4430 fffff801`89c79b2e : fffff880`1b0e44e0 00000000`4e0b96ee fffff801`8a39b580 fffff880`03321480 : hal!HalpTimerClockInterrupt+0x50
fffff880`1b0e4460 fffff801`89cccf20 : 00000000`00000000 fffff880`0382e2e1 fffffa80`08061210 fffffa80`1079f100 : nt!KiInterruptDispatchLBControl+0x1ce
fffff880`1b0e45f0 fffff880`0462bcff : fffff880`1b0e4890 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa : nt!KxWaitForLockOwnerShip+0x34
fffff880`1b0e4620 fffff880`1b0e4890 : 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 : IDSvia64+0x19cff
fffff880`1b0e4628 00000000`00000035 : 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 : 0xfffff880`1b0e4890
fffff880`1b0e4630 00000bc5`2ef0f854 : fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 : 0x35
fffff880`1b0e4638 fffff880`01f6d4fa : fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 fffff880`02363126 : 0x00000bc5`2ef0f854
fffff880`1b0e4640 fffff880`01f7c51b : fffffa80`102c8990 00000000`00000000 fffffa80`102c8991 fffff880`01e66302 : NETIO!KfdAleAcquireEndpointContextFromFlow+0x11a
fffff880`1b0e46b0 fffff880`01f680c3 : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x17b
fffff880`1b0e4700 fffff880`01f62e70 : 00000000`00000018 fffff880`1b0e4d48 00000000`00000000 fffffa80`0783b660 : NETIO!ProcessCallout+0x363
fffff880`1b0e47d0 fffff880`01f62684 : fffff880`1b0e4ab8 fffff880`1b0e4fc0 fffff880`1b0e4a10 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2b0
fffff880`1b0e4910 fffff880`0217592f : 00000000`00000000 00000000`00000001 fffff880`1b0e4df0 fffff880`1b0e54b8 : NETIO!KfdClassify+0xa3d
fffff880`1b0e4cf0 fffff880`0211194b : 00000000`00000000 00000000`00000001 00000000`00000008 fffffa80`00000008 : tcpip!WFPDatagramDataShimV4+0x44b
fffff880`1b0e5100 fffff880`021105ea : fffffa80`07dfb5c0 00000000`00000000 fffffa80`1042fdd0 fffffa80`1042fdd0 : tcpip!ProcessALEForTransportPacket+0x65b
fffff880`1b0e52e0 fffff880`02114775 : 0f200000`00000000 fffff880`0387e300 fffffa80`10975210 00000000`fe01a8c0 : tcpip!WfpProcessInTransportStackIndication+0x8fe
fffff880`1b0e58f0 fffff880`02113028 : fffffa80`0783b601 fffff880`0235c3c0 00000000`00000000 fffff880`02305240 : tcpip!InetInspectReceiveDatagram+0x255
fffff880`1b0e5a10 fffff880`0210f41b : fffffa80`1185fc90 fffffa80`09558000 00000000`00000000 fffff880`1b0e5c30 : tcpip!UdpBeginMessageIndication+0x78
fffff880`1b0e5b60 fffff880`0210fa50 : fffffa80`00000001 fffffa80`00000018 fffff880`00000000 fffff880`04d79070 : tcpip!UdpDeliverDatagrams+0x18b
fffff880`1b0e5cf0 fffff880`0210ee5f : fffff880`1b0e6018 00000000`00000001 00000000`00000000 00000000`00000005 : tcpip!UdpReceiveDatagrams+0x270
fffff880`1b0e5e40 fffff880`0210e2a8 : 00000000`00000003 00000000`0000000c 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
fffff880`1b0e5ef0 fffff880`02113cb1 : fffff880`02228b90 fffff880`02228b90 00000000`00000000 fffff880`1b0e6008 : tcpip!IppProcessDeliverList+0x68
fffff880`1b0e5fa0 fffff880`0210d4c4 : fffff880`1b0e60c8 fffffa80`09404880 00000000`00000000 fffff880`02228b90 : tcpip!IppReceiveHeaderBatch+0x211
fffff880`1b0e60d0 fffff880`02118b4c : fffffa80`10678410 00000000`00000000 fffff880`1b0e6001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8d4
fffff880`1b0e62f0 fffff880`02118429 : fffffa80`104df501 fffff880`00000001 fffff880`02118470 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e
fffff880`1b0e63c0 fffff801`89cc1fc5 : 00000000`00000000 fffff880`0233d602 00000000`00000000 fffff880`1b0e66e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
fffff880`1b0e64c0 fffff801`89cc2f55 : fffff880`02118310 fffff880`1b0e6630 fffffa80`0c9e9410 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
fffff880`1b0e65c0 fffff880`021185fe : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`1b0e6600 fffff880`01e67e2e : 00000000`00000000 00000000`00000001 00000000`ffffffff fffff880`1b0e66f0 : tcpip!FlReceiveNetBufferListChain+0xae
fffff880`1b0e6680 fffff880`01e67750 : fffffa80`00000002 fffffa80`07830000 fffffa80`00000000 fffffa80`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x373
fffff880`1b0e6720 fffff880`01e67a05 : fffffa80`0b7f11a0 00000000`00000000 00000000`00000001 fffffa80`0c4ea090 : ndis!ndisInvokeNextReceiveHandler+0x650
fffff880`1b0e67f0 fffff880`05135ff6 : fffffa80`0c50d890 fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc5
fffff880`1b0e6870 fffffa80`0c50d890 : fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 : athw8x+0x247ff6
fffff880`1b0e6878 fffff880`1b0e6aa0 : 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 : 0xfffffa80`0c50d890
fffff880`1b0e6880 00000000`00000000 : fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 00000000`00000000 : 0xfffff880`1b0e6aa0




STACK_COMMAND:  kb


FOLLOWUP_IP: 
IDSvia64+19cff
fffff880`0462bcff ??              ???


SYMBOL_STACK_INDEX:  6


SYMBOL_NAME:  IDSvia64+19cff


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: IDSvia64


IMAGE_NAME:  IDSvia64.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  503d8308


FAILURE_BUCKET_ID:  0x133_ISR_IDSvia64+19cff


BUCKET_ID:  0x133_ISR_IDSvia64+19cff


Followup: MachineOwner
---------

Uninstall symantec antivirus and use the built in windows defender as an antivirus

Please update your Qualcomm Atheros Extensible Wireless LAN device driver ​to the latest version.
 

My Computer

System One

  • OS
    Windows 8.1 professional x64 + WMC
    System Manufacturer/Model
    Acer Aspire 5920
    CPU
    Core 2 duo T5550
    Motherboard
    ACER CHAPALA
    Memory
    4GB DDR2
    Graphics Card(s)
    Intel GMA X3100
    Screen Resolution
    1280 X 800
    Hard Drives
    160 GB HDD
Hey,

I've uninstalled Norton 360 and my Qualcomm Atheros Extensible Wireless LAN device driver is already at the latest version from what I can tell, do you think I should reinstall it?

Thanks!
 

My Computer

System One

  • OS
    Windows 8
    System Manufacturer/Model
    Sony VAIO SVE1512W1ESI.CEK
    CPU
    Intel Core i5-3210M @ 2.50Ghz
    Motherboard
    Sony Corporation, VAIO
    Memory
    8139 Mb
    Graphics Card(s)
    AMD Radeon HD 7550M/7650M Graphics, 1024 Mb
Hey,

I've uninstalled Norton 360 and my Qualcomm Atheros Extensible Wireless LAN device driver is already at the latest version from what I can tell, do you think I should reinstall it?

Thanks!

Good.

Reinstall the drivers and see if the problem persists.. If it BSOD again upload those dumps so we can analyse further
 

My Computer

System One

  • OS
    Windows 8.1 professional x64 + WMC
    System Manufacturer/Model
    Acer Aspire 5920
    CPU
    Core 2 duo T5550
    Motherboard
    ACER CHAPALA
    Memory
    4GB DDR2
    Graphics Card(s)
    Intel GMA X3100
    Screen Resolution
    1280 X 800
    Hard Drives
    160 GB HDD
Back
Top