Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Richard\AppData\Local\Temp\Temp2_SF_06-11-2012.zip\SF_06-11-2012\110612-150640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16424.amd64fre.win8_gdr.120926-1855
Machine Name:
Kernel base = 0xfffff800`59677000 PsLoadedModuleList = 0xfffff800`59941a60
Debug session time: Mon Nov 5 18:40:57.934 2012 (UTC - 5:00)
System Uptime: 0 days 3:07:07.750
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {1, 780, 0, 0}
*** WARNING: Unable to verify timestamp for [B]IDSvia64.sys[/B]*** ERROR: Module load completed but symbols could not be loaded for IDSvia64.sys
Probably caused by : IDSvia64.sys ( IDSvia64+339a5 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000000780, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x133
PROCESS_NAME: uTorrent.exe
CURRENT_IRQL: d
LAST_CONTROL_TRANSFER: from fffff8005984b8eb to fffff800596f1d40
STACK_TEXT:
fffff880`1c9a2f28 fffff800`5984b8eb : 00000000`00000133 00000000`00000001 00000000`00000780 00000000`00000000 : nt!KeBugCheckEx
fffff880`1c9a2f30 fffff800`5971cd91 : fffff800`59cc4713 fffff800`5996d180 fffff880`1c9a30e0 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13ca8
fffff880`1c9a2fb0 fffff800`5971dc18 : ffffffff`ffd0d9a0 fffff800`59657502 fffff880`1c9a30e0 fffffa80`11c00000 : nt!KeUpdateRunTime+0x51
fffff880`1c9a2fe0 fffff800`5962deca : ffffffff`ffd0d9a0 fffff800`59657502 00000000`00000000 00000000`00000004 : nt!KeUpdateTime+0x3f9
fffff880`1c9a31d0 fffff800`596eb1ae : 0000001a`2442cf3a fffff800`59982000 fffff800`59657580 00000008`a90cbc75 : hal!HalpTimerClockInterrupt+0x86
fffff880`1c9a3200 fffff800`596b4186 : fffff800`596b4075 fffff880`1c9a3550 fffff880`04ced509 fffff880`1c9a3550 : nt!KiInterruptDispatchLBControl+0x1ce
fffff880`1c9a3398 fffff800`596b4075 : fffff880`1c9a3550 fffff880`04ced509 fffff880`1c9a3550 fffff800`597540a4 : nt!RtlpSearchFunctionTable+0x6a
fffff880`1c9a33a0 fffff800`59687643 : fffff880`00005562 fffff880`1c9a3550 fffff880`1c9a3530 fffff880`1c9a3b40 : nt!RtlpLookupFunctionEntryForStackWalks+0x95
fffff880`1c9a3400 fffff800`59684736 : fffff880`1c9a0000 fffff880`1c9a6000 00000000`00000000 fffff800`59684736 : nt!RtlpWalkFrameChain+0x6eb
fffff880`1c9a3ae0 fffff800`596847ec : 00000000`00000003 fffffa80`0d42fc18 00000000`00000000 00000000`00000001 : nt!RtlWalkFrameChain+0x5e
fffff880`1c9a3b10 fffff800`59cc4713 : fffffa80`0d42fc00 fffff880`1c9a3c59 fffff880`1c9a3df8 00000000`00000032 : nt!RtlCaptureStackBackTrace+0x44
fffff880`1c9a3b40 fffff800`59cc47bf : fffff980`ff71ec00 fffff880`1c9a3df8 fffff980`ff71ec00 fffff800`5983611d : nt!ViPoolLogStackCallout+0x2f
fffff880`1c9a3b70 fffff800`59cc4a32 : fffff880`1c9a3ed0 00000000`00000032 00000000`00000003 fffff980`ff71ec00 : nt!ViPoolLogStackTrace+0x8f
fffff880`1c9a3bb0 fffff800`598e76c1 : 00000000`00000400 fffff880`1c9a3c59 fffff880`1c9a3df8 00000000`00000000 : nt!VfFreePoolNotification+0x4a
fffff880`1c9a3be0 fffff880`04ce89a5 : fffff980`ff71ec00 00000000`0000003e fffff880`04d1e750 00000000`00000040 : nt!ExDeferredFreePool+0xa9f
fffff880`1c9a3cc0 fffff980`ff71ec00 : 00000000`0000003e fffff880`04d1e750 00000000`00000040 00000000`00000069 : IDSvia64+0x339a5
fffff880`1c9a3cc8 00000000`0000003e : fffff880`04d1e750 00000000`00000040 00000000`00000069 fffff880`04d15616 : 0xfffff980`ff71ec00
fffff880`1c9a3cd0 fffff880`04d1e750 : 00000000`00000040 00000000`00000069 fffff880`04d15616 fffff980`ff71ec00 : 0x3e
fffff880`1c9a3cd8 00000000`00000040 : 00000000`00000069 fffff880`04d15616 fffff980`ff71ec00 00000000`438ec33a : IDSvia64+0x69750
fffff880`1c9a3ce0 00000000`00000069 : fffff880`04d15616 fffff980`ff71ec00 00000000`438ec33a fffff880`1c9a3df8 : 0x40
fffff880`1c9a3ce8 fffff880`04d15616 : fffff980`ff71ec00 00000000`438ec33a fffff880`1c9a3df8 00000000`00000069 : 0x69
fffff880`1c9a3cf0 fffff980`ff71ec00 : 00000000`438ec33a fffff880`1c9a3df8 00000000`00000069 00000000`00000000 : IDSvia64+0x60616
fffff880`1c9a3cf8 00000000`438ec33a : fffff880`1c9a3df8 00000000`00000069 00000000`00000000 afc4c2fc`893959cd : 0xfffff980`ff71ec00
fffff880`1c9a3d00 fffff880`1c9a3df8 : 00000000`00000069 00000000`00000000 afc4c2fc`893959cd f1c38030`d324a33b : 0x438ec33a
fffff880`1c9a3d08 00000000`00000069 : 00000000`00000000 afc4c2fc`893959cd f1c38030`d324a33b efab56a7`e4e775fb : 0xfffff880`1c9a3df8
fffff880`1c9a3d10 00000000`00000000 : afc4c2fc`893959cd f1c38030`d324a33b efab56a7`e4e775fb 48030000`00000000 : 0x69
STACK_COMMAND: kb
FOLLOWUP_IP:
IDSvia64+339a5
fffff880`04ce89a5 ?? ???
SYMBOL_STACK_INDEX: f
SYMBOL_NAME: IDSvia64+339a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: IDSvia64
IMAGE_NAME: IDSvia64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 503d8308
FAILURE_BUCKET_ID: 0x133_VRFK_ISR_IDSvia64+339a5
BUCKET_ID: 0x133_VRFK_ISR_IDSvia64+339a5
Followup: MachineOwner