Windows 8 and 8.1 Forums


DPC_WATCHDOG_VIOLATION help!

  1. #1


    Posts : 5
    Windows 8

    Kernel_inpage_data_error help!


    Hey guys

    Recently got a new laptop running Windows 8. Initially I had a problem "Can not find script file c:\windows\temp\vaio care rescue tool.vbs" but this was solved by doing a system refresh.

    Since doing this refresh the laptop has been BSOD'ing on me with 2 messages.

    The first was KERNAL_DATA_INPAGE_ERROR, and the second and third time it was DPC_WATCHDOG_VIOLATION.

    Any ideas how this can be solved?

    Thank you!

    The DPC_WATCHDOG_VIOLATION error has now happened for the 3rd time today


    Update:

    After a long time of running normally, my laptop has BSOD'ed on me again with the error message KERNEL_DATA_INPAGE_ERROR

    Any ideas on what to do?

    New dump files are now attached

    Thanks!
    Last edited by rob9; 19 Feb 2013 at 19:19.

      My System SpecsSystem Spec

  2. #2


    bangalore
    Posts : 634
    Windows 8.1 professional x64 + WMC


    Code:
    ********************************************************************************                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    
    DPC_WATCHDOG_VIOLATION (133)
    The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
    or above.
    Arguments:
    Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    	DISPATCH_LEVEL or above. The offending component can usually be
    	identified with a stack trace.
    Arg2: 0000000000000780, The watchdog period.
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    
    Debugging Details:
    ------------------
    
    
    
    
    DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    
    BUGCHECK_STR:  0x133
    
    
    PROCESS_NAME:  System
    
    
    CURRENT_IRQL:  d
    
    
    LAST_CONTROL_TRANSFER:  from fffff80189dda8ab to fffff80189c80740
    
    
    STACK_TEXT:  
    fffff880`1b0e4378 fffff801`89dda8ab : 00000000`00000133 00000000`00000001 00000000`00000780 00000000`00000000 : nt!KeBugCheckEx
    fffff880`1b0e4380 fffff801`89cabe51 : 00000000`00000002 fffff801`89efc180 fffff880`1b0e44e0 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13ca8
    fffff880`1b0e4400 fffff801`8a371e94 : ffffffff`ffd0f9a0 fffff801`8a39b502 fffff880`1b0e46b8 fffff880`03321480 : nt!KeUpdateRunTime+0x51
    fffff880`1b0e4430 fffff801`89c79b2e : fffff880`1b0e44e0 00000000`4e0b96ee fffff801`8a39b580 fffff880`03321480 : hal!HalpTimerClockInterrupt+0x50
    fffff880`1b0e4460 fffff801`89cccf20 : 00000000`00000000 fffff880`0382e2e1 fffffa80`08061210 fffffa80`1079f100 : nt!KiInterruptDispatchLBControl+0x1ce
    fffff880`1b0e45f0 fffff880`0462bcff : fffff880`1b0e4890 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa : nt!KxWaitForLockOwnerShip+0x34
    fffff880`1b0e4620 fffff880`1b0e4890 : 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 : IDSvia64+0x19cff
    fffff880`1b0e4628 00000000`00000035 : 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 : 0xfffff880`1b0e4890
    fffff880`1b0e4630 00000bc5`2ef0f854 : fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 : 0x35
    fffff880`1b0e4638 fffff880`01f6d4fa : fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 fffff880`02363126 : 0x00000bc5`2ef0f854
    fffff880`1b0e4640 fffff880`01f7c51b : fffffa80`102c8990 00000000`00000000 fffffa80`102c8991 fffff880`01e66302 : NETIO!KfdAleAcquireEndpointContextFromFlow+0x11a
    fffff880`1b0e46b0 fffff880`01f680c3 : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x17b
    fffff880`1b0e4700 fffff880`01f62e70 : 00000000`00000018 fffff880`1b0e4d48 00000000`00000000 fffffa80`0783b660 : NETIO!ProcessCallout+0x363
    fffff880`1b0e47d0 fffff880`01f62684 : fffff880`1b0e4ab8 fffff880`1b0e4fc0 fffff880`1b0e4a10 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2b0
    fffff880`1b0e4910 fffff880`0217592f : 00000000`00000000 00000000`00000001 fffff880`1b0e4df0 fffff880`1b0e54b8 : NETIO!KfdClassify+0xa3d
    fffff880`1b0e4cf0 fffff880`0211194b : 00000000`00000000 00000000`00000001 00000000`00000008 fffffa80`00000008 : tcpip!WFPDatagramDataShimV4+0x44b
    fffff880`1b0e5100 fffff880`021105ea : fffffa80`07dfb5c0 00000000`00000000 fffffa80`1042fdd0 fffffa80`1042fdd0 : tcpip!ProcessALEForTransportPacket+0x65b
    fffff880`1b0e52e0 fffff880`02114775 : 0f200000`00000000 fffff880`0387e300 fffffa80`10975210 00000000`fe01a8c0 : tcpip!WfpProcessInTransportStackIndication+0x8fe
    fffff880`1b0e58f0 fffff880`02113028 : fffffa80`0783b601 fffff880`0235c3c0 00000000`00000000 fffff880`02305240 : tcpip!InetInspectReceiveDatagram+0x255
    fffff880`1b0e5a10 fffff880`0210f41b : fffffa80`1185fc90 fffffa80`09558000 00000000`00000000 fffff880`1b0e5c30 : tcpip!UdpBeginMessageIndication+0x78
    fffff880`1b0e5b60 fffff880`0210fa50 : fffffa80`00000001 fffffa80`00000018 fffff880`00000000 fffff880`04d79070 : tcpip!UdpDeliverDatagrams+0x18b
    fffff880`1b0e5cf0 fffff880`0210ee5f : fffff880`1b0e6018 00000000`00000001 00000000`00000000 00000000`00000005 : tcpip!UdpReceiveDatagrams+0x270
    fffff880`1b0e5e40 fffff880`0210e2a8 : 00000000`00000003 00000000`0000000c 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
    fffff880`1b0e5ef0 fffff880`02113cb1 : fffff880`02228b90 fffff880`02228b90 00000000`00000000 fffff880`1b0e6008 : tcpip!IppProcessDeliverList+0x68
    fffff880`1b0e5fa0 fffff880`0210d4c4 : fffff880`1b0e60c8 fffffa80`09404880 00000000`00000000 fffff880`02228b90 : tcpip!IppReceiveHeaderBatch+0x211
    fffff880`1b0e60d0 fffff880`02118b4c : fffffa80`10678410 00000000`00000000 fffff880`1b0e6001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8d4
    fffff880`1b0e62f0 fffff880`02118429 : fffffa80`104df501 fffff880`00000001 fffff880`02118470 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e
    fffff880`1b0e63c0 fffff801`89cc1fc5 : 00000000`00000000 fffff880`0233d602 00000000`00000000 fffff880`1b0e66e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
    fffff880`1b0e64c0 fffff801`89cc2f55 : fffff880`02118310 fffff880`1b0e6630 fffffa80`0c9e9410 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
    fffff880`1b0e65c0 fffff880`021185fe : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
    fffff880`1b0e6600 fffff880`01e67e2e : 00000000`00000000 00000000`00000001 00000000`ffffffff fffff880`1b0e66f0 : tcpip!FlReceiveNetBufferListChain+0xae
    fffff880`1b0e6680 fffff880`01e67750 : fffffa80`00000002 fffffa80`07830000 fffffa80`00000000 fffffa80`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x373
    fffff880`1b0e6720 fffff880`01e67a05 : fffffa80`0b7f11a0 00000000`00000000 00000000`00000001 fffffa80`0c4ea090 : ndis!ndisInvokeNextReceiveHandler+0x650
    fffff880`1b0e67f0 fffff880`05135ff6 : fffffa80`0c50d890 fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc5
    fffff880`1b0e6870 fffffa80`0c50d890 : fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 : athw8x+0x247ff6
    fffff880`1b0e6878 fffff880`1b0e6aa0 : 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 : 0xfffffa80`0c50d890
    fffff880`1b0e6880 00000000`00000000 : fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 00000000`00000000 : 0xfffff880`1b0e6aa0
    
    
    
    
    STACK_COMMAND:  kb
    
    
    FOLLOWUP_IP: 
    IDSvia64+19cff
    fffff880`0462bcff ??              ???
    
    
    SYMBOL_STACK_INDEX:  6
    
    
    SYMBOL_NAME:  IDSvia64+19cff
    
    
    FOLLOWUP_NAME:  MachineOwner
    
    
    MODULE_NAME: IDSvia64
    
    
    IMAGE_NAME:  IDSvia64.sys
    
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  503d8308
    
    
    FAILURE_BUCKET_ID:  0x133_ISR_IDSvia64+19cff
    
    
    BUCKET_ID:  0x133_ISR_IDSvia64+19cff
    
    
    Followup: MachineOwner
    ---------
    
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    
    DPC_WATCHDOG_VIOLATION (133)
    The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
    or above.
    Arguments:
    Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    	DISPATCH_LEVEL or above. The offending component can usually be
    	identified with a stack trace.
    Arg2: 0000000000000780, The watchdog period.
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    
    Debugging Details:
    ------------------
    
    
    
    
    DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    
    BUGCHECK_STR:  0x133
    
    
    PROCESS_NAME:  System
    
    
    CURRENT_IRQL:  d
    
    
    LAST_CONTROL_TRANSFER:  from fffff80189dda8ab to fffff80189c80740
    
    
    STACK_TEXT:  
    fffff880`1b0e4378 fffff801`89dda8ab : 00000000`00000133 00000000`00000001 00000000`00000780 00000000`00000000 : nt!KeBugCheckEx
    fffff880`1b0e4380 fffff801`89cabe51 : 00000000`00000002 fffff801`89efc180 fffff880`1b0e44e0 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13ca8
    fffff880`1b0e4400 fffff801`8a371e94 : ffffffff`ffd0f9a0 fffff801`8a39b502 fffff880`1b0e46b8 fffff880`03321480 : nt!KeUpdateRunTime+0x51
    fffff880`1b0e4430 fffff801`89c79b2e : fffff880`1b0e44e0 00000000`4e0b96ee fffff801`8a39b580 fffff880`03321480 : hal!HalpTimerClockInterrupt+0x50
    fffff880`1b0e4460 fffff801`89cccf20 : 00000000`00000000 fffff880`0382e2e1 fffffa80`08061210 fffffa80`1079f100 : nt!KiInterruptDispatchLBControl+0x1ce
    fffff880`1b0e45f0 fffff880`0462bcff : fffff880`1b0e4890 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa : nt!KxWaitForLockOwnerShip+0x34
    fffff880`1b0e4620 fffff880`1b0e4890 : 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 : IDSvia64+0x19cff
    fffff880`1b0e4628 00000000`00000035 : 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 : 0xfffff880`1b0e4890
    fffff880`1b0e4630 00000bc5`2ef0f854 : fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 : 0x35
    fffff880`1b0e4638 fffff880`01f6d4fa : fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 fffff880`02363126 : 0x00000bc5`2ef0f854
    fffff880`1b0e4640 fffff880`01f7c51b : fffffa80`102c8990 00000000`00000000 fffffa80`102c8991 fffff880`01e66302 : NETIO!KfdAleAcquireEndpointContextFromFlow+0x11a
    fffff880`1b0e46b0 fffff880`01f680c3 : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x17b
    fffff880`1b0e4700 fffff880`01f62e70 : 00000000`00000018 fffff880`1b0e4d48 00000000`00000000 fffffa80`0783b660 : NETIO!ProcessCallout+0x363
    fffff880`1b0e47d0 fffff880`01f62684 : fffff880`1b0e4ab8 fffff880`1b0e4fc0 fffff880`1b0e4a10 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2b0
    fffff880`1b0e4910 fffff880`0217592f : 00000000`00000000 00000000`00000001 fffff880`1b0e4df0 fffff880`1b0e54b8 : NETIO!KfdClassify+0xa3d
    fffff880`1b0e4cf0 fffff880`0211194b : 00000000`00000000 00000000`00000001 00000000`00000008 fffffa80`00000008 : tcpip!WFPDatagramDataShimV4+0x44b
    fffff880`1b0e5100 fffff880`021105ea : fffffa80`07dfb5c0 00000000`00000000 fffffa80`1042fdd0 fffffa80`1042fdd0 : tcpip!ProcessALEForTransportPacket+0x65b
    fffff880`1b0e52e0 fffff880`02114775 : 0f200000`00000000 fffff880`0387e300 fffffa80`10975210 00000000`fe01a8c0 : tcpip!WfpProcessInTransportStackIndication+0x8fe
    fffff880`1b0e58f0 fffff880`02113028 : fffffa80`0783b601 fffff880`0235c3c0 00000000`00000000 fffff880`02305240 : tcpip!InetInspectReceiveDatagram+0x255
    fffff880`1b0e5a10 fffff880`0210f41b : fffffa80`1185fc90 fffffa80`09558000 00000000`00000000 fffff880`1b0e5c30 : tcpip!UdpBeginMessageIndication+0x78
    fffff880`1b0e5b60 fffff880`0210fa50 : fffffa80`00000001 fffffa80`00000018 fffff880`00000000 fffff880`04d79070 : tcpip!UdpDeliverDatagrams+0x18b
    fffff880`1b0e5cf0 fffff880`0210ee5f : fffff880`1b0e6018 00000000`00000001 00000000`00000000 00000000`00000005 : tcpip!UdpReceiveDatagrams+0x270
    fffff880`1b0e5e40 fffff880`0210e2a8 : 00000000`00000003 00000000`0000000c 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
    fffff880`1b0e5ef0 fffff880`02113cb1 : fffff880`02228b90 fffff880`02228b90 00000000`00000000 fffff880`1b0e6008 : tcpip!IppProcessDeliverList+0x68
    fffff880`1b0e5fa0 fffff880`0210d4c4 : fffff880`1b0e60c8 fffffa80`09404880 00000000`00000000 fffff880`02228b90 : tcpip!IppReceiveHeaderBatch+0x211
    fffff880`1b0e60d0 fffff880`02118b4c : fffffa80`10678410 00000000`00000000 fffff880`1b0e6001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8d4
    fffff880`1b0e62f0 fffff880`02118429 : fffffa80`104df501 fffff880`00000001 fffff880`02118470 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e
    fffff880`1b0e63c0 fffff801`89cc1fc5 : 00000000`00000000 fffff880`0233d602 00000000`00000000 fffff880`1b0e66e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
    fffff880`1b0e64c0 fffff801`89cc2f55 : fffff880`02118310 fffff880`1b0e6630 fffffa80`0c9e9410 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
    fffff880`1b0e65c0 fffff880`021185fe : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
    fffff880`1b0e6600 fffff880`01e67e2e : 00000000`00000000 00000000`00000001 00000000`ffffffff fffff880`1b0e66f0 : tcpip!FlReceiveNetBufferListChain+0xae
    fffff880`1b0e6680 fffff880`01e67750 : fffffa80`00000002 fffffa80`07830000 fffffa80`00000000 fffffa80`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x373
    fffff880`1b0e6720 fffff880`01e67a05 : fffffa80`0b7f11a0 00000000`00000000 00000000`00000001 fffffa80`0c4ea090 : ndis!ndisInvokeNextReceiveHandler+0x650
    fffff880`1b0e67f0 fffff880`05135ff6 : fffffa80`0c50d890 fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc5
    fffff880`1b0e6870 fffffa80`0c50d890 : fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 : athw8x+0x247ff6
    fffff880`1b0e6878 fffff880`1b0e6aa0 : 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 : 0xfffffa80`0c50d890
    fffff880`1b0e6880 00000000`00000000 : fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 00000000`00000000 : 0xfffff880`1b0e6aa0
    
    
    
    
    STACK_COMMAND:  kb
    
    
    FOLLOWUP_IP: 
    IDSvia64+19cff
    fffff880`0462bcff ??              ???
    
    
    SYMBOL_STACK_INDEX:  6
    
    
    SYMBOL_NAME:  IDSvia64+19cff
    
    
    FOLLOWUP_NAME:  MachineOwner
    
    
    MODULE_NAME: IDSvia64
    
    
    IMAGE_NAME:  IDSvia64.sys
    
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  503d8308
    
    
    FAILURE_BUCKET_ID:  0x133_ISR_IDSvia64+19cff
    
    
    BUCKET_ID:  0x133_ISR_IDSvia64+19cff
    
    
    Followup: MachineOwner
    ---------
    
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    
    DPC_WATCHDOG_VIOLATION (133)
    The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
    or above.
    Arguments:
    Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    	DISPATCH_LEVEL or above. The offending component can usually be
    	identified with a stack trace.
    Arg2: 0000000000000780, The watchdog period.
    Arg3: 0000000000000000
    Arg4: 0000000000000000
    
    
    Debugging Details:
    ------------------
    
    
    
    
    DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    
    BUGCHECK_STR:  0x133
    
    
    PROCESS_NAME:  System
    
    
    CURRENT_IRQL:  d
    
    
    LAST_CONTROL_TRANSFER:  from fffff80189dda8ab to fffff80189c80740
    
    
    STACK_TEXT:  
    fffff880`1b0e4378 fffff801`89dda8ab : 00000000`00000133 00000000`00000001 00000000`00000780 00000000`00000000 : nt!KeBugCheckEx
    fffff880`1b0e4380 fffff801`89cabe51 : 00000000`00000002 fffff801`89efc180 fffff880`1b0e44e0 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x13ca8
    fffff880`1b0e4400 fffff801`8a371e94 : ffffffff`ffd0f9a0 fffff801`8a39b502 fffff880`1b0e46b8 fffff880`03321480 : nt!KeUpdateRunTime+0x51
    fffff880`1b0e4430 fffff801`89c79b2e : fffff880`1b0e44e0 00000000`4e0b96ee fffff801`8a39b580 fffff880`03321480 : hal!HalpTimerClockInterrupt+0x50
    fffff880`1b0e4460 fffff801`89cccf20 : 00000000`00000000 fffff880`0382e2e1 fffffa80`08061210 fffffa80`1079f100 : nt!KiInterruptDispatchLBControl+0x1ce
    fffff880`1b0e45f0 fffff880`0462bcff : fffff880`1b0e4890 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa : nt!KxWaitForLockOwnerShip+0x34
    fffff880`1b0e4620 fffff880`1b0e4890 : 00000000`00000035 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 : IDSvia64+0x19cff
    fffff880`1b0e4628 00000000`00000035 : 00000bc5`2ef0f854 fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 : 0xfffff880`1b0e4890
    fffff880`1b0e4630 00000bc5`2ef0f854 : fffff880`01f6d4fa fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 : 0x35
    fffff880`1b0e4638 fffff880`01f6d4fa : fffffa80`1042fdd0 fffffa80`1079f100 00000000`00000032 fffff880`02363126 : 0x00000bc5`2ef0f854
    fffff880`1b0e4640 fffff880`01f7c51b : fffffa80`102c8990 00000000`00000000 fffffa80`102c8991 fffff880`01e66302 : NETIO!KfdAleAcquireEndpointContextFromFlow+0x11a
    fffff880`1b0e46b0 fffff880`01f680c3 : 00000000`00000000 00000000`00000000 00000000`00000018 00000000`00000000 : NETIO!WfpFindAndRefFlowContext+0x17b
    fffff880`1b0e4700 fffff880`01f62e70 : 00000000`00000018 fffff880`1b0e4d48 00000000`00000000 fffffa80`0783b660 : NETIO!ProcessCallout+0x363
    fffff880`1b0e47d0 fffff880`01f62684 : fffff880`1b0e4ab8 fffff880`1b0e4fc0 fffff880`1b0e4a10 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2b0
    fffff880`1b0e4910 fffff880`0217592f : 00000000`00000000 00000000`00000001 fffff880`1b0e4df0 fffff880`1b0e54b8 : NETIO!KfdClassify+0xa3d
    fffff880`1b0e4cf0 fffff880`0211194b : 00000000`00000000 00000000`00000001 00000000`00000008 fffffa80`00000008 : tcpip!WFPDatagramDataShimV4+0x44b
    fffff880`1b0e5100 fffff880`021105ea : fffffa80`07dfb5c0 00000000`00000000 fffffa80`1042fdd0 fffffa80`1042fdd0 : tcpip!ProcessALEForTransportPacket+0x65b
    fffff880`1b0e52e0 fffff880`02114775 : 0f200000`00000000 fffff880`0387e300 fffffa80`10975210 00000000`fe01a8c0 : tcpip!WfpProcessInTransportStackIndication+0x8fe
    fffff880`1b0e58f0 fffff880`02113028 : fffffa80`0783b601 fffff880`0235c3c0 00000000`00000000 fffff880`02305240 : tcpip!InetInspectReceiveDatagram+0x255
    fffff880`1b0e5a10 fffff880`0210f41b : fffffa80`1185fc90 fffffa80`09558000 00000000`00000000 fffff880`1b0e5c30 : tcpip!UdpBeginMessageIndication+0x78
    fffff880`1b0e5b60 fffff880`0210fa50 : fffffa80`00000001 fffffa80`00000018 fffff880`00000000 fffff880`04d79070 : tcpip!UdpDeliverDatagrams+0x18b
    fffff880`1b0e5cf0 fffff880`0210ee5f : fffff880`1b0e6018 00000000`00000001 00000000`00000000 00000000`00000005 : tcpip!UdpReceiveDatagrams+0x270
    fffff880`1b0e5e40 fffff880`0210e2a8 : 00000000`00000003 00000000`0000000c 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
    fffff880`1b0e5ef0 fffff880`02113cb1 : fffff880`02228b90 fffff880`02228b90 00000000`00000000 fffff880`1b0e6008 : tcpip!IppProcessDeliverList+0x68
    fffff880`1b0e5fa0 fffff880`0210d4c4 : fffff880`1b0e60c8 fffffa80`09404880 00000000`00000000 fffff880`02228b90 : tcpip!IppReceiveHeaderBatch+0x211
    fffff880`1b0e60d0 fffff880`02118b4c : fffffa80`10678410 00000000`00000000 fffff880`1b0e6001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8d4
    fffff880`1b0e62f0 fffff880`02118429 : fffffa80`104df501 fffff880`00000001 fffff880`02118470 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e
    fffff880`1b0e63c0 fffff801`89cc1fc5 : 00000000`00000000 fffff880`0233d602 00000000`00000000 fffff880`1b0e66e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
    fffff880`1b0e64c0 fffff801`89cc2f55 : fffff880`02118310 fffff880`1b0e6630 fffffa80`0c9e9410 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
    fffff880`1b0e65c0 fffff880`021185fe : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
    fffff880`1b0e6600 fffff880`01e67e2e : 00000000`00000000 00000000`00000001 00000000`ffffffff fffff880`1b0e66f0 : tcpip!FlReceiveNetBufferListChain+0xae
    fffff880`1b0e6680 fffff880`01e67750 : fffffa80`00000002 fffffa80`07830000 fffffa80`00000000 fffffa80`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x373
    fffff880`1b0e6720 fffff880`01e67a05 : fffffa80`0b7f11a0 00000000`00000000 00000000`00000001 fffffa80`0c4ea090 : ndis!ndisInvokeNextReceiveHandler+0x650
    fffff880`1b0e67f0 fffff880`05135ff6 : fffffa80`0c50d890 fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc5
    fffff880`1b0e6870 fffffa80`0c50d890 : fffff880`1b0e6aa0 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 : athw8x+0x247ff6
    fffff880`1b0e6878 fffff880`1b0e6aa0 : 00000000`00000000 fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 : 0xfffffa80`0c50d890
    fffff880`1b0e6880 00000000`00000000 : fffffa80`0b7f11a0 fffffa80`00000001 fffff880`04faa899 00000000`00000000 : 0xfffff880`1b0e6aa0
    
    
    
    
    STACK_COMMAND:  kb
    
    
    FOLLOWUP_IP: 
    IDSvia64+19cff
    fffff880`0462bcff ??              ???
    
    
    SYMBOL_STACK_INDEX:  6
    
    
    SYMBOL_NAME:  IDSvia64+19cff
    
    
    FOLLOWUP_NAME:  MachineOwner
    
    
    MODULE_NAME: IDSvia64
    
    
    IMAGE_NAME:  IDSvia64.sys
    
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  503d8308
    
    
    FAILURE_BUCKET_ID:  0x133_ISR_IDSvia64+19cff
    
    
    BUCKET_ID:  0x133_ISR_IDSvia64+19cff
    
    
    Followup: MachineOwner
    ---------
    Uninstall symantec antivirus and use the built in windows defender as an antivirus

    Please update your Qualcomm Atheros Extensible Wireless LAN device driver ​to the latest version.
      My System SpecsSystem Spec

  3. #3


    Posts : 5
    Windows 8


    Hey,

    I've uninstalled Norton 360 and my Qualcomm Atheros Extensible Wireless LAN device driver is already at the latest version from what I can tell, do you think I should reinstall it?

    Thanks!
      My System SpecsSystem Spec

  4. #4


    bangalore
    Posts : 634
    Windows 8.1 professional x64 + WMC


    Quote Originally Posted by rob9 View Post
    Hey,

    I've uninstalled Norton 360 and my Qualcomm Atheros Extensible Wireless LAN device driver is already at the latest version from what I can tell, do you think I should reinstall it?

    Thanks!
    Good.

    Reinstall the drivers and see if the problem persists.. If it BSOD again upload those dumps so we can analyse further
      My System SpecsSystem Spec

DPC_WATCHDOG_VIOLATION help!
Related Threads
Dpc_watchdog_violation in BSOD Crashes and Debugging
Hello, I had a Dpc_watchdog_violation bsod today. It was completely out of nowhere after a month of using my new pc without any problem. I was just downloading something from steam and watching Game of Thrones from my NTB hard drive via lan. If you can help me diagnose what caused it, I would be...
Dpc_watchdog_violation in BSOD Crashes and Debugging
Hi,I am facing many BSOD , mainly DPC_WATCHDOG_VIOLATION and also others like IRQL-NOT LESS OR EQUAL,kernel mode exception not handled etc..sometimes i get them while paying games and even when watching movies or just browsing my hard disk.please help me out....see attachments.Thanks
dpc_watchdog_violation in BSOD Crashes and Debugging
guys i don't why but i started having dpc_watchdog_violation problem, like few days back, i restored my laptop to factory settings but still no help. I have lenovo y400. if you want full specs just check my profile or where ever the specs on this site are. and here is my minidump file. Download...
Another DPC_WATCHDOG_VIOLATION in BSOD Crashes and Debugging
Hey guys, new to the forums. New to Windows 8. Used to be able to fairly easily sort out issues for BSOD on previous windows... not sure why it's so hard with 8, lol. Anyways, i hope someone can help. I've been getting random freezes and BSOD's. Usually at night while i'm sleeping. I have...
Dpc_watchdog_violation in BSOD Crashes and Debugging
For some time now my computer has been having some stability issues. Today I had a DPC_WATCHDOG_VIOLATION 2 minutes after starting the computer. Here is the SF zip. It'll be most appreciated if anyone can help. Thanks.
Dpc_watchdog_violation in BSOD Crashes and Debugging
I have this error every time I use my main desktop. Could I have some help please? This is a retail version of Windows 8. What files do I need to upload so I can help you with solving my problem? Many thanks!
Eight Forums Android App Eight Forums IOS App Follow us on Facebook