New Contributor


Microsoft (R) Windows Debugger Version 10.0.22000.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST\081021-3140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff805`03e0e000 PsLoadedModuleList = 0xfffff805`0422d9b0
Debug session time: Wed Aug 11 00:28:40.358 2021 (UTC + 5:30)
System Uptime: 0 days 3:24:05.141
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3968

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 279051

Key : Analysis.Init.CPU.mSec
Value: 4452

Key : Analysis.Init.Elapsed.mSec
Value: 45134

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2125

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 2126

Key : Analysis.Init.CPU.mSec
Value: 8421

Key : Analysis.Init.Elapsed.mSec
Value: 324189

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------


************* Path validation summary **************
Response Time (ms) Location
OK C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST


Microsoft (R) Windows Debugger Version 10.0.22000.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST\081021-3140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff805`03e0e000 PsLoadedModuleList = 0xfffff805`0422d9b0
Debug session time: Wed Aug 11 00:28:40.358 2021 (UTC + 5:30)
System Uptime: 0 days 3:24:05.141
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3968

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 279051

Key : Analysis.Init.CPU.mSec
Value: 4452

Key : Analysis.Init.Elapsed.mSec
Value: 45134

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2125

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 2126

Key : Analysis.Init.CPU.mSec
Value: 8421

Key : Analysis.Init.Elapsed.mSec
Value: 324189

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------


************* Path validation summary **************
Response Time (ms) Location
OK C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST
www.000webhost.com