Regarding Windows Watch dog blue dump error

%3CLINGO-SUB%20id%3D%22lingo-sub-2634676%22%20slang%3D%22en-US%22%3ERegarding%20Windows%20Watch%20dog%20blue%20dump%20error%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2634676%22%20slang%3D%22en-US%22%3E%3CP%3EWindows%20blue%20dump%20error%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2634879%22%20slang%3D%22en-US%22%3ERe%3A%20Regarding%20Windows%20Watch%20dog%20blue%20dump%20error%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2634879%22%20slang%3D%22en-US%22%3E%3CBR%20%2F%3EMicrosoft%20(R)%20Windows%20Debugger%20Version%2010.0.22000.1%20X86%3CBR%20%2F%3ECopyright%20(c)%20Microsoft%20Corporation.%20All%20rights%20reserved.%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3ELoading%20Dump%20File%20%5BC%3A%5CUsers%5Cashwini%20kumar%5CDesktop%5CAvema%5CWatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)%5CWatchDog_NewIPC-10-8-21-02-58PM-EST%5C081021-3140-01.dmp%5D%3CBR%20%2F%3EMini%20Kernel%20Dump%20File%3A%20Only%20registers%20and%20stack%20trace%20are%20available%3CBR%20%2F%3E%3CBR%20%2F%3ESymbol%20search%20path%20is%3A%20srv*%3CBR%20%2F%3EExecutable%20search%20path%20is%3A%3CBR%20%2F%3EWindows%2010%20Kernel%20Version%2017763%20MP%20(12%20procs)%20Free%20x64%3CBR%20%2F%3EProduct%3A%20WinNt%2C%20suite%3A%20TerminalServer%20SingleUserTS%3CBR%20%2F%3EEdition%20build%20lab%3A%2017763.1.amd64fre.rs5_release.180914-1434%3CBR%20%2F%3EMachine%20Name%3A%3CBR%20%2F%3EKernel%20base%20%3D%200xfffff805%6003e0e000%20PsLoadedModuleList%20%3D%200xfffff805%600422d9b0%3CBR%20%2F%3EDebug%20session%20time%3A%20Wed%20Aug%2011%2000%3A28%3A40.358%202021%20(UTC%20%2B%205%3A30)%3CBR%20%2F%3ESystem%20Uptime%3A%200%20days%203%3A24%3A05.141%3CBR%20%2F%3ELoading%20Kernel%20Symbols%3CBR%20%2F%3E...............................................................%3CBR%20%2F%3E................................................................%3CBR%20%2F%3E...................................................%3CBR%20%2F%3ELoading%20User%20Symbols%3CBR%20%2F%3ELoading%20unloaded%20module%20list%3CBR%20%2F%3E......%3CBR%20%2F%3EFor%20analysis%20of%20this%20file%2C%20run%20!analyze%20-v%3CBR%20%2F%3E4%3A%20kd%26gt%3B%20!analyze%20-v%3CBR%20%2F%3E*******************************************************************************%3CBR%20%2F%3E*%20*%3CBR%20%2F%3E*%20Bugcheck%20Analysis%20*%3CBR%20%2F%3E*%20*%3CBR%20%2F%3E*******************************************************************************%3CBR%20%2F%3E%3CBR%20%2F%3EDPC_WATCHDOG_VIOLATION%20(133)%3CBR%20%2F%3EThe%20DPC%20watchdog%20detected%20a%20prolonged%20run%20time%20at%20an%20IRQL%20of%20DISPATCH_LEVEL%3CBR%20%2F%3Eor%20above.%3CBR%20%2F%3EArguments%3A%3CBR%20%2F%3EArg1%3A%200000000000000001%2C%20The%20system%20cumulatively%20spent%20an%20extended%20period%20of%20time%20at%3CBR%20%2F%3EDISPATCH_LEVEL%20or%20above.%20The%20offending%20component%20can%20usually%20be%3CBR%20%2F%3Eidentified%20with%20a%20stack%20trace.%3CBR%20%2F%3EArg2%3A%200000000000001e00%2C%20The%20watchdog%20period.%3CBR%20%2F%3EArg3%3A%20fffff805042d2380%2C%20cast%20to%20nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK%2C%20which%20contains%3CBR%20%2F%3Eadditional%20information%20regarding%20the%20cumulative%20timeout%3CBR%20%2F%3EArg4%3A%200000000000000000%3CBR%20%2F%3E%3CBR%20%2F%3EDebugging%20Details%3A%3CBR%20%2F%3E------------------%3CBR%20%2F%3E%3CBR%20%2F%3E*************************************************************************%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20Either%20you%20specified%20an%20unqualified%20symbol%2C%20or%20your%20debugger%20***%3CBR%20%2F%3E***%20doesn't%20have%20full%20symbol%20information.%20Unqualified%20symbol%20***%3CBR%20%2F%3E***%20resolution%20is%20turned%20off%20by%20default.%20Please%20either%20specify%20a%20***%3CBR%20%2F%3E***%20fully%20qualified%20symbol%20module!symbolname%2C%20or%20enable%20resolution%20***%3CBR%20%2F%3E***%20of%20unqualified%20symbols%20by%20typing%20%22.symopt-%20100%22.%20Note%20that%20***%3CBR%20%2F%3E***%20enabling%20unqualified%20symbol%20resolution%20with%20network%20symbol%20***%3CBR%20%2F%3E***%20server%20shares%20in%20the%20symbol%20path%20may%20cause%20the%20debugger%20to%20***%3CBR%20%2F%3E***%20appear%20to%20hang%20for%20long%20periods%20of%20time%20when%20an%20incorrect%20***%3CBR%20%2F%3E***%20symbol%20name%20is%20typed%20or%20the%20network%20symbol%20server%20is%20down.%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20For%20some%20commands%20to%20work%20properly%2C%20your%20symbol%20path%20***%3CBR%20%2F%3E***%20must%20point%20to%20.pdb%20files%20that%20have%20full%20type%20information.%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20Certain%20.pdb%20files%20(such%20as%20the%20public%20OS%20symbols)%20do%20not%20***%3CBR%20%2F%3E***%20contain%20the%20required%20information.%20Contact%20the%20group%20that%20***%3CBR%20%2F%3E***%20provided%20you%20with%20these%20symbols%20if%20you%20need%20this%20command%20to%20***%3CBR%20%2F%3E***%20work.%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20Type%20referenced%3A%20TickPeriods%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E*************************************************************************%3CBR%20%2F%3E***%20WARNING%3A%20Unable%20to%20verify%20timestamp%20for%20win32k.sys%3CBR%20%2F%3E%3CBR%20%2F%3EKEY_VALUES_STRING%3A%201%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.CPU.mSec%3CBR%20%2F%3EValue%3A%203968%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.DebugAnalysisManager%3CBR%20%2F%3EValue%3A%20Create%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Elapsed.mSec%3CBR%20%2F%3EValue%3A%20279051%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Init.CPU.mSec%3CBR%20%2F%3EValue%3A%204452%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Init.Elapsed.mSec%3CBR%20%2F%3EValue%3A%2045134%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Memory.CommitPeak.Mb%3CBR%20%2F%3EValue%3A%20110%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20WER.OS.Branch%3CBR%20%2F%3EValue%3A%20rs5_release%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20WER.OS.Timestamp%3CBR%20%2F%3EValue%3A%202018-09-14T14%3A34%3A00Z%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20WER.OS.Version%3CBR%20%2F%3EValue%3A%2010.0.17763.1%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_CODE%3A%20133%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P1%3A%201%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P2%3A%201e00%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P3%3A%20fffff805042d2380%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P4%3A%200%3CBR%20%2F%3E%3CBR%20%2F%3EDPC_TIMEOUT_TYPE%3A%20DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED%3CBR%20%2F%3E%3CBR%20%2F%3ETRAP_FRAME%3A%20ffffe7836f7e4160%20--%20(.trap%200xffffe7836f7e4160)%3CBR%20%2F%3ENOTE%3A%20The%20trap%20frame%20does%20not%20contain%20all%20registers.%3CBR%20%2F%3ESome%20register%20values%20may%20be%20zeroed%20or%20incorrect.%3CBR%20%2F%3Erax%3D0000000000000000%20rbx%3D0000000000000000%20rcx%3Dffffb28f51ffbbb0%3CBR%20%2F%3Erdx%3D0000000000000000%20rsi%3D0000000000000000%20rdi%3D0000000000000000%3CBR%20%2F%3Erip%3Dfffff80505658fa9%20rsp%3Dffffe7836f7e42f0%20rbp%3Dffffe7836f7e4389%3CBR%20%2F%3Er8%3Dffffb28f531dcaf0%20r9%3D0000000000000000%20r10%3Dffffb28f50f2a020%3CBR%20%2F%3Er11%3Dffffb28f50f2a1c0%20r12%3D0000000000000000%20r13%3D0000000000000000%3CBR%20%2F%3Er14%3D0000000000000000%20r15%3D0000000000000000%3CBR%20%2F%3Eiopl%3D0%20nv%20up%20ei%20pl%20zr%20na%20po%20nc%3CBR%20%2F%3Eafd!AfdTLCompleteBufferUserReceive%2B0x79%3A%3CBR%20%2F%3Efffff805%6005658fa9%200f8541f90000%20jne%20afd!AfdTLCompleteBufferUserReceive%2B0xf9c0%20(fffff805%60056688f0)%20%5Bbr%3D0%5D%3CBR%20%2F%3EResetting%20default%20scope%3CBR%20%2F%3E%3CBR%20%2F%3EBLACKBOXBSD%3A%201%20(!blackboxbsd)%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3ECUSTOMER_CRASH_COUNT%3A%201%3CBR%20%2F%3E%3CBR%20%2F%3EPROCESS_NAME%3A%20System%3CBR%20%2F%3E%3CBR%20%2F%3ESTACK_TEXT%3A%3CBR%20%2F%3Effff8b81%60da3a2ba8%20fffff805%60040118f7%20%3A%2000000000%6000000133%2000000000%6000000001%2000000000%6000001e00%20fffff805%60042d2380%20%3A%20nt!KeBugCheckEx%3CBR%20%2F%3Effff8b81%60da3a2bb0%20fffff805%6003e86a4f%20%3A%2000002392%601b3c0a67%20ffff8b81%60da386180%2000000000%6000000286%2000000000%60000bf549%20%3A%20nt!KeAccumulateTicks%2B0x187837%3CBR%20%2F%3Effff8b81%60da3a2c10%20fffff805%600480147c%20%3A%2000000000%6000000000%20ffffb28f%60486b6000%20ffffe783%606f7e41e0%20ffffb28f%60486b60b0%20%3A%20nt!KeClockInterruptNotify%2B0xcf%3CBR%20%2F%3Effff8b81%60da3a2f30%20fffff805%6003ef1a15%20%3A%20ffffb28f%60486b6000%20fffff805%6003f2c9e7%20ffff3bce%60d9fb0000%2000000000%6000000000%20%3A%20hal!HalpTimerClockIpiRoutine%2B0x1c%3CBR%20%2F%3Effff8b81%60da3a2f60%20fffff805%6003fc0a3a%20%3A%20ffffe783%606f7e41e0%20ffffb28f%60486b6000%20ffffb28f%60531f3b30%20ffffb28f%60486b6000%20%3A%20nt!KiCallInterruptServiceRoutine%2B0xa5%3CBR%20%2F%3Effff8b81%60da3a2fb0%20fffff805%6003fc0f87%20%3A%20ffffb28f%60535dbd90%20ffffffff%605ffffffd%20ffff8b81%60da386180%2000000000%6000000000%20%3A%20nt!KiInterruptSubDispatchNoLockNoEtw%2B0xfa%3CBR%20%2F%3Effffe783%606f7e4160%20fffff805%6005658fa9%20%3A%20ffffb28f%6049779a90%20ffffe783%606f7e4389%2000000000%6000000000%20ffffb28f%6051f5abd0%20%3A%20nt!KiInterruptDispatchNoLockNoEtw%2B0x37%3CBR%20%2F%3Effffe783%606f7e42f0%20fffff805%60189419ad%20%3A%20ffffe783%606f7e4400%20ffffb28f%60531dd220%20ffffb28f%60509d1040%20fffff805%6018833ef9%20%3A%20afd!AfdTLCompleteBufferUserReceive%2B0x79%3CBR%20%2F%3Effffe783%606f7e43f0%20fffff805%6018941906%20%3A%20ffffb28f%6051f5abd0%20ffffb28f%6051f5abd0%20ffffb28f%6050f2a1c0%20ffffb28f%60531dd220%20%3A%20tcpip!TcpCompleteClientReceiveRequest%2B0x25%3CBR%20%2F%3Effffe783%606f7e4450%20fffff805%6018940e96%20%3A%2000000000%6000000035%2000000000%6000000000%2000000000%6000000100%20fffff805%6018966c02%20%3A%20tcpip!TcpFlushRequestReceive%2B0xfa%3CBR%20%2F%3Effffe783%606f7e4540%20fffff805%601890f6cd%20%3A%20ffffb28f%6000000000%2000000000%6000000000%20ffffe783%606f7e46f0%20ffffe783%60833a74fb%20%3A%20tcpip!TcpAllowFin%2B0x1ba%3CBR%20%2F%3Effffe783%606f7e45f0%20fffff805%6018911d0d%20%3A%20ffff0020%60496eddd0%20ffffe783%606f7e4a40%2000000020%60c5c0ae61%20002b5798%6003e9d6c2%20%3A%20tcpip!TcpTcbCarefulDatagram%2B0x8fd%3CBR%20%2F%3Effffe783%606f7e4770%20fffff805%60189110d3%20%3A%20ffffb28f%604990f008%2000000000%6000000001%20ffffb28f%6049aaf0e0%20ffffb28f%604972aa00%20%3A%20tcpip!TcpTcbReceive%2B0x2dd%3CBR%20%2F%3Effffe783%606f7e49c0%20fffff805%6018910184%20%3A%20ffffb28f%60498ffaf0%2000000000%6000989680%20ffff8b81%60db61ec2c%200000001c%603b27fe8a%20%3A%20tcpip!TcpMatchReceive%2B0x213%3CBR%20%2F%3Effffe783%606f7e4c90%20fffff805%601890fe6d%20%3A%20ffffb28f%60498ffaf0%20fffff805%601890e3b2%20fffff805%6000000004%20ffffb28f%6049755800%20%3A%20tcpip!TcpReceive%2B0x304%3CBR%20%2F%3Effffe783%606f7e4d90%20fffff805%6018951429%20%3A%2000000000%6000000000%2000000000%6000000000%20ffffb28f%6049f05900%20fffff805%60189694e0%20%3A%20tcpip!TcpNlClientReceivePreValidatedDatagrams%2B0x2d%3CBR%20%2F%3Effffe783%606f7e4dd0%20fffff805%601896c037%20%3A%20ffffb28f%604da793d0%20ffffb28f%604da688e0%2000000000%6000000000%2000000000%6000000000%20%3A%20tcpip!IpFlcReceivePreValidatedPackets%2B0x649%3CBR%20%2F%3Effffe783%606f7e4ff0%2000000000%6000000000%20%3A%2000000000%6000000000%2000000000%6000000000%2000000000%6000000000%2000000000%6000000000%20%3A%20tcpip!FlReceiveNetBufferListChainCalloutRoutine%2B0x127%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3ESYMBOL_NAME%3A%20afd!AfdTLCompleteBufferUserReceive%2B79%3CBR%20%2F%3E%3CBR%20%2F%3EMODULE_NAME%3A%20afd%3CBR%20%2F%3E%3CBR%20%2F%3EIMAGE_NAME%3A%20afd.sys%3CBR%20%2F%3E%3CBR%20%2F%3EIMAGE_VERSION%3A%2010.0.17763.316%3CBR%20%2F%3E%3CBR%20%2F%3ESTACK_COMMAND%3A%20.thread%20%3B%20.cxr%20%3B%20kb%3CBR%20%2F%3E%3CBR%20%2F%3EBUCKET_ID_FUNC_OFFSET%3A%2079%3CBR%20%2F%3E%3CBR%20%2F%3EFAILURE_BUCKET_ID%3A%200x133_ISR_afd!AfdTLCompleteBufferUserReceive%3CBR%20%2F%3E%3CBR%20%2F%3EOS_VERSION%3A%2010.0.17763.1%3CBR%20%2F%3E%3CBR%20%2F%3EBUILDLAB_STR%3A%20rs5_release%3CBR%20%2F%3E%3CBR%20%2F%3EOSPLATFORM_TYPE%3A%20x64%3CBR%20%2F%3E%3CBR%20%2F%3EOSNAME%3A%20Windows%2010%3CBR%20%2F%3E%3CBR%20%2F%3EFAILURE_ID_HASH%3A%20%7B2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab%7D%3CBR%20%2F%3E%3CBR%20%2F%3EFollowup%3A%20MachineOwner%3CBR%20%2F%3E---------%3CBR%20%2F%3E%3CBR%20%2F%3E4%3A%20kd%26gt%3B%20!analyze%20-v%3CBR%20%2F%3E*******************************************************************************%3CBR%20%2F%3E*%20*%3CBR%20%2F%3E*%20Bugcheck%20Analysis%20*%3CBR%20%2F%3E*%20*%3CBR%20%2F%3E*******************************************************************************%3CBR%20%2F%3E%3CBR%20%2F%3EDPC_WATCHDOG_VIOLATION%20(133)%3CBR%20%2F%3EThe%20DPC%20watchdog%20detected%20a%20prolonged%20run%20time%20at%20an%20IRQL%20of%20DISPATCH_LEVEL%3CBR%20%2F%3Eor%20above.%3CBR%20%2F%3EArguments%3A%3CBR%20%2F%3EArg1%3A%200000000000000001%2C%20The%20system%20cumulatively%20spent%20an%20extended%20period%20of%20time%20at%3CBR%20%2F%3EDISPATCH_LEVEL%20or%20above.%20The%20offending%20component%20can%20usually%20be%3CBR%20%2F%3Eidentified%20with%20a%20stack%20trace.%3CBR%20%2F%3EArg2%3A%200000000000001e00%2C%20The%20watchdog%20period.%3CBR%20%2F%3EArg3%3A%20fffff805042d2380%2C%20cast%20to%20nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK%2C%20which%20contains%3CBR%20%2F%3Eadditional%20information%20regarding%20the%20cumulative%20timeout%3CBR%20%2F%3EArg4%3A%200000000000000000%3CBR%20%2F%3E%3CBR%20%2F%3EDebugging%20Details%3A%3CBR%20%2F%3E------------------%3CBR%20%2F%3E%3CBR%20%2F%3E*************************************************************************%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20Either%20you%20specified%20an%20unqualified%20symbol%2C%20or%20your%20debugger%20***%3CBR%20%2F%3E***%20doesn't%20have%20full%20symbol%20information.%20Unqualified%20symbol%20***%3CBR%20%2F%3E***%20resolution%20is%20turned%20off%20by%20default.%20Please%20either%20specify%20a%20***%3CBR%20%2F%3E***%20fully%20qualified%20symbol%20module!symbolname%2C%20or%20enable%20resolution%20***%3CBR%20%2F%3E***%20of%20unqualified%20symbols%20by%20typing%20%22.symopt-%20100%22.%20Note%20that%20***%3CBR%20%2F%3E***%20enabling%20unqualified%20symbol%20resolution%20with%20network%20symbol%20***%3CBR%20%2F%3E***%20server%20shares%20in%20the%20symbol%20path%20may%20cause%20the%20debugger%20to%20***%3CBR%20%2F%3E***%20appear%20to%20hang%20for%20long%20periods%20of%20time%20when%20an%20incorrect%20***%3CBR%20%2F%3E***%20symbol%20name%20is%20typed%20or%20the%20network%20symbol%20server%20is%20down.%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20For%20some%20commands%20to%20work%20properly%2C%20your%20symbol%20path%20***%3CBR%20%2F%3E***%20must%20point%20to%20.pdb%20files%20that%20have%20full%20type%20information.%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20Certain%20.pdb%20files%20(such%20as%20the%20public%20OS%20symbols)%20do%20not%20***%3CBR%20%2F%3E***%20contain%20the%20required%20information.%20Contact%20the%20group%20that%20***%3CBR%20%2F%3E***%20provided%20you%20with%20these%20symbols%20if%20you%20need%20this%20command%20to%20***%3CBR%20%2F%3E***%20work.%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E***%20Type%20referenced%3A%20TickPeriods%20***%3CBR%20%2F%3E***%20***%3CBR%20%2F%3E*************************************************************************%3CBR%20%2F%3E%3CBR%20%2F%3EKEY_VALUES_STRING%3A%201%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.CPU.mSec%3CBR%20%2F%3EValue%3A%202125%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.DebugAnalysisManager%3CBR%20%2F%3EValue%3A%20Create%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Elapsed.mSec%3CBR%20%2F%3EValue%3A%202126%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Init.CPU.mSec%3CBR%20%2F%3EValue%3A%208421%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Init.Elapsed.mSec%3CBR%20%2F%3EValue%3A%20324189%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20Analysis.Memory.CommitPeak.Mb%3CBR%20%2F%3EValue%3A%20110%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20WER.OS.Branch%3CBR%20%2F%3EValue%3A%20rs5_release%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20WER.OS.Timestamp%3CBR%20%2F%3EValue%3A%202018-09-14T14%3A34%3A00Z%3CBR%20%2F%3E%3CBR%20%2F%3EKey%20%3A%20WER.OS.Version%3CBR%20%2F%3EValue%3A%2010.0.17763.1%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_CODE%3A%20133%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P1%3A%201%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P2%3A%201e00%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P3%3A%20fffff805042d2380%3CBR%20%2F%3E%3CBR%20%2F%3EBUGCHECK_P4%3A%200%3CBR%20%2F%3E%3CBR%20%2F%3EDPC_TIMEOUT_TYPE%3A%20DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED%3CBR%20%2F%3E%3CBR%20%2F%3ETRAP_FRAME%3A%20ffffe7836f7e4160%20--%20(.trap%200xffffe7836f7e4160)%3CBR%20%2F%3ENOTE%3A%20The%20trap%20frame%20does%20not%20contain%20all%20registers.%3CBR%20%2F%3ESome%20register%20values%20may%20be%20zeroed%20or%20incorrect.%3CBR%20%2F%3Erax%3D0000000000000000%20rbx%3D0000000000000000%20rcx%3Dffffb28f51ffbbb0%3CBR%20%2F%3Erdx%3D0000000000000000%20rsi%3D0000000000000000%20rdi%3D0000000000000000%3CBR%20%2F%3Erip%3Dfffff80505658fa9%20rsp%3Dffffe7836f7e42f0%20rbp%3Dffffe7836f7e4389%3CBR%20%2F%3Er8%3Dffffb28f531dcaf0%20r9%3D0000000000000000%20r10%3Dffffb28f50f2a020%3CBR%20%2F%3Er11%3Dffffb28f50f2a1c0%20r12%3D0000000000000000%20r13%3D0000000000000000%3CBR%20%2F%3Er14%3D0000000000000000%20r15%3D0000000000000000%3CBR%20%2F%3Eiopl%3D0%20nv%20up%20ei%20pl%20zr%20na%20po%20nc%3CBR%20%2F%3Eafd!AfdTLCompleteBufferUserReceive%2B0x79%3A%3CBR%20%2F%3Efffff805%6005658fa9%200f8541f90000%20jne%20afd!AfdTLCompleteBufferUserReceive%2B0xf9c0%20(fffff805%60056688f0)%20%5Bbr%3D0%5D%3CBR%20%2F%3EResetting%20default%20scope%3CBR%20%2F%3E%3CBR%20%2F%3EBLACKBOXBSD%3A%201%20(!blackboxbsd)%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3ECUSTOMER_CRASH_COUNT%3A%201%3CBR%20%2F%3E%3CBR%20%2F%3EPROCESS_NAME%3A%20System%3CBR%20%2F%3E%3CBR%20%2F%3ESTACK_TEXT%3A%3CBR%20%2F%3Effff8b81%60da3a2ba8%20fffff805%60040118f7%20%3A%2000000000%6000000133%2000000000%6000000001%2000000000%6000001e00%20fffff805%60042d2380%20%3A%20nt!KeBugCheckEx%3CBR%20%2F%3Effff8b81%60da3a2bb0%20fffff805%6003e86a4f%20%3A%2000002392%601b3c0a67%20ffff8b81%60da386180%2000000000%6000000286%2000000000%60000bf549%20%3A%20nt!KeAccumulateTicks%2B0x187837%3CBR%20%2F%3Effff8b81%60da3a2c10%20fffff805%600480147c%20%3A%2000000000%6000000000%20ffffb28f%60486b6000%20ffffe783%606f7e41e0%20ffffb28f%60486b60b0%20%3A%20nt!KeClockInterruptNotify%2B0xcf%3CBR%20%2F%3Effff8b81%60da3a2f30%20fffff805%6003ef1a15%20%3A%20ffffb28f%60486b6000%20fffff805%6003f2c9e7%20ffff3bce%60d9fb0000%2000000000%6000000000%20%3A%20hal!HalpTimerClockIpiRoutine%2B0x1c%3CBR%20%2F%3Effff8b81%60da3a2f60%20fffff805%6003fc0a3a%20%3A%20ffffe783%606f7e41e0%20ffffb28f%60486b6000%20ffffb28f%60531f3b30%20ffffb28f%60486b6000%20%3A%20nt!KiCallInterruptServiceRoutine%2B0xa5%3CBR%20%2F%3Effff8b81%60da3a2fb0%20fffff805%6003fc0f87%20%3A%20ffffb28f%60535dbd90%20ffffffff%605ffffffd%20ffff8b81%60da386180%2000000000%6000000000%20%3A%20nt!KiInterruptSubDispatchNoLockNoEtw%2B0xfa%3CBR%20%2F%3Effffe783%606f7e4160%20fffff805%6005658fa9%20%3A%20ffffb28f%6049779a90%20ffffe783%606f7e4389%2000000000%6000000000%20ffffb28f%6051f5abd0%20%3A%20nt!KiInterruptDispatchNoLockNoEtw%2B0x37%3CBR%20%2F%3Effffe783%606f7e42f0%20fffff805%60189419ad%20%3A%20ffffe783%606f7e4400%20ffffb28f%60531dd220%20ffffb28f%60509d1040%20fffff805%6018833ef9%20%3A%20afd!AfdTLCompleteBufferUserReceive%2B0x79%3CBR%20%2F%3Effffe783%606f7e43f0%20fffff805%6018941906%20%3A%20ffffb28f%6051f5abd0%20ffffb28f%6051f5abd0%20ffffb28f%6050f2a1c0%20ffffb28f%60531dd220%20%3A%20tcpip!TcpCompleteClientReceiveRequest%2B0x25%3CBR%20%2F%3Effffe783%606f7e4450%20fffff805%6018940e96%20%3A%2000000000%6000000035%2000000000%6000000000%2000000000%6000000100%20fffff805%6018966c02%20%3A%20tcpip!TcpFlushRequestReceive%2B0xfa%3CBR%20%2F%3Effffe783%606f7e4540%20fffff805%601890f6cd%20%3A%20ffffb28f%6000000000%2000000000%6000000000%20ffffe783%606f7e46f0%20ffffe783%60833a74fb%20%3A%20tcpip!TcpAllowFin%2B0x1ba%3CBR%20%2F%3Effffe783%606f7e45f0%20fffff805%6018911d0d%20%3A%20ffff0020%60496eddd0%20ffffe783%606f7e4a40%2000000020%60c5c0ae61%20002b5798%6003e9d6c2%20%3A%20tcpip!TcpTcbCarefulDatagram%2B0x8fd%3CBR%20%2F%3Effffe783%606f7e4770%20fffff805%60189110d3%20%3A%20ffffb28f%604990f008%2000000000%6000000001%20ffffb28f%6049aaf0e0%20ffffb28f%604972aa00%20%3A%20tcpip!TcpTcbReceive%2B0x2dd%3CBR%20%2F%3Effffe783%606f7e49c0%20fffff805%6018910184%20%3A%20ffffb28f%60498ffaf0%2000000000%6000989680%20ffff8b81%60db61ec2c%200000001c%603b27fe8a%20%3A%20tcpip!TcpMatchReceive%2B0x213%3CBR%20%2F%3Effffe783%606f7e4c90%20fffff805%601890fe6d%20%3A%20ffffb28f%60498ffaf0%20fffff805%601890e3b2%20fffff805%6000000004%20ffffb28f%6049755800%20%3A%20tcpip!TcpReceive%2B0x304%3CBR%20%2F%3Effffe783%606f7e4d90%20fffff805%6018951429%20%3A%2000000000%6000000000%2000000000%6000000000%20ffffb28f%6049f05900%20fffff805%60189694e0%20%3A%20tcpip!TcpNlClientReceivePreValidatedDatagrams%2B0x2d%3CBR%20%2F%3Effffe783%606f7e4dd0%20fffff805%601896c037%20%3A%20ffffb28f%604da793d0%20ffffb28f%604da688e0%2000000000%6000000000%2000000000%6000000000%20%3A%20tcpip!IpFlcReceivePreValidatedPackets%2B0x649%3CBR%20%2F%3Effffe783%606f7e4ff0%2000000000%6000000000%20%3A%2000000000%6000000000%2000000000%6000000000%2000000000%6000000000%2000000000%6000000000%20%3A%20tcpip!FlReceiveNetBufferListChainCalloutRoutine%2B0x127%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3ESYMBOL_NAME%3A%20afd!AfdTLCompleteBufferUserReceive%2B79%3CBR%20%2F%3E%3CBR%20%2F%3EMODULE_NAME%3A%20afd%3CBR%20%2F%3E%3CBR%20%2F%3EIMAGE_NAME%3A%20afd.sys%3CBR%20%2F%3E%3CBR%20%2F%3EIMAGE_VERSION%3A%2010.0.17763.316%3CBR%20%2F%3E%3CBR%20%2F%3ESTACK_COMMAND%3A%20.thread%20%3B%20.cxr%20%3B%20kb%3CBR%20%2F%3E%3CBR%20%2F%3EBUCKET_ID_FUNC_OFFSET%3A%2079%3CBR%20%2F%3E%3CBR%20%2F%3EFAILURE_BUCKET_ID%3A%200x133_ISR_afd!AfdTLCompleteBufferUserReceive%3CBR%20%2F%3E%3CBR%20%2F%3EOS_VERSION%3A%2010.0.17763.1%3CBR%20%2F%3E%3CBR%20%2F%3EBUILDLAB_STR%3A%20rs5_release%3CBR%20%2F%3E%3CBR%20%2F%3EOSPLATFORM_TYPE%3A%20x64%3CBR%20%2F%3E%3CBR%20%2F%3EOSNAME%3A%20Windows%2010%3CBR%20%2F%3E%3CBR%20%2F%3EFAILURE_ID_HASH%3A%20%7B2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab%7D%3CBR%20%2F%3E%3CBR%20%2F%3EFollowup%3A%20MachineOwner%3CBR%20%2F%3E---------%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E*************%20Path%20validation%20summary%20**************%3CBR%20%2F%3EResponse%20Time%20(ms)%20Location%3CBR%20%2F%3EOK%20C%3A%5CUsers%5Cashwini%20kumar%5CDesktop%5CAvema%5CWatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)%5CWatchDog_NewIPC-10-8-21-02-58PM-EST%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E
New Contributor


Microsoft (R) Windows Debugger Version 10.0.22000.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST\081021-3140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff805`03e0e000 PsLoadedModuleList = 0xfffff805`0422d9b0
Debug session time: Wed Aug 11 00:28:40.358 2021 (UTC + 5:30)
System Uptime: 0 days 3:24:05.141
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3968

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 279051

Key : Analysis.Init.CPU.mSec
Value: 4452

Key : Analysis.Init.Elapsed.mSec
Value: 45134

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2125

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 2126

Key : Analysis.Init.CPU.mSec
Value: 8421

Key : Analysis.Init.Elapsed.mSec
Value: 324189

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------


************* Path validation summary **************
Response Time (ms) Location
OK C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST

1 Reply

Microsoft (R) Windows Debugger Version 10.0.22000.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST\081021-3140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff805`03e0e000 PsLoadedModuleList = 0xfffff805`0422d9b0
Debug session time: Wed Aug 11 00:28:40.358 2021 (UTC + 5:30)
System Uptime: 0 days 3:24:05.141
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3968

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 279051

Key : Analysis.Init.CPU.mSec
Value: 4452

Key : Analysis.Init.Elapsed.mSec
Value: 45134

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805042d2380, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2125

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 2126

Key : Analysis.Init.CPU.mSec
Value: 8421

Key : Analysis.Init.Elapsed.mSec
Value: 324189

Key : Analysis.Memory.CommitPeak.Mb
Value: 110

Key : WER.OS.Branch
Value: rs5_release

Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z

Key : WER.OS.Version
Value: 10.0.17763.1


BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805042d2380

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffe7836f7e4160 -- (.trap 0xffffe7836f7e4160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb28f51ffbbb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80505658fa9 rsp=ffffe7836f7e42f0 rbp=ffffe7836f7e4389
r8=ffffb28f531dcaf0 r9=0000000000000000 r10=ffffb28f50f2a020
r11=ffffb28f50f2a1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTLCompleteBufferUserReceive+0x79:
fffff805`05658fa9 0f8541f90000 jne afd!AfdTLCompleteBufferUserReceive+0xf9c0 (fffff805`056688f0) [br=0]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8b81`da3a2ba8 fffff805`040118f7 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`042d2380 : nt!KeBugCheckEx
ffff8b81`da3a2bb0 fffff805`03e86a4f : 00002392`1b3c0a67 ffff8b81`da386180 00000000`00000286 00000000`000bf549 : nt!KeAccumulateTicks+0x187837
ffff8b81`da3a2c10 fffff805`0480147c : 00000000`00000000 ffffb28f`486b6000 ffffe783`6f7e41e0 ffffb28f`486b60b0 : nt!KeClockInterruptNotify+0xcf
ffff8b81`da3a2f30 fffff805`03ef1a15 : ffffb28f`486b6000 fffff805`03f2c9e7 ffff3bce`d9fb0000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1c
ffff8b81`da3a2f60 fffff805`03fc0a3a : ffffe783`6f7e41e0 ffffb28f`486b6000 ffffb28f`531f3b30 ffffb28f`486b6000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8b81`da3a2fb0 fffff805`03fc0f87 : ffffb28f`535dbd90 ffffffff`5ffffffd ffff8b81`da386180 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe783`6f7e4160 fffff805`05658fa9 : ffffb28f`49779a90 ffffe783`6f7e4389 00000000`00000000 ffffb28f`51f5abd0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe783`6f7e42f0 fffff805`189419ad : ffffe783`6f7e4400 ffffb28f`531dd220 ffffb28f`509d1040 fffff805`18833ef9 : afd!AfdTLCompleteBufferUserReceive+0x79
ffffe783`6f7e43f0 fffff805`18941906 : ffffb28f`51f5abd0 ffffb28f`51f5abd0 ffffb28f`50f2a1c0 ffffb28f`531dd220 : tcpip!TcpCompleteClientReceiveRequest+0x25
ffffe783`6f7e4450 fffff805`18940e96 : 00000000`00000035 00000000`00000000 00000000`00000100 fffff805`18966c02 : tcpip!TcpFlushRequestReceive+0xfa
ffffe783`6f7e4540 fffff805`1890f6cd : ffffb28f`00000000 00000000`00000000 ffffe783`6f7e46f0 ffffe783`833a74fb : tcpip!TcpAllowFin+0x1ba
ffffe783`6f7e45f0 fffff805`18911d0d : ffff0020`496eddd0 ffffe783`6f7e4a40 00000020`c5c0ae61 002b5798`03e9d6c2 : tcpip!TcpTcbCarefulDatagram+0x8fd
ffffe783`6f7e4770 fffff805`189110d3 : ffffb28f`4990f008 00000000`00000001 ffffb28f`49aaf0e0 ffffb28f`4972aa00 : tcpip!TcpTcbReceive+0x2dd
ffffe783`6f7e49c0 fffff805`18910184 : ffffb28f`498ffaf0 00000000`00989680 ffff8b81`db61ec2c 0000001c`3b27fe8a : tcpip!TcpMatchReceive+0x213
ffffe783`6f7e4c90 fffff805`1890fe6d : ffffb28f`498ffaf0 fffff805`1890e3b2 fffff805`00000004 ffffb28f`49755800 : tcpip!TcpReceive+0x304
ffffe783`6f7e4d90 fffff805`18951429 : 00000000`00000000 00000000`00000000 ffffb28f`49f05900 fffff805`189694e0 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
ffffe783`6f7e4dd0 fffff805`1896c037 : ffffb28f`4da793d0 ffffb28f`4da688e0 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x649
ffffe783`6f7e4ff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127


SYMBOL_NAME: afd!AfdTLCompleteBufferUserReceive+79

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.17763.316

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 79

FAILURE_BUCKET_ID: 0x133_ISR_afd!AfdTLCompleteBufferUserReceive

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2e3b9e19-ceec-7006-c4f3-1a6dc5e86fab}

Followup: MachineOwner
---------


************* Path validation summary **************
Response Time (ms) Location
OK C:\Users\ashwini kumar\Desktop\Avema\WatchDog_dump-NewIPC-10-8-21-02-58PM-EST(2)\WatchDog_NewIPC-10-8-21-02-58PM-EST
www.000webhost.com