Microsoft (R) Windows Debugger Version 10.0.18272.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 17134 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Kernel base = 0xfffff800`5fa12000 PsLoadedModuleList = 0xfffff800`5fdc0170 Debug session time: Fri Dec 7 19:03:57.930 2018 (UTC + 8:00) System Uptime: 2 days 22:06:53.718 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ....... Loading User Symbols PEB is paged out (Peb.Ldr = 000000b7`018c8018). Type ".hh dbgerr001" for details Loading unloaded module list .................................................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`5fbbb680 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9480`810d5bd0=0000000000000133 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff8005fe5f378, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804 SYSTEM_MANUFACTURER: MSI SYSTEM_PRODUCT_NAME: MS-7693 SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: 3.0 BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: V10.6 BIOS_DATE: 01/08/2016 BASEBOARD_MANUFACTURER: MSI BASEBOARD_PRODUCT: 970A-G43 (MS-7693) BASEBOARD_VERSION: 3.0 DUMP_TYPE: 1 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff8005fe5f378 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED CPU_COUNT: 8 CPU_MHZ: 1068 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 2 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x133 PROCESS_NAME: svchost.exe CURRENT_IRQL: d ANALYSIS_SESSION_HOST: DESKTOP-86NMJVQ ANALYSIS_SESSION_TIME: 12-07-2018 19:27:04.0720 ANALYSIS_VERSION: 10.0.18272.1001 amd64fre LAST_CONTROL_TRANSFER: from fffff8005fc0d695 to fffff8005fbbb680 STACK_TEXT: ffff9480`810d5bc8 fffff800`5fc0d695 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`5fe5f378 : nt!KeBugCheckEx ffff9480`810d5bd0 fffff800`5faf237a : 0000b801`15c853e8 ffff9480`81080180 00000000`00000282 00000000`00000000 : nt!KeAccumulateTicks+0x1189d5 ffff9480`810d5c30 fffff800`6036851b : 0000b801`15c806f7 00000000`00000090 00000000`00000000 ffffb88e`47104a00 : nt!KeClockInterruptNotify+0x9da ffff9480`810d5f40 fffff800`5fb3ed75 : ffffb88e`47104a00 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x1b ffff9480`810d5f70 fffff800`5fbbcf3a : ffffd603`b45fcb90 ffffb88e`47104a00 00000000`66636546 00000000`00000200 : nt!KiCallInterruptServiceRoutine+0xa5 ffff9480`810d5fb0 fffff800`5fbbd427 : ffff9480`81080de0 ffffb88e`47104a00 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea ffffd603`b45fcb10 fffff800`5fbc3337 : ffff9480`81080de0 fffff800`5fcfc706 00000000`00000000 ffffd603`b45fd7e0 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffffd603`b45fcca0 fffff800`5fcfc706 : 00000000`00000000 ffffd603`b45fd7e0 00000000`00000050 ffffb88e`00000082 : nt!ExpInterlockedPopEntrySListResume ffffd603`b45fccb0 fffff803`d1609b34 : 00000000`000030b8 00000000`00000000 00000000`66636546 ffffd603`b45fcf30 : nt!ExAllocatePoolWithTag+0x2f6 ffffd603`b45fcda0 fffff803`d164a639 : ffffb88e`48faa010 fffff803`00000000 25acfb9d`3f393b05 25acfb9d`3f393b05 : NETIO!WfpPoolAllocNonPaged+0x20 ffffd603`b45fcdd0 fffff803`d1d560eb : 000050eb`00003cdd ffffd603`b45fcf30 ffffd603`b45fdb48 ffffda83`9dc00540 : NETIO!FeAcquireWritableLayerDataPointer+0x1f9 ffffd603`b45fce50 fffff803`d2397fa1 : ffffd603`b45fcf30 fffff803`d16b4f7c 00000000`00000000 00000000`000030b8 : fwpkclnt!FwpsAcquireWritableLayerDataPointer0+0x2b ffffd603`b45fce80 fffff803`d2397e17 : ffffd603`b45fd638 ffffd603`b45fded0 ffffd603`b45fdb48 00000000`00000000 : drweblwf+0x27fa1 ffffd603`b45fcef0 fffff803`d1bba83b : ffffd603`b45fded0 ffffb88e`483f6c40 ffffd603`b45fded0 fffff803`d1695287 : drweblwf+0x27e17 ffffd603`b45fd2f0 fffff803`d1634799 : ffffb88e`48428230 ffffd603`b45fd638 00000000`00000107 ffffb88e`49763040 : tcpip!AlePostProcessClassify+0xfb ffffd603`b45fd340 fffff803`d1615087 : 00000000`00000043 ffffd603`b45fdb48 ffffd603`b45fded0 ffffd603`b45fdc20 : NETIO!ProcessCallout+0x1eb39 ffffd603`b45fd4d0 fffff803`d1612d88 : ffffb88e`483eb910 ffffd603`b45fdb48 00000000`00000000 ffffd603`b45fd890 : NETIO!ArbitrateAndEnforce+0x4a7 ffffd603`b45fd6c0 fffff803`d1b69ca3 : ffffb88e`4f5e07d0 ffffd603`b45fdbe0 ffffb88e`4eeb94cc 00000000`00000000 : NETIO!KfdClassify+0x2f8 ffffd603`b45fdae0 fffff803`d1ae6031 : ffffb88e`4ef33cc0 ffffb88e`4ef33cc0 ffffb88e`4ef33cc0 00000000`00000002 : tcpip!AleInspectConnectRequest+0x6a233 ffffd603`b45fe330 fffff803`d1afcd7d : ffffb88e`5150d350 ffffb88e`5150d350 ffffb88e`4ef33cc0 ffffb88e`485a8d88 : tcpip!TcpCreateAndConnectTcbWorkQueueRoutine+0x311 ffffd603`b45fe470 fffff803`d1afc79c : 00000000`00000000 ffffb88e`489e2b50 00000000`00000000 ffffb88e`47ac67b0 : tcpip!TcpCreateAndConnectTcb+0x5d5 ffffd603`b45fe5e0 fffff803`d2ad850b : 00000000`00000000 ffffb88e`47ac67b0 ffffb88e`489e2b20 00000008`00000000 : tcpip!TcpTlProviderConnect+0xc ffffd603`b45fe610 fffff803`d2acfa37 : ffffb88e`51052460 ffffb88e`47ac67b0 ffffda83`acce0d90 fffff800`5fa3adbe : afd!AfdSuperConnect+0x50b ffffd603`b45fe7d0 fffff800`5fa4cef9 : ffffb88e`51052460 00000000`00000000 000000b7`0207f790 00000000`00000000 : afd!AfdDispatchDeviceControl+0x77 ffffd603`b45fe800 fffff800`5fef81cb : ffffb88e`51052460 00000000`00000000 ffffb88e`51052460 00000000`00000000 : nt!IofCallDriver+0x59 ffffd603`b45fe840 fffff800`5fef787a : 000000b7`00000000 ffffb88e`47d81cd0 00000000`00000000 ffffd603`b45feb80 : nt!IopSynchronousServiceTail+0x1ab ffffd603`b45fe8f0 fffff800`5fef8006 : 006c0062`0061006e 00000000`00000000 00000000`00000000 000001d3`eca89be0 : nt!IopXxxControlFile+0x68a ffffd603`b45fea20 fffff800`5fbcbd43 : ffffd603`b45feae8 00000000`00100000 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56 ffffd603`b45fea90 00007ffd`e4969fe4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 000000b7`0207f6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e4969fe4 THREAD_SHA1_HASH_MOD_FUNC: 83a6972eee6a405513417fd0ea285d9a4575de7d THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1ade482b714ad86b54c6d56e6a4941f4401dbbf6 THREAD_SHA1_HASH_MOD: 4078466ad787633376a44c997e95802ed75935b7 FOLLOWUP_IP: NETIO!WfpPoolAllocNonPaged+20 fffff803`d1609b34 488903 mov qword ptr [rbx],rax FAULT_INSTR_CODE: 48038948 SYMBOL_STACK_INDEX: 9 SYMBOL_NAME: NETIO!WfpPoolAllocNonPaged+20 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 90332b2 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 20 FAILURE_BUCKET_ID: 0x133_ISR_NETIO!WfpPoolAllocNonPaged BUCKET_ID: 0x133_ISR_NETIO!WfpPoolAllocNonPaged PRIMARY_PROBLEM_CLASS: 0x133_ISR_NETIO!WfpPoolAllocNonPaged TARGET_TIME: 2018-12-07T11:03:57.000Z OSBUILD: 17134 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-11-09 10:19:47 BUILDDATESTAMP_STR: 180410-1804 BUILDLAB_STR: rs4_release BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804 ANALYSIS_SESSION_ELAPSED_TIME: 1885 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x133_isr_netio!wfppoolallocnonpaged FAILURE_ID_HASH: {7bfbb49a-bfaf-4444-700c-9f51280ab83f} Followup: MachineOwner ---------