When you analyze a memory dump, the output looks similar to the following:
BugCheck 9E, {fffffa80945ddb30, 4b0, 0, 0}
Probably caused by : netft.sys ( netft!NetftWatchdogTimerDpc+b9 )
Followup: MachineOwner
---------
USER_MODE_HEALTH_MONITOR (9e)
One or more critical user mode components failed to satisfy a health check.
Hardware mechanisms such as watchdog timers can detect that basic kernel
services are not executing. However, resource starvation issues, including
memory leaks, lock contention, and scheduling priority misconfiguration,
may block critical user mode components without blocking DPCs or
draining the nonpaged pool.
Kernel components can extend watchdog timer functionality to user mode
by periodically monitoring critical applications. This bugcheck indicates
that a user mode health check failed in a manner such that graceful
shutdown is unlikely to succeed. It restores critical services by
rebooting and/or allowing application failover to other servers.
Arguments:
Arg1: fffffa80945ddb30, Process that failed to satisfy a health check within the
configured timeout
Arg2: 00000000000004b0, Health monitoring timeout (seconds)
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
PROCESS_OBJECT: fffffa80945ddb30
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x9E
PROCESS_NAME: System
CURRENT_IRQL: 2
TAG_NOT_DEFINED_c000000f: FFFFF80003144FB0
LAST_CONTROL_TRANSFER: from fffff88002c026a5 to fffff80001ce11c0
STACK_TEXT:
fffff800`0313e518 fffff880`02c026a5 :
|
00000000
|
`0000009e fffffa80`
|
945ddb30 00000000
|
`000004b0 00000000`
|
00000000 : nt!KeBugCheckEx
|
fffff800`0313e520 fffff800`01cebe3c :
|
fffff800
|
`0313e648 00000000`
|
00000003 00000000
|
`00000004 00000000`
|
00000001 : netft!NetftWatchdogTimerDpc+0xb9
|
fffff800`0313e570 fffff800`01cebcd6 :
|
fffffa80
|
`9d49f648 fffffa80`
|
9d49f648 00000000
|
`00000000 00000000`
|
00000000 : nt!KiProcessTimerDpcTable+0x6c
|
fffff800`0313e5e0 fffff800`01cebbbe :
|
00000ed7
|
`2ce1c0f0 fffff800`
|
0313ec58 00000000
|
`06397d58 fffff800`
|
01e56d88 : nt!KiProcessExpiredTimerList+0xc6
|
fffff800`0313ec30 fffff800`01ceb9a7 :
|
0000054f
|
`eeea05c7 0000054f`
|
06397d58 0000054f
|
`eeea0582 00000000`
|
00000058 : nt!KiTimerExpiration+0x1be
|
fffff800`0313ecd0 fffff800`01cd8eca :
|
fffff800
|
`01e53e80 fffff800`
|
01e61cc0 00000000
|
`00000000 fffff880`
|
00e8ea00 : nt!KiRetireDpcList+0x277
|
fffff800`0313ed80 00000000`00000000 :
|
fffff800
|
`0313f000 fffff800`
|
03139000 fffff800
|
`0313ed40 00000000`
|
00000000 : nt!KiIdleLoop+0x5a
|
STACK_COMMAND:
FOLLOWUP_IP:
netft!NetftWatchdogTimerDpc+b9
fffff880`02c026a5 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: netft!NetftWatchdogTimerDpc+b9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netft
IMAGE_NAME: netft.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc48a
FAILURE_BUCKET_ID: X64_0x9E_netft!NetftWatchdogTimerDpc+b9
BUCKET_ID: X64_0x9E_netft!NetftWatchdogTimerDpc+b9