USER_MODE_HEALTH_MONITOR (9e)
One or more critical user mode components failed to satisfy a health check.
Hardware mechanisms such as watchdog timers can detect that basic kernel services are not executing.
However, resource starvation issues, including memory leaks, lock contention, and scheduling priority misconfiguration, may block critical user mode components without blocking DPCs or draining the nonpaged pool.
Kernel components can extend watchdog timer functionality to user mode by periodically monitoring critical applications.
This BugCheck indicates that a user mode health check failed in a manner such that graceful shutdown is unlikely to succeed.
It restores critical services by rebooting and/or allowing application failover to other servers.
Arguments:
Arg1: ffffb702f6a542c0, Process that failed to satisfy a health check within the
configured timeout
Arg2: 00000000000004b0, Health monitoring timeout (seconds)
Arg3: 0000000000000065, WatchdogSourceRhsResourceDeadlockPhysicalDisk
A subclass of WatchdogSourceRhsResourceDeadlock.
For the resource types that are known to cause RHS termination hangs we isolate them to separate codes so we can quickly triage dumps.
Arg4: 0000000000000000
*************************************************************************
*** Either you specified an unqualified symbol, or your debugger ***
*** [CUT] ***
*** Type referenced: netft!NETFT_WATCHDOG_SOURCE ***
*************************************************************************
*** WARNING: Check Image - Checksum mismatch - Dump: 0x4cf37, File: 0x4d01d - d:\symbols\netft.sys\6F5C75A848000\netft.sys
*** WARNING: Check Image - Checksum mismatch - Dump: 0x4cf37, File: 0x4d01d - d:\symbols\netft.sys\6F5C75A848000\netft.sys
BUGCHECK_CODE: 9e
BUGCHECK_P1: ffffb702f6a542c0
BUGCHECK_P2: 4b0
BUGCHECK_P3: 65
BUGCHECK_P4: 0
FILE_IN_CAB: 123024-38859-01.dmp
PROCESS_NAME: rhs.exe
IMAGE_NAME: rhs.exe
MODULE_NAME: rhs
FAULTING_MODULE: 0000000000000000
STACK_TEXT:
fffff583`0553f078 fffff804`44cc5294 : 00000000`0000009e ffffb702`f6a542c0 00000000`000004b0 00000000`00000065 : nt!KeBugCheckEx
fffff583`0553f080 fffff804`44cc4a1c : 00000000`00000000 ffffbf00`0753b610 ffffbf0f`786a4b80 ffffbf0f`786a4c10 : netft!NetftProcessWatchdogEvent+0x368
fffff583`0553f0f0 fffff804`22831fc4 : 00000000`00000002 fffff583`0553f1e9 ffffbf0f`7865e2f0 ffffa501`e6dc0180 : netft!NetftWatchdogTimerDpc+0x4c
fffff583`0553f120 fffff804`22830a64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0708cb7f : nt!KiProcessExpiredTimerList+0x204
fffff583`0553f250 fffff804`22a2751e : ffffffff`00000000 ffffa501`e6dc0180 ffffa501`e6dcc840 ffffbf0f`78cba080 : nt!KiRetireDpcList+0xa14
fffff583`0553f500 00000000`00000000 : fffff583`05540000 fffff583`05539000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x9E_65_IMAGE_rhs.exe
OS_VERSION: 10.0.20348.2849
BUILDLAB_STR: fe_release_svc_prod1