HI,
Microsoft ® Windows Debugger Version 10.0.16299.91 AMD64
Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [C:\aws\MEMORY.DMP]Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.Symbol search path is: srv*Executable search path is:Windows 10 Kernel Version 16299 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 16299.15.amd64fre.rs3_release.170928-1534Machine Name:Kernel base = 0xfffff802`e2683000 PsLoadedModuleList = 0xfffff802`e29ea110Debug session time: Tue Mar 13 16:29:09.539 2018 (UTC + 2:00)System Uptime: 0 days 6:36:33.812Loading Kernel Symbols........................................................................Page 120ac4 not present in the dump file. Type ".hh dbgerr004" for details.....................................................................................................................................................Loading User SymbolsLoading unloaded module list...........******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 133, {1, 1e00, fffff802e2a80370, 0}**************************************************************************** ****** ****** Either you specified an unqualified symbol, or your debugger ****** doesn't have full symbol information. Unqualified symbol ****** resolution is turned off by default. Please either specify a ****** fully qualified symbol module!symbolname, or enable resolution ****** of unqualified symbols by typing ".symopt- 100". Note that ****** enabling unqualified symbol resolution with network symbol ****** server shares in the symbol path may cause the debugger to ****** appear to hang for long periods of time when an incorrect ****** symbol name is typed or the network symbol server is down. ****** ****** For some commands to work properly, your symbol path ****** must point to .pdb files that have full type information. ****** ****** Certain .pdb files (such as the public OS symbols) do not ****** contain the required information. Contact the group that ****** provided you with these symbols if you need this command to ****** work. ****** ****** Type referenced: TickPeriods ****** ****************************************************************************Probably caused by : ntkrnlmp.exe ( nt!KeAccumulateTicks+f2583 )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************DPC_WATCHDOG_VIOLATION (133)The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVELor above.Arguments:Arg1: 0000000000000001, The system cumulatively spent an extended period of time atDISPATCH_LEVEL or above. The offending component can usually beidentified with a stack trace.Arg2: 0000000000001e00, The watchdog period.Arg3: fffff802e2a80370, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which containsadditional information regarding the cumulative timeoutArg4: 0000000000000000Debugging Details:------------------**************************************************************************** ****** ****** Either you specified an unqualified symbol, or your debugger ****** doesn't have full symbol information. Unqualified symbol ****** resolution is turned off by default. Please either specify a ****** fully qualified symbol module!symbolname, or enable resolution ****** of unqualified symbols by typing ".symopt- 100". Note that ****** enabling unqualified symbol resolution with network symbol ****** server shares in the symbol path may cause the debugger to ****** appear to hang for long periods of time when an incorrect ****** symbol name is typed or the network symbol server is down. ****** ****** For some commands to work properly, your symbol path ****** must point to .pdb files that have full type information. ****** ****** Certain .pdb files (such as the public OS symbols) do not ****** contain the required information. Contact the group that ****** provided you with these symbols if you need this command to ****** work. ****** ****** Type referenced: TickPeriods ****** ****************************************************************************DUMP_CLASS: 1DUMP_QUALIFIER: 401BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534SYSTEM_MANUFACTURER: Dell Inc.SYSTEM_PRODUCT_NAME: Inspiron 7559SYSTEM_SKU: 0706SYSTEM_VERSION: 1.2.5BIOS_VENDOR: Dell Inc.BIOS_VERSION: 1.2.5BIOS_DATE: 09/26/2017BASEBOARD_MANUFACTURER: Dell Inc.BASEBOARD_PRODUCT: 0H87XCBASEBOARD_VERSION: A00DUMP_TYPE: 1BUGCHECK_P1: 1BUGCHECK_P2: 1e00BUGCHECK_P3: fffff802e2a80370BUGCHECK_P4: 0DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDEDCPU_COUNT: 4CPU_MHZ: 900CPU_VENDOR: GenuineIntelCPU_FAMILY: 6CPU_MODEL: 5eCPU_STEPPING: 3CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: BA'00000000 (cache) BA'00000000 (init)DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULTBUGCHECK_STR: 0x133PROCESS_NAME: SystemCURRENT_IRQL: dANALYSIS_SESSION_HOST: XXXXXXXANALYSIS_SESSION_TIME: 03-13-2018 17:46:03.0748ANALYSIS_VERSION: 10.0.16299.91 amd64freLAST_CONTROL_TRANSFER: from fffff802e283eab3 to fffff802e27f8430STACK_TEXT:fffff802`e32839b8 fffff802`e283eab3 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`e2a80370 : nt!KeBugCheckExfffff802`e32839c0 fffff802`e274a1b8 : 000031e6`96d52564 fffff802`e0f59180 00000000`00173c74 00000000`00000000 : nt!KeAccumulateTicks+0xf2583fffff802`e3283a20 fffff802`e26074c6 : 000031e6`96d4c880 00000000`00000000 fffff802`e3283df0 00000000`00000001 : nt!KeClockInterruptNotify+0x5f8fffff802`e3283d30 fffff802`e27178c5 : fffff802`e265a550 fffff802`e2737232 ffffc08d`30384040 fffff802`e27371f5 : hal!HalpTimerClockInterrupt+0x56fffff802`e3283d60 fffff802`e27f9d1a : fffff802`e3283e70 fffff802`e265a550 00000000`00000000 ffffc08d`2c574c00 : nt!KiCallInterruptServiceRoutine+0xa5fffff802`e3283da0 fffff802`e27fa227 : ffffc08d`3168600e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xeafffff802`e3283df0 fffff802`e27f98a9 : ffffd181`611aea00 ffffd181`611aea00 ffffc08d`352e4030 ffffc08d`2c574c00 : nt!KiInterruptDispatchNoLockNoEtw+0x37fffff802`e3283f80 fffff802`e27f95b7 : ffffc08d`352e4030 00000000`00000000 00000001`ffffffff fffffff6`00000002 : nt!KiScanInterruptObjectList+0xc9ffffbf8c`01e966b0 fffff80d`419b535e : 00000000`00000000 00000000`00000000 ffffc08d`2fc40700 00000000`00000000 : nt!KiChainedDispatch+0x37ffffbf8c`01e96840 fffff80d`419c1ae3 : 00000000`00000000 ffffc08d`2c98dc60 ffffc08d`00000000 00000000`0000000a : ndis!ndisMIndicateNetBufferListsToOpen+0x104eeffffbf8c`01e96910 fffff80d`419a5583 : ffffc08d`2c4301a0 ffffbf8c`01e96b01 fffff80d`419a4a50 ffffbf8c`01e96b60 : ndis!ndisMTopReceiveNetBufferLists+0x1d093ffffbf8c`01e96a10 fffff80d`419a498e : 00000000`00002381 ffffc08d`2c4301a0 ffffc08d`2fc404a0 00000000`00000000 : ndis!ndisCallReceiveHandler+0x43ffffbf8c`01e96a60 fffff80d`43fb1a3e : 00000000`00000000 00000000`00000000 ffffbf8c`01e96c60 00006894`9c7bc310 : ndis!NdisMIndicateReceiveNetBufferLists+0x5aeffffbf8c`01e96bd0 fffff80d`43fb160b : ffffc08d`2d7fb000 ffffc08d`2fc404a0 00000000`00000000 00000000`cf639600 : vmswitch!VmsExtMpIndicatePackets+0x16effffbf8c`01e96ca0 fffff80d`419a6468 : 00000000`00000000 00000000`00000000 ffffc08d`2c658f02 00000000`00000000 : vmswitch!VmsExtMpSendNetBufferLists+0x2fbffffbf8c`01e96e80 fffff80d`419a310b : ffffc08d`2c430100 ffffc08d`2fc404a0 00000000`00000000 ffffbf8c`01e96ff9 : ndis!ndisMSendNBLToMiniportInternal+0x108ffffbf8c`01e96f40 fffff80d`43fa6e30 : ffffc08d`2c574c00 ffffc08d`2fc404a0 ffffc08d`00000000 ffffc08d`00000021 : ndis!NdisSendNetBufferLists+0x33bffffbf8c`01e970a0 fffff80d`43fa4878 : ffffc08d`2d7fb000 ffffc08d`2c9a0001 ffffc08d`2c7f7900 00000000`0000000a : vmswitch!VmsExtPtRouteNetBufferLists+0x460ffffbf8c`01e97170 fffff80d`419a4fae : 00000000`00000001 00000000`00000001 00000000`00000001 ffffbf8c`01e97510 : vmswitch!VmsPtNicReceiveNetBufferLists+0x18a8ffffbf8c`01e973a0 fffff80d`419a4c12 : ffffc08d`2c9a6001 00000000`00000000 00000000`00000000 00000000`0000000a : ndis!ndisMIndicateNetBufferListsToOpen+0x13effffbf8c`01e97470 fffff80d`419a5583 : ffffc08d`2c7b41a0 ffff0000`00009401 fffff80d`419a4a50 fffffff6`00000002 : ndis!ndisMTopReceiveNetBufferLists+0x1c2ffffbf8c`01e97570 fffff80d`419a498e : 00000000`00000000 fffff802`e26066fd fffff7ae`40001ec8 00000000`0000002f : ndis!ndisCallReceiveHandler+0x43ffffbf8c`01e975c0 fffff80d`48a93c8c : ffffc08d`2c97e000 00000000`00000000 00000000`00000200 ffffc08d`2f4e4030 : ndis!NdisMIndicateReceiveNetBufferLists+0x5aeffffbf8c`01e97730 fffff80d`48a819f6 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb24ffffbf8c`01e97920 fffff80d`419c384c : 815f067f`0000000a 00000000`00000000 ba0d1556`0865015d dc050045`00082c20 : rt640x64!MPHandleInterrupt+0x366ffffbf8c`01e97990 fffff80d`419b2534 : ffffc08d`2b084900 00000000`00000000 ffffc08d`2d795848 00000000`00000000 : ndis!ndisQueuedMiniportDpcWorkItem+0x1ae0cffffbf8c`01e97ac0 fffff802`e2799b87 : ffffc08d`2bee4040 ffffc08d`2bee4040 fffff80d`419b23d0 00000000`00000000 : ndis!ndisReceiveWorkerThread+0x164ffffbf8c`01e97b90 fffff802`e27ffbe6 : fffff802`e0f59180 ffffc08d`2bee4040 fffff802`e2799b40 00000000`00000000 : nt!PspSystemThreadStartup+0x47ffffbf8c`01e97be0 00000000`00000000 : ffffbf8c`01e98000 ffffbf8c`01e91000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16THREAD_SHA1_HASH_MOD_FUNC: 17963406c2e4a27d6b0bf0ea37b18f7ebce25cdeTHREAD_SHA1_HASH_MOD_FUNC_OFFSET: 85046a51deaf129158f50fb493aa68c7aa312448THREAD_SHA1_HASH_MOD: 2b40ad853785a6d9d4878ba4ec8e79420cf57766FOLLOWUP_IP:nt!KeAccumulateTicks+f2583fffff802`e283eab3 cc int 3FAULT_INSTR_CODE: ab3944ccSYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt!KeAccumulateTicks+f2583FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 5a7e7659STACK_COMMAND: .thread ; .cxr ; kbBUCKET_ID_FUNC_OFFSET: f2583FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicksBUCKET_ID: 0x133_ISR_nt!KeAccumulateTicksPRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicksTARGET_TIME: 2018-03-13T14:29:09.000ZOSBUILD: 16299OSSERVICEPACK: 0SERVICEPACK_NUMBER: 0OS_REVISION: 0SUITE_MASK: 272PRODUCT_TYPE: 1OSPLATFORM_TYPE: x64OSNAME: Windows 10OSEDITION: Windows 10 WinNt TerminalServer SingleUserTSOS_LOCALE:USER_LCID: 0OSBUILD_TIMESTAMP: 2018-02-10 06:34:33BUILDDATESTAMP_STR: 170928-1534BUILDLAB_STR: rs3_releaseBUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534ANALYSIS_SESSION_ELAPSED_TIME: 17fdANALYSIS_SOURCE: KMFAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticksFAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}Followup: MachineOwner---------
I was running Clonezilla in guest Hyper-V machine, and was constructing saved Clonezilla image located in LAN samba share (to remote img file).
Also, together with dump I had such error
Attached Files
Edited by Suncatcher, 13 March 2018 - 11:09 AM.