Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Question
Friday, March 8, 2013 7:59 PM
Hi
we have the server geting rebooted by a bugchk error for netft.sys Please let me know if we have any fix for this issue. i am not sure wht is causing the issue on the server
the server is windows 2008 R2 Datacenter and it is on the HyperV cluster
Thanks in advance
All replies (71)
Friday, March 8, 2013 9:28 PM ✅Answered
I assume you are referring to a stop 0x9e for netft.sys, which is an intentional bugcheck caused by the cluster service due to a deadlock condition identified. I'd recommend reviewing the following for further tips to troubleshoot this issue:
Visit my blog about multi-site clustering
Saturday, March 9, 2013 3:02 AM ✅Answered | 1 vote
Clustering has health detection between the user mode service and the kernel mode NetFT driver. If user mode goes unresponsive, then clustering bugchecks the box in an effort to force a failover. A STOP 0x9e is expected cluster behavior. You should troubleshoot the condition as a user mode hang...
Thanks!
Elden
Friday, March 8, 2013 10:29 PM
Thanks John,
thi was the same error i was refering to. I did go through the MS site and i found some Hotfix for it, Not very sure if that Hot fix is for the same issue.
http://support.microsoft.com/kb/2135160/en-us error “FIX: "0x0000009E" Stop error when you host Hyper-V virtual machines in a Windows Server 2008 R2-based failover cluster
do u have any clue on it ?
Friday, March 8, 2013 11:00 PM
I think the most important line in that KB article:
Not all "0x0000009E" Stop errors are caused by this problem.
This blue screen just indicates that something caused the cluster to believe that the node was hung. If you are running Hyper-V, this might be a good place to start with this hotfix. Otherwise, you might consider opening a ticket with PSS to troubleshoot this further.
Visit my blog about multi-site clustering
Sunday, March 10, 2013 7:16 PM
Techei, I am a developer on the clustering team. if the problem persists then you can share dump file with me (c:\windows\memory.dmp). I will take a look what exactly caused the bugcheck. if you do not want to share it with the world then give me your email, I'll reply with my email and you can share this dump with me. If you prefer work through customer support then they also should be able to look at the dump and tell you what netft is not happy about.
Regards, Vladimir Petter, Microsoft Corporation
Wednesday, March 13, 2013 3:02 PM
We're having a very similar problem.. which i'd love for someone to actually investigate the memory dump to give me a real clue as to the problem. We're in the midst of multiple cases with PSS but a solution couldn't come quick enough. How can I share this dump with you?
Friday, October 11, 2013 8:20 PM
Hi Vladimir, I have the same issue with the bugcheck 0x0000009e
How can I send you the memory.dmp? Thaanks a lot
Saturday, October 12, 2013 3:28 AM
If you can put it to some location I can download it from that would work.
Thanks,
Vladimir.
Regards, Vladimir Petter, Microsoft Corporation
Tuesday, October 15, 2013 3:55 PM
I used my skydrive. You can dowload it from there
https://skydrive.live.com/redir?resid=95BBBD60D3F2B190!117
thanks!
Wednesday, October 16, 2013 5:05 AM
look at the properties of the files c:\windows\system32\drivers\EmcpXcr.sys, EmcpBase.sys and EmcpGpx.sys to see what company these drivers came from and contact that company for support, and share with them your dump.
Cluster bugchecked the machine because cluster tried to terminate resource host monitor - the host process where the plug-ins that control applications, disks etc are running in, and this process did not go away in 20 minutes. Termination is stuck because some threads are stuck in the kernel. They all end up waiting for the thread below. That thread has been stuck for 25 minutes
THREAD fffffa800793f660 Cid 0004.0050 Teb: 0000000000000000 Win32Thread: 0000000000000000 WAIT: (Executive) KernelMode Non-Alertable
fffffa8008467db8 SynchronizationEvent
fffffa8008467dd0 NotificationEvent
IRP List:
fffffa801452f4b0: (0006,0310) Flags: 00060070 Mdl: 00000000
fffffa8013d9ba90: (0006,0310) Flags: 00060070 Mdl: 00000000
Not impersonating
DeviceMap fffff8a000008500
Owning Process fffffa80078c49e0 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 262955 Ticks: 96163 (0:00:25:00.152)
Context Switch Count 10707 IdealProcessor: 12
UserTime 00:00:00.000
KernelTime 00:00:12.105
Win32 Start Address nt!ExpWorkerThread (0xfffff800024e0150)
Stack Init fffff88002b5cdb0 Current fffff88002b5be20
Base fffff88002b5d000 Limit fffff88002b57000 Call 0
Priority 13 BasePriority 12 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
fffff880`02b5be60 fffff800`024cc5f2 nt!KiSwapContext+0x7a
fffff880`02b5bfa0 fffff800`024d90ea nt!KiCommitThreadWait+0x1d2
fffff880`02b5c030 fffff880`0146ee3b nt!KeWaitForMultipleObjects+0x272
fffff880`02b5c2f0 fffff880`01603601 EmcpBase!PowerSleep+0x83
fffff880`02b5c350 fffff880`016038d9 EmcpXcr!XcryptUpdateAssocCallout+0xc45
fffff880`02b5c3b0 fffff880`014f8c10 EmcpXcr!XcryptUpdateAssocCallout+0xf1d
fffff880`02b5c3f0 fffff880`01467adf EmcpGpx!GpxDestroySplitPirp+0x78
fffff880`02b5c420 fffff880`014f8c30 EmcpBase!PowerDispatchX+0x243
fffff880`02b5c470 fffff880`01467adf EmcpGpx!GpxDestroySplitPirp+0x98
fffff880`02b5c4a0 fffff880`01468b41 EmcpBase!PowerDispatchX+0x243
fffff880`02b5c4f0 fffff880`01475681 EmcpBase!PowerSyncIoTopDispatch+0x89
fffff880`02b5c520 fffff880`01478686 EmcpBase!PowerWinIsIrpSync+0x965
fffff880`02b5c570 fffff880`0180d362 EmcpBase!PowerWinIsPseudoBusPDO+0x219a
fffff880`02b5c5d0 fffff880`0180971f disk!DiskGetPortGeometry+0x92
fffff880`02b5c630 fffff880`018015ec disk!DiskUpdateGeometry+0x4ef
fffff880`02b5c670 fffff880`0180164c disk!DiskReadDriveCapacity+0x1c
fffff880`02b5c6a0 fffff880`0159ce7d disk!DiskDeviceControl+0x2e3
fffff880`02b5c700 fffff880`012f1244 CLASSPNP!ClassDeviceControlDispatch+0x2d
fffff880`02b5c730 fffff800`027f745d partmgr!PmFilterDeviceControl+0xd4
fffff880`02b5c790 fffff800`027f72b4 nt!FstubGetDiskGeometry+0x12d
fffff880`02b5c810 fffff800`027f76e2 nt!FstubAllocateDiskInformation+0x44
fffff880`02b5c840 fffff880`012f3512 nt!IoReadPartitionTableEx+0x1a
fffff880`02b5c870 fffff880`012f1398 partmgr!PmGetDriveLayoutEx+0x5d2
fffff880`02b5c970 fffff880`0162d48f partmgr!PmFilterDeviceControl+0x228
fffff880`02b5c9d0 fffff880`0162ae3d ClusDisk!ClusDskpSendIoctl+0x8f
fffff880`02b5ca70 fffff800`02742eb0 ClusDisk!ClusDskDeviceChangeNotification+0xc9
fffff880`02b5cae0 fffff800`02741787 nt!PnpNotifyDriverCallback+0x5c
fffff880`02b5cb70 fffff800`02742ffc nt!PnpNotifyTargetDeviceChange+0x16b
fffff880`02b5cc20 fffff800`027420ca nt!PnpProcessCustomDeviceEvent+0x2c
fffff880`02b5cc50 fffff800`024e0261 nt!PnpDeviceEventWorker+0x142
fffff880`02b5ccb0 fffff800`027732ea nt!ExpWorkerThread+0x111
fffff880`02b5cd40 fffff800`024c78e6 nt!PspSystemThreadStartup+0x5a
fffff880`02b5cd80 00000000`00000000 nt!KxStartSystemThread+0x16
Storage class device fffffa800f2ef060 with extension at fffffa800f2ef1b0
Classpnp Internal Information at fffffa801371c530
Transfer Packet Engine:
Packet Status DL Irp Opcode Sector/ListId UL Irp
Pending Idle Requests: 0x0
Failed Requests:
Srb Scsi
Opcode Status Status Sense Code Sector/ListId Time Stamp
28 04 02 02 04 03 00000001 12:28:45.684
28 04 02 02 04 03 003fffff 12:28:45.684
28 04 02 02 04 03 00000001 12:28:45.684
28 04 02 02 04 03 003fffff 12:28:45.684
28 04 02 02 04 03 00000001 12:28:45.684
28 04 02 02 04 03 003fffff 12:28:45.684
28 04 02 02 04 03 00000001 12:28:45.699
28 04 02 02 04 03 003fffff 12:28:45.699
28 04 02 02 04 03 00000001 12:28:45.699
28 04 02 02 04 03 003fffff 12:28:45.699
28 04 02 02 04 03 00000001 12:28:45.699
28 04 02 02 04 03 003fffff 12:28:45.715
28 04 02 02 04 03 00000001 12:28:45.824
28 04 02 02 04 03 003fffff 12:28:45.824
28 04 02 02 04 03 00000001 12:28:45.840
28 04 02 02 04 03 003fffff 12:28:45.840
-- dt classpnp!_CLASS_PRIVATE_FDO_DATA fffffa801371c530 --
Classpnp External Information at fffffa800f2ef1b0
DGC RAID 5 0429 CKM00100500355
Minidriver information at fffffa800f2ef670
Attached device object at fffffa800f2ed060
Physical device object at fffffa800f2ed060
Media Geometry:
Bytes in a Sector = 512
Sectors per Track = 63
Tracks / Cylinder = 255
Media Length = 2147483648 bytes = ~2 GB
-- dt classpnp!_FUNCTIONAL_DEVICE_EXTENSION fffffa800f2ef1b0 --
Regards, Vladimir Petter, Microsoft Corporation
Wednesday, October 16, 2013 4:26 PM
Thanks a lot! I ve already talked with EMC and they recomended to us do an updated of drivers and multipath.
I have another question but using the debug tool. I download it from http://msdn.microsoft.com/en-us/windows/hardware/gg463009.aspx but always it give me error from symbols
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Temp\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: srv*C:\websymbols*http://msdl.microsoft.com/download/symbols;srv\*
Executable search path is: srv*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Windows 7 Kernel Version 7601 (Service Pack 1) MP (16 procs) Free x64
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`02461000 PsLoadedModuleList = 0xfffff800`026a46d0
Debug session time: Fri Oct 11 16:53:45.992 2013 (UTC - 3:00)
System Uptime: 0 days 1:33:22.285
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Loading Kernel Symbols
...............................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 9E, {fffffa8008a5eab0, 4b0, 0, 0}
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
Probably caused by : netft.sys ( netft!NetftWatchdogTimerDpc+b9 )
Followup: MachineOwner
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
USER_MODE_HEALTH_MONITOR (9e)
One or more critical user mode components failed to satisfy a health check.
Hardware mechanisms such as watchdog timers can detect that basic kernel
services are not executing. However, resource starvation issues, including
memory leaks, lock contention, and scheduling priority misconfiguration,
may block critical user mode components without blocking DPCs or
draining the nonpaged pool.
Kernel components can extend watchdog timer functionality to user mode
by periodically monitoring critical applications. This bugcheck indicates
that a user mode health check failed in a manner such that graceful
shutdown is unlikely to succeed. It restores critical services by
rebooting and/or allowing application failover to other servers.
Arguments:
Arg1: fffffa8008a5eab0, Process that failed to satisfy a health check within the
configured timeout
Arg2: 00000000000004b0, Health monitoring timeout (seconds)
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
ADDITIONAL_DEBUG_TEXT:
You can run '.symfix; .reload' to try to fix the symbol path and load symbols.
MODULE_NAME: netft
FAULTING_MODULE: fffff80002461000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc48a
PROCESS_OBJECT: fffffa8008a5eab0
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x9E
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff88000e626a5 to fffff800024d6bc0
STACK_TEXT:
fffff880`0253d518 fffff880`00e626a5 : 00000000`0000009e fffffa80`08a5eab0 00000000`000004b0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0253d520 fffff800`024e185c : fffff880`0253d618 00000000`00000001 00000000`400e0088 00000000`00000001 : netft!NetftWatchdogTimerDpc+0xb9
fffff880`0253d570 fffff800`024e16f6 : fffff880`00e6f100 00000000`00057ace 00000000`00000000 00000000`00000000 : nt!KeReleaseMutant+0xb2c
fffff880`0253d5e0 fffff800`024e15de : 0000000d`0b38db3c fffff880`0253dc58 00000000`00057ace fffff880`02518f48 : nt!KeReleaseMutant+0x9c6
fffff880`0253dc30 fffff800`024e13c7 : 00000003`0ebda1c2 00000003`00057ace 00000003`0ebda10c 00000000`000000ce : nt!KeReleaseMutant+0x8ae
fffff880`0253dcd0 fffff800`024ce8ca : fffff880`02515180 fffff880`025202c0 00000000`00000000 fffff880`01a95a48 : nt!KeReleaseMutant+0x697
fffff880`0253dd80 00000000`00000000 : fffff880`0253e000 fffff880`02538000 fffff880`0253dd40 00000000`00000000 : nt!KiCpuId+0x6fa
STACK_COMMAND: kb
FOLLOWUP_IP:
netft!NetftWatchdogTimerDpc+b9
fffff880`00e626a5 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: netft!NetftWatchdogTimerDpc+b9
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: netft.sys
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
8: kd> !process fffffa8008a5eab0 3
NT symbols are incorrect, please fix symbols
Wednesday, October 16, 2013 5:10 PM
Once open the dump first run ".symfix" then ".reload". After that always start from "!analyze -v". If you see
USER_MODE_HEALTH_MONITOR (9e) then it complains about a process not doing something in time (in the case above not terminating in time). The process address is in Arg1. run "!process <Arg1> 1f", and go from there.
Regards, Vladimir Petter, Microsoft Corporation
Tuesday, August 5, 2014 7:35 AM
Hi all
Thanks for this information.
3. days ago we had a blusceen as well on one of our Exchange 2010 MBX server.
All drives are connected via iSCSI except C. These drives are not pysical. We are using NetApp and on top VmWare.
As I could see in the dump file while using WinDBG is:
Probably caused by : netft.sys ( netft+26a5 )What do you suggest to solve this issue?Kind regards Matthias
Tuesday, August 5, 2014 4:09 PM
Hello Matthias,
If you can share the dump with me I'll be happy to take a look.
Regards, Vladimir Petter, Microsoft Corporation
Wednesday, August 6, 2014 2:37 PM
Hi Vladimir
Thanks for your reply. I rely appreciate this.
Here is the link to have a look into the dump: https://drive.google.com/file/d/0BxDBxOjFJ8GLRXpVZE9JN19BXzA/edit?usp=sharing.
I am waiting for your feedback.
Kind regards
Matthias
Wednesday, August 6, 2014 6:38 PM
Looks like your VMWare disks are timing out IO at the moment, and also I see some netapp LUNs were failing. Please check your storage.
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 04 22 00 00 00 01f73420 16:17:20.276 Retried
28 04 22 00 00 00 018807e0 16:17:20.276 Retried
2a 04 22 00 00 00 000599c8 16:17:20.276 Retried
2a 04 22 00 00 00 01aa0bb0 17:23:49.276 Retried
2a 04 22 00 00 00 02e790f0 17:23:49.276 Retried
2a 04 22 00 00 00 013bfc50 17:23:49.276 Retried
2a 04 22 00 00 00 02692250 17:23:49.276 Retried
2a 04 22 00 00 00 03553f80 17:23:49.276 Retried
2a 04 22 00 00 00 0311d0a5 17:23:49.276 Retried
2a 04 22 00 00 00 00608b90 17:23:49.276 Retried
2a 04 22 00 00 00 02b2a210 17:23:49.276 Retried
2a 04 22 00 00 00 006327f8 17:23:49.276 Retried
2a 04 22 00 00 00 0007a050 17:23:49.276 Retried
2a 04 22 00 00 00 0333eb68 17:23:49.276 Retried
2a 04 22 00 00 00 0004e538 17:23:49.276 Retried
28 04 22 00 00 00 009fa980 17:23:49.276 Retried
VMware Virtual disk 1.0 6000c292caa09c5f634b3b75741142ea
Opcode Status Status Sense Code Sector/ListId Time Stamp
28 04 22 00 00 00 006bbac0 16:11:00.276 Retried
28 04 22 00 00 00 008e1d30 16:12:26.276 Retried
28 04 22 00 00 00 0099b8c8 16:12:26.276 Retried
28 04 22 00 00 00 0084d9c8 16:12:26.276 Retried
28 04 22 00 00 00 006cdc08 16:12:26.276 Retried
28 04 22 00 00 00 006cdb88 16:12:26.276 Retried
28 04 22 00 00 00 008e0020 16:14:50.276 Retried
28 04 22 00 00 00 0099b828 16:14:50.276 Retried
28 04 22 00 00 00 006bbbb8 16:14:50.276 Retried
28 04 22 00 00 00 0079ee58 16:14:50.276 Retried
28 04 22 00 00 00 006ed580 16:14:50.276 Retried
28 04 22 00 00 00 008fd188 16:14:50.276 Retried
28 04 22 00 00 00 00701e60 16:17:22.276 Retried
28 04 22 00 00 00 00757f68 16:17:22.276 Retried
28 04 22 00 00 00 00a87f28 16:17:22.276 Retried
28 04 22 00 00 00 00783c60 16:17:22.276 Retried
VMware Virtual disk 1.0 6000c29be6a5c7d86a9a12fabe644f5d
Opcode Status Status Sense Code Sector/ListId Time Stamp
28 04 02 06 3f 0e 0fbac380 13:33:27.572 Retried
2a 0e 00 00 00 00 137a3c00 16:09:42.041 Retried
2a 0e 00 00 00 00 137a3e00 16:09:42.041 Retried
2a 0e 02 06 29 00 137a3c00 16:09:42.119 Retried
2a 0e 00 00 00 00 00614818 17:24:09.432 Retried
NETAPP LUN 811a 7SRjT+BTl8Uf
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 0e 00 00 00 00 0e910e60 16:09:42.729 Retried
2a 0e 02 06 29 00 006407f8 16:09:42.807 Retried
2a 0e 00 00 00 00 005fd608 16:11:00.291 Retried
2a 0e 00 00 00 00 00632330 16:11:00.291 Retried
2a 0e 00 00 00 00 0063d620 16:11:00.291 Retried
2a 0e 00 00 00 00 0bfc32e0 16:11:00.291 Retried
2a 0e 02 06 29 00 005fd608 16:11:00.322 Retried
2a 0e 00 00 00 00 0c35dfe0 16:12:29.994 Retried
2a 0e 02 06 29 00 0c35dfe0 16:12:29.994 Retried
2a 0e 00 00 00 00 0060b1b8 16:12:30.010 Retried
2a 0e 00 00 00 00 0060b1c8 16:14:50.479 Retried
2a 0e 00 00 00 00 000d0070 16:14:50.479 Retried
2a 0e 00 00 00 00 0e9e6b60 16:14:50.479 Retried
2a 0e 02 06 29 00 0060b1c8 16:14:50.510 Retried
2a 0e 00 00 00 00 0e80ece0 16:17:21.354 Retried
2a 0e 02 06 29 00 0e80ece0 16:17:21.510 Retried
NETAPP LUN 811a 7SRjT+BTl8Uh
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 0e 00 00 00 00 000f09d8 16:12:30.088 Retried
2a 0e 00 00 00 00 002a6be8 16:12:30.088 Retried
28 0e 02 06 29 00 0e223ce8 16:12:30.088 Retried
28 0e 02 06 29 00 0e240ce8 16:13:43.276 Retried
NETAPP LUN 811a 7SRjT+BTl8Uj
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 0e 00 00 00 00 00635770 16:11:02.369 Retried
2a 0e 02 06 29 00 005fd5f0 16:11:02.369 Retried
2a 0e 00 00 00 00 0011c320 16:13:42.979 Retried
2a 0e 02 06 29 00 0011c320 16:13:43.010 Retried
NETAPP LUN 811a 7SRjT+BTl8Ul
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 0e 02 06 29 00 005fd608 16:13:43.260 Retried
2a 0e 02 06 29 00 00640a20 16:17:30.916 Retried
NETAPP LUN 811a 7SRjT+BTl8Un
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 0e 00 00 00 00 0351aef8 16:11:02.463 Retried
2a 0e 00 00 00 00 0060fb78 16:11:02.463 Retried
28 0e 02 06 29 00 0b1ad938 16:11:02.463 Retried
2a 0e 00 00 00 00 06557578 16:12:30.057 Retried
28 0e 02 06 29 00 0b218f38 16:12:30.213 Retried
28 0e 02 06 29 00 0b236338 16:13:43.369 Retried
28 04 02 06 3f 0e 0cec5338 17:08:29.760 Retried
28 04 02 06 3f 0e 0d187b38 17:21:28.932 Retried
NETAPP LUN 811a 7SRjT+BTl8Up
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 0e 00 00 00 00 1379fca0 16:09:43.197 Retried
2a 0e 02 06 29 00 002c8a60 16:09:43.229 Retried
2a 0e 02 06 29 00 005fd600 16:11:02.307 Retried
2a 0e 00 00 00 00 1379fca0 16:13:43.026 Retried
2a 0e 00 00 00 00 00628278 16:13:43.026 Retried
2a 0e 02 06 29 00 1379fca0 16:13:43.041 Retried
2a 0e 00 00 00 00 0060d340 16:17:30.713 Retried
2a 0e 00 00 00 00 002c8a60 16:17:30.713 Retried
2a 0e 02 06 29 00 0060d340 16:17:30.729 Retried
NETAPP LUN 811a 7SRjT+BTl8Ut
Opcode Status Status Sense Code Sector/ListId Time Stamp
2a 0e 00 00 00 00 02f88e50 16:17:30.572 Retried
2a 0e 00 00 00 00 012aa038 16:17:30.588 Retried
2a 0e 00 00 00 00 0063d768 16:17:30.588 Retried
2a 0e 00 00 00 00 0286d1a0 16:17:30.588 Retried
2a 0e 00 00 00 00 006199c0 16:17:30.588 Retried
2a 0e 00 00 00 00 01175778 16:17:30.588 Retried
2a 0e 00 00 00 00 0004cae0 16:17:30.588 Retried
2a 0e 02 06 29 00 0323e8c8 16:17:30.791 Retried
2a 04 02 06 3f 0e 025d736f 16:54:35.307 Retried
NETAPP LUN 811a 7SRjT+BTl8Uv
Regards, Vladimir Petter, Microsoft Corporation
Thursday, August 21, 2014 1:00 PM
Hi Vladimir,
I've used WinDBG on many occassions, mainly for clr debugging. however, i'm amazed at the information you keep getting out of the dump files.
What are the most useful commands to help with this? It's a science in itself. Any guidance will be hugely appreciated
Thanks
Andreas
Thursday, August 21, 2014 5:06 PM
Hi Vladamir,
Can you please help me with debugging the minidump file.
https://drive.google.com/folderview?id=0B0T9i-iE-IVhWDYwY1Z1Nm1yRFk&usp=sharing
Regards
Techwiz
Friday, August 22, 2014 7:42 AM
Hello Techwiz,
Unfortunately I cannot tell much from the kernel minidump. Please change your OS settings to collect kernel full dump on bugcheck, and share that dump on the next repro.
From the minidump it looks like a thread of RHS.exe process has been stuck in the kernel for 20 minutes preventing process termination from making forward progresss. After that a watchdog has recycled machine by bugchecking it. Minidump does not contain thread's stack so I cannot tell where is it stuck.
Regards, Vladimir Petter, Microsoft Corporation
Monday, December 15, 2014 7:36 PM
Vladimir,
Can you take a look at my DMP file?
https://drive.google.com/file/d/0BzIR_AB_PyatQmowSkJZX2gyQTg/view?usp=sharing
I've had two crashes in the past two weeks with Netft.sys listed as the culprit.
I would appreciate it if you noticed anything else. From a host on a Hyper-V Cluster.
Thanks,
Jon
Monday, December 15, 2014 8:09 PM
Please open a case with Microsoft support and they will be able to debug the dump and identify root cause.
Also see this blog:
http://blogs.msdn.com/b/clustering/archive/2013/11/13/10467483.aspx
Thanks!
Elden
Tuesday, December 16, 2014 3:58 AM | 1 vote
Hello Jon,
The problem is that you have such high DPC rate coming from network on CPU0 and CPU14 that it is stalling threads, and thread scheduling on CPU0.
On CPU 0 DPCs were running back-to-back for almost 27 seconds. CPU0 currently handling a DPC, and in the queue there are 4 to go. By the time when these 4 are processed probably new DPCs will be enqued.
CPU#0
Current DPC: NDIS!ndisInterruptDpc (Normal DPC)
Debugger Saved IRQL: 0
Cumulative DPC Time Limit: 120.000 seconds
Current Cumulative DPC Time: 26.906 seconds
Single DPC Time Limit: 20.000 seconds
Current Single DPC Time: 0.000 seconds
Pending DPCs:
CPU Type KDPC Function
0: Normal : 0xffffe00152bafb20 0xfffff800608b6ae0 vmbkmclr!InpProcessingDpcRoutine
0: Normal : 0xffffe00149e628e8 0xfffff80060014c60 NDIS!ndisInterruptDpc
0: Normal : 0xffffe00149d1f8e8 0xfffff80060014c60 NDIS!ndisInterruptDpc
0: Normal : 0xffffe00149ddf8e8 0xfffff80060014c60 NDIS!ndisInterruptDpc
On CPU14 they were running for almost 1.8 seconds
CPU#14
Current DPC: netft!NetftWatchdogTimerDpc (Normal DPC)
Debugger Saved IRQL: 2
Cumulative DPC Time Limit: 120.000 seconds
Current Cumulative DPC Time: 1.828 seconds
Single DPC Time Limit: 20.000 seconds
Current Single DPC Time: 0.000 seconds
The thread that is currently (RUNING) not making forward progress because CPU0 is busy processing DPCs from the network
THREAD ffffe00147e1f040 Cid 0004.01a4 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
Not impersonating
DeviceMap ffffc000c360dca0
Owning Process ffffe001463c3900 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 52759634 Ticks: 52 (0:00:00:00.812)
Context Switch Count 11411046 IdealProcessor: 0
UserTime 00:00:00.000
KernelTime 00:09:27.515
Win32 Start Address vmbusr!AwWorkerThread (0xfffff80060a1d9f0)
Stack Init ffffd001e478add0 Current ffffd001e478a7b0
Base ffffd001e478b000 Limit ffffd001e4785000 Call 0
Priority 15 BasePriority 8 UnusualBoost 7 ForegroundBoost 0 IoPriority 2 PagePriority 5
# Child-SP RetAddr Call Site
00 fffff803`7df681b0 fffff800`608b9007 vmbusr!BusChSendInterrupt+0x7
01 (Inline Function) ` vmbkmclr!KmclSendSignal+0xf
02 (Inline Function) ` vmbkmclr!OutpProcessRingResult+0x29
03 (Inline Function) ` vmbkmclr!OutpTrySendControlPacket+0x227
04 (Inline Function) ` vmbkmclr!OutSendPacket+0x2ac
05 fffff803`7df681e0 fffff800`6091f89a vmbkmclr!VmbPacketSendWithTransferPageRanges+0x307
06 fffff803`7df68290 fffff800`6091f2ee vmswitch!VmsVmNicPvtRndisHostMessageSend+0xfa
07 fffff803`7df68350 fffff800`6091ec7f vmswitch!RndisDevHostDeviceIndicatePackets+0x61e
08 (Inline Function) ` vmswitch!RndisDevDeviceIndicatePackets+0x25
09 fffff803`7df68540 fffff800`6092ed39 vmswitch!VmsVmNicPvtPacketForward+0x17f
0a fffff803`7df68750 fffff800`6092bb0a vmswitch!VmsRouterDeliverNetBufferLists+0x5c9
0b fffff803`7df68830 fffff800`60012a53 vmswitch!VmsExtPtReceiveNetBufferLists+0x13a
0c fffff803`7df68890 fffff800`60012f19 NDIS!ndisMIndicateNetBufferListsToOpen+0x123
0d (Inline Function) ` NDIS!ndisMDispatchReceiveNetBufferListsInternal+0x27e
0e fffff803`7df68950 fffff800`600136b2 NDIS!ndisMTopReceiveNetBufferLists+0x2c9
0f (Inline Function) ` NDIS!ndisIterativeDPInvokeHandlerOnTracker+0x2d3
10 (Inline Function) ` NDIS!ndisInvokeNextReceiveHandler+0x64d
11 (Inline Function) ` NDIS!ndisMIndicateReceiveNetBufferListsInternal+0x6a2
12 fffff803`7df689e0 fffff800`6091963e NDIS!NdisMIndicateReceiveNetBufferLists+0x732
13 fffff803`7df68bd0 fffff800`60918aea vmswitch!VmsExtMpIndicatePackets+0x96
14 fffff803`7df68c10 fffff800`60017f81 vmswitch!VmsExtMpSendNetBufferLists+0x47a
15 (Inline Function) ` NDIS!ndisMSendNBLToMiniportInternal+0xca
16 (Inline Function) ` NDIS!ndisMSendNBLToMiniport+0xca
17 (Inline Function) ` NDIS!ndisCallSendHandler+0x24d
18 (Inline Function) ` NDIS!ndisIterativeDPInvokeHandlerOnTracker+0x27c
19 (Inline Function) ` NDIS!ndisInvokeNextSendHandler+0x417
1a (Inline Function) ` NDIS!ndisSendNBLToFilter+0x497
1b (Inline Function) ` NDIS!ndisMTopSendNetBufferLists+0x4a5
1c fffff803`7df68da0 fffff800`6091e347 NDIS!NdisSendNetBufferLists+0x551
1d fffff803`7df68f90 fffff800`6091de14 vmswitch!VmsExtPtRouteNetBufferLists+0x377
1e fffff803`7df69060 fffff800`60012a53 vmswitch!VmsPtNicReceiveNetBufferLists+0x3c4
1f fffff803`7df691c0 fffff800`60012f19 NDIS!ndisMIndicateNetBufferListsToOpen+0x123
20 (Inline Function) ` NDIS!ndisMDispatchReceiveNetBufferListsInternal+0x27e
21 fffff803`7df69280 fffff800`600136b2 NDIS!ndisMTopReceiveNetBufferLists+0x2c9
22 (Inline Function) ` NDIS!ndisIterativeDPInvokeHandlerOnTracker+0x2d3
23 (Inline Function) ` NDIS!ndisInvokeNextReceiveHandler+0x64d
24 (Inline Function) ` NDIS!ndisMIndicateReceiveNetBufferListsInternal+0x6a2
25 fffff803`7df69310 fffff800`61a0f814 NDIS!NdisMIndicateReceiveNetBufferLists+0x732
26 fffff803`7df69500 fffff800`61a0f23e NdisImPlatform!implatTryToIndicateReceiveNBLs+0x1e8
27 fffff803`7df69570 fffff800`60012a53 NdisImPlatform!implatReceiveNetBufferLists+0x1a2
28 fffff803`7df695f0 fffff800`60012f19 NDIS!ndisMIndicateNetBufferListsToOpen+0x123
29 (Inline Function) ` NDIS!ndisMDispatchReceiveNetBufferListsInternal+0x27e
2a fffff803`7df696b0 fffff800`60013094 NDIS!ndisMTopReceiveNetBufferLists+0x2c9
2b (Inline Function) ` NDIS!ndisInvokeNextReceiveHandler+0x2f
2c (Inline Function) ` NDIS!ndisMIndicateReceiveNetBufferListsInternal+0x84
2d fffff803`7df69740 fffff800`606251c4 NDIS!NdisMIndicateReceiveNetBufferLists+0x114
2e fffff803`7df69930 fffff800`60625a9d e1i63x64!RECEIVE::RxIndicateNBLs+0xd4
2f fffff803`7df69970 fffff800`60618150 e1i63x64!RECEIVE::RxProcessInterrupts+0x19d
30 fffff803`7df699f0 fffff800`6061857e e1i63x64!INTERRUPT::MsgIntDpcTxRxProcessing+0x1c0
31 fffff803`7df69a60 fffff800`60617b78 e1i63x64!INTERRUPT::MsgIntMessageInterruptDPC+0x13e
32 fffff803`7df69ac0 fffff800`60014e02 e1i63x64!INTERRUPT::MiniportMessageInterruptDPC+0x28
33 (Inline Function) ` NDIS!ndisMiniportDpc+0x110
34 fffff803`7df69b00 fffff803`7c342cd0 NDIS!ndisInterruptDpc+0x1a3
35 fffff803`7df69be0 fffff803`7c341f87 nt!KiExecuteAllDpcs+0x1b0
36 fffff803`7df69d30 fffff803`7c3cbad5 nt!KiRetireDpcList+0xd7
37 fffff803`7df69fb0 fffff803`7c3cb8d9 nt!KyRetireDpcList+0x5
38 ffffd001`e478aa10 fffff803`7c3cd9fa nt!KiDispatchInterruptContinue
39 ffffd001`e478aa40 fffff803`7c343cd3 nt!KiDpcInterrupt+0xca
3a (Inline Function) ` nt!KzLowerIrql+0x9
3b ffffd001`e478abd0 fffff800`608b7d4b nt!KeInsertQueueDpc+0x1e3
3c (Inline Function) ` vmbkmclr!InpReleaseLockAndPerformWork+0xe8
3d ffffd001`e478ac50 fffff800`608b6a90 vmbkmclr!InpTransitionRunningQueue+0x17b
3e ffffd001`e478ac90 fffff800`60a1daaf vmbkmclr!InpProcessingWorkerRoutine+0xf0
3f (Inline Function) ` vmbusr!AwRunWorkItem+0x29
40 ffffd001`e478ace0 fffff803`7c379c70 vmbusr!AwWorkerThread+0xbf
41 ffffd001`e478ad40 fffff803`7c3cefc6 nt!PspSystemThreadStartup+0x58
42 ffffd001`e478ada0 00000000`00000000 nt!KxStartSystemThread+0x16
There are several threads on the CPU0 ready to run
Processor 0: Ready Threads at priority 15
THREAD ffffe8006e2d2080 Cid 0c08.2894 Teb: 00007ff7ac976000 Win32Thread: 0000000000000000 READY on processor 0
THREAD ffffe0014e53f880 Cid 0c08.0d58 Teb: 00007ff7ac978000 Win32Thread: 0000000000000000 READY on processor 0
THREAD ffffe8006df75880 Cid 0c08.247c Teb: 00007ff7ac972000 Win32Thread: fffff901407ac010 READY on processor 0
THREAD ffffe8006bd24880 Cid 0c08.177c Teb: 00007ff7ac96a000 Win32Thread: 0000000000000000 READY on processor 0
THREAD ffffe00148889880 Cid 0004.0dc8 Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
THREAD ffffe8006a321880 Cid 0820.1e64 Teb: 00007ff671f88000 Win32Thread: fffff901406c4b60 READY on processor 0
THREAD ffffe00150278040 Cid 0004.045c Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
THREAD ffffe0014d98e300 Cid 0004.2160 Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
THREAD ffffe8006e65b880 Cid 0004.1b00 Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
I see a clussvc thread has been sitting in the READY state on CPU0 for almost 58 seconds. It is possible that this thread eventually was supposed to send the heartbeat.
THREAD ffffe0014d98e300 Cid 0004.2160 Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
Not impersonating
DeviceMap ffffc000c360dca0
Owning Process ffffe001463c3900 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 52755922 Ticks: 3764 (0:00:00:58.812)
Context Switch Count 56741 IdealProcessor: 0
UserTime 00:00:00.000
KernelTime 00:00:01.109
Win32 Start Address nt!ExpWorkerThread (0xfffff8037c314100)
Stack Init ffffd001eb77efd0 Current ffffd001eb77ebc0
Base ffffd001eb77f000 Limit ffffd001eb779000 Call 0
Priority 15 BasePriority 7 UnusualBoost 8 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd001`eb77ec00 fffff803`7c29fe9b nt!KiSwapContext+0x76
(Inline Function) ` nt!KzCheckForThreadDispatch+0x134 (Inline Function @ fffff803`7c29fe9b)
ffffd001`eb77ed40 fffff803`7c29fb7b nt!KiCheckForThreadDispatch+0x153
ffffd001`eb77ed80 fffff803`7c29f98d nt!KeSetSystemGroupAffinityThread+0xfb
ffffd001`eb77edd0 fffff803`7c2f5a4b nt!KeGenericProcessorCallback+0xdd
ffffd001`eb77ef40 fffff803`7c3cc2f7 nt!KeGenericCallDpc+0x27
ffffd001`eb77ef80 fffff803`7c3cc2bd nt!KySwitchKernelStackCallout+0x27 (TrapFrame @ ffffd001`eb77ee40)
ffffd001`eb8f97f0 fffff803`7c2b6a7d nt!KiSwitchKernelStackContinue
ffffd001`eb8f9810 fffff803`7c3024ab nt!KeExpandKernelStackAndCalloutInternal+0x2fd
ffffd001`eb8f9900 fffff803`7c32634b nt!MiSwapStackPage+0x2d7
ffffd001`eb8f99d0 fffff803`7c304cee nt!MiClaimPhysicalRun+0x44f
ffffd001`eb8f9a50 fffff803`7c3043cd nt!MiFindContiguousPages+0x282
ffffd001`eb8f9bb0 fffff803`7c723a8c nt!MiRebuildLargePage+0x99
ffffd001`eb8f9c40 fffff803`7c31438c nt!MiRebuildLargePages+0x88
ffffd001`eb8f9c90 fffff803`7c379c70 nt!ExpWorkerThread+0x28c
ffffd001`eb8f9d40 fffff803`7c3cefc6 nt!PspSystemThreadStartup+0x58
ffffd001`eb8f9da0 00000000`00000000 nt!KxStartSystemThread+0x16
Because of DPC storm on CPU0 that clussvc did not send to netft heartbeat for 1 minute and netft finally bugchecked the machine.
I would be curios to learn what scenario are you running that leads to that.
As a remediation I see several options
- Increase ClussvcHangTimeout (cluster public property) to a value above “Cumulative DPC Time Limit”. You can set it to 135 (2 minutes 15 seconds). In that case either machine survives or it will be bugchecked by DPC watchdog, in any case it might be better than 9e from netft,sys.
- Look at you NIC settings. Looks like you are using 4 “Intel(R) Gigabit ET Quad Port Server Adapter” hooked to VMswitch and 3 “Broadcom BCM5709C NetXtreme II GigE” available for the host. Perhaps you can tune up how traffic from these NICs is load balanced across CPUs using RSS (Receive Side Scaling) and VMQ. Please also check that you have latest and greatest drivers for these NICs.
- I see you are using Windows 2012 R2. Please make sure you have latest fixes: https://support.microsoft.com/kb/2920151?wa=wsignin1.0.
I would second Elden’s advise to contact Microsoft support for this case. You should share with them your dump, and you are welcome to share analysis above.
Regards, Vladimir Petter, Microsoft Corporation
Wednesday, August 26, 2015 8:25 AM
Hello Vladimir,
it seems that we are having a very similar problem with a new installation at customer site. Maybe you can help us locating what the Problem is?
You can find the latest dump file here: https://www.dropbox.com/s/i6m0ic49epbxk6g/MEMORY.zip?dl=0
There is a 2012 R2 Cluster running on a DataCore SANsymphonyV virtual SAN. Once we start to initialize new virtual disks the cluster crashes down.
Would be great if you could help us, because the System will not go productive until the problem is fixed...
Thanks a lot,
Martin
Wednesday, August 26, 2015 7:20 PM
Hello Martin,
Netft bugchecked machine because RHS.exe was not able to complete termination in 20 minutes. One of the threads of that process is stuck in kernel waiting for an IO to complete by the storage.
I would suggest to share that dump with support of folks who implemented DcsPoll.sys. Or see if they have any updates.
Loaded symbol image file: DcsPoll.sys
Image path: \SystemRoot\System32\drivers\DcsPoll.sys
Image name: DcsPoll.sys
Timestamp: Mon Aug 10 11:26:39 2015 (55C8ECDF)
CheckSum: 00013D53
ImageSize: 00016000
File version: 15.0.300.5312
Product version: 15.0.300.5312
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: DataCore Software Corporation
ProductName: DcsPoll.sys
InternalName: DcsPoll.sys
OriginalFilename: DcsPoll.sys
ProductVersion: 15.0.300.5312
FileVersion: 15.0.300.5312
FileDescription: DcsPoll.sys
LegalCopyright: Copyright © 1998-2015 DataCore Software Corporation. All Rights Reserved.
Comments: All Rights Reserved.
System Uptime: 4 days 2:58:57.605, and this thread is doing some busy loop.
THREAD ffffe000e1174880 Cid 0004.0248 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 2e
Not impersonating
DeviceMap ffffc0015500c0b0
Owning Process ffffe000e10b05c0 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 22805606 Ticks: 0
Context Switch Count 1196804 IdealProcessor: 44
UserTime 00:00:00.000
KernelTime 4 Days 02:06:17.359
*** ERROR: Symbol file could not be found. Defaulted to export symbols for DcsPoll.sys -
Win32 Start Address DcsPoll (0xfffff8013fa85504)
Stack Init ffffd00023569c90 Current ffffd00023569810
Base ffffd0002356a000 Limit ffffd00023564000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`23569b20 fffff801`3fa856a0 DcsPoll+0x5b2d
ffffd000`23569bc0 fffff803`c931536c DcsPoll+0x66a0
ffffd000`23569c00 fffff803`c936c2c6 nt!PspSystemThreadStartup+0x58@ 5906]
ffffd000`23569c60 00000000`00000000 nt!KxStartSystemThread+0x16
I see they are also busy spinning on the 3 other CPUs
THREAD ffffe000e3dd1380 Cid 0004.0644 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 4
Not impersonating
DeviceMap ffffc0015500c0b0
Owning Process ffffe000e10b05c0 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 22805606 Ticks: 0
Context Switch Count 37419169 IdealProcessor: 4
UserTime 00:00:00.000
KernelTime 00:23:29.843
Win32 Start Address DcsPool (0xfffff80140a71d44)
Stack Init ffffd0002118fc90 Current ffffd0002118f890
Base ffffd00021190000 Limit ffffd0002118a000 Call 0
Priority 9 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`2118f920 fffff801`40a90462 DcsPool+0xe40a
ffffd000`2118fb20 fffff801`40a903ed DcsPool+0x23462
ffffd000`2118fb60 fffff801`40a9cd9e DcsPool+0x233ed
ffffd000`2118fb90 fffff801`40a71dde DcsPool+0x2fd9e
ffffd000`2118fbc0 fffff803`c931536c DcsPool+0x4dde
ffffd000`2118fc00 fffff803`c936c2c6 nt!PspSystemThreadStartup+0x58
ffffd000`2118fc60 00000000`00000000 nt!KxStartSystemThread+0x16
THREAD ffffe8008628a040 Cid 0004.26f0 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 10
Not impersonating
DeviceMap ffffc0015500c0b0
Owning Process ffffe000e10b05c0 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 22805606 Ticks: 0
Context Switch Count 2805765 IdealProcessor: 16
UserTime 00:00:00.000
KernelTime 00:19:47.625
Win32 Start Address DcsFcEng (0xfffff8013f609cf4)
Stack Init ffffd0002b121c90 Current ffffd0002b121810
Base ffffd0002b122000 Limit ffffd0002b11c000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`2b121968 fffff801`3fa6f6a4 DcsSup+0x13eb
ffffd000`2b121970 fffff801`3f60a3ce DcsSup!DcsSup::memset+0x48
ffffd000`2b1219a0 fffff801`3f60a208 DcsFcEng+0xa3ce
ffffd000`2b121a40 fffff801`3f607a6c DcsFcEng+0xa208
ffffd000`2b121ad0 fffff801`3f607ead DcsFcEng+0x7a6c
ffffd000`2b121b00 fffff801`3f609c11 DcsFcEng+0x7ead
ffffd000`2b121b40 fffff801`3f609cfd DcsFcEng+0x9c11
ffffd000`2b121bd0 fffff803`c931536c DcsFcEng+0x9cfd
ffffd000`2b121c00 fffff803`c936c2c6 nt!PspSystemThreadStartup+0x58
ffffd000`2b121c60 00000000`00000000 nt!KxStartSystemThread+0x16
THREAD ffffe000e1174040 Cid 0004.0244 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 2c
Not impersonating
DeviceMap ffffc0015500c0b0
Owning Process ffffe000e10b05c0 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 22805606 Ticks: 0
Context Switch Count 767536 IdealProcessor: 16
UserTime 00:00:00.000
KernelTime 4 Days 02:41:57.718
Win32 Start Address DcsPoll (0xfffff8013fa85504)
Stack Init ffffd000269e2c90 Current ffffd000269e26f0
Base ffffd000269e3000 Limit ffffd000269dd000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`269e2970 fffff801`40db3264 DcsIs+0x1d4ba
ffffd000`269e29a0 fffff801`414d4c33 DcsIs+0x1d264
ffffd000`269e29d0 fffff801`3fb815aa DcsiMgr+0x20c33
ffffd000`269e2a10 fffff801`3f621150 DcsShim+0xa5aa
ffffd000`269e2a80 fffff801`3f61d82a DcsFcEng+0x21150
ffffd000`269e2ac0 fffff801`3f60ed11 DcsFcEng+0x1d82a
ffffd000`269e2af0 fffff801`3fa84b71 DcsFcEng+0xed11
ffffd000`269e2b20 fffff801`3fa856a0 DcsPoll+0x5b71
ffffd000`269e2bc0 fffff803`c931536c DcsPoll+0x66a0
ffffd000`269e2c00 fffff803`c936c2c6 nt!PspSystemThreadStartup+0x58
ffffd000`269e2c60 00000000`00000000 nt!KxStartSystemThread+0x16
In this dump I see 3 IOs outstanding to disks
DO ffffe80085c2a4a0 Ext ffffe80085c2a5f0 Adapter ffffe000e48b31a0 Working
Vendor: DataCore Product: Mirror Disk SCSI ID: (0, 3, 1)
Claimed Enumerated
SlowLock Free RemLock 2 PageCount 0
QueueTagList: ffffe80085c2a6b0 Outstanding: Head ffffe000e4ff0050 Tail ffffe000e4ff0050 Timeout 50
DeviceQueue ffffe80085c2a6e0 Depth: 250 Status: Not Frozen PauseCount: 0 BusyCount: 0
IO Gateway: Busy Count 0 Pause Count 0
Requests: Outstanding 1 Device 0 ByPass 0
[Device-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Bypass-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Outstanding Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
ffffe80084c69350 [SCSI] ffffe800850bd220 ffffe000e4ff0020 SCSI/UNMAP ffffe80084222d00 0000000000000000 50
[Completed Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
DO ffffe800851d1480 Ext ffffe800851d15d0 Adapter ffffe000e48b31a0 Working
Vendor: DataCore Product: Virtual Disk SCSI ID: (0, 0, 1)
Claimed Enumerated
SlowLock Free RemLock 2 PageCount 0
QueueTagList: ffffe800851d1690 Outstanding: Head ffffe000e53f1c10 Tail ffffe000e53f1c10 Timeout 50
DeviceQueue ffffe800851d16c0 Depth: 250 Status: Not Frozen PauseCount: 0 BusyCount: 0
IO Gateway: Busy Count 0 Pause Count 0
Requests: Outstanding 1 Device 0 ByPass 0
[Device-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Bypass-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Outstanding Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
ffffe80085c142f0 [SCSI] ffffe80083f7dec0 ffffe000e53f1be0 **SCSI/UNMAP ** ffffe80085d7b750 0000000000000000 50
[Completed Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
DO ffffe80086beb060 Ext ffffe80086beb1b0 Adapter ffffe000e48b31a0 Working
Vendor: DataCore Product: Mirror Disk SCSI ID: (0, 3, 2)
Claimed Enumerated
SlowLock Free RemLock 2 PageCount 0
QueueTagList: ffffe80086beb270 Outstanding: Head ffffe000e4ff7050 Tail ffffe000e4ff7050 Timeout 50
DeviceQueue ffffe80086beb2a0 Depth: 250 Status: Not Frozen PauseCount: 0 BusyCount: 0
IO Gateway: Busy Count 0 Pause Count 0
Requests: Outstanding 1 Device 0 ByPass 0
[Device-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Bypass-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Outstanding Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
ffffe000e1392ee0 [SCSI] ffffe80084579890 ffffe000e4ff7020 **SCSI/UNMAP ** ffffe000edf20360 0000000000000000 50
[Completed Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
DO ffffe80089d6c7f0 Ext ffffe80089d6c940 Adapter ffffe000e48b31a0 Working
Vendor: DataCore Product: Virtual Disk SCSI ID: (0, 1, 0)
Claimed Enumerated
SlowLock Free RemLock 2 PageCount 0
QueueTagList: ffffe80089d6ca00 Outstanding: Head ffffe000e53f8c10 Tail ffffe000e53f8c10 Timeout 50
DeviceQueue ffffe80089d6ca30 Depth: 250 Status: Not Frozen PauseCount: 0 BusyCount: 0
IO Gateway: Busy Count 0 Pause Count 0
Requests: Outstanding 1 Device 0 ByPass 0
[Device-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Bypass-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Outstanding Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
ffffe800864be010 [SCSI] ffffe800856d2df0 ffffe000e53f8be0 **SCSI/UNMAP ** ffffe80084b7fa10 0000000000000000 50
[Completed Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
Since this is scsi/unmap my guess this is some solution that provides SSD/NVME based cache.
Regards, Vladimir Petter, Microsoft Corporation
Wednesday, September 9, 2015 3:41 PM
Hello Vladimir,
Could you please help in reviewing memory dump uploaded at below link?
https://drive.google.com/file/d/0B1Z6Q5Mfd7nid2lDWGJKLVZDWWs/view?usp=sharing
I have 2 node windows 2012 R2 active/passive cluster setup on Hyper-V. cluster nodes generate crash dump with bug check 09e very frequently.
Thanks & Regards,
Suchit Patil
Wednesday, September 9, 2015 6:56 PM
Hello Suchit,
Cluster bugchecked machine because Resource Host Monitor has not completed termination in 20 minutes. One of the RHS threads is stuck in the kernel for about 20 minutes. Looks like things are getting stuck in TmXPFlt.sys.
As a remediation you might want to uninstall this product until issue is resolved. I would also suggest to talk to support of the company that provided that solution to see if they have a fix and to make sure they are aware of that issue.
I see lots of threads in the system are stuck with a similar call stack.
Loaded symbol image file: TmXPFlt.sys
Image path: \?\C:\Program Files (x86)\Trend Micro\OfficeScan Client\TmXPFlt.sys
Image name: TmXPFlt.sys
Timestamp: Sat Aug 30 06:11:38 2014 (5401CD8A)
CheckSum: 0005DDB6
ImageSize: 0006C000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
THREAD fffffa806e2d6080 Cid 0d94.0f6c Teb: 000007f7a0c6e000 Win32Thread: fffff90102e3ab80 WAIT: (Executive) KernelMode Non-Alertable
fffff88007394440 SynchronizationEvent
IRP List:
fffffa8033b24010: (0006,03e8) Flags: 00000884 Mdl: 00000000
Not impersonating
DeviceMap fffff8a00000c310
Owning Process fffffa8032dd9980 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 750939 Ticks: 76757 (0:00:19:59.328)
Context Switch Count 378 IdealProcessor: 5
UserTime 00:00:00.015
KernelTime 00:00:00.015
Win32 Start Address 0x000007f7a13cbc24
Stack Init fffff88007395c90 Current fffff88007394190
Base fffff88007396000 Limit fffff88007390000 Call 0
Priority 14 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
fffff880`073941d0 fffff800`342aff79 nt!KiSwapContext+0x76
(Inline Function) ` nt!KiSwapThread+0xfa (Inline Function @ fffff800`342aff79)
fffff880`07394310 fffff800`342ac21f nt!KiCommitThreadWait+0x229
fffff880`07394380 fffff880`05050457 nt!KeWaitForSingleObject+0x1cf
fffff880`07394410 fffff880`050460df TmXPFlt+0xe457
fffff880`07394470 fffff880`04384df5 TmXPFlt+0x40df
fffff880`07394590 fffff880`016ae844 TmPreFlt!TmpQueryFullName+0xd61
fffff880`07394660 fffff880`016afa6c fltmgr!FltpPerformPreCallbacks+0x324
fffff880`07394770 fffff880`016da349 fltmgr!FltpPassThroughInternal+0x8c
fffff880`073947a0 fffff800`34655228 fltmgr!FltpCreate+0x339
(Inline Function) ` nt!IoCallDriverWithTracing+0xc3 (Inline Function @ fffff800`34655228)
fffff880`07394850 fffff800`34668470 nt!IopParseDevice+0x173c
fffff880`07394a30 fffff800`34656978 nt!ObpLookupObjectName+0x644
fffff880`07394b40 fffff800`3466930e nt!ObOpenObjectByName+0x258
fffff880`07394c10 fffff800`3463f96c nt!IopCreateFile+0x37c
fffff880`07394cb0 fffff800`34284d53 nt!NtOpenFile+0x58
fffff880`07394d40 fffff800`34289f30 nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`07394db0)
fffff880`07394f48 fffff800`34626a68 nt!KiServiceLinkage
fffff880`07394f50 fffff800`34284d53 nt!NtCreateUserProcess+0x400
fffff880`07395a90 000007fb`572a371b nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`07395b00)
000000a4`76ced028 00000000`00000000 0x000007fb`572a371b
I’ve also noticed several threads where TmXPFlt is trying to open a file over SMB. Perhaps all other activity is stuck behind these activities, but it is hard to tell without symbols.
THREAD fffffa806e078080 Cid 0004.0c9c Teb: 0000000000000000 Win32Thread: 0000000000000000 WAIT: (Executive) KernelMode Non-Alertable
fffffa803444e190 SynchronizationEvent
IRP List:
fffffa806f440010: (0006,01f0) Flags: 00000884 Mdl: 00000000
Impersonation token: fffff8a00dc72270 (Level Impersonation)
DeviceMap fffff8a00e5514b0
Owning Process fffffa8030bc9980 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 728673 Ticks: 99023 (0:00:25:47.234)
Context Switch Count 42000 IdealProcessor: 7
UserTime 00:00:00.000
KernelTime 00:00:40.156
Win32 Start Address TmXPFlt (0xfffff8800504dddc)
Stack Init fffff88009395fd0 Current fffff88009395b80
Base fffff88009396000 Limit fffff88009390000 Call 0
Priority 12 BasePriority 8 UnusualBoost 3 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
fffff880`09395bc0 fffff800`342aff79 nt!KiSwapContext+0x76
(Inline Function) ` nt!KiSwapThread+0xfa (Inline Function @ fffff800`342aff79)
fffff880`09395d00 fffff800`342ac21f nt!KiCommitThreadWait+0x229
fffff880`09395d70 fffff880`056483bb nt!KeWaitForSingleObject+0x1cf
fffff880`09395e00 fffff880`0563ffde mrxsmb10!SmbCeInitiateExchange+0x30f
fffff880`09395e70 fffff880`043a40db mrxsmb10!MRxSmbCreate+0x8d6
fffff880`09395f50 fffff800`342804a7 mrxsmb!SmbpShellCreateWithNewStack+0x1b
fffff880`09395f80 fffff800`3428046d nt!KySwitchKernelStackCallout+0x27 (TrapFrame @ fffff880`09395e40)
fffff880`0664b880 fffff800`342c786e nt!KiSwitchKernelStackContinue
fffff880`0664b8a0 fffff800`34243fc5 nt!KeExpandKernelStackAndCalloutInternal+0x20e
fffff880`0664b9a0 fffff880`043a40aa nt!KeExpandKernelStackAndCallout+0x15
fffff880`0664b9e0 fffff880`01ba8620 mrxsmb!SmbShellCreate+0x4a
fffff880`0664ba10 fffff880`01ba547d rdbss!RxCollapseOrCreateSrvOpen+0x210
fffff880`0664baa0 fffff880`01ba69ab rdbss!RxCreateFromNetRoot+0x63d
fffff880`0664bbd0 fffff880`01b6e652 rdbss!RxCommonCreate+0x15b
fffff880`0664bc70 fffff880`01ba059b rdbss!RxFsdCommonDispatch+0x522
fffff880`0664bdd0 fffff880`043d209c rdbss!RxFsdDispatch+0xcb
fffff880`0664be30 fffff880`01f37161 mrxsmb!MRxSmbFsdDispatch+0x8c
fffff880`0664be70 fffff880`01f34215 mup!MupiCallUncProvider+0x1b1
fffff880`0664bee0 fffff880`01f32475 mup!MupStateMachine+0xb6
fffff880`0664bf10 fffff880`016b04ee mup!MupCreate+0x165
fffff880`0664bf80 fffff880`016da35d fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x25e
fffff880`0664c020 fffff800`34655228 fltmgr!FltpCreate+0x34d
(Inline Function) ` nt!IoCallDriverWithTracing+0xc3 (Inline Function @ fffff800`34655228)
fffff880`0664c0d0 fffff800`34668470 nt!IopParseDevice+0x173c
fffff880`0664c2b0 fffff800`34656978 nt!ObpLookupObjectName+0x644
fffff880`0664c3c0 fffff800`3466930e nt!ObOpenObjectByName+0x258
fffff880`0664c490 fffff800`34669a59 nt!IopCreateFile+0x37c
fffff880`0664c530 fffff800`34284d53 nt!NtCreateFile+0x79 fffff880`0664c5c0 fffff800`34289f30 nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`0664c630) fffff880`0664c7c8 fffff880`04fb1651 nt!KiServiceLinkage
fffff880`0664c7d0 fffff880`04fb243a VSApiNt!VSSwapShortTable+0x721
fffff880`0664c840 fffff880`05049d16 VSApiNt!VSKDZwCreateFile+0x5a
fffff880`0664c8b0 fffff880`0504c1b9 TmXPFlt+0x7d16
fffff880`0664c980 fffff880`0504ce6e TmXPFlt+0xa1b9
fffff880`0664c9e0 fffff880`0504da7f TmXPFlt+0xae6e
fffff880`0664cb20 fffff880`0504def1 TmXPFlt+0xba7f
fffff880`0664cbe0 fffff800`3422f2c5 TmXPFlt+0xbef1
fffff880`0664cc10 fffff800`3426c656 nt!PspSystemThreadStartup+0x59 [d:\win8_ldr\minkernel\ntos\ps\psexec.c @ 5691]
fffff880`0664cc60 00000000`00000000 nt!KxStartSystemThread+0x16 [d:\win8_ldr\minkernel\ntos\ke\amd64\threadbg.asm @ 75]
Loaded symbol image file: VSApiNt.sys
Image path: \?\C:\Program Files (x86)\Trend Micro\OfficeScan Client\VSApiNt.sys
Image name: VSApiNt.sys
Timestamp: Sat Aug 30 06:03:46 2014 (5401CBB2)
CheckSum: 0024476C
ImageSize: 00238000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Here is a list of all opens that are stack over SMB.
RxContext RDR [ Maj, Min] Irp Thread FCB
fffffa8032dd4bb0 0 [ 0x 0, 0x 0] fffffa806e7df010 fffffa806eea9440 0000000000000000
16:08.471 CREATE '\HMEL-BTH-DC03.hmel.int\IPC$'
fffffa8034749950 0 [ 0x 0, 0x 0] fffffa806f624d90 fffffa80342c4b00 fffff88001b998c0
13:29.967 CREATE '<<empty>>'
fffffa8033ce44b0 0 [ 0x 0, 0x 0] fffffa806f130d10 fffffa80338bbb00 fffff8a00e5bf010
25:47.248 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-18\F\0E4\F0E43290E239950FABB7730FEA0B4421.DVS'
fffffa8033ee15e0 0 [ 0x 0, 0x 0] fffffa8033f27400 fffffa806f4a0900 fffff8a00ee432a0
25:47.248 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\05-07\6\125\6125F1071BA45DE8BA67A9D1E7004ED1~90~9F3EAD6D~00~1.DVSSP'
fffffa8034459200 0 [ 0x 0, 0x 0] fffffa806ef81be0 fffffa803413cb00 fffff8a00d5d4670
25:47.247 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-18\F\0E4\F0E4B8A43ECF2FB81443FFE354A7A931.DVS'
fffffa8033ac7950 2 [ 0x e, 0x 0] fffffa8032de64f0 fffffa8033896080 fffff8a00f667610
76:14.999 IOCTL '\2'
fffffa8031f94010 2 [ 0x e, 0x 0] fffffa80335c2010 fffffa803216b600 fffff8a00f667610
44:46.553 IOCTL '\2'
fffffa80335e05a0 0 [ 0x 0, 0x 0] fffffa803453ec20 fffffa8033ff5080 fffff8a00daac010
25:47.250 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-16\F\051\F0516C6C8D4D24CED66C01341EBC0F71.DVS'
fffffa8033b59610 0 [ 0x 0, 0x 0] fffffa80342b9600 fffffa806f8af5c0 fffff8a0118532a0
25:47.248 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\08-18\6\11D\611D856FB14A3D5416A61EF0D7116911~0F~C97B4131~00~1.DVSSP'
fffffa8033c93240 0 [ 0x 0, 0x 0] fffffa8033b2c580 fffffa8034381b00 fffff8a00da1d600
25:47.248 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2014\07-17\6\0A5\60A5BB94AFB6B48F2B15E53045337701~35~1FD28490~00~1.DVSSP'
fffffa806ef187f0 0 [ 0x 0, 0x 0] fffffa80340a4630 fffffa806e0c0080 fffff8a010c947e0
25:46.524 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\05-17\D\06B\D06B43ABD3EEB44CA7CB2FE2CAB27721~39~6A552458~00~1.DVSSP'
fffffa80336269a0 0 [ 0x 0, 0x 0] fffffa8033528780 fffffa806e0fa080 fffff8a012ccf010
25:46.499 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\03-05\3\03B\303B66B5ACE86D5696529DF90977A8F1~6D~5FD6F55D~00~1.DVSSP'
fffffa8034749cb0 0 [ 0x 0, 0x 0] fffffa806f030750 fffffa806f53e080 fffff88001b998c0
13:29.967 CREATE '<<empty>>'
fffffa806f35fc20 0 [ 0x 0, 0x 0] fffffa80343ced10 fffffa803417fb00 fffff8a00d22e350
25:47.247 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\08-18\6\11D\611D8ED60F35534A9D9860B16528A501~C4~46589CF8~00~1.DVSSP'
fffffa803444e010 0 [ 0x 0, 0x 0] fffffa806f440010 fffffa806e078080 fffff8a00dd3e2f0
25:47.241 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\08-18\6\11D\611D8CD7E12525CA7EE50328316C7AF1~85~6174E8BD~00~1.DVSSP'
fffffa8034151010 0 [ 0x 0, 0x 0] fffffa8034366690 fffffa806e0fab00 fffff8a00d89d8e0
25:47.234 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-18\F\0E4\F0E4B2D443D4F8D070887D83728C6411.DVS'
fffffa8033fe7cb0 0 [ 0x 0, 0x 0] fffffa8033bf2d80 fffffa806e031b00 fffff8a00d66b500
25:47.234 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\08-18\6\11D\611D83CE4F080D152AB519841E0F9551.DVS'
fffffa806e9acb30 0 [ 0x 0, 0x 0] fffffa8033468940 fffffa806e0bfb00 fffff8a00e6bf010
25:47.234 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\08-18\6\11D\611D8585CAAFD30258F5F9204E8B8F21.DVS'
fffffa806f214cb0 0 [ 0x 0, 0x 0] fffffa8033e719a0 fffffa806f56e080 fffff8a012de3010
25:46.500 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\06-15\5\048\50488155ACE08770781A75BBD1F269C1~29~B78492F0~00~1.DVSSP'
fffffa8034747cb0 0 [ 0x 0, 0x 0] fffffa806f567380 fffffa806ebda480 fffff88001b998c0
13:29.967 CREATE '<<empty>>'
fffffa80346e2010 0 [ 0x 0, 0x 0] fffffa8033c48730 fffffa803424ca80 fffff88001b998c0
13:29.967 CREATE '<<empty>>'
fffffa80349fd310 0 [ 0x 0, 0x 0] fffffa8033d55b00 fffffa8033dbd100 fffff88001b998c0
3:29.963 CREATE '<<empty>>'
fffffa803493e010 0 [ 0x 0, 0x 0] fffffa8033c3c010 fffffa80341a1b00 fffff88001b998c0
3:29.962 CREATE '<<empty>>'
fffffa806f6fe010 0 [ 0x 0, 0x 0] fffffa806f32b680 fffffa806e0bdb00 fffff8a010d06730
25:47.234 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-18\F\0E9\F0E9001E013394D9C07EF02330BFB911.DVS'
fffffa806ec38010 0 [ 0x 0, 0x 0] fffffa806f07e700 fffffa806f366b00 fffff8a012ca2a80
25:47.225 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-18\F\0E7\F0E756057B9D6D2ABECB8E13E3415CC1.DVS'
fffffa806ee48230 0 [ 0x 0, 0x 0] fffffa806f132010 fffffa806e0be6c0 fffff8a01242a010
25:47.014 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2014\12-20\D\0C2\D0C292F3FB7A73F70208526C10EAF491.DVS'
fffffa806f78e9a0 0 [ 0x 0, 0x 0] fffffa806e8e12c0 fffffa8034337b00 fffff8a004aea010
25:46.501 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\05-17\C\0E1\C0E1AAE496323E417F8B4BEFFAAE1FB1~D5~E770E121~00~1.DVSSP'
fffffa806eb5a450 0 [ 0x 0, 0x 0] fffffa806ef3b6b0 fffffa806ee98b00 fffff88001b998c0
13:29.967 CREATE '<<empty>>'
fffffa806f5f87f0 0 [ 0x 0, 0x 0] fffffa806f677010 fffffa806e0bf080 fffff8a00ffa4a60
25:47.190 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP02\2015\05-29\5\0BC\50BCEB2E36C8C4FABB47EC3453CB13B1~F3~00A34DF4~00~1.DVSSP'
fffffa806f1d9770 0 [ 0x 0, 0x 0] fffffa806f46d390 fffffa806f048080 fffff8a01282a010
25:47.249 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\01-16\1\124\1124F16CCD8694D455954CAABDF10111~97~5E195B14~00~1.DVSSP'
fffffa806f71ecb0 0 [ 0x 0, 0x 0] fffffa806f543370 fffffa806f5cb080 fffff8a012705a80
25:47.248 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-15\1\00F\100F697A6B99B08748C65EBD6A56BC21.DVS'
fffffa806f703900 0 [ 0x 0, 0x 0] fffffa806f742010 fffffa806e0c06c0 fffff8a012b51380
25:47.221 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-13\F\011\F0116842118398CEE7462D0AE65D7601.DVS'
fffffa806eeee780 0 [ 0x 0, 0x 0] fffffa80345d6a10 fffffa806f38b300 fffff88001b998c0
3:29.962 CREATE '<<empty>>'
fffffa806f529190 0 [ 0x 0, 0x 0] fffffa806f7f8320 fffffa806e0bab00 fffff8a012b145b0
25:47.249 CREATE '\Hmelbthdd\bth-evmjavsp01'
fffffa806eb4b910 0 [ 0x 0, 0x 0] fffffa8034263e10 fffffa803438e080 fffff8a010b89a80
25:47.027 CREATE '\Hmelbthdd\bth-evmjavsp01\EVMJAVSP01\2015\08-16\F\054\F054CC18A0FC36B2B94C5D416455D4B1.DVS'
fffffa803415c010 0 [ 0x 0, 0x 0] fffffa806f800510 fffffa806f267680 fffff88001b998c0
13:29.967 CREATE '<<empty>>'
fffffa806ebee830 0 [ 0x 0, 0x 0] fffffa806f6fd010 fffffa8033ee4080 fffff88001b998c0
13:29.966 CREATE '<<empty>>'
SMB client has several Irps stuck in the networking stack for a long time
Time Pending IRP
25:47.251 fffffa806f775010
16:08.472 fffffa8033fb3b90
6: kd> !irp fffffa806f775010
Irp is active with 2 stacks 1 is current (= 0xfffffa806f7750e0)
No Mdl: No System Buffer: Thread 00000000: Irp stack trace.
cmd flg cl Device File Completion-Context
>[IRP_MJ_INTERNAL_DEVICE_CONTROL(f), N/A(10)]
0 e1 fffffa80315c6c10 00000000 fffff8800439d8b0-fffffa8033a6fd10 Success Error Cancel pending
\Driver\AFD mrxsmb!SmbWskGetAddressInfoComplete
Args: fffffa803209e410 fffff880096e5ae0 fffffa803392d5c0 00000000
[N/A(0), N/A(0)]
0 0 00000000 00000000 00000000-00000000
Args: fffff88001b97a00 fffff88001b97a00 fffffa806f775010 7184f95f
6: kd> !irp fffffa8033fb3b90
Irp is active with 2 stacks 1 is current (= 0xfffffa8033fb3c60)
No Mdl: No System Buffer: Thread 00000000: Irp stack trace.
cmd flg cl Device File Completion-Context
>[IRP_MJ_INTERNAL_DEVICE_CONTROL(f), N/A(10)]
0 e1 fffffa80315c6c10 00000000 fffff8800439d8b0-fffffa806f77a240 Success Error Cancel pending
\Driver\AFD mrxsmb!SmbWskGetAddressInfoComplete
Args: fffffa803209e410 fffff8800bf71c50 fffffa8033c71ec0 00000000
[N/A(0), N/A(0)]
0 0 00000000 00000000 00000000-00000000
Args: fffff88001b98b00 fffff88001b98b00 fffffa8033fb3b90 718dce3a
Looks like these Irps are calls from SMB client to DNS client to resolve names. NDIS should send up-call back to the DNS client service in user mode to resolve them. DNS client service is hosted in one of the svchost.exe processes. I see many threads from svchost processes are stuck in TmXPFlt so it is possible that this is what is causing the deadlock.
Regards, Vladimir Petter, Microsoft Corporation
Thursday, September 10, 2015 7:12 AM
Thank you very much Vladimir for your immediate review of memory dump, we have taken required action on Trend Micro Antivirus and cluster nodes are under observation.
Friday, September 11, 2015 12:25 PM
Hello Vladimir,
Could you please help me to understand what command did you use to get all thread, specifically THREAD fffffa806e078080 , also how did you see the list of all opens threads that are stack over SMB, and how did you check the stuck IRP's in SMB.
Thanks & Regards,
Suchit Patil
Friday, September 11, 2015 12:26 PM
Hello Vladimir.
I know this is an old post, but I would appreciate if you can analyse another minidump file about 0x0000009E message.
It´s an Exchange Mailbox Server.
https://dl.dropboxusercontent.com/u/12198734/091015-233437-01.dmp
Tks a lot
Dan Pinheiro
Rio de Janeiro - Brasil
Dan Pinheiro RJ - Brasil
Friday, September 11, 2015 6:51 PM
Hello Suchit,
To dump ongoing SMB requests I am using a debugger extension that unfortunately is not publically released. As a workaround you can always find synchronies SMB requests using "!stacks 2 mrx" or "!stacks 2 rdbss"
Regards, Vladimir Petter, Microsoft Corporation
Friday, September 11, 2015 6:56 PM
Hello Dan, what you've shared with me is a kernel minidump, which would not have thread stacks, and unfortunately would not be useful. Please configure full memory dump
And once you get one feel free to share it with me.
Regards, Vladimir Petter, Microsoft Corporation
Monday, October 19, 2015 4:07 PM
Vladimir,
I've also run into this issue and would appreciate you taking a look at a dump file if you are still willing and available?
Tuesday, October 20, 2015 2:00 AM
Sure, I can take a look. Please share a kernel dump with me.
Regards, Vladimir Petter, Microsoft Corporation
Tuesday, October 20, 2015 12:25 PM
Thank you it's much appreciated. Should be able to download the dump from the link below.
Wednesday, October 21, 2015 6:48 AM
I think you are running into a known issue. My guess this is happening when backup is reading data from snapshot. In this case it is reading 700GB VHD file, which builds a big section. 32GB of RAM on this machine allows that file to fit into the file cache. Eventually memory manager tries to trim active pages from the file cache and move them to stand by list. While doing that it is holding a lock on the thread fffffa803f730080. It has been doing that for about 1 minute on CPU 15
THREAD fffffa803f730080 Cid 0e60.1944 Teb: 000007f7d3a06000 Win32Thread: 0000000000000000 RUNNING on processor 15
IRP List:
fffffa803e217010: (0006,01f0) Flags: 00060070 Mdl: 00000000
Not impersonating
DeviceMap fffff8a00b793f00
Owning Process fffffa8020179980 Image: vmwp.exe
Attached Process N/A Image: N/A
Wait Start TickCount 9213470 Ticks: 283 (0:00:00:04.414)
Context Switch Count 99 IdealProcessor: 12
UserTime 00:00:00.000
KernelTime 00:01:05.286
Win32 Start Address 0x000007ff24521290
Stack Init fffff88007075c90 Current fffff88007074a80
Base fffff88007076000 Limit fffff88007070000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
fffff880`07074e00 fffff803`494593f4 nt!MiTrimSection+0x18e
fffff880`07074f60 fffff803`49457bda nt!MiTrimSharedPage+0x188
fffff880`07075000 fffff803`49459059 nt!MiClaimPhysicalRun+0x38a
fffff880`07075080 fffff803`495f6170 nt!MiFindContiguousPages+0x39d
fffff880`070751f0 fffff803`49545efd nt!MiAllocatePagesForMdl+0xb1f64
fffff880`070752f0 fffff880`065d8454 nt!MmAllocateNodePagesForMdlEx+0x75
fffff880`07075340 fffff880`065d89ca Vid!VsmmpAllocatePagesFromNumaNode+0x58
fffff880`07075390 fffff880`065bd947 Vid!VsmmAllocatePagesStrictQoS+0x10a
fffff880`07075440 fffff880`065da6e8 Vid!VsmmReserveBucketReservePages+0xcb
fffff880`070754b0 fffff880`065b7f50 Vid!VsmmReservePages+0x160
fffff880`07075560 fffff880`065b761f Vid!VidIoControlPartition+0x7d0
fffff880`07075630 fffff880`065b7708 Vid!VidIoControlDispatch+0x143
fffff880`070756e0 fffff880`01078706 Vid!VidIoControlPreProcess+0x5c
(Inline Function) ` Wdf01000!PreprocessIrp+0x3f (Inline Function @ fffff880`01078706)
(Inline Function) ` Wdf01000!DispatchWorker+0xe7 (Inline Function @ fffff880`01078706)
fffff880`07075730 fffff880`01078866 Wdf01000!FxDevice::Dispatch+0x106
fffff880`07075770 fffff803`498822e8 Wdf01000!FxDevice::DispatchWithLock+0xa6
(Inline Function) ` nt!IoCallDriverWithTracing+0x1b (Inline Function @ fffff803`498822e8)
(Inline Function) ` nt!IopCallDriverReference+0x9b (Inline Function @ fffff803`498822e8)
fffff880`070757b0 fffff803`49841d23 nt!IopSynchronousServiceTail+0x158
fffff880`07075880 fffff803`4985b406 nt!IopXxxControlFile+0xde0
fffff880`07075a20 fffff803`4946b453 nt!NtDeviceIoControlFile+0x56
fffff880`07075a90 000007ff`244e2bda nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`07075b00)
00000011`b777f828 00000000`00000000 0x000007ff`244e2bda
Meanwhile cluster service is trying to send a heartbeat to the kernel, and the thread that is supposed to do that got blocked on the same lock while trying to lock a page.
THREAD fffffa802750e080 Cid 09cc.1048 Teb: 000007f73e43c000 Win32Thread: 0000000000000000 WAIT: (WrPushLock) KernelMode Non-Alertable
fffff880089b6360 SynchronizationEvent
IRP List:
fffffa80198536c0: (0006,0118) Flags: 00060000 Mdl: 00000000
Not impersonating
DeviceMap fffff8a00000c370
Owning Process fffffa801eeb1700 Image: clussvc.exe
Attached Process N/A Image: N/A
Wait Start TickCount 9209942 Ticks: 3811 (0:00:00:59.451)
Context Switch Count 10363 IdealProcessor: 5
UserTime 00:00:00.124
KernelTime 00:00:00.078
Win32 Start Address 0x000007ff24521290
Stack Init fffff880089b6c90 Current fffff880089b6060
Base fffff880089b7000 Limit fffff880089b1000 Call 0
Priority 13 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
fffff880`089b60a0 fffff803`494af54b nt!KiSwapContext+0x76
(Inline Function) ` nt!KiSwapThread+0xfa (Inline Function @ fffff803`494af54b)
fffff880`089b61e0 fffff803`494ae38f nt!KiCommitThreadWait+0x23b
fffff880`089b62a0 fffff803`494f1746 nt!KeWaitForSingleObject+0x1cf
fffff880`089b6330 fffff803`494d36d1 nt!ExfAcquirePushLockExclusive+0x16d
(Inline Function) ` nt!ExAcquirePushLockExclusive+0x62 (Inline Function @ fffff803`494d36d1)
fffff880`089b63c0 fffff803`49447a62 nt!LOCK_WORKING_SET+0x79
fffff880`089b63f0 fffff803`49448218 nt!MiLockCode+0xc2
fffff880`089b6500 fffff803`4944839a nt!MiLockImageSection+0x58
fffff880`089b6550 fffff803`49806f58 nt!MiLockPagableImageSection+0xda
fffff880`089b6590 fffff880`013759c0 nt!MmLockPagableSectionByHandle+0x68
(Inline Function) ` NDIS!ndisReferencePackage+0x22 (Inline Function @ fffff880`013759c0)
fffff880`089b65c0 fffff803`498822e8 NDIS!ndisDeviceControlIrpHandler+0x98
(Inline Function) ` nt!IoCallDriverWithTracing+0x1b (Inline Function @ fffff803`498822e8)
(Inline Function) ` nt!IopCallDriverReference+0x9b (Inline Function @ fffff803`498822e8)
fffff880`089b67b0 fffff803`49841d23 nt!IopSynchronousServiceTail+0x158
fffff880`089b6880 fffff803`4985b406 nt!IopXxxControlFile+0xde0
fffff880`089b6a20 fffff803`4946b453 nt!NtDeviceIoControlFile+0x56
fffff880`089b6a90 000007ff`244e2bda nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`089b6b00)
00000053`a6c9f1f8 00000000`00000000 0x000007ff`244e2bda
Because kernel component has not received heartbeat in 1 minute it bugchecked the machine with USER_MODE_HEALTH_MONITOR (9e).
As far as I remember this was fixed and a fix was backported to Windows Server 2012 R2. I do not remember if it was ported back to Windows Server 2012 (9200.17528.amd64fre.win8_gdr.150928-0600), which you are running.
Here is what I suggest to do.
Make sure that you have all the latest patches.
If you do and issue is still reproducing, then I suggest to call to Microsoft support and present them this analysis and the dump. They should be able to provide you a patch, and if necessary they will initiate backport of the fix to Windows Server 2012.
Regards, Vladimir Petter, Microsoft Corporation
Wednesday, October 21, 2015 4:16 PM
Thank you so much for taking a look at it at providing suggestions. I suspected it had something to do with backups due to the time frame I was seeing it happen. I thought I had applied all relevant patches and hotfixes but I will revisit that and make sure everything is applied and investigate further from there.
Thanks again for taking your time to look at this.
Friday, December 4, 2015 4:30 AM
Hi Vladimir,
Would you please help me out with taking a look a dump-file ?
So far I have this:
Opened log file 'c:\temp\debuglog.txt'
8: kd> .sympath srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Expanded Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*c:\symbols*http://msdl.microsoft.com/download/symbols
8: kd> .reload;!analyze -v;r;kv;lmnt;.logclose;q
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
USER_MODE_HEALTH_MONITOR (9e)
One or more critical user mode components failed to satisfy a health check.
Hardware mechanisms such as watchdog timers can detect that basic kernel
services are not executing. However, resource starvation issues, including
memory leaks, lock contention, and scheduling priority misconfiguration,
may block critical user mode components without blocking DPCs or
draining the nonpaged pool.
Kernel components can extend watchdog timer functionality to user mode
by periodically monitoring critical applications. This bugcheck indicates
that a user mode health check failed in a manner such that graceful
shutdown is unlikely to succeed. It restores critical services by
rebooting and/or allowing application failover to other servers.
Arguments:
Arg1: fffffa80f7862060, WatchdogSourceRhsCleanup
Monitors that RHS process goes away when
terminating on graceful exit
Arg2: 00000000000004b0, WatchdogSourceRhsResourceDeadlockBugcheckNow
RHS was asked to immediately bugcheck machine
on resource deadlock
Arg3: 0000000000000000, WatchdogSourceRhsExceptionFromResource
Resource has leaked unhandled exception from an entry point,
RHS is terminating and this watchdog monitors that
process will go away
Arg4: 0000000000000000, WatchdogSourceRhsUnhandledException
Unhandled exception in RHS.
RHS is terminating and this watchdog monitors that
process will go away
5 - WatchdogSourceRhsResourceDeadlock
Monitors that RHS process goes away when
terminating on resource deadlock
6 - WatchdogSourceRhsResourceTypeDeadlock
Monitors that RHS process goes away when
terminating on resource type deadlock
7 - WatchdogSourceClussvcUnhandledException
Unhandled exception in clussvc.
clussvc is terminating and this watchdog monitors that
process will go away
8 - WatchdogSourceClussvcBugcheckMessageRecieved
Another cluster node has send message asking to bugcheck this node.
9 - WatchdogSourceClussvcWatchdogBugcheck
User mode watchdog has expired and created netft watchdog
to bugchecked the node.
10 - WatchdogSourceClussvcIsAlive
Cluster service sends heartbeat to netft every 500 millseconds.
By default netft expects at least 1 heartbeat per second.
If this watchdog was triggered that means clussvc is o not getting
CPU to send heartbers.
101 - WatchdogSourceRhsResourceDeadlockPhysicalDisk
102 - WatchdogSourceRhsResourceDeadlockStoragePool
103 - WatchdogSourceRhsResourceDeadlockFileServer
104 - WatchdogSourceRhsResourceDeadlockSODAFileServer
105 - WatchdogSourceRhsResourceDeadlockStorageReplica
106 - WatchdogSourceRhsResourceDeadlockStorageQOS
107 - WatchdogSourceRhsResourceDeadlockStorageNFSV2
Values above are subclasses of WatchdogSourceRhsResourceDeadlock
For the resource types that are known to cause RHS termination hangs
we isolate them to separate codes so we can quickly triage dumps.
201 - WatchdogSourceRhsResourceTypeDeadlockPhysicalDisk
202 - WatchdogSourceRhsResourceTypeDeadlockStoragePool
203 - WatchdogSourceRhsResourceTypeDeadlockFileServer
204 - WatchdogSourceRhsResourceTypeDeadlockSODAFileServer
205 - WatchdogSourceRhsResourceTypeDeadlockStorageReplica
206 - WatchdogSourceRhsResourceTypeDeadlockStorageQOS
207 - WatchdogSourceRhsResourceTypeDeadlockStorageNFSV2
Values above are subclasses of WatchdogSourceRhsResourceTypeDeadlock
For the resource types that are known to cause RHS termination hangs
we isolate them to separate codes so we can quickly triage dumps.
Debugging Details:
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
SYSTEM_MANUFACTURER: HP
SYSTEM_PRODUCT_NAME: ProLiant BL460c Gen8
SYSTEM_SKU: 641016-B21
BIOS_VENDOR: HP
BIOS_VERSION: I31
BIOS_DATE: 12/20/2013
DUMP_TYPE: 1
BUGCHECK_P1: fffffa80f7862060
BUGCHECK_P2: 4b0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: rhs.exe
IMAGE_NAME: rhs.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: rhs
FAULTING_MODULE: 0000000000000000
CPU_COUNT: 10
CPU_MHZ: ce4
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2d
CPU_STEPPING: 7
CPU_MICROCODE: 6,2d,7,0 (F,M,S,R) SIG: 710'00000000 (cache) 710'00000000 (init)
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x9E
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: ATC-WJUMP
ANALYSIS_SESSION_TIME: 12-03-2015 18:10:10.0807
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
STACK_TEXT:
fffff880`0253f3d8 fffff880`0512d6a5 : 00000000`0000009e fffffa80`f7862060 00000000`000004b0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0253f3e0 fffff800`0209c91c : fffff880`0253f4c0 00000000`00000001 00000000`40390088 fffff880`014cbc94 : netft!NetftWatchdogTimerDpc+0xb9
fffff880`0253f430 fffff800`0209c7b6 : fffff880`0513a100 00000000`010322f9 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x6c
fffff880`0253f4a0 fffff800`0209c69e : 00000268`d86300d3 fffff880`0253fb18 00000000`010322f9 fffff880`0251b4a8 : nt!KiProcessExpiredTimerList+0xc6
fffff880`0253faf0 fffff800`0209c487 : 000000c6`cac035c1 000000c6`010322f9 000000c6`cac035cf 00000000`000000f9 : nt!KiTimerExpiration+0x1be
fffff880`0253fb90 fffff800`0208874a : fffff880`02517180 fffff880`025222c0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff880`0253fc40 00000000`00000000 : fffff880`02540000 fffff880`0253a000 fffff880`0253fc00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 816f11a87ad4e6cc4ea0c0bae49953386adf648a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5d45c8c68fd994a4bdace855a86f47ca470766fe
THREAD_SHA1_HASH_MOD: 62ffe22e249d6ed7a775c30201445f402c1cebbf
FOLLOWUP_NAME: MachineOwner
IMAGE_VERSION:
FAILURE_BUCKET_ID: X64_0x9E_IMAGE_rhs.exe
BUCKET_ID: X64_0x9E_IMAGE_rhs.exe
PRIMARY_PROBLEM_CLASS: X64_0x9E_IMAGE_rhs.exe
TARGET_TIME: 2015-11-23T12:43:44.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 274
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 Server (Service Pack 1) Enterprise TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-03-17 00:02:04
BUILDDATESTAMP_STR: 150316-1654
BUILDLAB_STR: win7sp1_gdr
BUILDOSVER_STR: 6.1.7601.18798.amd64fre.win7sp1_gdr.150316-1654
ANALYSIS_SESSION_ELAPSED_TIME: 15d0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x9e_image_rhs.exe
FAILURE_ID_HASH: {c259dc81-ac67-ae55-7e62-cf1c10f90628}
Followup: MachineOwner
rax=0000000000000000 rbx=fffffa80f9c091d0 rcx=000000000000009e
rdx=fffffa80f7862060 rsi=fffff88005139110 rdi=fffff8800253f400
rip=fffff80002090a40 rsp=fffff8800253f3d8 rbp=0000000000000000
r8=00000000000004b0 r9=0000000000000000 r10=fffff8000201e000
r11=fffffa806e4a4c10 r12=fffff8800513a0e0 r13=fffff8800253fb18
r14=fffff880025222c0 r15=fffff88002517180
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000246
nt!KeBugCheckEx:
fffff800`02090a40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`0253f3e0=000000000000009e
Child-SP RetAddr : Args to Child : Call Site
fffff880`0253f3d8 fffff880`0512d6a5 : 00000000`0000009e fffffa80`f7862060 00000000`000004b0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0253f3e0 fffff800`0209c91c : fffff880`0253f4c0 00000000`00000001 00000000`40390088 fffff880`014cbc94 : netft!NetftWatchdogTimerDpc+0xb9
fffff880`0253f430 fffff800`0209c7b6 : fffff880`0513a100 00000000`010322f9 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x6c
fffff880`0253f4a0 fffff800`0209c69e : 00000268`d86300d3 fffff880`0253fb18 00000000`010322f9 fffff880`0251b4a8 : nt!KiProcessExpiredTimerList+0xc6
fffff880`0253faf0 fffff800`0209c487 : 000000c6`cac035c1 000000c6`010322f9 000000c6`cac035cf 00000000`000000f9 : nt!KiTimerExpiration+0x1be
fffff880`0253fb90 fffff800`0208874a : fffff880`02517180 fffff880`025222c0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff880`0253fc40 00000000`00000000 : fffff880`02540000 fffff880`0253a000 fffff880`0253fc00 00000000`00000000 : nt!KiIdleLoop+0x5a
start end module name
fffff800`01faf000 fffff800`01fb9000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff800`0201e000 fffff800`02606000 nt ntkrnlmp.exe Tue Mar 17 00:02:04 2015 (5507A73C)
fffff800`02606000 fffff800`0264f000 hal hal.dll Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`00c00000 fffff880`00c52e00 mfewfpk mfewfpk.sys Fri Jan 30 13:42:08 2015 (54CBD080)
fffff880`00c53000 fffff880`00c80000 mrxsmb mrxsmb.sys Tue Jan 06 20:49:30 2015 (54AC90AA)
fffff880`00c81000 fffff880`00cd0000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 08:03:51 2010 (4CE7C737)
fffff880`00cd0000 fffff880`00ce4000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`00ce4000 fffff880`00d42000 CLFS CLFS.SYS Tue Mar 03 22:21:12 2015 (54F67A28)
fffff880`00d42000 fffff880`00da5000 storport storport.sys Sat Nov 20 05:35:02 2010 (4CE7A456)
fffff880`00da5000 fffff880`00dd6000 be2iscsi be2iscsi.sys Sun Aug 11 04:57:21 2013 (520751F1)
fffff880`00e00000 fffff880`00e3a000 involflt involflt.sys Tue Aug 05 22:35:00 2014 (53E19454)
fffff880`00e3a000 fffff880`00e5e000 hpeaadsm hpeaadsm.sys Mon Jan 10 00:07:38 2011 (4D2A941A)
fffff880`00e5e000 fffff880`00e89000 HpCISSs2 HpCISSs2.sys Mon Oct 28 11:10:30 2013 (526E7E66)
fffff880`00e9d000 fffff880`00f5d000 CI CI.dll Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`00f78000 fffff880`00fd4000 volmgrx volmgrx.sys Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`00fd4000 fffff880`00feb000 HpSAMD HpSAMD.sys Tue Apr 20 14:32:18 2010 (4BCDF332)
fffff880`01000000 fffff880`01060000 NETIO NETIO.SYS Tue Nov 26 05:21:01 2013 (5294760D)
fffff880`01060000 fffff880`0107a000 mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`01082000 fffff880`01175000 NDIS NDIS.SYS Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`01175000 fffff880`011d3000 msrpc msrpc.sys Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`011d3000 fffff880`011f9000 msdsm msdsm.sys Fri May 31 23:58:14 2013 (51A97156)
fffff880`01200000 fffff880`0122b000 mpio mpio.sys Thu Nov 29 22:55:16 2012 (50B82E24)
fffff880`0122b000 fffff880`01240000 partmgr partmgr.sys Sat Mar 17 01:06:09 2012 (4F641BC1)
fffff880`01240000 fffff880`01249000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`01249000 fffff880`01255000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`01260000 fffff880`01322000 Wdf01000 Wdf01000.sys Fri Jun 21 23:13:05 2013 (51C51641)
fffff880`01322000 fffff880`01332000 WDFLDR WDFLDR.SYS Wed Jul 25 22:29:04 2012 (5010AB70)
fffff880`01332000 fffff880`01389000 ACPI ACPI.sys Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`01389000 fffff880`01392000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01392000 fffff880`0139c000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0139c000 fffff880`013cf000 pci pci.sys Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`013cf000 fffff880`013dc000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`013dc000 fffff880`013f1000 volmgr volmgr.sys Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`01418000 fffff880`01588000 ql2300 ql2300.sys Thu Mar 07 13:19:46 2013 (5138DA42)
fffff880`01588000 fffff880`01593000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`01593000 fffff880`015df000 fltmgr fltmgr.sys Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0161f000 fffff880`016f4700 mfehidk mfehidk.sys Fri Jan 30 13:41:34 2015 (54CBD05E)
fffff880`016f5000 fffff880`01767000 cng cng.sys Thu Jan 29 22:17:08 2015 (54CAF7B4)
fffff880`01767000 fffff880`01793000 ksecpkg ksecpkg.sys Fri Apr 03 22:15:42 2015 (551F494E)
fffff880`01793000 fffff880`017dc000 fwpkclnt fwpkclnt.sys Fri Apr 04 21:23:21 2014 (533F5B09)
fffff880`017dc000 fffff880`017e9000 TDI TDI.SYS Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`017e9000 fffff880`017ff000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`01800000 fffff880`0180a000 Fs_Rec Fs_Rec.sys Wed Feb 29 22:41:06 2012 (4F4EEFD2)
fffff880`0180a000 fffff880`01812000 hpqilo3whea hpqilo3whea.sys Fri Feb 12 18:33:27 2010 (4B75E547)
fffff880`01812000 fffff880`01822000 vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`01829000 fffff880`019cb000 Ntfs Ntfs.sys Fri Apr 12 07:54:36 2013 (5167F5FC)
fffff880`019cb000 fffff880`019e6000 ksecdd ksecdd.sys Fri Apr 03 21:58:36 2015 (551F454C)
fffff880`019e6000 fffff880`019f7000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`01a00000 fffff880`01bff000 tcpip tcpip.sys Fri Apr 04 21:26:44 2014 (533F5BD4)
fffff880`01c00000 fffff880`01c22000 tdx tdx.sys Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`01c26000 fffff880`01c72000 volsnap volsnap.sys Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`01c72000 fffff880`01c7a000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01c7a000 fffff880`01c98000 mup mup.sys Tue Jan 06 20:48:27 2015 (54AC906B)
fffff880`01c98000 fffff880`01cae580 mfedisk mfedisk.sys Fri Jan 30 13:42:39 2015 (54CBD09F)
fffff880`01caf000 fffff880`01cb8000 hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`01cb8000 fffff880`01cce000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01cce000 fffff880`01cfe000 CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`01cfe000 fffff880`01d1c000 bowser bowser.sys Tue Feb 22 23:55:04 2011 (4D649328)
fffff880`01d41000 fffff880`01d61000 DpmFilter DpmFilter.sys Mon Sep 17 06:52:03 2012 (505700D3)
fffff880`01d61000 fffff880`01d6f000 ClusDisk ClusDisk.sys Sat Nov 20 04:42:24 2010 (4CE79800)
fffff880`01d6f000 fffff880`01d77000 InCDskFl InCDskFl.sys Tue Aug 05 22:49:45 2014 (53E197C9)
fffff880`01d77000 fffff880`01d80000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`01d80000 fffff880`01d8e000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01d8e000 fffff880`01db3000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01db3000 fffff880`01dc3000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`01dc3000 fffff880`01dcc000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01dcc000 fffff880`01dd5000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01dd5000 fffff880`01dde000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01dde000 fffff880`01de9000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01de9000 fffff880`01dfa000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04c01000 fffff880`04c46000 netbt netbt.sys Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`04c46000 fffff880`04ccf000 afd afd.sys Fri May 30 02:45:48 2014 (5388291C)
fffff880`04ccf000 fffff880`04cd8000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04cd8000 fffff880`04cfe000 pacer pacer.sys Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`04cfe000 fffff880`04d0d000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`04d0d000 fffff880`04d2a000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`04d2a000 fffff880`04d45000 wanarp wanarp.sys Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`04d45000 fffff880`04d59000 termdd termdd.sys Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff880`04d59000 fffff880`04daa000 rdbss rdbss.sys Tue Jan 06 20:49:42 2015 (54AC90B6)
fffff880`04daa000 fffff880`04db6000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff880`04db6000 fffff880`04dc1000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`04dc1000 fffff880`04dd0000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`04dd0000 fffff880`04def000 dfsc dfsc.sys Tue Jan 06 20:48:10 2015 (54AC905A)
fffff880`04def000 fffff880`04e00000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`04e16000 fffff880`04e92000 be2nd62 be2nd62.sys Sat Dec 07 01:04:36 2013 (52A2BA74)
fffff880`04e92000 fffff880`04ea4000 usbehci usbehci.sys Tue Nov 26 20:41:11 2013 (52954DB7)
fffff880`04ea4000 fffff880`04efa000 USBPORT USBPORT.SYS Tue Nov 26 20:41:11 2013 (52954DB7)
fffff880`04efa000 fffff880`04f09000 hpqilo3core hpqilo3core.sys Wed May 22 17:41:45 2013 (519D3B99)
fffff880`04f09000 fffff880`04f4a000 g200eHm g200eHm.sys Wed Apr 11 16:24:18 2012 (4F85E872)
fffff880`04f4a000 fffff880`04f59000 hpqilo3chif hpqilo3chif.sys Sat Nov 23 21:26:20 2013 (529163CC)
fffff880`04f59000 fffff880`04f66000 usbuhci usbuhci.sys Tue Nov 26 20:41:05 2013 (52954DB1)
fffff880`04f66000 fffff880`04f7e000 IPMIDrv IPMIDrv.sys Sat Nov 20 05:04:53 2010 (4CE79D45)
fffff880`04f7e000 fffff880`04f8a000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04f8a000 fffff880`04fa8000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04fa8000 fffff880`04fb7000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04fb7000 fffff880`04fc6000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04fc6000 fffff880`04fd5000 tpm tpm.sys Mon Jul 13 19:21:48 2009 (4A5BC18C)
fffff880`04fd5000 fffff880`04fdf000 acpipmi acpipmi.sys Sat Nov 20 04:30:42 2010 (4CE79542)
fffff880`04fdf000 fffff880`04fef000 CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`05000000 fffff880`05018000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0501e000 fffff880`05060000 cpqteam cpqteam.sys Wed Dec 11 05:30:40 2013 (52A83ED0)
fffff880`05060000 fffff880`05076000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`05076000 fffff880`0509a000 rasl2tp rasl2tp.sys Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`0509a000 fffff880`050a6000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`050a6000 fffff880`050d5000 ndiswan ndiswan.sys Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`050d5000 fffff880`050f0000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`050f0000 fffff880`05111000 raspptp raspptp.sys Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`05111000 fffff880`0512b000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0512b000 fffff880`05147000 netft netft.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05147000 fffff880`05152000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`05152000 fffff880`05153480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`05154000 fffff880`05197000 ks ks.sys Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`05197000 fffff880`051a9000 umbus umbus.sys Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`051a9000 fffff880`051b5000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`051b5000 fffff880`051c3000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`051c3000 fffff880`051e6000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`051e6000 fffff880`051fb000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05200000 fffff880`0522b000 dump_HpCISSs2 dump_HpCISSs2.sys Mon Oct 28 11:10:30 2013 (526E7E66)
fffff880`0522f000 fffff880`05289000 usbhub usbhub.sys Tue Nov 26 20:41:36 2013 (52954DD0)
fffff880`05289000 fffff880`0529e000 NDProxy NDProxy.SYS Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`0529e000 fffff880`052eea00 mfeavfk mfeavfk.sys Fri Jan 30 13:43:31 2015 (54CBD0D3)
fffff880`052ef000 fffff880`052fab00 mfeaacsk mfeaacsk.sys Fri Jan 30 13:48:09 2015 (54CBD1E9)
fffff880`052fb000 fffff880`05307100 mfeplk mfeplk.sys Fri Jan 30 13:48:10 2015 (54CBD1EA)
fffff880`05308000 fffff880`0535fb80 mfeaack mfeaack.sys Fri Jan 30 13:48:06 2015 (54CBD1E6)
fffff880`05360000 fffff880`053dfc80 mfefirek mfefirek.sys Fri Jan 30 13:44:56 2015 (54CBD128)
fffff880`053e0000 fffff880`053ee000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`053ee000 fffff880`053f8000 dump_diskdump dump_diskdump.sys Sat Nov 20 05:33:56 2010 (4CE7A414)
fffff880`06e00000 fffff880`06ea6000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`06ea6000 fffff880`06eb1000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`06ebe000 fffff880`06f0c000 mrxsmb10 mrxsmb10.sys Tue Jan 06 20:48:48 2015 (54AC9080)
fffff880`06f0c000 fffff880`06f30000 mrxsmb20 mrxsmb20.sys Tue Jan 06 20:48:38 2015 (54AC9076)
fffff880`06f30000 fffff880`06ff9000 HTTP HTTP.sys Tue Feb 24 22:17:55 2015 (54ED3EE3)
fffff880`07c00000 fffff880`07c98000 srv srv.sys Thu Apr 28 23:06:06 2011 (4DBA2B1E)
fffff880`07c98000 fffff880`07ca7000 tssecsrv tssecsrv.sys Sat Nov 20 06:04:09 2010 (4CE7AB29)
fffff880`07cc3000 fffff880`07cf4000 srvnet srvnet.sys Thu Apr 28 23:05:35 2011 (4DBA2AFF)
fffff880`07cf4000 fffff880`07d06000 tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`07d06000 fffff880`07d3f000 RDPWD RDPWD.SYS Fri Apr 27 23:55:20 2012 (4F9B6A28)
fffff880`07d57000 fffff880`07dc0000 srv2 srv2.sys Thu Apr 28 23:05:46 2011 (4DBA2B0A)
fffff880`07dc0000 fffff880`07dee000 rdpdr rdpdr.sys Sat Nov 20 06:06:41 2010 (4CE7ABC1)
fffff880`07dee000 fffff880`07df9000 tdtcp tdtcp.sys Thu Feb 16 23:57:32 2012 (4F3DDE3C)
fffff880`0b472000 fffff880`0b47d000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff960`00040000 fffff960`00363000 win32k win32k.sys Mon May 25 13:08:15 2015 (556356FF)
fffff960`00400000 fffff960`0041e000 dxg dxg.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00710000 fffff960`0071a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff960`00860000 fffff960`00896000 G200eHd G200eHd.dll Wed Apr 11 16:24:18 2012 (4F85E872)
fffff960`00af0000 fffff960`00b38000 RDPDD RDPDD.dll Sat Nov 20 06:05:00 2010 (4CE7AB5C)
Unloaded modules:
fffff880`0b4ee000 fffff880`0b55f000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`0b5b9000 fffff880`0b5e6000 mfeapfk.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002D000
fffff880`0b58c000 fffff880`0b5b9000 mfeapfk.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002D000
fffff880`0b55f000 fffff880`0b58c000 mfeapfk.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002D000
fffff880`0b47d000 fffff880`0b4ee000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`0b401000 fffff880`0b472000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`07d06000 fffff880`07d33000 mfeapfk.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002D000
fffff880`07d06000 fffff880`07d57000 mfeavfk01.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00051000
fffff880`01cfe000 fffff880`01d0c000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01d0c000 fffff880`01d16000 dump_storport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`01d16000 fffff880`01d41000 dump_HpCISSs2.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0002B000
fffff880`00f5d000 fffff880`00f78000 sacdrv.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001B000
Closing open log file c:\temp\debuglog.txt
Friday, December 4, 2015 6:58 PM
Please share this dump with me.
Regards, Vladimir Petter, Microsoft Corporation
Thursday, December 31, 2015 6:04 PM
Hi Vladimir
sorry to hijack this thread. First time posting
Would you be able to help me decipher my bugcheck crash?
Running exchange 2010 mailbox server on windows 2008r2. Server crashed yesterday with
The bugcheck was: 0x0000009e (0xfffffa8014390320, 0x000000000000003c, 0x0000000000000000, 0x0000000000000000).
the link to the memory dump is here
https://www.dropbox.com/s/oujf7etgx271a63/MEMORY.DMP?dl=0
thank you so much
Friday, January 1, 2016 1:42 AM
Hi, I am getting errors trying to load this dump
THIS DUMP FILE IS PARTIALLY CORRUPT.
KdDebuggerDataBlock is not present or unreadable.
Unfortunately looks like this dump is corrupt.
Regards, Vladimir Petter, Microsoft Corporation
Friday, January 1, 2016 4:36 AM
Have you made nay changes in Network settings like Teaming or change in Teaming mode from LACP to Auto or any thing?
because in this case you might be face problem if you have not restarted the server after making this change.
Monday, January 4, 2016 2:57 PM
that is weird. server is a virtual machine running under vmware esx.
i guess i have to wait for another crash then
thank you for your prompt response
Tuesday, January 5, 2016 8:42 AM
we run a 5 host hyper-v cluster with a SAN as CSV. we've had a few bugcheck E as well caused by netflt.sys .
One of the Hype-V hosts seem to suffer from BugCheck 9E, {ffffe800f6529900, 4b0, 5, 0}
I have uploaded support diagnostics using http://home.diagnostics.support.microsoft.com/SelfHelp
Not sure how to publish them here, but would be nice if somebody experienced from microsoft take a look at it. I am tired of calling Microsoft support as the support has recently degraded a lot and the support is just a waste of time.
Tuesday, January 5, 2016 9:33 AM
Hi, Hopefully someone from support can take a look at this dump. I am in a completely different part of the org - engineering, and do not have access to the support infrastructure.
If you have support case opened then support folks should be able to help you with this dump.
Regards, Vladimir Petter, Microsoft Corporation
Tuesday, January 5, 2016 2:59 PM
If this issue is causing a business outage, a support case really needs to be opened. This is not a support forum so hoping that a support engineer wanders over here (on their personal time, because like any support organization, they do have charge for company time) might take a while. If you are having issues with support, I would request an escalation. If you are paying for support, you need to demand support.
One thing you need to start with is looking at the physical environment running the ESX hosts. Even though they are running ESX, the components must still be certified to run the version of Windows Server running in the VM, in this case, 2008 R2. You can check at windowsservercatalog.com.
. : | : . : | : . tim
Thursday, January 28, 2016 1:16 PM
Hello Vladimir,
Could you please help in reviewing memory dump uploaded at below link?https://drive.google.com/file/d/0B7HTVM4VNM3SSEVDZElfZmEtejA/view?usp=sharing
one of the server rebooted due to prowershell. please find debug details
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa800d393c10, Terminating object
Arg3: fffffa800d393e48, Process image file name
Arg4: fffff80001eed8d0, Explanatory message (ascii)Debugging Details:
Page e156a not present in the dump file. Type ".hh dbgerr004" for details
Page e1b5e not present in the dump file. Type ".hh dbgerr004" for detailsPROCESS_OBJECT: fffffa800d393c10
IMAGE_NAME: csrss.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: csrss
FAULTING_MODULE: 0000000000000000
PROCESS_NAME: wsmprovhost.exe
BUGCHECK_STR: 0xF4_wsmprovhost.exe
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80001f69353 to fffff80001c6a450
STACK_TEXT:
fffffa60`0c598b28 fffff800`01f69353 : 00000000`000000f4 00000000`00000003 fffffa80`0d393c10 fffffa80`0d393e48 : nt!KeBugCheckEx
fffffa60`0c598b30 fffff800`01e82358 : fffffa80`0f23bbb0 fffffa80`0f23bbb0 00000000`1a78e4c0 00000000`00000000 : nt!PspCatchCriticalBreak+0x93
fffffa60`0c598b70 fffff800`01eb5f50 : fffffa80`0f23bbb0 00000000`00000008 00000000`1a78e4c0 fffff800`00000008 : nt! ?? ::NNGAKEGL::`string'+0x110f6
fffffa60`0c598bc0 fffff800`01c69ef3 : fffffa80`0d393c10 fffffa80`0f23bbb0 fffffa60`0c598ca0 00000000`1a78e4c0 : nt!NtTerminateProcess+0xd8
fffffa60`0c598c20 00000000`778e6fda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1a78e3b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778e6fdaThanks & Regards,
Asif Iqbal
Friday, January 29, 2016 6:35 AM
Hello Asif,
This thread has been about cluster bugcheking machine with 9e. You have hit a different issue. In your case user mode process csrss.exe is getting terminated. This is a critical OS process, and in response to its termination OS is bugchecking machine with CRITICAL_OBJECT_TERMINATION (f4). It looks like process termination was done by wsmprovhost.exe, which I guess is running some administrative action on behalf of a user with SID S-1-5-21-800109603-1914418702-385554406-17320. You can use PsGetSid (https://technet.microsoft.com/en-us/sysinternals/bb897417.aspx) to lookup user name from the SID.
Regards, Vladimir Petter, Microsoft Corporation
Thursday, February 11, 2016 4:09 AM
Vladimir,
Would you be able to analyze the following minidump?
https://rbs.syncedtool.com/shares/file/4e7c8229e80029/
Please let me know if you need additional information. Thank you very much.
Brett
Thursday, February 11, 2016 6:30 AM
Hello Brett,
You have a minidump. Unfortunately there is no much I can tell from. Please configure you servers to collect full kernel dump (http://blogs.msdn.com/b/xiz/archive/2013/11/04/how-to-setup-to-collect-memory-dump.aspx) and share a dump next time you get a repro.
In your case a resource call took over 5 minutes, and RHS.exe terminated itself. Because process termination did not complete in 20 minutes netft.sys bugchecked machine with 9e. Process termination cannot complete because one of the threads of that process is stuck waiting for the kernel to complete an IO. From my experience most often we find that this IO is stuck somewhere in the storage stack. If you will be able to get full kernel dump for 9e then I should be able to track down why IO is stuck.
I see this dump is from VMware virtual machine. Please check that at the time of failure VMware did not go through some storage problem.
Regards, Vladimir Petter, Microsoft Corporation
Monday, July 25, 2016 12:15 PM
Hi Vladimir,
I have the same issue - 3 Node Hyper-V cluster - Windows 2012 R2, iSCSI Netapp Storage - 4 CSV disk, which are holding the VM`s.
Could you please check, if you have some time the dump I have. I have checked some things in it, but I am not so good with the Dump reading and analyzing:
https://drive.google.com/file/d/0B75QCMrGcihoVnEyY1FGb1g4aEU/view?usp=sharing
Thank you in advance.
Tuesday, July 26, 2016 2:12 AM
Something going on with the system disk (HP disk). IOs are stuck on the disk for 30+, and this disk is being reset. Most likely disk reset is stuck. Try to install latest firmaware and drivers from HP. If issue is not resolved then contact HP support.
Thanks,
Vladimir.
ffffe000b42c3770 [1,2] HP LOGICAL VOLUME Paging Disk
Storage class device ffffe000b42c3770 with extension at ffffe000b42c38c0
Classpnp Internal Information at ffffe000b41f1010
Transfer Packet Engine:
Packet Status DL Irp Opcode Sector/ListId UL Irp
ffffe000b8eddb60 Queued ffffe000b8edd840 00 ffffe000b8953640 \Windows\System32\winevt\Logs\Microsoft-Windows-MsLbfoProvider%4Operational.evtx
ffffe000b8eacd40 Queued ffffe000b8eaca20 00 ffffe8007a1b4010 \Windows\Cluster\clussvc.exe
ffffe8007849d4c0 Queued ffffe8007a32b010 00 ffffe000b8e5bcf0 \ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_7.9.9600.18039_40833763cfe4a66227486a838a61544353f89a8_00000000_e3915ddc\Report.wer
ffffe8007a199e80 Queued ffffe8007a32e4e0 00 ffffe000b89b68d0 \Windows\System32\winevt\Logs\Microsoft-Windows-FailoverClustering%4Diagnostic.evtx
ffffe8007bc4c670 Queued ffffe8007a2f5350 00 ffffe000ba9f2010 \Windows\System32\wfp\wfpdiag.etl
ffffe8007a022960 Queued ffffe8007a3b89d0 00 ffffe8007ceb54e0 \Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Health Service Store\edb.log
ffffe8007a1cc840 Queued ffffe8007a2f5cf0 00 ffffe80079c1d4e0 \Windows\System32\winevt\Logs\Microsoft-Windows-WMI-Activity%4Operational.evtx
ffffe8007a1b1e80 Queued ffffe8007a1b1b60 00 ffffe8007cf05340 \LogFile
ffffe8007a1b19d0 Queued ffffe8007a1b16b0 00 ffffe000ba26a820 \Windows\System32\winevt\Logs\Microsoft-Windows-FailoverClustering%4Diagnostic.evtx
ffffe80079014e80 Queued ffffe80078cc6010 00 ffffe000bad19cf0 \Windows\System32\wbem\Repository\OBJECTS.DATA
Pending Idle Requests: 0x0
Failed Requests:
Srb Scsi
Opcode Status Status Sense Code Sector/ListId Time Stamp
1a 04 02 05 24 00 07:37:37.124
Classpnp External Information at ffffe000b42c38c0
HP LOGICAL VOLUME 6.64 5001438018152350
Minidriver information at ffffe000b42c3d80
Attached device object at ffffe000b44477c0
Physical device object at ffffe000b44477c0
Media Geometry:
Bytes in a Sector = 512
Sectors per Track = 32
Tracks / Cylinder = 255
Media Length = 299966445568 bytes = ~279 GB
-- dt classpnp!_FUNCTIONAL_DEVICE_EXTENSION ffffe000b42c38c0 --
8: kd> !irp ffffe000b8953640
Irp is active with 8 stacks 4 is current (= 0xffffe000b89537e8)
Mdl=ffffd000524757e0: No System Buffer: Thread ffffe000ba251880: Irp stack trace.
cmd flg cl Device File Completion-Context
[N/A(0), N/A(0)]
0 0 00000000 00000000 00000000-00000000
Args: 00000000 00000000 00000000 00000000
[N/A(0), N/A(0)]
0 0 00000000 00000000 00000000-00000000
Args: 00000000 00000000 00000000 00000000
[N/A(0), N/A(0)]
0 0 00000000 00000000 00000000-00000000
Args: 00000000 00000000 00000000 00000000
>[IRP_MJ_WRITE(4), N/A(34)]
10 e0 ffffe000b42c3770 00000000 fffff801659e7360-00000000 Success Error Cancel
\Driver\disk partmgr!PmIoCompletion
Args: 0000a000 00000000 4bf55000 00000000
[IRP_MJ_WRITE(4), N/A(3)]
10 e0 ffffe000b42c5a40 00000000 fffff801656011b0-ffffe000b41f6a30 Success Error Cancel
\Driver\partmgr volmgr!VmpReadWriteCompletionRoutine
Args: 51af0eed0a 00000000 4bf55000 00000000
[IRP_MJ_WRITE(4), N/A(0)]
0 e0 ffffe000b41f68e0 00000000 fffff8016639c410-ffffe000b4600180 Success Error Cancel
\Driver\volmgr volsnap!VspRefCountCompletionRoutine
Args: 0000a000 00000000 51af0eed08 00000000
[IRP_MJ_WRITE(4), N/A(0)]
0 e1 ffffe000b4600030 00000000 fffff80165c34a14-ffffd000524751c0 Success Error Cancel pending
\Driver\volsnap Ntfs
Args: 0000a000 00000000 36055000 00000000
[IRP_MJ_WRITE(4), N/A(0)]
0 0 ffffe000b3864030 ffffe000b49282c0 00000000-00000000
\FileSystem\Ntfs
Args: 0000a000 00000000 000c1000 00000000
THREAD ffffe000ba251880 Cid 0004.2984 Teb: 0000000000000000 Win32Thread: 0000000000000000 WAIT: (Executive) KernelMode Non-Alertable
ffffd000524751c8 NotificationEvent
IRP List:
ffffe000b8953640: (0006,0310) Flags: 00060043 Mdl: ffffd000524757e0
Not impersonating
DeviceMap ffffc00157a0c320
Owning Process ffffe000b3816480 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 9579627 Ticks: 133171 (0:00:34:40.796)
Context Switch Count 64043 IdealProcessor: 5
UserTime 00:00:00.000
KernelTime 00:00:01.359
Win32 Start Address nt!ExpWorkerThread (0xfffff801fe4ce390)
Stack Init ffffd00052475dd0 Current ffffd00052474a70
Base ffffd00052476000 Limit ffffd00052470000 Call 0
Priority 13 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`52474ab0 fffff801`fe4d24ee nt!KiSwapContext+0x76
ffffd000`52474bf0 fffff801`fe4d1f69 nt!KiSwapThread+0x14e
ffffd000`52474c90 fffff801`fe487563 nt!KiCommitThreadWait+0x129
ffffd000`52474d10 fffff801`65c2e422 nt!KeWaitForSingleObject+0x373
(Inline Function) ` Ntfs!NtfsWaitOnIo+0x1e (Inline Function @ fffff801`65c2e422)
ffffd000`52474da0 fffff801`65c30734 Ntfs!NtfsNonCachedIo+0x412
ffffd000`52475010 fffff801`65c33b63 Ntfs!NtfsCommonWrite+0xd54
ffffd000`52475250 fffff801`653a2b1e Ntfs!NtfsFsdWrite+0x203
ffffd000`52475520 fffff801`653a10c2 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd000`524755c0 fffff801`fe4a2d80 fltmgr!FltpDispatch+0xb2
ffffd000`52475620 fffff801`fe4a2baa nt!IoSynchronousPageWrite+0x138
ffffd000`52475660 fffff801`fe51b2cd nt!MiIssueSynchronousFlush+0x66
ffffd000`524756d0 fffff801`fe4a25e5 nt!MiFlushSectionInternal+0x775
ffffd000`524758e0 fffff801`fe45f0ab nt!MmFlushSection+0xa9
ffffd000`524759a0 fffff801`fe45f7cb nt!CcFlushCachePriv+0x493
(Inline Function) ` nt!CcFlushCache+0x1d (Inline Function @ fffff801`fe45f7cb)
ffffd000`52475ab0 fffff801`fe4a63f5 nt!CcWriteBehindInternal+0x17b
ffffd000`52475b40 fffff801`fe4a67ad nt!CcWriteBehind+0x95
ffffd000`52475be0 fffff801`fe4cea2f nt!CcWorkerThread+0x22d
ffffd000`52475c90 fffff801`fe514c10 nt!ExpWorkerThread+0x69f
ffffd000`52475d40 fffff801`fe56e8c6 nt!PspSystemThreadStartup+0x58
ffffd000`52475da0 00000000`00000000 nt!KxStartSystemThread+0x16
DO ffffe000b44477c0 Ext ffffe000b4447910 Adapter ffffe000b42241a0 Working
Vendor: HP Product: LOGICAL VOLUME SCSI ID: (0, 4, 0)
Claimed Enumerated
SlowLock Free RemLock 13 PageCount 1
QueueTagList: ffffe000b44479d0 Outstanding: Head ffffe000b4438040 Tail ffffe000b4448040 Timeout -2 (Timed Out)
DeviceQueue ffffe000b4447a00 Depth: 24 Status: Not Frozen PauseCount: 1 BusyCount: 0
IO Gateway: Busy Count 0 Pause Count 0
Requests: Outstanding 6 Device 4 ByPass 0
[Device-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
ffffe8007a2f5350 [SCSI] ffffe80078803820 n/a SCSI/WRITE (10) ffffe000b92e3f40 n/a 60s
ffffe000b8eaca20 [SCSI] ffffe000b9278e80 n/a SCSI/READ (10) ffffe000b6d06b30 n/a 60s
ffffe8007a32b010 [SCSI] ffffe8007935e230 n/a SCSI/READ (10) ffffe000b8cb7010 n/a 60s
ffffe8007a32e4e0 [SCSI] ffffe800787f5710 n/a SCSI/WRITE (10) ffffe8007a152f48 n/a 60s
[Bypass-Queued Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
[Outstanding Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
ffffe8007a3b89d0 [SCSI] ffffe80077e65a10 ffffe000b4438010 SCSI/WRITE (10) ffffe000b8f1ddf0 ffffe000b44380e0 60s
ffffe80078cc6010 [SCSI] ffffe80077f01990 ffffe000b4422010 SCSI/WRITE (10) ffffd000548f02b0 ffffe000b44220e0 60s
ffffe8007a2f5cf0 [SCSI] ffffe800788c17b0 ffffe000b443c010 SCSI/WRITE (10) ffffd000212357e0 ffffe000b443c0e0 60s
ffffe8007a1b1b60 [SCSI] ffffe80077312090 ffffe000b442c010 SCSI/WRITE (10) ffffe000b4253720 ffffe000b442c0e0 60s
ffffe8007a1b16b0 [SCSI] ffffe80078823d10 ffffe000b441a010 SCSI/READ (10) ffffe8007874e420 ffffe000b441a0e0 60s
ffffe000b8edd840 [SCSI] ffffe000b4714b40 ffffe000b4432010 SCSI/WRITE (10) ffffd000524757e0 ffffe000b44320e0 60s
ffffe800773256f0 [SCSI] ffffe000b8c7c770 ffffe000b4448010 RESET LUN 0000000000000000 0000000000000000 0s
[Completed Requests]
IRP SRB Type SRB XRB Command MDL SGList Timeout
ERROR: 7 counted requests > 6 outstanding requests
Regards, Vladimir Petter, Microsoft Corporation
Tuesday, July 26, 2016 6:21 AM
Hi Vladimir,
Thank you so much for your time. You are machine.
I`ll check with HP, because we are already with the latest SPP from HP.
Friday, November 11, 2016 5:19 PM
Hi Vladimir,
I've got the same problem on my Windows 2012R2 HyperV cluster.
I checked the memory dump but could not identify the real problem. Here are the dump information. Could you help me to see what's going wrong ?
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
USER_MODE_HEALTH_MONITOR (9e)
One or more critical user mode components failed to satisfy a health check.
Hardware mechanisms such as watchdog timers can detect that basic kernel
services are not executing. However, resource starvation issues, including
memory leaks, lock contention, and scheduling priority misconfiguration,
may block critical user mode components without blocking DPCs or
draining the nonpaged pool.
Kernel components can extend watchdog timer functionality to user mode
by periodically monitoring critical applications. This bugcheck indicates
that a user mode health check failed in a manner such that graceful
shutdown is unlikely to succeed. It restores critical services by
rebooting and/or allowing application failover to other servers.
Arguments:
Arg1: ffffe0002424b900, Process that failed to satisfy a health check within the
configured timeout
Arg2: 0000000000000690, Health monitoring timeout (seconds)
Arg3: 0000000000000005
Arg4: 0000000000000000
Debugging Details:
PROCESS_OBJECT: ffffe0002424b900
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x9E
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff800202c2468 to fffff802f9f519a0
STACK_TEXT:
ffffd000`cd2bf968 fffff800`202c2468 : 00000000`0000009e ffffe000`2424b900 00000000`00000690 00000000`00000005 : nt!KeBugCheckEx
ffffd000`cd2bf970 fffff800`202c20f2 : 00000000`00000000 00000000`00000001 ffffd000`cd2aa180 00000000`00000000 : netft!NetftProcessWatchdogEvent+0xe4
ffffd000`cd2bf9b0 fffff802`f9ecb3a8 : ffffd000`cd2bfb20 00000000`00000000 ffffe000`240d49f0 fffff800`2013acd5 : netft!NetftWatchdogTimerDpc+0x36
ffffd000`cd2bf9e0 fffff802`f9f554ea : ffffd000`cd2aa180 ffffd000`cd2aa180 ffffd000`cd2b6bc0 ffffe000`2c08e040 : nt!KiRetireDpcList+0x4f8
ffffd000`cd2bfc60 00000000`00000000 : ffffd000`cd2c0000 ffffd000`cd2ba000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
netft!NetftProcessWatchdogEvent+e4
fffff800`202c2468 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: netft!NetftProcessWatchdogEvent+e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netft
IMAGE_NAME: netft.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5434e860
BUCKET_ID_FUNC_OFFSET: e4
FAILURE_BUCKET_ID: 0x9E_netft!NetftProcessWatchdogEvent
BUCKET_ID: 0x9E_netft!NetftProcessWatchdogEvent
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x9e_netft!netftprocesswatchdogevent
FAILURE_ID_HASH: {fc992d70-4714-ccd6-c6b5-601c2a57cb6c}
Followup: MachineOwner
10: kd> !process ffffe0002424b900
PROCESS ffffe0002424b900
SessionId: 0 Cid: 153c Peb: 7ff6f6277000 ParentCid: 09cc
DirBase: 13da7a000 ObjectTable: ffffc0016bb10040 HandleCount: <Data Not Accessible>
Image: rhs.exe
VadRoot ffffe00022e05380 Vads 87 Clone 0 Private 592. Modified 12. Locked 0.
DeviceMap ffffc0015d00c3a0
Token ffffc00165ce9060
ElapsedTime 02:00:11.093
UserTime 00:00:00.031
KernelTime 00:00:00.031
QuotaPoolUsage[PagedPool] 76408
QuotaPoolUsage[NonPagedPool] 11248
Working Set Sizes (now,min,max) (1952, 50, 345) (7808KB, 200KB, 1380KB)
PeakWorkingSetSize 1891
VirtualSize 2097191 Mb
PeakVirtualSize 2097193 Mb
PageFaultCount 2285
MemoryPriority BACKGROUND
BasePriority 13
CommitCharge 639
THREAD ffffe0002424e080 Cid 153c.1654 Teb: 00007ff6f627e000 Win32Thread: fffff901406ddb60 WAIT: (UserRequest) UserMode Non-Alertable
ffffe8006ee78960 NotificationEvent
ffffe0002349f080 ProcessObject
ffffe000031f11b0 NotificationEvent
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 329056 Ticks: 144294 (0:00:37:34.593)
Context Switch Count 60 IdealProcessor: 23
UserTime 00:00:00.000
KernelTime 00:00:00.046
Win32 Start Address 0x00007ff6f6ce1c80
Stack Init ffffd000d503dc90 Current ffffd000d503cfc0
Base ffffd000d503e000 Limit ffffd000d5038000 Call 0
Priority 14 BasePriority 13 UnusualBoost 1 ForegroundBoost 0 IoPriority 2 PagePriority 5
Kernel stack not resident.
Child-SP RetAddr Call Site
ffffd000`d503d000 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`d503d140 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`d503d1e0 fffff802`f9e31f43 nt!KiCommitThreadWait+0x129
ffffd000`d503d260 fffff802`fa1c9929 nt!KeWaitForMultipleObjects+0x403
ffffd000`d503d320 fffff802`fa1c967a nt!ObWaitForMultipleObjects+0x289
ffffd000`d503d830 fffff802`f9f5d1b3 nt!NtWaitForMultipleObjects+0xd6
ffffd000`d503da90 00007ffb`b3cb11fa nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d503db00)
0000006d`24a5edc8 00000000`00000000 0x00007ffb`b3cb11fa
THREAD ffffe8006ee7f800 Cid 153c.1650 Teb: 00007ff6f627c000 Win32Thread: 0000000000000000 WAIT: (UserRequest) UserMode Non-Alertable
ffffe8006ee7f750 NotificationEvent
ffffe8006ee7f6d0 SynchronizationEvent
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 338992 Ticks: 134358 (0:00:34:59.343)
Context Switch Count 181 IdealProcessor: 25
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00007ff6f6cdf550
Stack Init ffffd000d5acec90 Current ffffd000d5acdfc0
Base ffffd000d5acf000 Limit ffffd000d5ac9000 Call 0
Priority 13 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Kernel stack not resident.
Child-SP RetAddr Call Site
ffffd000`d5ace000 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`d5ace140 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`d5ace1e0 fffff802`f9e31f43 nt!KiCommitThreadWait+0x129
ffffd000`d5ace260 fffff802`fa1c9929 nt!KeWaitForMultipleObjects+0x403
ffffd000`d5ace320 fffff802`fa1c967a nt!ObWaitForMultipleObjects+0x289
ffffd000`d5ace830 fffff802`f9f5d1b3 nt!NtWaitForMultipleObjects+0xd6
ffffd000`d5acea90 00007ffb`b3cb11fa nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d5aceb00)
0000006d`252bf678 00000000`00000000 0x00007ffb`b3cb11fa
THREAD ffffe8006ee84080 Cid 153c.16d8 Teb: 00007ff6f627a000 Win32Thread: 0000000000000000 WAIT: (UserRequest) UserMode Non-Alertable
ffffe8006dd2f060 SynchronizationEvent
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 329056 Ticks: 144294 (0:00:37:34.593)
Context Switch Count 16 IdealProcessor: 27
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00007ffbb3c533a0
Stack Init ffffd000d5506c90 Current ffffd000d5506760
Base ffffd000d5507000 Limit ffffd000d5501000 Call 0
Priority 15 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Kernel stack not resident.
Child-SP RetAddr Call Site
ffffd000`d55067a0 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`d55068e0 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`d5506980 fffff802`f9e5a8d0 nt!KiCommitThreadWait+0x129
ffffd000`d5506a00 fffff802`fa1eeec2 nt!KeWaitForSingleObject+0x2c0
ffffd000`d5506a90 fffff802`f9f5d1b3 nt!NtWaitForSingleObject+0xb2
ffffd000`d5506b00 00007ffb`b3cb0c8a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d5506b00)
0000006d`2533f6a8 00000000`00000000 0x00007ffb`b3cb0c8a
THREAD ffffe8006ee86080 Cid 153c.16c8 Teb: 00007ff6f6275000 Win32Thread: 0000000000000000 WAIT: (UserRequest) UserMode Non-Alertable
ffffe8006ee7f590 SynchronizationEvent
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 329056 Ticks: 144294 (0:00:37:34.593)
Context Switch Count 15 IdealProcessor: 31
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00007ffbaa0c1dc0
Stack Init ffffd000d54fcc90 Current ffffd000d54fc760
Base ffffd000d54fd000 Limit ffffd000d54f7000 Call 0
Priority 15 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Kernel stack not resident.
Child-SP RetAddr Call Site
ffffd000`d54fc7a0 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`d54fc8e0 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`d54fc980 fffff802`f9e5a8d0 nt!KiCommitThreadWait+0x129
ffffd000`d54fca00 fffff802`fa1eeec2 nt!KeWaitForSingleObject+0x2c0
ffffd000`d54fca90 fffff802`f9f5d1b3 nt!NtWaitForSingleObject+0xb2
ffffd000`d54fcb00 00007ffb`b3cb0c8a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d54fcb00)
0000006d`2549fe58 00000000`00000000 0x00007ffb`b3cb0c8a
THREAD ffffe8006ee87080 Cid 153c.1708 Teb: 00007ff6f6273000 Win32Thread: 0000000000000000 WAIT: (Executive) KernelMode Non-Alertable
ffffe0002bd3b360 SynchronizationEvent
IRP List:
ffffe80072954cf0: (0006,0310) Flags: 00000884 Mdl: 00000000
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 365873 Ticks: 107477 (0:00:27:59.328)
Context Switch Count 132 IdealProcessor: 33
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00007ff6f6cbe880
Stack Init ffffd000d563ac90 Current ffffd000d5638e60
Base ffffd000d563b000 Limit ffffd000d5635000 Call 0
Priority 14 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
*** ERROR: Module load completed but symbols could not be loaded for EX64.SYS
*** ERROR: Module load completed but symbols could not be loaded for SRTSP64.SYS
Child-SP RetAddr Call Site
ffffd000`d5638ea0 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`d5638fe0 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`d5639080 fffff802`f9e5a8d0 nt!KiCommitThreadWait+0x129
ffffd000`d5639100 fffff802`fa290399 nt!KeWaitForSingleObject+0x2c0
ffffd000`d5639190 fffff802`fa1e55b7 nt!IopAcquireFileObjectLock+0x85
ffffd000`d56391e0 fffff802`f9f5d1b3 nt!NtReadFile+0x8d7
ffffd000`d56392d0 fffff802`f9f55600 nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d5639340)
ffffd000`d56394d8 fffff800`1f4bc73c nt!KiServiceLinkage
ffffd000`d56394e0 fffff800`1f4bc89d EX64+0x273c
ffffd000`d5639550 fffff800`1f4bdf87 EX64+0x289d
ffffd000`d56395a0 fffff800`1f4c0087 EX64+0x3f87
ffffd000`d56395f0 fffff800`1f4c0468 EX64+0x6087
ffffd000`d56396b0 fffff800`1f4c0350 EX64+0x6468
ffffd000`d5639840 fffff800`1f4c0b35 EX64+0x6350
ffffd000`d5639910 fffff800`1f4c0e0d EX64+0x6b35
ffffd000`d5639a50 fffff800`1f4c2a4c EX64+0x6e0d
ffffd000`d5639af0 fffff800`1f4c888e EX64+0x8a4c
ffffd000`d5639cb0 fffff800`1f4c971b EX64+0xe88e
ffffd000`d5639e00 fffff800`1f4c991e EX64+0xf71b
ffffd000`d5639ee0 fffff800`1ed5240f EX64+0xf91e
ffffd000`d5639f40 fffff800`1ed525c7 SRTSP64+0x7940f
ffffd000`d5639fa0 fffff800`1eda031d SRTSP64+0x795c7
ffffd000`d563a000 fffff800`1ed9e198 SRTSP64+0xc731d
ffffd000`d563a070 fffff800`1ed9debc SRTSP64+0xc5198
ffffd000`d563a0f0 fffff800`1ed08718 SRTSP64+0xc4ebc
ffffd000`d563a150 fffff800`1ed08a40 SRTSP64+0x2f718
ffffd000`d563a180 fffff800`1ed406b1 SRTSP64+0x2fa40
ffffd000`d563a1b0 fffff800`1e6fc9d7 SRTSP64+0x676b1
ffffd000`d563a200 fffff800`1e6fd14d fltmgr!FltpPerformPostCallbacks+0x2d7
ffffd000`d563a2d0 fffff800`1e6fbbc1 fltmgr!FltpPassThroughCompletionWorker+0x7d
ffffd000`d563a340 fffff800`1e724349 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x371
ffffd000`d563a3e0 fffff802`fa240b91 fltmgr!FltpCreate+0x339
ffffd000`d563a490 fffff802`fa1ecc39 nt!IopParseDevice+0x6c1
ffffd000`d563a6b0 fffff802`fa1eaa63 nt!ObpLookupObjectName+0x6b9
ffffd000`d563a830 fffff802`fa2637ab nt!ObOpenObjectByName+0x1e3
ffffd000`d563a960 fffff802`fa263438 nt!IopCreateFile+0x36b
ffffd000`d563aa00 fffff802`f9f5d1b3 nt!NtCreateFile+0x78
ffffd000`d563aa90 00007ffb`b3cb119a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d563ab00)
0000006d`2561de18 00000000`00000000 0x00007ffb`b3cb119a
THREAD ffffe8006ee8b080 Cid 153c.1774 Teb: 00007ff6f614a000 Win32Thread: 0000000000000000 WAIT: (UserRequest) UserMode Non-Alertable
ffffe8006d89d710 NotificationEvent
ffffe8006ec92d60 NotificationEvent
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 436170 Ticks: 37180 (0:00:09:40.937)
Context Switch Count 421 IdealProcessor: 39
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00007ffbb30f0b70
Stack Init ffffd000d5adfc90 Current ffffd000d5adefc0
Base ffffd000d5ae0000 Limit ffffd000d5ada000 Call 0
Priority 14 BasePriority 13 UnusualBoost 1 ForegroundBoost 0 IoPriority 2 PagePriority 5
Kernel stack not resident.
Child-SP RetAddr Call Site
ffffd000`d5adf000 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`d5adf140 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`d5adf1e0 fffff802`f9e31f43 nt!KiCommitThreadWait+0x129
ffffd000`d5adf260 fffff802`fa1c9929 nt!KeWaitForMultipleObjects+0x403
ffffd000`d5adf320 fffff802`fa1c967a nt!ObWaitForMultipleObjects+0x289
ffffd000`d5adf830 fffff802`f9f5d1b3 nt!NtWaitForMultipleObjects+0xd6
ffffd000`d5adfa90 00007ffb`b3cb11fa nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d5adfb00)
0000006d`25a7f8f8 00000000`00000000 0x00007ffb`b3cb11fa
THREAD ffffe000263ee880 Cid 153c.151c Teb: 00007ff6f614e000 Win32Thread: 0000000000000000 WAIT: (WrLpcReply) UserMode Non-Alertable
ffffe000263eeeb0 Semaphore Limit 0x1
Waiting for reply to ALPC Message ffffc0015e5b9d00 : queued at port ffffe00023a68e40 : owned by process ffffe00023469900
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 338992 Ticks: 134358 (0:00:34:59.343)
Context Switch Count 545 IdealProcessor: 31
UserTime 00:00:00.031
KernelTime 00:00:00.031
Win32 Start Address 0x00007ffbb3c533a0
Stack Init ffffd000d7fe6c90 Current ffffd000d7fe6400
Base ffffd000d7fe7000 Limit ffffd000d7fe1000 Call 0
Priority 13 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Kernel stack not resident.
Child-SP RetAddr Call Site
ffffd000`d7fe6440 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`d7fe6580 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`d7fe6620 fffff802`f9e5a8d0 nt!KiCommitThreadWait+0x129
ffffd000`d7fe66a0 fffff802`f9e3d9c3 nt!KeWaitForSingleObject+0x2c0
ffffd000`d7fe6730 fffff802`fa1cb3c9 nt!AlpcpSignalAndWait+0x443
ffffd000`d7fe67e0 fffff802`fa1ca8c7 nt!AlpcpReceiveSynchronousReply+0x55
ffffd000`d7fe6840 fffff802`fa1ec520 nt!AlpcpProcessSynchronousRequest+0x377
ffffd000`d7fe69c0 fffff802`f9f5d1b3 nt!NtAlpcSendWaitReceivePort+0x270
ffffd000`d7fe6a90 00007ffb`b3cb14ca nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`d7fe6b00)
0000006d`2569e138 00000000`00000000 0x00007ffb`b3cb14ca
THREAD ffffe8006ec4e880 Cid 153c.1784 Teb: 00007ff6f6278000 Win32Thread: 0000000000000000 WAIT: (WrQueue) UserMode Alertable
ffffe8006d89ec80 QueueObject
Not impersonating
DeviceMap ffffc0015d00c3a0
Owning Process ffffe0002424b900 Image: rhs.exe
Attached Process N/A Image: N/A
Wait Start TickCount 472644 Ticks: 706 (0:00:00:11.031)
Context Switch Count 329 IdealProcessor: 33
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00007ffbb3c533a0
Stack Init ffffd000222f9c90 Current ffffd000222f9420
Base ffffd000222fa000 Limit ffffd000222f4000 Call 0
Priority 13 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`222f9460 fffff802`f9e32d7e nt!KiSwapContext+0x76
ffffd000`222f95a0 fffff802`f9e327f9 nt!KiSwapThread+0x14e
ffffd000`222f9640 fffff802`f9e314cd nt!KiCommitThreadWait+0x129
ffffd000`222f96c0 fffff802`f9e3104a nt!KeRemoveQueueEx+0x26d
ffffd000`222f9750 fffff802`f9e306fb nt!IoRemoveIoCompletion+0x8a
ffffd000`222f9870 fffff802`f9f5d1b3 nt!NtWaitForWorkViaWorkerFactory+0x30b
ffffd000`222f9a90 00007ffb`b3cb273a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`222f9b00)
0000006d`2541f3f8 00000000`00000000 0x00007ffb`b3cb273a
Saturday, November 12, 2016 12:03 AM
Please open a case with Microsoft support, and they will be able to analyze the memory dump for you and root cause what went wrong.
Thanks!
Elden
Friday, May 19, 2017 8:37 PM
Hello Vladimir, Sorry for replying to an old thread. But we just had a cluster server stop error with a 9E with the watch dog event. I've run the memory dump through the debugger and I can't find anything obvious about why it reached the timeout / bug-check threshold. I was wondering if someone could look at it with more knowledge in the debugger than I have?
Here is the 7-zip'd file.
https://1drv.ms/u/s!Aj_NX6R0CE7qeXLZMJXSCGH-Lqg
Thanks,
Dean
Wednesday, September 27, 2017 2:53 PM
Hello Vladimir,
Would you be helping me in analyzing a memory dump with bugcheck 19, {0x22, ffffe00017fb3000, 0, 0}?
server is a VM running windows 2012 on Esxi 6.0, it is rebooting after every 2-3 days with above mentioned bugcheck.
Thanks & Regards,
Suchit
Wednesday, February 14, 2018 8:42 AM
HI Vladimir,
Can you please analyze the memory dump file generated.
location: https://ibm.box.com/s/dnvntrh4dg2kd8gexqhbo9yiizg6pqnn
Sunday, March 25, 2018 1:20 AM
You can analyze the memory dump using WinDbg tool here: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools
Thursday, October 4, 2018 8:12 PM
Hi, I am having similar issue. Can I share the dump file?
Monday, June 10, 2019 3:11 PM
HI,Vladimir:
What command did you use for this dump file?I also suspect that it is a vmware disk problem.Thank you!
Monday, June 10, 2019 3:23 PM
Hello Hardy.
If you are looking at bugcheck 9e then first parameter of bugcheck is address of the process this watchdog was for. Start by running "!process <address> 1f". Stepping back a bit, always start with
.symfix
.reload
and then start trying other commands. This will fix symbols for you. Use lml to see what symbols are loaded.
Not going back. Once you dump that process look at the threads, and see if they are blocked on something in kernel. For instance if they are waiting on ERESOURCE then try to get address of ERESOURCE and use !locks <address> to see who owns it. Keep following wait chain.
If you get stuck then you can try your like by checking what is going on in storage using
!storagekd.unit
!storagekd.classext
I am inside Microsoft corpnet so I have access to private symbols, while you might be limited to public symbols only. As such I am not sure if storagekd will work for you. I am also not sure if it ships with public version of windbg. If you are blocked and can find a way to give me access to the dump I can take a look.
Regards,
Vladimir.
Regards, Vladimir Petter, Microsoft Corporation
Tuesday, June 11, 2019 4:42 PM
HI,Vladimir:
Thanks for your help, I have tried many times using windbg to prompt DBGHELP: Timeout to store: c:\symbols*http://msdl.microsoft.com/download/symbols. Please help you analyze the dmp file, thank you!
https://1drv.ms/u/s!ApZTZXkGWOEB2zmFbxqB072hED7A?e=dut0Bx
Tuesday, June 11, 2019 6:43 PM
What you have is a kernel minidump. Minidump would not be helpful for this class of issues because it includes only stack of the thread that triggered bugcheck, and we need all kernel threads and non-paged pool so we can follow threads wait chain. You need to change settings to collect full kernel dump on the next repro https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/enabling-a-kernel-mode-dump-file
Regards,
Vladimir Petter.
Regards, Vladimir Petter, Microsoft Corporation
Wednesday, July 24, 2019 5:25 PM
HI,Vladimir:
I have a system failure, I hope you can help analyze the problem! I hope you can open the link: https://pan.baidu.com/s/1zz6Xkj_qzlwiK2QrbkO2VQ Extraction code: if3l Thank you!
Thursday, July 25, 2019 2:48 AM
HI,Vladimir:
Not sure if you can open the Baidu network disk, I will change it to onedrive: https://1drv.ms/u/s!ApZTZXkGWOEB3DKLkm7MwHd-i_Wu .Thank you!
Tuesday, October 1, 2019 8:08 AM
HI,Vladimir
We have system failure at the same time at two Hyperv Cluster Windows 2012R2. Some hosts in the cluster restarted with bugcheck code 0x0000009E. In memory dump I can onli get this. All host are fw and software up tu date.
I put all dumps on share (mini and some full memory dump)
I hope you can help analyze the problem.
4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* USER_MODE_HEALTH_MONITOR (9e) One or more critical user mode components failed to satisfy a health check. Hardware mechanisms such as watchdog timers can detect that basic kernel services are not executing. However, resource starvation issues, including memory leaks, lock contention, and scheduling priority misconfiguration, may block critical user mode components without blocking DPCs or draining the nonpaged pool. Kernel components can extend watchdog timer functionality to user mode by periodically monitoring critical applications. This bugcheck indicates that a user mode health check failed in a manner such that graceful shutdown is unlikely to succeed. It restores critical services by rebooting and/or allowing application failover to other servers. Arguments: Arg1: ffffe000234e7080, Process that failed to satisfy a health check within the configured timeout Arg2: 000000000000003c, Health monitoring timeout (seconds) Arg3: 000000000000000a, WatchdogSourceClussvcIsAlive Cluster service sends heartbeat to netft every 500 millseconds. By default netft expects at least 1 heartbeat per second. If this watchdog was triggered that means clussvc is o not getting CPU to send heartbers. Arg4: 0000000000000000
Regards
Gorazd
Gorazd
Tuesday, October 1, 2019 6:06 PM
You have DPC storm on CPU0 from network activity. DPC storm is starving cluster service timer that is triggering sending heart to netft.sys. Since netft.sys has not recieved HB in 60 seconds it bugchecked machine.
To solve this issue you need to setup RSS/vRSS/VMQ to make sure network traffic is equally spread across all CPUs instead of all happening on CPU0.
In Windows Server 2019 we made number of improvements to reduce number of false positives watchdog timeouts.
- We increased timeout to 135 to be larger than commulative DPC timeout 120 seocnds so you would get a bugcheck from commulative DPC watchdog before the cluster watchdog.
- We changed default watchdog action from bugchck to take a LiveDump, terminate process, and extent watchdog to 20 minutes. Only if process termination does not complete in 20 minutes we would bugcheck machine.
CPU#0
Current DPC: NDIS!ndisInterruptDpc (Normal DPC)
Debugger Saved IRQL: 0
Cumulative DPC Time Limit: 120.000 seconds
Current Cumulative DPC Time: 60.156 seconds
Single DPC Time Limit: 20.000 seconds
Current Single DPC Time: 0.000 seconds
DPC History:
Deferred Routine Start Tick End Tick Duration (in seconds)
[00] NDIS!ndisInterruptDpc 0x3EDB 0x3EDB -
[01] NDIS!ndisInterruptDpc 0x3EDB 0x3EDB -
[02] NDIS!ndisInterruptDpc 0x3EDB (DPC Active)
[03] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[04] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[05] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[06] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[07] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[08] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[09] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[10] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[11] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[12] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[13] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[14] NDIS!ndisInterruptDpc 0x3EDA 0x3EDA -
[15] NDIS!ndisInterruptDpc 0x3EDA 0x3EDB 0.0156
You can also see number of threads are sitting on CPU0 in a ready state for almost 60 seconds
Processor 0: Ready Threads at priority 30
THREAD ffffe800edf29080 Cid 0c58.1cfc Teb: 00007ff692a72000 Win32Thread: 0000000000000000 READY on processor 0
IRP List:
ffffe0009b376ee0: (0006,0118) Flags: 00060030 Mdl: 00000000
Not impersonating
DeviceMap ffffc0000260c370
Owning Process ffffe0008fc27080 Image: vmms.exe
Attached Process N/A Image: N/A
Wait Start TickCount 12261 Ticks: 3830 (0:00:00:59.843)
Context Switch Count 931 IdealProcessor: 0
UserTime 00:00:00.015
KernelTime 00:00:00.000
Win32 Start Address 0x00007ffeeaaf8a10
Stack Init ffffd0002846dc90 Current ffffd0002846cc80
Base ffffd0002846e000 Limit ffffd00028468000 Call 0000000000000000
Priority 30 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`2846ccc0 fffff801`d123519b nt!KiSwapContext+0x76
(Inline Function) ` nt!KzCheckForThreadDispatch+0x134 (Inline Function @ fffff801`d123519b)
ffffd000`2846ce00 fffff801`d1234e7b nt!KiCheckForThreadDispatch+0x153
ffffd000`2846ce40 fffff801`d1234c8d nt!KeSetSystemGroupAffinityThread+0xfb
ffffd000`2846ce90 fffff801`d1234a3d nt!KeGenericProcessorCallback+0xdd
ffffd000`2846d000 fffff801`166326cc nt!KeFlushQueuedDpcsEx+0x11d
ffffd000`2846d1a0 fffff801`16632627 vmswitch!VmsOmpPortUninitializeFlowTable+0x1c
ffffd000`2846d1d0 fffff801`1662b52b vmswitch!VmsOmpPortDeleted+0xcb
ffffd000`2846d220 fffff801`1661ef22 vmswitch!VmsOmObjectRefCountDecrement+0x2f
ffffd000`2846d250 fffff801`1661d32f vmswitch!VmsOmPortDelete+0x3fa
(Inline Function) ` vmswitch!VmsCdpPortDeleteByName+0x24 (Inline Function @ fffff801`1661d32f)
ffffd000`2846d330 fffff801`1662bcca vmswitch!VmsCdpPortDelete+0x11f
ffffd000`2846d5c0 fffff801`1533018c vmswitch!VmsCdpDeviceControl+0x416
ffffd000`2846d5f0 fffff801`15331176 NDIS!ndisDummyIrpHandler+0x88
ffffd000`2846d620 fffff801`d168e0af NDIS!ndisDeviceControlIrpHandler+0x666
(Inline Function) ` nt!IoCallDriverWithTracing+0x7e (Inline Function @ fffff801`d168e0af)
(Inline Function) ` nt!IopCallDriverReference+0x187 (Inline Function @ fffff801`d168e0af)
ffffd000`2846d810 fffff801`d168f018 nt!IopSynchronousServiceTail+0x32b
ffffd000`2846d8e0 fffff801`d165e8a6 nt!IopXxxControlFile+0xdb8
ffffd000`2846da20 fffff801`d13592e3 nt!NtDeviceIoControlFile+0x56
ffffd000`2846da90 00007ffe`eab507ca nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`2846db00)
00000082`eeefe958 00000000`00000000 0x00007ffe`eab507ca
THREAD ffffe800eded4040 Cid 0004.17e8 Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
IRP List:
ffffe800f2b85ca0: (0006,0358) Flags: 00000404 Mdl: 00000000
Not impersonating
DeviceMap ffffc0000260c370
Owning Process ffffe00084020480 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 13221 Ticks: 2870 (0:00:00:44.843)
Context Switch Count 426 IdealProcessor: 0
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address nt!ExpWorkerThread (0xfffff801d1269430)
Stack Init ffffd00026d3fc90 Current ffffd00026d3f3c0
Base ffffd00026d40000 Limit ffffd00026d3a000 Call 0000000000000000
Priority 30 BasePriority 12 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`26d3f400 fffff801`d123519b nt!KiSwapContext+0x76
(Inline Function) ` nt!KzCheckForThreadDispatch+0x134 (Inline Function @ fffff801`d123519b)
ffffd000`26d3f540 fffff801`d1234e7b nt!KiCheckForThreadDispatch+0x153
ffffd000`26d3f580 fffff801`d1234c8d nt!KeSetSystemGroupAffinityThread+0xfb
ffffd000`26d3f5d0 fffff801`d1234a3d nt!KeGenericProcessorCallback+0xdd
ffffd000`26d3f740 fffff801`d1597e64 nt!KeFlushQueuedDpcsEx+0x11d
ffffd000`26d3f8e0 fffff801`1620529f nt!MmPageEntireDriver+0xa0
(Inline Function) ` Msfs!MsDereferenceVcb+0x26 (Inline Function @ fffff801`1620529f)
(Inline Function) ` Msfs!MsCommonClose+0x5b (Inline Function @ fffff801`1620529f)
ffffd000`26d3f910 fffff801`15474101 Msfs!MsFsdClose+0x6f
ffffd000`26d3f950 fffff801`d15cde0c fltmgr!FltpDispatch+0xf1
ffffd000`26d3f9b0 fffff801`d15c1e5c nt!IopDeleteFile+0x128
ffffd000`26d3fa30 fffff801`d125c9bf nt!ObpRemoveObjectRoutine+0x64
(Inline Function) ` nt!ObfDereferenceObjectWithTag+0x80 (Inline Function @ fffff801`d125c9bf)
ffffd000`26d3fa90 fffff801`1549eb9a nt!ObfDereferenceObject+0x8f
ffffd000`26d3fad0 fffff801`d1269acf fltmgr!FltpManualDeviceAttachWorker+0xc2
ffffd000`26d3fb50 fffff801`d12ccdc6 nt!ExpWorkerThread+0x69f
ffffd000`26d3fc00 fffff801`d1350e66 nt!PspSystemThreadStartup+0x18a
ffffd000`26d3fc60 00000000`00000000 nt!KxStartSystemThread+0x16
Processor 0: Ready Threads at priority 15
THREAD ffffe000a3bf9080 Cid 0004.2ffc Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
Not impersonating
DeviceMap ffffc0000260c370
Owning Process ffffe00084020480 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 12940 Ticks: 3151 (0:00:00:49.234)
Context Switch Count 7 IdealProcessor: 0
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address nt!EtwpLogger (0xfffff801d16afc78)
Stack Init ffffd0002bad9c90 Current ffffd0002bad9780
Base ffffd0002bada000 Limit ffffd0002bad4000 Call 0000000000000000
Priority 15 BasePriority 15 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`2bad97c0 fffff801`d123519b nt!KiSwapContext+0x76
(Inline Function) ` nt!KzCheckForThreadDispatch+0x134 (Inline Function @ fffff801`d123519b)
ffffd000`2bad9900 fffff801`d1234e7b nt!KiCheckForThreadDispatch+0x153
ffffd000`2bad9940 fffff801`d1234c8d nt!KeSetSystemGroupAffinityThread+0xfb
ffffd000`2bad9990 fffff801`d1234147 nt!KeGenericProcessorCallback+0xdd
ffffd000`2bad9b00 fffff801`d169d08e nt!KeGenericCallDpc+0x27
(Inline Function) ` nt!EtwpSynchronizeWithElevatedIrqlLogging+0xe (Inline Function @ fffff801`d169d08e)
ffffd000`2bad9b40 fffff801`d16afef5 nt!EtwpFreeLoggerContext+0x8e
ffffd000`2bad9b80 fffff801`d12ccdc6 nt!EtwpLogger+0x27d
ffffd000`2bad9c00 fffff801`d1350e66 nt!PspSystemThreadStartup+0x18a
ffffd000`2bad9c60 00000000`00000000 nt!KxStartSystemThread+0x16
Processor 0: Ready Threads at priority 14
THREAD ffffe800ee157880 Cid 1878.2c2c Teb: 00007ff71d04c000 Win32Thread: fffff90140740610 READY on processor 0
Not impersonating
DeviceMap ffffc000078c9eb0
Owning Process ffffe0008f9b8900 Image: vmwp.exe
Attached Process N/A Image: N/A
Wait Start TickCount 12271 Ticks: 3820 (0:00:00:59.687)
Context Switch Count 85 IdealProcessor: 0
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00007ffeeaaf8a10
Stack Init ffffd0002a173c90 Current ffffd0002a1737c0
Base ffffd0002a174000 Limit ffffd0002a16e000 Call 0000000000000000
Priority 14 BasePriority 8 PriorityDecrement 16 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`2a173800 fffff801`d12724e7 nt!KiSwapContext+0x76
(Inline Function) ` nt!KzCheckForThreadDispatch+0x101 (Inline Function @ fffff801`d12724e7)
(Inline Function) ` nt!KiCheckForThreadDispatch+0x101 (Inline Function @ fffff801`d12724e7)
ffffd000`2a173940 fffff801`d1233439 nt!KiProcessDeferredReadyList+0x13b
ffffd000`2a173980 fffff801`d160dcbb nt!KeSetLegacyAffinityThread+0xd9
ffffd000`2a1739e0 fffff801`d13592e3 nt!NtSetInformationThread+0x9ab
ffffd000`2a173b00 00007ffe`eab5082a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`2a173b00)
00000088`03cff018 00000000`00000000 0x00007ffe`eab5082a
Processor 0: Ready Threads at priority 12
THREAD ffffe00085b60880 Cid 0004.01c4 Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
Not impersonating
DeviceMap ffffc0000260c370
Owning Process ffffe00084020480 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 12261 Ticks: 3830 (0:00:00:59.843)
Context Switch Count 7542 IdealProcessor: 0
UserTime 00:00:00.000
KernelTime 00:00:00.062
Win32 Start Address nt!ExpWorkerThread (0xfffff801d1269430)
Stack Init ffffd00077b31c90 Current ffffd00077b31700
Base ffffd00077b32000 Limit ffffd00077b2c000 Call 0000000000000000
Priority 12 BasePriority 12 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`77b31740 fffff801`d123519b nt!KiSwapContext+0x76
(Inline Function) ` nt!KzCheckForThreadDispatch+0x134 (Inline Function @ fffff801`d123519b)
ffffd000`77b31880 fffff801`d1234e7b nt!KiCheckForThreadDispatch+0x153
ffffd000`77b318c0 fffff801`158023c2 nt!KeSetSystemGroupAffinityThread+0xfb
(Inline Function) ` vmbusr!WdmlibKeSetSystemGroupAffinityThread+0x20 (Inline Function @ fffff801`158023c2)
ffffd000`77b31910 fffff801`15817d24 vmbusr!PncPullMessage+0x4e
ffffd000`77b31980 fffff801`d126a920 vmbusr!XPartReceiveMessageWorkItem+0x7c
ffffd000`77b31ae0 fffff801`d1269acf nt!IopProcessWorkItem+0x80
ffffd000`77b31b50 fffff801`d12ccdc6 nt!ExpWorkerThread+0x69f
ffffd000`77b31c00 fffff801`d1350e66 nt!PspSystemThreadStartup+0x18a
ffffd000`77b31c60 00000000`00000000 nt!KxStartSystemThread+0x16
Processor 0: Ready Threads at priority 8
THREAD ffffe00085e49880 Cid 0004.01f8 Teb: 0000000000000000 Win32Thread: 0000000000000000 READY on processor 0
Not impersonating
DeviceMap ffffc0000260c370
Owning Process ffffe00084020480 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 12261 Ticks: 3830 (0:00:00:59.843)
Context Switch Count 5 IdealProcessor: 0
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address NDIS!ndisReceiveWorkerThread (0xfffff801152aedd0)
Stack Init ffffd000775c6c90 Current ffffd000775c67d0
Base ffffd000775c7000 Limit ffffd000775c1000 Call 0000000000000000
Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr Call Site
ffffd000`775c6810 fffff801`d13c7417 nt!KiSwapContext+0x76
ffffd000`775c6950 fffff801`d134c2af nt!KiQuantumEnd+0x52b
ffffd000`775c69a0 fffff801`d134eb69 nt!KiDispatchInterruptContinue+0x16
ffffd000`775c69d0 fffff801`d125daa7 nt!KiDpcInterrupt+0x2a9 (TrapFrame @ ffffd000`775c69d0)
ffffd000`775c6b68 fffff801`152aefc1 nt!KzLowerIrql+0x7
ffffd000`775c6b70 fffff801`d12ccdc6 NDIS!ndisReceiveWorkerThread+0x1f1
ffffd000`775c6c00 fffff801`d1350e66 nt!PspSystemThreadStartup+0x18a
ffffd000`775c6c60 00000000`00000000 nt!KxStartSystemThread+0x16
Regards, Vladimir Petter, Microsoft Corporation
Thursday, October 3, 2019 6:04 AM
Thanks for your help
Regards
Gorazd
Gorazd
Monday, February 24, 2020 4:07 PM
Techei, I am a developer on the clustering team. if the problem persists then you can share dump file with me (c:\windows\memory.dmp). I will take a look what exactly caused the bugcheck. if you do not want to share it with the world then give me your email, I'll reply with my email and you can share this dump with me. If you prefer work through customer support then they also should be able to look at the dump and tell you what netft is not happy about.
Regards, Vladimir Petter, Microsoft Corporation
Are you still able to do this with me sending you a direct link via email? I've got a server that dumps out with the same error fairly consistently and I can get you the dump file.
Thanks!
Monday, February 24, 2020 5:17 PM
Sure, happy to help. You can send me a link to vladp72 [at] yahoo [dot] com.
Thanks,
Vladimir.
Regards, Vladimir Petter, Microsoft Corporation
Sunday, July 19, 2020 10:51 PM
John_Alliance I'm having the same issue with 2012 R2. Could you help me out?