Quantcast
Channel: Hyper-V forum
Viewing all articles
Browse latest Browse all 8743

Hyper-V Host Blue screens when I power on a VM

$
0
0

Hi,

I have a Windows 2016 standard server that I have installed Hyper-V on.

I have created a VM and before I can install Windows Server on the VM or if even just leave it to power on, the physical machine blue screens.

The Memory.dmp file give me the following info:

Microsoft (R) Windows Debugger Version 10.0.17763.1 X86

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 14393 MP (16 procs) Free x64

Product: LanManNt, suite: TerminalServer SingleUserTS

Built by: 14393.3383.amd64fre.rs1_release.191125-1816

Machine Name:

Kernel base = 0xfffff802`1f888000 PsLoadedModuleList = 0xfffff802`1fb8b020

Debug session time: Thu Feb 27 23:04:52.935 2020 (UTC + 0:00)

System Uptime: 0 days 0:10:45.421

Loading Kernel Symbols

...............................................................

................................................................

....................................

Loading User Symbols

PEB is paged out (Peb.Ldr = 0000000f`657bc018). Type ".hh dbgerr001" for details

Loading unloaded module list

.......

*******************************************************************************

*                                                                            *

*                       Bugcheck Analysis                                    *

*                                                                            *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 133, {1, 1e00, fffff8021fc2d540, 0}

*************************************************************************

***                                                                  ***

***                                                                  ***

***   Either you specified an unqualified symbol, or your debugger  ***

***   doesn't have full symbol information.  Unqualified symbol     ***

***   resolution is turned off by default. Please either specify a  ***

***   fully qualified symbol module!symbolname, or enable resolution ***

***   of unqualified symbols by typing ".symopt- 100". Note that    ***

***   enabling unqualified symbol resolution with network symbol    ***

***   server shares in the symbol path may cause the debugger to    ***

***   appear to hang for long periods of time when an incorrect     ***

***   symbol name is typed or the network symbol server is down.    ***

***                                                                  ***

***   For some commands to work properly, your symbol path          ***

***   must point to .pdb files that have full type information.     ***

***                                                                  ***

***   Certain .pdb files (such as the public OS symbols) do not     ***

***   contain the required information.  Contact the group that     ***

***   provided you with these symbols if you need this command to    ***

***   work.                                                         ***

***                                                                  ***

***   Type referenced: TickPeriods                                  ***

***                                                                  ***

*************************************************************************

Probably caused by : ntkrnlmp.exe ( nt!KeAccumulateTicks+42a )

Followup:    MachineOwner

---------

0: kd> !analyze -v

*******************************************************************************

*                                                                            *

*                       Bugcheck Analysis                                   *

*                                                                            *

*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)

The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL

or above.

Arguments:

Arg1: 0000000000000001, The system cumulatively spent an extended period of time at

         DISPATCH_LEVEL or above. The offending component can usually be

         identified with a stack trace.

Arg2: 0000000000001e00, The watchdog period.

Arg3: fffff8021fc2d540, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains

         additional information regarding the cumulative timeout

Arg4: 0000000000000000

Debugging Details:

------------------

*************************************************************************

***                                                                  ***

***                                                                  ***

***   Either you specified an unqualified symbol, or your debugger  ***

***   doesn't have full symbol information.  Unqualified symbol     ***

***   resolution is turned off by default. Please either specify a  ***

***   fully qualified symbol module!symbolname, or enable resolution ***

***   of unqualified symbols by typing ".symopt- 100". Note that    ***

***   enabling unqualified symbol resolution with network symbol    ***

***   server shares in the symbol path may cause the debugger to    ***

***   appear to hang for long periods of time when an incorrect     ***

***   symbol name is typed or the network symbol server is down.    ***

***                                                                  ***

***   For some commands to work properly, your symbol path          ***

***   must point to .pdb files that have full type information.     ***

***                                                                  ***

***   Certain .pdb files (such as the public OS symbols) do not     ***

***   contain the required information.  Contact the group that     ***

***   provided you with these symbols if you need this command to   ***

***   work.                                                         ***

***                                                                  ***

***   Type referenced: TickPeriods                                  ***

***                                                                  ***

*************************************************************************

KEY_VALUES_STRING: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 14393.3383.amd64fre.rs1_release.191125-1816

SYSTEM_MANUFACTURER: HP

SYSTEM_PRODUCT_NAME: ProLiant DL360 Gen9

SYSTEM_SKU: 843374-425

BIOS_VENDOR: HP

BIOS_VERSION: P89

BIOS_DATE: 10/25/2017

BASEBOARD_MANUFACTURER: HP

BASEBOARD_PRODUCT: ProLiant DL360 Gen9

DUMP_TYPE: 1

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8021fc2d540

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: 10

CPU_MHZ: 832

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4f

CPU_STEPPING: 1

CPU_MICROCODE: 6,4f,1,0 (F,M,S,R) SIG: B00002C'00000000 (cache) B00002C'00000000 (init)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x133

PROCESS_NAME: dwm.exe

CURRENT_IRQL: d

ANALYSIS_SESSION_HOST: Server2016

ANALYSIS_SESSION_TIME: 02-28-2020 10:33:02.0542

ANALYSIS_VERSION: 10.0.17763.1 x86fre

LAST_CONTROL_TRANSFER: from fffff8021f933e0a to fffff8021f9e4e00

STACK_TEXT: 

fffff802`21a1bd88 fffff802`1f933e0a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`1fc2d540 : nt!KeBugCheckEx

fffff802`21a1bd90 fffff802`1f931058 : 0000ce61`e90ef725 00000000`00000000 ffffd981`30b37918 fffff780`00000320 : nt!KeAccumulateTicks+0x42a

fffff802`21a1bdf0 fffff802`1f80f4e5 : fffff802`1f85b6b0 fffff802`1f85b6b0 00000000`00000001 00000000`00000000 : nt!KeClockInterruptNotify+0xb8

fffff802`21a1bf40 fffff802`1f8e6236 : ffff8080`05947350 ffffd981`2ed67280 ffffd981`2ed67288 fffff802`1f9e621a : hal!HalpTimerClockIpiRoutine+0x15

fffff802`21a1bf70 fffff802`1f9e65fa : ffffd981`30b37380 00000000`00000000 fffff080`ddba0e28 ffff8080`00000000 : nt!KiCallInterruptServiceRoutine+0x106

fffff802`21a1bfb0 fffff802`1f9e6ae7 : ffff8080`0570d228 00000000`058c3110 00000000`00000000 fffff802`1fa7750c : nt!KiInterruptSubDispatchNoLockNoEtw+0xea

ffffd981`30b37300 fffff802`1f94765e : 00000000`058c3110 00000000`00000000 00000000`00000000 fffff802`1fa77041 : nt!KiInterruptDispatchNoLockNoEtw+0x37

ffffd981`30b37490 fffff802`1f946197 : 00000000`00000001 00000000`001d01e0 00000000`00000080 fffff802`1f9105e3 : nt!MiPfnShareCountIsZero+0x42e

ffffd981`30b374e0 fffff802`1f91418d : 00000000`00000000 fffff080`ddba0ff8 ffffd981`30b37750 9c000001`c652d867 : nt!MiDeletePteRun+0x507

ffffd981`30b37650 fffff802`1f90bd57 : ffffc300`317d1880 ffffd981`30b37939 ffffc300`32789a60 fffff802`1f8ffd78 : nt!MiDeleteVirtualAddresses+0xd5d

ffffd981`30b37870 fffff802`1f8e5955 : 000001bb`7429ffff 000001bb`7429ffff 000001bb`73da0000 ffffc300`32789a60 : nt!MiDeleteVad+0x277

ffffd981`30b379a0 fffff802`1fcf98bd : 00000000`00000000 000001bb`73da0000 00000000`00000000 00000000`00000000 : nt!MiFreeVadRange+0x4d

ffffd981`30b379e0 fffff802`1f9f4903 : ffffc300`31e485c0 00000000`ffffffff 00000000`00000000 ffffc300`3233c960 : nt!NtFreeVirtualMemory+0x2dd

ffffd981`30b37b00 00007ffd`60d65e04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

0000000f`659fea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`60d65e04

THREAD_SHA1_HASH_MOD_FUNC: 8ff6605fc97e89cc1ae4e27ff955ac4a7c511c79

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 08f97060e3daed93bce1aa5a5fd3880a672c6751

THREAD_SHA1_HASH_MOD: a46c1b556d92394c8d3f63eb407b2ed053afd34a

FOLLOWUP_IP:

nt!KeAccumulateTicks+42a

fffff802`1f933e0a cc             int    3

FAULT_INSTR_CODE: cccccccc

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!KeAccumulateTicks+42a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 5ddcba81

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 42a

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks

TARGET_TIME: 2020-02-27T23:04:52.000Z

OSBUILD: 14393

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 2

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 LanManNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-11-26 05:39:13

BUILDDATESTAMP_STR: 191125-1816

BUILDLAB_STR: rs1_release

BUILDOSVER_STR: 10.0.14393.3383.amd64fre.rs1_release.191125-1816

ANALYSIS_SESSION_ELAPSED_TIME: 1bf6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:    MachineOwner

---------

Thanks



Viewing all articles
Browse latest Browse all 8743

Trending Articles