Hi,
I have a Windows 2016 standard server that I have installed Hyper-V on.
I have created a VM and before I can install Windows Server on the VM or if even just leave it to power on, the physical machine blue screens.
The Memory.dmp file give me the following info:
Microsoft (R) Windows Debugger Version 10.0.17763.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (16 procs) Free x64
Product: LanManNt, suite: TerminalServer SingleUserTS
Built by: 14393.3383.amd64fre.rs1_release.191125-1816
Machine Name:
Kernel base = 0xfffff802`1f888000 PsLoadedModuleList = 0xfffff802`1fb8b020
Debug session time: Thu Feb 27 23:04:52.935 2020 (UTC + 0:00)
System Uptime: 0 days 0:10:45.421
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000000f`657bc018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {1, 1e00, fffff8021fc2d540, 0}
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
Probably caused by : ntkrnlmp.exe ( nt!KeAccumulateTicks+42a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8021fc2d540, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 14393.3383.amd64fre.rs1_release.191125-1816
SYSTEM_MANUFACTURER: HP
SYSTEM_PRODUCT_NAME: ProLiant DL360 Gen9
SYSTEM_SKU: 843374-425
BIOS_VENDOR: HP
BIOS_VERSION: P89
BIOS_DATE: 10/25/2017
BASEBOARD_MANUFACTURER: HP
BASEBOARD_PRODUCT: ProLiant DL360 Gen9
DUMP_TYPE: 1
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8021fc2d540
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CPU_COUNT: 10
CPU_MHZ: 832
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 4f
CPU_STEPPING: 1
CPU_MICROCODE: 6,4f,1,0 (F,M,S,R) SIG: B00002C'00000000 (cache) B00002C'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: dwm.exe
CURRENT_IRQL: d
ANALYSIS_SESSION_HOST: Server2016
ANALYSIS_SESSION_TIME: 02-28-2020 10:33:02.0542
ANALYSIS_VERSION: 10.0.17763.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8021f933e0a to fffff8021f9e4e00
STACK_TEXT:
fffff802`21a1bd88 fffff802`1f933e0a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`1fc2d540 : nt!KeBugCheckEx
fffff802`21a1bd90 fffff802`1f931058 : 0000ce61`e90ef725 00000000`00000000 ffffd981`30b37918 fffff780`00000320 : nt!KeAccumulateTicks+0x42a
fffff802`21a1bdf0 fffff802`1f80f4e5 : fffff802`1f85b6b0 fffff802`1f85b6b0 00000000`00000001 00000000`00000000 : nt!KeClockInterruptNotify+0xb8
fffff802`21a1bf40 fffff802`1f8e6236 : ffff8080`05947350 ffffd981`2ed67280 ffffd981`2ed67288 fffff802`1f9e621a : hal!HalpTimerClockIpiRoutine+0x15
fffff802`21a1bf70 fffff802`1f9e65fa : ffffd981`30b37380 00000000`00000000 fffff080`ddba0e28 ffff8080`00000000 : nt!KiCallInterruptServiceRoutine+0x106
fffff802`21a1bfb0 fffff802`1f9e6ae7 : ffff8080`0570d228 00000000`058c3110 00000000`00000000 fffff802`1fa7750c : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
ffffd981`30b37300 fffff802`1f94765e : 00000000`058c3110 00000000`00000000 00000000`00000000 fffff802`1fa77041 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd981`30b37490 fffff802`1f946197 : 00000000`00000001 00000000`001d01e0 00000000`00000080 fffff802`1f9105e3 : nt!MiPfnShareCountIsZero+0x42e
ffffd981`30b374e0 fffff802`1f91418d : 00000000`00000000 fffff080`ddba0ff8 ffffd981`30b37750 9c000001`c652d867 : nt!MiDeletePteRun+0x507
ffffd981`30b37650 fffff802`1f90bd57 : ffffc300`317d1880 ffffd981`30b37939 ffffc300`32789a60 fffff802`1f8ffd78 : nt!MiDeleteVirtualAddresses+0xd5d
ffffd981`30b37870 fffff802`1f8e5955 : 000001bb`7429ffff 000001bb`7429ffff 000001bb`73da0000 ffffc300`32789a60 : nt!MiDeleteVad+0x277
ffffd981`30b379a0 fffff802`1fcf98bd : 00000000`00000000 000001bb`73da0000 00000000`00000000 00000000`00000000 : nt!MiFreeVadRange+0x4d
ffffd981`30b379e0 fffff802`1f9f4903 : ffffc300`31e485c0 00000000`ffffffff 00000000`00000000 ffffc300`3233c960 : nt!NtFreeVirtualMemory+0x2dd
ffffd981`30b37b00 00007ffd`60d65e04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000000f`659fea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`60d65e04
THREAD_SHA1_HASH_MOD_FUNC: 8ff6605fc97e89cc1ae4e27ff955ac4a7c511c79
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 08f97060e3daed93bce1aa5a5fd3880a672c6751
THREAD_SHA1_HASH_MOD: a46c1b556d92394c8d3f63eb407b2ed053afd34a
FOLLOWUP_IP:
nt!KeAccumulateTicks+42a
fffff802`1f933e0a cc int 3
FAULT_INSTR_CODE: cccccccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeAccumulateTicks+42a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5ddcba81
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 42a
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks
TARGET_TIME: 2020-02-27T23:04:52.000Z
OSBUILD: 14393
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 2
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 LanManNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-11-26 05:39:13
BUILDDATESTAMP_STR: 191125-1816
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.3383.amd64fre.rs1_release.191125-1816
ANALYSIS_SESSION_ELAPSED_TIME: 1bf6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
Thanks