HyperBone icon indicating copy to clipboard operation
HyperBone copied to clipboard

Bugcheck 1E On call to StartHv()

Open nicholaskunes opened this issue 5 years ago • 2 comments

edit: fixed 1E bugcheck, this is a different one...

I am not running the tests, purely just attempting to virtualize each CPU so I removed the Test files. HyperBone is manually mapped into the system and all the imports are resolved properly but that's why the log says 'Unknown Module' instead of "Hyperbone.sys".

I do not have SEH enabled, I see that you are using __try/__except for unhandled exceptions, but only in UtilKernelBase and UtilSearchPattern. The call to UtilKernelBase is fine, and I never call UtilSearchPattern as I'm not setting any hooks.

Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\MEMORY.DMP] Could not open dump file [C:\Windows\MEMORY.DMP], Win32 error 0n2 "The system cannot find the file specified."

Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\041419-6953-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 17134 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Kernel base = 0xfffff80384e92000 PsLoadedModuleList = 0xfffff8038523f2b0 Debug session time: Sun Apr 14 14:24:51.641 2019 (UTC - 7:00) System Uptime: 0 days 0:10:19.437 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .............. Loading User Symbols Loading unloaded module list ........ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff8038503c0a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffcf8139dd5bd0=0000000000000133 5: kd> !analyze -v


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending component can usually be identified with a stack trace. Arg2: 0000000000000501, The DPC time count (in ticks). Arg3: 0000000000000500, The DPC time allotment (in ticks). Arg4: fffff803852de378, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding this single DPC timeout

Debugging Details:




*** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. ***


*** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. ***


*** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. ***


*** Type referenced: TickPeriods ***



*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER: LENOVO

SYSTEM_PRODUCT_NAME: 20349

SYSTEM_SKU: LENOVO_MT_20349_BU_idea_FM_Lenovo Y50-70 Touch

SYSTEM_VERSION: Lenovo Y50-70 Touch

BIOS_VENDOR: LENOVO

BIOS_VERSION: 9ECN31WW(V1.14)

BIOS_DATE: 08/18/2014

BASEBOARD_MANUFACTURER: LENOVO

BASEBOARD_PRODUCT: Lenovo Y50-70 Touch

BASEBOARD_VERSION: 31900058WIN

DUMP_TYPE: 2

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff803852de378

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

CPU_COUNT: 8

CPU_MHZ: 95a

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXPNP: 1 (!blackboxpnp)

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x133

PROCESS_NAME: System

CURRENT_IRQL: d

ANALYSIS_SESSION_HOST: DESKTOP-3HJM5HP

ANALYSIS_SESSION_TIME: 04-14-2019 14:27:17.0775

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER: from fffff803850670f7 to fffff8038503c0a0

STACK_TEXT:
ffffcf8139dd5bc8 fffff803850670f7 : 0000000000000133 0000000000000000 0000000000000501 0000000000000500 : nt!KeBugCheckEx ffffcf8139dd5bd0 fffff80384ed43ba : 0000015b94731e7a ffffcf8139db9180 0000000000000282 0000000000000000 : nt!KeAccumulateTicks+0x1903f7 ffffcf8139dd5c30 fffff80384e0951b : 0000015b9472f302 00000000052f5008 0000000000000000 ffffe40ea2501a00 : nt!KeClockInterruptNotify+0x9da ffffcf8139dd5f40 fffff80384f99a65 : ffffe40ea2501a00 ffffa88030261b50 fffffb0006fcad40 fffff80385260080 : hal!HalpTimerClockIpiRoutine+0x1b ffffcf8139dd5f70 fffff8038503d95a : ffffa88030261310 ffffe40ea2501a00 0000000000100000 fffffb0006e470e0 : nt!KiCallInterruptServiceRoutine+0xa5 ffffcf8139dd5fb0 fffff8038503de47 : 000000000024e00d 012e13a8fffffff8 0000000000000000 0000000000000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea ffffa88030261290 fffff80384f45fea : 0000000000000000 ffffa88030261520 0000000008100008 fffff80384ed8461 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffffa88030261420 fffff80384f6495b : 0000007f00000000 ffffe267c0a24fb0 ffffcf81449db000 ffffcf81449db690 : nt!MiFindContiguousPages+0x25a ffffa880302615d0 fffff80384f6477d : 3032303700000200 0000000000001000 0000000fffffffff 3431433000000000 : nt!MiAllocateContiguousMemory+0x1cb ffffa88030261680 fffff803850184c1 : ffffa880302617a0 0000000000074c00 ffffe267c0a24fb0 ffffe27133e05120 : nt!MmAllocateContiguousNodeMemory+0x8d ffffa880302616d0 fffff80385018479 : ffffffffffffffd2 ffffcf813d6840b7 0000000000000010 0000000000000206 : nt!MmAllocateContiguousMemorySpecifyCacheNode+0x31 ffffa88030261710 ffffcf813d6815e4 : 0000000000000001 fffff80384eb0733 ffffcf814434e7f8 ffffcf81449f6000 : nt!MmAllocateContiguousMemorySpecifyCache+0x19 ffffa88030261750 0000000000000001 : fffff80384eb0733 ffffcf814434e7f8 ffffcf81449f6000 0000000200000000 : 0xffffcf813d6815e4 ffffa88030261758 fffff80384eb0733 : ffffcf814434e7f8 ffffcf81449f6000 0000000200000000 0000000000000206 : 0x1 ffffa88030261760 ffffcf813d681461 : ffffcf814434e800 0000000000220000 ffffcf814434e000 0000000000000001 : nt!MmGetPhysicalAddress+0x13 ffffa88030261790 ffffcf814434e800 : 0000000000220000 ffffcf814434e000 0000000000000001 0000000000220000 : 0xffffcf813d681461 ffffa88030261798 0000000000220000 : ffffcf814434e000 0000000000000001 0000000000220000 0000000000220000 : 0xffffcf814434e800 ffffa880302617a0 ffffcf814434e000 : 0000000000000001 0000000000220000 0000000000220000 ffffe40ea36a7808 : 0x220000 ffffa880302617a8 0000000000000001 : 0000000000220000 0000000000220000 ffffe40ea36a7808 ffffcf813d681794 : 0xffffcf814434e000 ffffa880302617b0 0000000000220000 : 0000000000220000 ffffe40ea36a7808 ffffcf813d681794 0000000000000200 : 0x1 ffffa880302617b8 0000000000220000 : ffffe40ea36a7808 ffffcf813d681794 0000000000000200 ffffcf813d03f000 : 0x220000 ffffa880302617c0 ffffe40ea36a7808 : ffffcf813d681794 0000000000000200 ffffcf813d03f000 000000000003f600 : 0x220000 ffffa880302617c8 ffffcf813d681794 : 0000000000000200 ffffcf813d03f000 000000000003f600 0000000000000005 : 0xffffe40ea36a7808 ffffa880302617d0 0000000000000200 : ffffcf813d03f000 000000000003f600 0000000000000005 ffffe40ea36a7107 : 0xffffcf813d681794 ffffa880302617d8 ffffcf813d03f000 : 000000000003f600 0000000000000005 ffffe40ea36a7107 0000000000220000 : 0x200 ffffa880302617e0 000000000003f600 : 0000000000000005 ffffe40ea36a7107 0000000000220000 0000000200000200 : 0xffffcf813d03f000 ffffa880302617e8 0000000000000005 : ffffe40ea36a7107 0000000000220000 0000000200000200 ffffe40ea36a71a0 : 0x3f600 ffffa880302617f0 ffffe40ea36a7107 : 0000000000220000 0000000200000200 ffffe40ea36a71a0 0000000000000001 : 0x5 ffffa880302617f8 0000000000220000 : 0000000200000200 ffffe40ea36a71a0 0000000000000001 ffffa88030261b20 : 0xffffe40ea36a7107 ffffa88030261800 0000000200000200 : ffffe40ea36a71a0 0000000000000001 ffffa88030261b20 0000000000006000 : 0x220000 ffffa88030261808 ffffe40ea36a71a0 : 0000000000000001 ffffa88030261b20 0000000000006000 ffffcf813d681286 : 0x0000000200000200 ffffa88030261810 0000000000000001 : ffffa88030261b20 0000000000006000 ffffcf813d681286 ffffe40ea36a7808 : 0xffffe40ea36a71a0 ffffa88030261818 ffffa88030261b20 : 0000000000006000 ffffcf813d681286 ffffe40ea36a7808 ffffa88030261a10 : 0x1 ffffa88030261820 0000000000006000 : ffffcf813d681286 ffffe40ea36a7808 ffffa88030261a10 ffffe40ea36a71a0 : 0xffffa88030261b20 ffffa88030261828 ffffcf813d681286 : ffffe40ea36a7808 ffffa88030261a10 ffffe40ea36a71a0 ffffe40ea36a7808 : 0x6000 ffffa88030261830 ffffe40ea36a7808 : ffffa88030261a10 ffffe40ea36a71a0 ffffe40ea36a7808 ffffe40ea36a7808 : 0xffffcf813d681286 ffffa88030261838 ffffa88030261a10 : ffffe40ea36a71a0 ffffe40ea36a7808 ffffe40ea36a7808 ffffcf813d682572 : 0xffffe40ea36a7808 ffffa88030261840 ffffe40ea36a71a0 : ffffe40ea36a7808 ffffe40ea36a7808 ffffcf813d682572 ffffffffffffffff : 0xffffa88030261a10 ffffa88030261848 ffffe40ea36a7808 : ffffe40ea36a7808 ffffcf813d682572 ffffffffffffffff ffffe40ea36a71a0 : 0xffffe40ea36a71a0 ffffa88030261850 ffffe40ea36a7808 : ffffcf813d682572 ffffffffffffffff ffffe40ea36a71a0 0000000000001000 : 0xffffe40ea36a7808 ffffa88030261858 ffffcf813d682572 : ffffffffffffffff ffffe40ea36a71a0 0000000000001000 ffffa88030261b20 : 0xffffe40ea36a7808 ffffa88030261860 ffffffffffffffff : ffffe40ea36a71a0 0000000000001000 ffffa88030261b20 0000001000001000 : 0xffffcf813d682572 ffffa88030261868 ffffe40ea36a71a0 : 0000000000001000 ffffa88030261b20 0000001000001000 ffffe40ea9c55748 : 0xffffffffffffffff ffffa88030261870 0000000000001000 : ffffa88030261b20 0000001000001000 ffffe40ea9c55748 0000000000000000 : 0xffffe40ea36a71a0 ffffa88030261878 ffffa88030261b20 : 0000001000001000 ffffe40ea9c55748 0000000000000000 ffffcf813d681db0 : 0x1000 ffffa88030261880 0000001000001000 : ffffe40ea9c55748 0000000000000000 ffffcf813d681db0 ffffe40ea36a71a0 : 0xffffa88030261b20 ffffa88030261888 ffffe40ea9c55748 : 0000000000000000 ffffcf813d681db0 ffffe40ea36a71a0 ffffa880348229d0 : 0x0000001000001000 ffffa88030261890 0000000000000000 : ffffcf813d681db0 ffffe40ea36a71a0 ffffa880348229d0 00000000001ad002 : 0xffffe40e`a9c55748

THREAD_SHA1_HASH_MOD_FUNC: b61f6390c98229687b65418b88421ef4a52369bb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a39f3b870a29025524265824a6eedad5e5609aba

THREAD_SHA1_HASH_MOD: d5e908d356bf8d04aac79332806776dc287dfa54

FOLLOWUP_IP: nt!KeAccumulateTicks+1903f7 fffff803`850670f7 cc int 3

FAULT_INSTR_CODE: f68445cc

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!KeAccumulateTicks+1903f7

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 5ca31432

IMAGE_VERSION: 10.0.17134.706

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1903f7

FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks

BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks

PRIMARY_PROBLEM_CLASS: 0x133_DPC_nt!KeAccumulateTicks

TARGET_TIME: 2019-04-14T21:24:51.000Z

OSBUILD: 17134

OSSERVICEPACK: 706

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-04-02 00:50:10

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 434f

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x133_dpc_nt!keaccumulateticks

FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}

Followup: MachineOwner

nicholaskunes avatar Apr 14 '19 10:04 nicholaskunes

hello, how you can fix 0x1E problem ?

YangKi1902 avatar May 04 '19 03:05 YangKi1902

figure this out? I get this as well, but do not in vmware with test mode enabled.

JakeDahl avatar Jun 22 '19 17:06 JakeDahl