HyperBone
HyperBone copied to clipboard
Bugcheck 1E On call to StartHv()
edit: fixed 1E bugcheck, this is a different one...
I am not running the tests, purely just attempting to virtualize each CPU so I removed the Test files. HyperBone is manually mapped into the system and all the imports are resolved properly but that's why the log says 'Unknown Module' instead of "Hyperbone.sys".
I do not have SEH enabled, I see that you are using __try/__except for unhandled exceptions, but only in UtilKernelBase and UtilSearchPattern. The call to UtilKernelBase is fine, and I never call UtilSearchPattern as I'm not setting any hooks.
Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP] Could not open dump file [C:\Windows\MEMORY.DMP], Win32 error 0n2 "The system cannot find the file specified."
Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\041419-6953-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 17134 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Kernel base = 0xfffff803
84e92000 PsLoadedModuleList = 0xfffff803
8523f2b0 Debug session time: Sun Apr 14 14:24:51.641 2019 (UTC - 7:00) System Uptime: 0 days 0:10:19.437 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .............. Loading User Symbols Loading unloaded module list ........ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff8038503c0a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffcf81
39dd5bd0=0000000000000133 5: kd> !analyze -v
*
Bugcheck Analysis *
*
DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending component can usually be identified with a stack trace. Arg2: 0000000000000501, The DPC time count (in ticks). Arg3: 0000000000000500, The DPC time allotment (in ticks). Arg4: fffff803852de378, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding this single DPC timeout
Debugging Details:
*** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. ***
*** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. ***
*** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. ***
*** Type referenced: TickPeriods ***
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: LENOVO
SYSTEM_PRODUCT_NAME: 20349
SYSTEM_SKU: LENOVO_MT_20349_BU_idea_FM_Lenovo Y50-70 Touch
SYSTEM_VERSION: Lenovo Y50-70 Touch
BIOS_VENDOR: LENOVO
BIOS_VERSION: 9ECN31WW(V1.14)
BIOS_DATE: 08/18/2014
BASEBOARD_MANUFACTURER: LENOVO
BASEBOARD_PRODUCT: Lenovo Y50-70 Touch
BASEBOARD_VERSION: 31900058WIN
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff803852de378
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
CPU_COUNT: 8
CPU_MHZ: 95a
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: System
CURRENT_IRQL: d
ANALYSIS_SESSION_HOST: DESKTOP-3HJM5HP
ANALYSIS_SESSION_TIME: 04-14-2019 14:27:17.0775
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff803850670f7 to fffff8038503c0a0
STACK_TEXT:
ffffcf8139dd5bc8 fffff803
850670f7 : 0000000000000133 00000000
00000000 0000000000000501 00000000
00000500 : nt!KeBugCheckEx ffffcf8139dd5bd0 fffff803
84ed43ba : 0000015b94731e7a ffffcf81
39db9180 0000000000000282 00000000
00000000 : nt!KeAccumulateTicks+0x1903f7 ffffcf8139dd5c30 fffff803
84e0951b : 0000015b9472f302 00000000
052f5008 0000000000000000 ffffe40e
a2501a00 : nt!KeClockInterruptNotify+0x9da ffffcf8139dd5f40 fffff803
84f99a65 : ffffe40ea2501a00 ffffa880
30261b50 fffffb0006fcad40 fffff803
85260080 : hal!HalpTimerClockIpiRoutine+0x1b ffffcf8139dd5f70 fffff803
8503d95a : ffffa88030261310 ffffe40e
a2501a00 0000000000100000 fffffb00
06e470e0 : nt!KiCallInterruptServiceRoutine+0xa5 ffffcf8139dd5fb0 fffff803
8503de47 : 000000000024e00d 012e13a8
fffffff8 0000000000000000 00000000
00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea ffffa88030261290 fffff803
84f45fea : 0000000000000000 ffffa880
30261520 0000000008100008 fffff803
84ed8461 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffffa88030261420 fffff803
84f6495b : 0000007f00000000 ffffe267
c0a24fb0 ffffcf81449db000 ffffcf81
449db690 : nt!MiFindContiguousPages+0x25a ffffa880302615d0 fffff803
84f6477d : 3032303700000200 00000000
00001000 0000000fffffffff 34314330
00000000 : nt!MiAllocateContiguousMemory+0x1cb ffffa88030261680 fffff803
850184c1 : ffffa880302617a0 00000000
00074c00 ffffe267c0a24fb0 ffffe271
33e05120 : nt!MmAllocateContiguousNodeMemory+0x8d ffffa880302616d0 fffff803
85018479 : ffffffffffffffd2 ffffcf81
3d6840b7 0000000000000010 00000000
00000206 : nt!MmAllocateContiguousMemorySpecifyCacheNode+0x31 ffffa88030261710 ffffcf81
3d6815e4 : 0000000000000001 fffff803
84eb0733 ffffcf814434e7f8 ffffcf81
449f6000 : nt!MmAllocateContiguousMemorySpecifyCache+0x19 ffffa88030261750 00000000
00000001 : fffff80384eb0733 ffffcf81
4434e7f8 ffffcf81449f6000 00000002
00000000 : 0xffffcf813d6815e4 ffffa880
30261758 fffff80384eb0733 : ffffcf81
4434e7f8 ffffcf81449f6000 00000002
00000000 0000000000000206 : 0x1 ffffa880
30261760 ffffcf813d681461 : ffffcf81
4434e800 0000000000220000 ffffcf81
4434e000 0000000000000001 : nt!MmGetPhysicalAddress+0x13 ffffa880
30261790 ffffcf814434e800 : 00000000
00220000 ffffcf814434e000 00000000
00000001 0000000000220000 : 0xffffcf81
3d681461 ffffa88030261798 00000000
00220000 : ffffcf814434e000 00000000
00000001 0000000000220000 00000000
00220000 : 0xffffcf814434e800 ffffa880
302617a0 ffffcf814434e000 : 00000000
00000001 0000000000220000 00000000
00220000 ffffe40ea36a7808 : 0x220000 ffffa880
302617a8 0000000000000001 : 00000000
00220000 0000000000220000 ffffe40e
a36a7808 ffffcf813d681794 : 0xffffcf81
4434e000 ffffa880302617b0 00000000
00220000 : 0000000000220000 ffffe40e
a36a7808 ffffcf813d681794 00000000
00000200 : 0x1 ffffa880302617b8 00000000
00220000 : ffffe40ea36a7808 ffffcf81
3d681794 0000000000000200 ffffcf81
3d03f000 : 0x220000 ffffa880302617c0 ffffe40e
a36a7808 : ffffcf813d681794 00000000
00000200 ffffcf813d03f000 00000000
0003f600 : 0x220000 ffffa880302617c8 ffffcf81
3d681794 : 0000000000000200 ffffcf81
3d03f000 000000000003f600 00000000
00000005 : 0xffffe40ea36a7808 ffffa880
302617d0 0000000000000200 : ffffcf81
3d03f000 000000000003f600 00000000
00000005 ffffe40ea36a7107 : 0xffffcf81
3d681794 ffffa880302617d8 ffffcf81
3d03f000 : 000000000003f600 00000000
00000005 ffffe40ea36a7107 00000000
00220000 : 0x200 ffffa880302617e0 00000000
0003f600 : 0000000000000005 ffffe40e
a36a7107 0000000000220000 00000002
00000200 : 0xffffcf813d03f000 ffffa880
302617e8 0000000000000005 : ffffe40e
a36a7107 0000000000220000 00000002
00000200 ffffe40ea36a71a0 : 0x3f600 ffffa880
302617f0 ffffe40ea36a7107 : 00000000
00220000 0000000200000200 ffffe40e
a36a71a0 0000000000000001 : 0x5 ffffa880
302617f8 0000000000220000 : 00000002
00000200 ffffe40ea36a71a0 00000000
00000001 ffffa88030261b20 : 0xffffe40e
a36a7107 ffffa88030261800 00000002
00000200 : ffffe40ea36a71a0 00000000
00000001 ffffa88030261b20 00000000
00006000 : 0x220000 ffffa88030261808 ffffe40e
a36a71a0 : 0000000000000001 ffffa880
30261b20 0000000000006000 ffffcf81
3d681286 : 0x0000000200000200 ffffa880
30261810 0000000000000001 : ffffa880
30261b20 0000000000006000 ffffcf81
3d681286 ffffe40ea36a7808 : 0xffffe40e
a36a71a0 ffffa88030261818 ffffa880
30261b20 : 0000000000006000 ffffcf81
3d681286 ffffe40ea36a7808 ffffa880
30261a10 : 0x1 ffffa88030261820 00000000
00006000 : ffffcf813d681286 ffffe40e
a36a7808 ffffa88030261a10 ffffe40e
a36a71a0 : 0xffffa88030261b20 ffffa880
30261828 ffffcf813d681286 : ffffe40e
a36a7808 ffffa88030261a10 ffffe40e
a36a71a0 ffffe40ea36a7808 : 0x6000 ffffa880
30261830 ffffe40ea36a7808 : ffffa880
30261a10 ffffe40ea36a71a0 ffffe40e
a36a7808 ffffe40ea36a7808 : 0xffffcf81
3d681286 ffffa88030261838 ffffa880
30261a10 : ffffe40ea36a71a0 ffffe40e
a36a7808 ffffe40ea36a7808 ffffcf81
3d682572 : 0xffffe40ea36a7808 ffffa880
30261840 ffffe40ea36a71a0 : ffffe40e
a36a7808 ffffe40ea36a7808 ffffcf81
3d682572 ffffffffffffffff : 0xffffa880
30261a10 ffffa88030261848 ffffe40e
a36a7808 : ffffe40ea36a7808 ffffcf81
3d682572 ffffffffffffffff ffffe40e
a36a71a0 : 0xffffe40ea36a71a0 ffffa880
30261850 ffffe40ea36a7808 : ffffcf81
3d682572 ffffffffffffffff ffffe40e
a36a71a0 0000000000001000 : 0xffffe40e
a36a7808 ffffa88030261858 ffffcf81
3d682572 : ffffffffffffffff ffffe40e
a36a71a0 0000000000001000 ffffa880
30261b20 : 0xffffe40ea36a7808 ffffa880
30261860 ffffffffffffffff : ffffe40e
a36a71a0 0000000000001000 ffffa880
30261b20 0000001000001000 : 0xffffcf81
3d682572 ffffa88030261868 ffffe40e
a36a71a0 : 0000000000001000 ffffa880
30261b20 0000001000001000 ffffe40e
a9c55748 : 0xffffffffffffffff ffffa880
30261870 0000000000001000 : ffffa880
30261b20 0000001000001000 ffffe40e
a9c55748 0000000000000000 : 0xffffe40e
a36a71a0 ffffa88030261878 ffffa880
30261b20 : 0000001000001000 ffffe40e
a9c55748 0000000000000000 ffffcf81
3d681db0 : 0x1000 ffffa88030261880 00000010
00001000 : ffffe40ea9c55748 00000000
00000000 ffffcf813d681db0 ffffe40e
a36a71a0 : 0xffffa88030261b20 ffffa880
30261888 ffffe40ea9c55748 : 00000000
00000000 ffffcf813d681db0 ffffe40e
a36a71a0 ffffa880348229d0 : 0x00000010
00001000 ffffa88030261890 00000000
00000000 : ffffcf813d681db0 ffffe40e
a36a71a0 ffffa880348229d0 00000000
001ad002 : 0xffffe40e`a9c55748THREAD_SHA1_HASH_MOD_FUNC: b61f6390c98229687b65418b88421ef4a52369bb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a39f3b870a29025524265824a6eedad5e5609aba
THREAD_SHA1_HASH_MOD: d5e908d356bf8d04aac79332806776dc287dfa54
FOLLOWUP_IP: nt!KeAccumulateTicks+1903f7 fffff803`850670f7 cc int 3
FAULT_INSTR_CODE: f68445cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeAccumulateTicks+1903f7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5ca31432
IMAGE_VERSION: 10.0.17134.706
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1903f7
FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
PRIMARY_PROBLEM_CLASS: 0x133_DPC_nt!KeAccumulateTicks
TARGET_TIME: 2019-04-14T21:24:51.000Z
OSBUILD: 17134
OSSERVICEPACK: 706
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-04-02 00:50:10
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 434f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_dpc_nt!keaccumulateticks
FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}
Followup: MachineOwner
hello, how you can fix 0x1E problem ?
figure this out? I get this as well, but do not in vmware with test mode enabled.