Skip to content

Commit baf0488

Browse files
committed
updates
1 parent dd306dd commit baf0488

2 files changed

Lines changed: 121 additions & 85 deletions

File tree

support/windows-server/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2774,6 +2774,8 @@ items:
27742774
href: ./virtualization/degraded-integration-services-message.md
27752775
- name: Hyper-V Time Synchronization doesn't adjust the VM system clock
27762776
href: ./virtualization/virtual-machine-time-not-synced.md
2777+
- name: Hyper-V virtual machine input, migration, and device integration issues
2778+
href: ./virtualization/hyper-v-virtual-machine-input-migration-integration.md
27772779
- name: Unknown devices in Device manager
27782780
href: ./virtualization/unknown-device-vmbus-virtual-machine.md
27792781
- name: Uptime value of Hyper-V Management console changes to the resume time
Lines changed: 119 additions & 85 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Hyper-V Virtual Machine Input, Migration, and Device Integration Issues
2+
title: Troubleshoot Hyper-V Virtual Machine Input, Migration, and Device Integration Issues
33
description: Provides a comprehensive guide to troubleshoot common issues encountered with Hyper-V virtual machines (VMs).
44
ms.date: 08/18/2025
55
manager: dcscontentpm
@@ -10,96 +10,101 @@ ms.custom:
1010
- sap:virtualization and hyper-v\integration components
1111
- pcy:WinComm Storage High Avail
1212
---
13-
# Troubleshooting Hyper-V Virtual Machine Input, Migration, and Device Integration Issues
13+
# Troubleshoot Hyper-V virtual machine input, migration, and device integration issues
1414

15-
This article provides a comprehensive guide to troubleshoot common issues encountered with Hyper-V virtual machines (VMs). It focuses on resolving problems related to device integration (such as mouse, keyboard, GPU, or USB), migration, and enhanced session mode. These issues may arise following platform upgrades, changes in cluster configurations, or migrations from other hypervisors, like VMware. Addressing these problems is critical to maintaining VM usability, ensuring network connectivity, and supporting business operations.
15+
This article provides a comprehensive guide to troubleshoot common issues encountered with Hyper-V virtual machines (VMs). It focuses on resolving problems related to device integration (such as mouse, keyboard, graphics processing unit (GPU), or USB), migration, and enhanced session mode. These issues might arise following platform upgrades, changes in cluster configurations, or migrations from other hypervisors, like VMware. Addressing these problems is critical to maintaining VM usability, ensuring network connectivity, and supporting business operations.
1616

17-
## Symptoms
18-
19-
### End-user symptoms
17+
## End-user symptoms
2018

2119
- Mouse movements appear inverted vertically in Linux guest VMs after upgrading to Windows 11.
2220
- Mouse and keyboard become unresponsive in Windows 11 VMs when using Enhanced Session Mode.
2321
- Failure to perform live migration of VMs with Trusted Platform Module (TPM) enabled.
24-
- VMs assigned to VLANs lose network connectivity.
22+
- VMs assigned to virtual local area networks (VLANs) lose network connectivity.
2523
- Inability to connect USB devices or GPU cards to VMs after migration from VMware.
2624
- VMs experience frequent, random reboots or unexpected connectivity loss to business applications.
2725

28-
### Technical/system symptoms
29-
30-
- **Error messages or Event IDs**: - “Failed to remove checkpoint. (Virtual machine ID …)”
31-
- “Virtual machine failed to generate VHD tree: Catastrophic failure (0x8000FFFF)”
32-
- “Cannot delete checkpoint: Catastrophic failure (0x8000FFFF)”
33-
- “The system cannot find the file specified.”
34-
- Event ID 1069 (Failover Clustering): Cluster resource failure.
35-
- Event ID 41 (Kernel-Power): System rebooted without a clean shutdown.
36-
- Event ID 18502 (Hyper-V-Worker): VM was turned off.
37-
- Event ID 3056 (Hyper-V-Worker): NUMA topology mismatch warning.
38-
- Event ID 1106 (Hyper-V VMMS): Access violation (c0000005) during live migration.
39-
- Reliability Monitor shows repeated SCVMM agent crashes.
26+
## Technical/system symptoms
27+
28+
- Error messages or event IDs:
29+
30+
- > Failed to remove checkpoint. (Virtual machine ID …)
31+
- > Virtual machine failed to generate VHD tree: Catastrophic failure (0x8000FFFF)
32+
- > Cannot delete checkpoint: Catastrophic failure (0x8000FFFF)
33+
- > The system cannot find the file specified.
34+
- Event ID 1069 (Failover Clustering): Cluster resource failure.
35+
- Event ID 41 (Kernel-Power): System rebooted without a clean shutdown.
36+
- Event ID 18502 (Hyper-V-Worker): VM was turned off.
37+
- Event ID 3056 (Hyper-V-Worker): NUMA topology mismatch warning.
38+
- Event ID 1106 (Hyper-V VMMS): Access violation (c0000005) during live migration.
39+
- Reliability Monitor shows repeated System Center Virtual Machine Manager (SCVMM) agent crashes.
40+
4041
- Inability to uninstall VMware Tools after migration to Hyper-V.
41-
- VMs hang or become unresponsive, with high CPU usage by services like WMI or LSASS.
42+
- VMs hang or become unresponsive, with high CPU usage by services like Windows Management Instrumentation (WMI) or Local Security Authority Subsystem Service (LSASS).
4243
- Hyper-V Manager displays orphaned checkpoints that block backups.
4344

44-
## Cause
45+
## Cause 1: Input and device integration failures
4546

46-
### Input and device integration failures
47+
- Operating system (OS) or hypervisor compatibility: Upgrading the host OS (for example, to Windows 11, version 24H2) might introduce changes in Hyper-V integration services, leading to input inversion or loss, especially in non-Windows guest VMs.
48+
- Enhanced Session Mode: Protocol or driver issues might disrupt input device functionality within Enhanced Session Mode on Windows 11 VMs.
49+
- Migration from VMware: Incomplete or incompatible removal of VMware Tools or differences in device passthrough (for example, USB or GPU) between VMware and Hyper-V might cause connectivity and performance problems.
4750

48-
- **OS/Hypervisor compatibility**: Upgrading the host OS (for example, to Windows 11 24H2) may introduce changes in Hyper-V integration services, leading to input inversion or loss, especially in non-Windows guest VMs.
49-
- **Enhanced Session Mode**: Protocol or driver issues may disrupt input device functionality within Enhanced Session Mode on Windows 11 VMs.
50-
- **Migration from VMware**: Incomplete or incompatible removal of VMware Tools or differences in device passthrough (for example, USB or GPU) between VMware and Hyper-V may cause connectivity and performance problems.
51+
### Resolution: Input and device integration issues
5152

52-
### Migration and cluster failures
53+
#### A. Mouse or keyboard issues in guest VMs
5354

54-
- **TPM/shielded VM certificate misconfiguration**: Missing or improperly transferred shielding certificates can prevent live migration for TPM-enabled VMs.
55-
- **VLAN/network configuration**: Physical switch port misconfigurations or legacy network teaming setups may isolate VMs after VLAN assignment.
56-
- **VM configuration version**: Outdated VM configuration versions may be incompatible with newer Hyper-V hosts, leading to migration failures.
57-
- **Heartbeat integration**: High CPU usage, resource exhaustion, or application hangs within VMs may trigger cluster heartbeat failures, resulting in forced restarts.
55+
- For inverted mouse input in Linux guest VMs on Windows 11, version 24H2, revert the host OS to Windows 11, version 23H2 until a permanent fix is available.
56+
- To resolve Enhanced Session Mode input loss in Windows 11 VMs, follow these steps:
5857

59-
### File system and storage issues
58+
1. Open **Hyper-V Manager**.
59+
2. Navigate to **Hyper-V Settings** > **Enhanced Session Mode Policy**.
60+
3. Uncheck **Allow enhanced session mode** to disable the feature.
61+
4. Test input functionality in standard session mode.
6062

61-
- **Orphaned checkpoints**: Incomplete merge operations can leave behind phantom checkpoint files, blocking backups or checkpoint deletions.
62-
- **File system corruption**: Issues with storage or the file system may disrupt checkpoint removal or VHD chain updates.
63+
#### B. USB or GPU passthrough after VMware migration
6364

64-
### Application-level and third-party integration
65+
- USB devices:
6566

66-
- **Monitoring/agent crashes**: Third-party monitoring or agent software (such as SCVMM or Zenoss) may fail due to changes in Hyper-V or Windows Server. These failures often occur without a direct impact unless associated with failed operations.
67+
- Use Remote Desktop USB redirection or Enhanced Session Mode for supported OSs.
68+
- Alternatively, configure a network USB solution as Hyper-V doesn't natively support direct USB passthrough.
6769

68-
## Resolution
70+
- GPU assignment: Use Discrete Device Assignment (DDA):
6971

70-
### 1. Input and device integration issues
72+
- Follow guidance from [Deploying graphics devices using DDA](/windows-server/virtualization/hyper-v/deploy/deploying-graphics-devices-using-dda#configure-the-vm-for-dda).
73+
- Confirm hardware, drivers, and VM configuration support for DDA.
7174

72-
#### A. Mouse/keyboard issues in guest VMs
75+
#### C. Uninstalling VMware tools
7376

74-
- For inverted mouse input in Linux guest VMs on Windows 11 24H2, revert the host OS to Windows 11 23H2 until a permanent fix is available.
75-
- To resolve Enhanced Session Mode input loss in Windows 11 VMs: 1. Open **Hyper-V Manager**.
76-
2. Navigate to **Hyper-V Settings > Enhanced Session Mode Policy**.
77-
3. Uncheck **Allow enhanced session mode** to disable the feature.
78-
4. Test input functionality in standard session mode.
77+
Use PowerShell scripts, like **Uninstall-VMwareTools.ps1** from GitHub, to forcibly remove VMware tools and associated services after migration.
7978

80-
#### B. USB/GPU passthrough after VMware migration
79+
## Cause 2: Migration and cluster failures
8180

82-
- **USB devices**: - Use Remote Desktop USB redirection or Enhanced Session Mode for supported OSs.
83-
- Alternatively, configure a network USB solution as Hyper-V does not natively support direct USB passthrough.
84-
- **GPU assignment**: Use Discrete Device Assignment (DDA): - Follow guidance from [Deploying graphics devices using DDA](https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/deploying-graphics-devices-using-dda#configure-the-vm-for-dda).
85-
- Confirm hardware, drivers, and VM configuration support for DDA.
81+
- TPM/shielded VM certificate misconfiguration: Missing or improperly transferred shielding certificates can prevent live migration for TPM-enabled VMs.
82+
- VLAN/network configuration: Physical switch port misconfigurations or legacy network teaming setups might isolate VMs after VLAN assignment.
83+
- VM configuration version: Outdated VM configuration versions might be incompatible with newer Hyper-V hosts, leading to migration failures.
84+
- Heartbeat integration: High CPU usage, resource exhaustion, or application hangs within VMs might trigger cluster heartbeat failures, resulting in forced restarts.
8685

87-
#### C. Uninstalling VMware Tools
86+
### Resolution: Migration and cluster issues
8887

89-
- Use PowerShell scripts, like Uninstall-VMwareTools.ps1 from GitHub, to forcibly remove VMware Tools and associated services after migration.
88+
#### A. TPM/shielded VM migration failures
9089

91-
### 2. Migration and cluster issues
90+
1. On the source node, list shielded VM certificates by using the following command:
9291

93-
#### A. TPM/shielded VM migration failures
92+
```console
93+
bashcertutil -store "Shielded VM Local Certificates"
94+
```
9495

95-
1. On the source node, list Shielded VM certificates:bashcertutil -store "Shielded VM Local Certificates"
96-
2. Export encryption and signing certificates:
96+
2. Export encryption and signing certificates by using the following commands:
9797

98-
```plaintext
98+
```console
9999
certutil -exportPFX -p <password> "Shielded VM Local Certificates" <SerialNumber> c:\cert-VMEncryption.pfx
100100
certutil -exportPFX -p <password> "Shielded VM Local Certificates" <SerialNumber> c:\cert-VMSigning.pfx
101101
```
102-
3. Import certificates on the target node:```bashcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMEncryption.pfxcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMSigning.pfx
102+
103+
3. Import certificates on the target node by using the following command:
104+
105+
```console
106+
bashcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMEncryption.pfxcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMSigning.pfx
107+
```
103108

104109
#### B. VLAN/network connectivity
105110

@@ -109,79 +114,108 @@ This article provides a comprehensive guide to troubleshoot common issues encoun
109114

110115
#### C. VM configuration version
111116

112-
- Update the VM configuration:
117+
Update the VM configuration by using the following cmdlet:
113118

114-
```plaintext
115-
Update-VMVersion -Name <VMName>
116-
```
117-
- After updating, test live migration. If issues persist, shut down the VM, perform a quick migration, and then restart.
119+
```powershell
120+
Update-VMVersion -Name <VMName>
121+
```
122+
123+
After the updating, test live migration. If issues persist, shut down the VM, perform a quick migration, and then restart.
118124

119125
#### D. Cluster/heartbeat-related reboots
120126

121-
- If VMs are rebooted due to heartbeat failures: 1. Disable the Heartbeat Integration Service for affected VMs: - Go to **VM settings > Integration Services**.
122-
- Uncheck **Heartbeat**.
123-
2. Monitor VM stability. If high CPU usage (for example, by WMI or LSASS) is detected, investigate resource usage.
124-
3. Collect memory dumps for analysis:```bashDebug-VM -Name -InjectNonMaskableInterrupt -Force
127+
If VMs are rebooted due to heartbeat failures, follow these steps:
125128

126-
### 3. File system, storage, and checkpoint failures
129+
1. Disable the Heartbeat Integration Service for affected VMs:
130+
1. Go to **VM settings > Integration Services**.
131+
2. Uncheck **Heartbeat**.
132+
2. Monitor VM stability. If high CPU usage (for example, by WMI or LSASS) is detected, investigate resource usage.
133+
3. Collect memory dumps for analysis by using the following command:
127134

128-
#### A. Orphaned/phantom checkpoints
135+
```console
136+
-Name -InjectNonMaskableInterrupt -Force
137+
```
138+
139+
## Cause 3: File system and storage issues
140+
141+
- Orphaned checkpoints: Incomplete merge operations can leave behind phantom checkpoint files, blocking backups or checkpoint deletions.
142+
- File system corruption: Issues with storage or the file system might disrupt checkpoint removal or VHD chain updates.
143+
144+
### Resolution: File system, storage, and checkpoint failures
145+
146+
#### Orphaned/phantom checkpoints
129147

130148
1. Create a new checkpoint for the affected VM.
131149
2. Export the latest checkpoint to a safe location.
132150
3. Delete the VM from Hyper-V Manager.
133151
4. Import the VM back into Hyper-V using the restore option. For clusters, remove the VM from the cluster, recreate it with the same configuration, attach the existing VHD/VHDX, and add it back to the cluster.
134152
5. Inspect checkpoints using PowerShell:
135153

136-
```plaintext
154+
```powershell
137155
Get-VM -Name <VMName> | Get-VMSnapshot
138156
Get-VHDChain -Path <path-to-vhdx>
139157
```
158+
140159
6. Use tools like Process Monitor (procmon) to trace file access and verify system integrity.
141160

142-
### 4. Application-level and third-party integration issues
161+
## Cause 4: Application-level and third-party integration
162+
163+
- Monitoring/agent crashes: Third-party monitoring or agent software (such as SCVMM or Zenoss) might fail due to changes in Hyper-V or Windows Server. These failures often occur without a direct impact unless associated with failed operations.
164+
165+
### Resolution: Application-level and third-party integration issues
143166

144-
- If monitoring or agent integration fails: - Verify WMI and WINRM configurations on hosts.
145-
- Review application logs for authentication errors, such as GSS challenge failures.
146-
- If Hyper-V and WMI are functional, escalate to the third-party vendor for further support.
167+
- If monitoring or agent integration fails:
147168

148-
### 5. General remediation and prevention
169+
- Verify WMI and WINRM configurations on hosts.
170+
- Review application logs for authentication errors, such as GSS challenge failures.
171+
- If Hyper-V and WMI are functional, escalate to the third-party vendor for further support.
172+
173+
## General remediation and prevention
149174

150175
- Apply the latest Windows updates and cluster patches.
151176
- Regularly monitor storage infrastructure to prevent file system corruption.
152177
- Maintain up-to-date documentation of VM configurations, certificates, and network settings.
153-
- For security vulnerabilities, ensure correct revocation policies and registry settings:```bashSet-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name EnableVirtualizationBasedSecurity -Value 0 -Type DWordRestart-Computer
178+
- For security vulnerabilities, ensure correct revocation policies and registry settings by using the following command:
179+
180+
```console
181+
bashSet-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name EnableVirtualizationBasedSecurity -Value 0 -Type DWordRestart-Computer
182+
```
154183

155184
## Data collection
156185

157186
To collect logs and information:
158-
- **Cluster and event logs**: Gather TSS logs, Performance Monitor data, and Event Viewer logs (Hyper-V-VMMS, Hyper-V-Worker, System, Application).
159-
- **VM configuration**:
160187

161-
```plaintext
188+
- Cluster and event logs: Gather TSS logs, Performance Monitor data, and Event Viewer logs (Hyper-V-VMMS, Hyper-V-Worker, System, Application).
189+
- VM configuration:
190+
191+
```powershell
162192
Update-VMVersion -Name <VMName>
163193
```
164-
- **Snapshot/checkpoint inspection**:
165194

166-
```plaintext
195+
- Snapshot/checkpoint inspection:
196+
197+
```powershell
167198
Get-VM -Name <VMName> | Get-VMSnapshot
168199
Get-VHDChain -Path <path-to-vhdx>
169200
```
170-
- **Certificate management**:
171201

172-
```plaintext
202+
- Certificate management:
203+
204+
```console
173205
certutil -store "Shielded VM Local Certificates"
174206
certutil -exportPFX ...
175207
certutil -importPFX ...
176208
```
177-
- **Memory dump collection**:
178209

179-
```plaintext
210+
- Memory dump collection:
211+
212+
```powershell
180213
Debug-VM -Name <VMName> -InjectNonMaskableInterrupt -Force
181214
```
182-
- **Process/file system monitoring**: Use Process Monitor (procmon) to track errors.
215+
216+
- Process/file system monitoring: Use Process Monitor (procmon) to track errors.
183217

184218
## References
185219

186220
- [Deploying graphics devices using DDA](https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/deploying-graphics-devices-using-dda#configure-the-vm-for-dda)
187-
- Check Microsoft advisories for relevant updates and patches.
221+
- Check Microsoft advisories for relevant updates and patches.

0 commit comments

Comments
 (0)