P
p_maldini3
Hi All,
I am having issue with my Hyper-v server, this is the 1st time I have unexpected reboot this occurred directly after having remote session for few seconds then suddenly I lost the control, when I checked the logs and found Bugcheck event ID : 1001,
The computer has rebooted from a bugcheck. The bugcheck was 0x00020001 (....). A dump was saved in : C:\Windows\MEMORY.DMP.
ReportID: ...
, so I ran windbg to read memory.dmp
Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*Symbol information
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 8 Kernel Version 9200 MP (12 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 9200.22794.amd64fre.win8_ldr.190606-0600
Machine Name:
Kernel base = 0xfffff802`80a08000 PsLoadedModuleList = 0xfffff802`80ca49c0
Debug session time: Thu Aug 8 11:41:53.058 2019 (UTC + 4:00)
System Uptime: 6 days 4:16:58.654
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 20001, {11, 210260, 1005, fffff80080001d40}
Page 1eee17a not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!HvlNmiCallbackRoutine+54 )
Followup: MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
HYPERVISOR_ERROR (20001)
The hypervisor has encountered a fatal error.
Arguments:
Arg1: 0000000000000011
Arg2: 0000000000210260
Arg3: 0000000000001005
Arg4: fffff80080001d40
Debugging Details:
------------------
Page 1eee17a not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
BUGCHECK_STR: 0x20001_11_210260
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: f
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff80280b0b7e4 to fffff80280bb7720
STACK_TEXT:
fffff880`03198f78 fffff802`80b0b7e4 : 00000000`00020001 00000000`00000011 00000000`00210260 00000000`00001005 : nt!KeBugCheckEx
fffff880`03198f80 fffff802`80b1bb10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlNmiCallbackRoutine+0x54
fffff880`03198fc0 fffff802`80b1b108 : fffff880`03199170 fffff802`80a52719 fffff880`03189180 fffff880`031991f0 : nt!KiHandleNmi+0x20
fffff880`03198ff0 fffff802`80bc2902 : fffff880`03189180 fffff880`031991f0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0x158
fffff880`03199030 fffff802`80bc2730 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxNmiInterrupt+0x82
fffff880`03199170 fffff802`81146fff : fffff802`80b8379f 00000000`00000001 00000000`00000000 fffffa80`64de2010 : nt!KiNmiInterrupt+0x1b0
fffff880`031bb9c8 fffff802`80b8379f : 00000000`00000001 00000000`00000000 fffffa80`64de2010 fffffa80`64de2010 : hal!HalProcessorIdle+0xf
fffff880`031bb9d0 fffff802`80b7e9e8 : fffff880`03189180 fffffa80`00000008 00000000`00000000 00000000`00000008 : nt!PpmIdleGuestExecute+0x13
fffff880`031bba00 fffff802`80b7efa0 : 00000000`00000000 00000000`0136b92d fffff880`031bbb68 fffff880`031bbb70 : nt!PpmIdleExecuteTransition+0x3c8
fffff880`031bbb20 fffff802`80bbcf2c : fffff880`03189180 fffff880`03189180 00000000`00000000 fffff880`03199300 : nt!PoIdle+0x1e0
fffff880`031bbc60 00000000`00000000 : fffff880`031bc000 fffff880`031b6000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!HvlNmiCallbackRoutine+54
fffff802`80b0b7e4 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!HvlNmiCallbackRoutine+54
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5cf92fac
IMAGE_VERSION: 6.2.9200.22794
BUCKET_ID_FUNC_OFFSET: 54
FAILURE_BUCKET_ID: 0x20001_11_210260_nt!HvlNmiCallbackRoutine
BUCKET_ID: 0x20001_11_210260_nt!HvlNmiCallbackRoutine
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x20001_11_210260_nt!hvlnmicallbackroutine
FAILURE_ID_HASH: {7e330efc-1027-03b5-a8c2-285ccbe7dbd8}
Followup: MachineOwner
---------
Dell PE T620 Server usage : 5 years old,
OS windows server standard 2012,
has any one encountered this issue before?
any reply or help would be highly appreciated
Continue reading...
I am having issue with my Hyper-v server, this is the 1st time I have unexpected reboot this occurred directly after having remote session for few seconds then suddenly I lost the control, when I checked the logs and found Bugcheck event ID : 1001,
The computer has rebooted from a bugcheck. The bugcheck was 0x00020001 (....). A dump was saved in : C:\Windows\MEMORY.DMP.
ReportID: ...
, so I ran windbg to read memory.dmp
Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*Symbol information
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 8 Kernel Version 9200 MP (12 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 9200.22794.amd64fre.win8_ldr.190606-0600
Machine Name:
Kernel base = 0xfffff802`80a08000 PsLoadedModuleList = 0xfffff802`80ca49c0
Debug session time: Thu Aug 8 11:41:53.058 2019 (UTC + 4:00)
System Uptime: 6 days 4:16:58.654
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 20001, {11, 210260, 1005, fffff80080001d40}
Page 1eee17a not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!HvlNmiCallbackRoutine+54 )
Followup: MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
HYPERVISOR_ERROR (20001)
The hypervisor has encountered a fatal error.
Arguments:
Arg1: 0000000000000011
Arg2: 0000000000210260
Arg3: 0000000000001005
Arg4: fffff80080001d40
Debugging Details:
------------------
Page 1eee17a not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
BUGCHECK_STR: 0x20001_11_210260
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: f
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff80280b0b7e4 to fffff80280bb7720
STACK_TEXT:
fffff880`03198f78 fffff802`80b0b7e4 : 00000000`00020001 00000000`00000011 00000000`00210260 00000000`00001005 : nt!KeBugCheckEx
fffff880`03198f80 fffff802`80b1bb10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlNmiCallbackRoutine+0x54
fffff880`03198fc0 fffff802`80b1b108 : fffff880`03199170 fffff802`80a52719 fffff880`03189180 fffff880`031991f0 : nt!KiHandleNmi+0x20
fffff880`03198ff0 fffff802`80bc2902 : fffff880`03189180 fffff880`031991f0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0x158
fffff880`03199030 fffff802`80bc2730 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxNmiInterrupt+0x82
fffff880`03199170 fffff802`81146fff : fffff802`80b8379f 00000000`00000001 00000000`00000000 fffffa80`64de2010 : nt!KiNmiInterrupt+0x1b0
fffff880`031bb9c8 fffff802`80b8379f : 00000000`00000001 00000000`00000000 fffffa80`64de2010 fffffa80`64de2010 : hal!HalProcessorIdle+0xf
fffff880`031bb9d0 fffff802`80b7e9e8 : fffff880`03189180 fffffa80`00000008 00000000`00000000 00000000`00000008 : nt!PpmIdleGuestExecute+0x13
fffff880`031bba00 fffff802`80b7efa0 : 00000000`00000000 00000000`0136b92d fffff880`031bbb68 fffff880`031bbb70 : nt!PpmIdleExecuteTransition+0x3c8
fffff880`031bbb20 fffff802`80bbcf2c : fffff880`03189180 fffff880`03189180 00000000`00000000 fffff880`03199300 : nt!PoIdle+0x1e0
fffff880`031bbc60 00000000`00000000 : fffff880`031bc000 fffff880`031b6000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!HvlNmiCallbackRoutine+54
fffff802`80b0b7e4 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!HvlNmiCallbackRoutine+54
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5cf92fac
IMAGE_VERSION: 6.2.9200.22794
BUCKET_ID_FUNC_OFFSET: 54
FAILURE_BUCKET_ID: 0x20001_11_210260_nt!HvlNmiCallbackRoutine
BUCKET_ID: 0x20001_11_210260_nt!HvlNmiCallbackRoutine
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x20001_11_210260_nt!hvlnmicallbackroutine
FAILURE_ID_HASH: {7e330efc-1027-03b5-a8c2-285ccbe7dbd8}
Followup: MachineOwner
---------
Dell PE T620 Server usage : 5 years old,
OS windows server standard 2012,
has any one encountered this issue before?
any reply or help would be highly appreciated
Continue reading...