Windbg ntkrnlmp.exe - eventID:1001

P

p_maldini3

Hi All,

I am having issue with my Hyper-v server, this is the 1st time I have unexpected reboot this occurred directly after having remote session for few seconds then suddenly I lost the control, when I checked the logs and found Bugcheck event ID : 1001,

The computer has rebooted from a bugcheck. The bugcheck was 0x00020001 (....). A dump was saved in : C:\Windows\MEMORY.DMP.

ReportID: ...




, so I ran windbg to read memory.dmp

Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*Symbol information
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 8 Kernel Version 9200 MP (12 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 9200.22794.amd64fre.win8_ldr.190606-0600
Machine Name:
Kernel base = 0xfffff802`80a08000 PsLoadedModuleList = 0xfffff802`80ca49c0
Debug session time: Thu Aug 8 11:41:53.058 2019 (UTC + 4:00)
System Uptime: 6 days 4:16:58.654
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols

Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 20001, {11, 210260, 1005, fffff80080001d40}

Page 1eee17a not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!HvlNmiCallbackRoutine+54 )

Followup: MachineOwner
---------

8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

HYPERVISOR_ERROR (20001)
The hypervisor has encountered a fatal error.
Arguments:
Arg1: 0000000000000011
Arg2: 0000000000210260
Arg3: 0000000000001005
Arg4: fffff80080001d40

Debugging Details:
------------------

Page 1eee17a not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details
Page 1eee600 not present in the dump file. Type ".hh dbgerr004" for details

BUGCHECK_STR: 0x20001_11_210260

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: f

ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre

LAST_CONTROL_TRANSFER: from fffff80280b0b7e4 to fffff80280bb7720

STACK_TEXT:
fffff880`03198f78 fffff802`80b0b7e4 : 00000000`00020001 00000000`00000011 00000000`00210260 00000000`00001005 : nt!KeBugCheckEx
fffff880`03198f80 fffff802`80b1bb10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlNmiCallbackRoutine+0x54
fffff880`03198fc0 fffff802`80b1b108 : fffff880`03199170 fffff802`80a52719 fffff880`03189180 fffff880`031991f0 : nt!KiHandleNmi+0x20
fffff880`03198ff0 fffff802`80bc2902 : fffff880`03189180 fffff880`031991f0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0x158
fffff880`03199030 fffff802`80bc2730 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxNmiInterrupt+0x82
fffff880`03199170 fffff802`81146fff : fffff802`80b8379f 00000000`00000001 00000000`00000000 fffffa80`64de2010 : nt!KiNmiInterrupt+0x1b0
fffff880`031bb9c8 fffff802`80b8379f : 00000000`00000001 00000000`00000000 fffffa80`64de2010 fffffa80`64de2010 : hal!HalProcessorIdle+0xf
fffff880`031bb9d0 fffff802`80b7e9e8 : fffff880`03189180 fffffa80`00000008 00000000`00000000 00000000`00000008 : nt!PpmIdleGuestExecute+0x13
fffff880`031bba00 fffff802`80b7efa0 : 00000000`00000000 00000000`0136b92d fffff880`031bbb68 fffff880`031bbb70 : nt!PpmIdleExecuteTransition+0x3c8
fffff880`031bbb20 fffff802`80bbcf2c : fffff880`03189180 fffff880`03189180 00000000`00000000 fffff880`03199300 : nt!PoIdle+0x1e0
fffff880`031bbc60 00000000`00000000 : fffff880`031bc000 fffff880`031b6000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!HvlNmiCallbackRoutine+54
fffff802`80b0b7e4 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!HvlNmiCallbackRoutine+54

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 5cf92fac

IMAGE_VERSION: 6.2.9200.22794

BUCKET_ID_FUNC_OFFSET: 54

FAILURE_BUCKET_ID: 0x20001_11_210260_nt!HvlNmiCallbackRoutine

BUCKET_ID: 0x20001_11_210260_nt!HvlNmiCallbackRoutine

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x20001_11_210260_nt!hvlnmicallbackroutine

FAILURE_ID_HASH: {7e330efc-1027-03b5-a8c2-285ccbe7dbd8}

Followup: MachineOwner
---------



Dell PE T620 Server usage : 5 years old,

OS windows server standard 2012,

has any one encountered this issue before?


any reply or help would be highly appreciated

Continue reading...
 

Similar threads

P
Replies
0
Views
418
Plebtkp
P
S
Replies
0
Views
234
ShehanGunathilake
S
U
Replies
0
Views
321
understandably
U
P
Replies
0
Views
144
Phú Hưng Nguyễn
P
Back
Top Bottom