none
Windows 2008r2 Sp1 Server Unexcted reboot. Mini dump generated RRS feed

  • Question

  • Windows 2008r2 Sp1 Server Unexcted reboot. Mini dump generated. This is vm and running on ESXi 5.1

    Server Unexcted reboot. Mini dump generated.The computer has rebooted from a bugcheck. The bugcheck was: 0x000000f4 (0x0000000000000003, 0xfffffa8012ee7060, 0xfffffa8012ee7340, 0xfffff80001dd4e30)

    Friday, July 10, 2015 5:24 AM

All replies

  • Dump analysis

    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    CRITICAL_OBJECT_TERMINATION (f4)
    A process or thread crucial to system operation has unexpectedly exited or been
    terminated.
    Several processes and threads are necessary for the operation of the
    system; when they are terminated (for any reason), the system can no
    longer function.
    Arguments:
    Arg1: 0000000000000003, Process
    Arg2: fffffa8012ee7060, Terminating object
    Arg3: fffffa8012ee7340, Process image file name
    Arg4: fffff80001dd4e30, Explanatory message (ascii)

    Debugging Details:
    ------------------

    PEB is paged out (Peb.Ldr = 00000000`7efdf018).  Type ".hh dbgerr001" for details
    PEB is paged out (Peb.Ldr = 00000000`7efdf018).  Type ".hh dbgerr001" for details

    PROCESS_OBJECT: fffffa8012ee7060

    IMAGE_NAME:  _

    DEBUG_FLR_IMAGE_TIMESTAMP:  0

    MODULE_NAME: _

    FAULTING_MODULE: 0000000000000000

    PROCESS_NAME:  java.exe

    BUGCHECK_STR:  0xF4_java.exe

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    CURRENT_IRQL:  0

    LAST_CONTROL_TRANSFER:  from fffff80001e655c2 to fffff80001ad2c80

    STACK_TEXT:  
    fffff880`0b095b18 fffff800`01e655c2 : 00000000`000000f4 00000000`00000003 fffffa80`12ee7060 fffffa80`12ee7340 : nt!KeBugCheckEx
    fffff880`0b095b20 fffff800`01e1dfbb : 00000000`00000001 fffffa80`124502f0 fffffa80`12ee7060 fffffa80`08282801 : nt!PspCatchCriticalBreak+0x92
    fffff880`0b095b60 fffff800`01d88834 : 00000000`00000001 00000000`00000cc4 fffffa80`12ee7060 fffffa80`00000008 : nt! ?? ::NNGAKEGL::`string'+0x29d46
    fffff880`0b095bb0 fffff800`01ad1f13 : 00000000`00000cc4 fffffa80`124502f0 fffffa80`12ee7060 00000000`000123d8 : nt!NtTerminateProcess+0x284
    fffff880`0b095c20 00000000`7713c0da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`192ee638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7713c0da


    STACK_COMMAND:  kb

    FOLLOWUP_NAME:  MachineOwner

    FAILURE_BUCKET_ID:  X64_0xF4_java.exe_IMAGE__

    BUCKET_ID:  X64_0xF4_java.exe_IMAGE__

    Followup: MachineOwner
    ---------

    Friday, July 10, 2015 10:10 AM