A virtual machine restarts and reports the following event:
The CPU has been disabled by the guest operating system. Power off or reset the virtual machine.
2023-07-08T01:33:39.012Z| vcpu-0| I125: Vix: [vmxCommands.c:7191]: VMAutomation_HandleCLIHLTEvent. Do nothing.
2023-07-08T01:33:39.012Z| vcpu-0| I125: MsgHint: msg.monitorevent.halt
2023-07-08T01:33:39.012Z| vcpu-0| I125+ The CPU has been disabled by the guest operating system. Power off or reset the virtual machine.
All VMware vSphere ESXi versions
.vmss
) and memory image (.vmem
) will be generated and can be found in the datastore from the virtual machine directory.vmss
and .vmem
) from the virtual machine into a core dump file using the vmss2core utility. For more information, see the article Converting a snapshot file to memory dump using the vmss2core tool. If the guest operating system vendor identifies the crash is due to a VMware component (e.g. VMware Tools), please contact VMware by Broadcom support. See Contact Broadcom support for more details.
Note: If using Linux, it is often recommended to disable soft lockups and NMI watchdog within the guest operating system to avoid spurious restarts in virtual environments. Ask the Guest Operating System vendor if disabling these settings would be applicable in the environment. e.g. RHEL - Chapter 8. Keeping kernel panic parameters disabled in virtualized environments / SUSE - What are all these "Bug: soft lockup" messages about?