<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WS15 Crash on resume in VMware Workstation Pro Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828961#M168725</link>
    <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/274885"&gt;@scott28tt&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Feb 2021 16:40:23 GMT</pubDate>
    <dc:creator>nkaufman</dc:creator>
    <dc:date>2021-02-10T16:40:23Z</dc:date>
    <item>
      <title>WS15 Crash on resume</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828241#M168664</link>
      <description>&lt;P&gt;I've been experiencing this issue regularly ever since I migrated from WS-12 and a Win-10 update, Following is what I have from a recent crash.&lt;/P&gt;
&lt;P&gt;Any ideas/suggestions?&lt;/P&gt;
&lt;LI-SPOILER&gt;
&lt;P&gt;==========================================================================================&lt;BR /&gt;Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64&lt;BR /&gt;Copyright (c) Microsoft Corporation. All rights reserved.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Loading Dump File [C:\WINDOWS\MEMORY.DMP]&lt;BR /&gt;Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;************* Path validation summary **************&lt;BR /&gt;Response Time (ms) Location&lt;BR /&gt;Deferred srv*&lt;BR /&gt;Symbol search path is: srv*&lt;BR /&gt;Executable search path is:&lt;BR /&gt;Windows 10 Kernel Version 18362 MP (2 procs) Free x64&lt;BR /&gt;Product: WinNt, suite: TerminalServer SingleUserTS&lt;BR /&gt;Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202&lt;BR /&gt;Machine Name:&lt;BR /&gt;Kernel base = 0xfffff807`32800000 PsLoadedModuleList = 0xfffff807`32c461b0&lt;BR /&gt;Debug session time: Sat Feb 6 17:41:29.751 2021 (UTC - 5:00)&lt;BR /&gt;System Uptime: 0 days 7:09:45.054&lt;BR /&gt;Loading Kernel Symbols&lt;BR /&gt;...............................................................&lt;BR /&gt;................................................................&lt;BR /&gt;................................................................&lt;BR /&gt;...&lt;BR /&gt;Loading User Symbols&lt;BR /&gt;PEB is paged out (Peb.Ldr = 000000ca`3261b018). Type ".hh dbgerr001" for details&lt;BR /&gt;Loading unloaded module list&lt;BR /&gt;........&lt;BR /&gt;For analysis of this file, run !analyze -v&lt;BR /&gt;nt!KeBugCheckEx:&lt;BR /&gt;fffff807`329c3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff807`372928d0=&lt;A href="tel:0000000000000139" target="_blank"&gt;0000000000000139&lt;/A&gt;&lt;BR /&gt;0: kd&amp;gt; !analyze -v&lt;BR /&gt;*******************************************************************************&lt;BR /&gt;* *&lt;BR /&gt;* Bugcheck Analysis *&lt;BR /&gt;* *&lt;BR /&gt;*******************************************************************************&lt;/P&gt;
&lt;P&gt;KERNEL_SECURITY_CHECK_FAILURE (139)&lt;BR /&gt;A kernel component has corrupted a critical data structure. The corruption&lt;BR /&gt;could potentially allow a malicious user to gain control of this machine.&lt;BR /&gt;Arguments:&lt;BR /&gt;Arg1: &lt;A href="tel:0000000000000003" target="_blank"&gt;0000000000000003&lt;/A&gt;, A LIST_ENTRY has been corrupted (i.e. double remove).&lt;BR /&gt;Arg2: fffff80737292bf0, Address of the trap frame for the exception that caused the bugcheck&lt;BR /&gt;Arg3: fffff80737292b48, Address of the exception record for the exception that caused the bugcheck&lt;BR /&gt;Arg4: &lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt;, Reserved&lt;/P&gt;
&lt;P&gt;Debugging Details:&lt;BR /&gt;------------------&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;KEY_VALUES_STRING: 1&lt;/P&gt;
&lt;P&gt;Key : Analysis.CPU.mSec&lt;BR /&gt;Value: 13952&lt;/P&gt;
&lt;P&gt;Key : Analysis.DebugAnalysisProvider.CPP&lt;BR /&gt;Value: Create: 8007007e on DESKTOP-J91JQE3&lt;/P&gt;
&lt;P&gt;Key : Analysis.DebugData&lt;BR /&gt;Value: CreateObject&lt;/P&gt;
&lt;P&gt;Key : Analysis.DebugModel&lt;BR /&gt;Value: CreateObject&lt;/P&gt;
&lt;P&gt;Key : Analysis.Elapsed.mSec&lt;BR /&gt;Value: 14834&lt;/P&gt;
&lt;P&gt;Key : Analysis.Memory.CommitPeak.Mb&lt;BR /&gt;Value: 73&lt;/P&gt;
&lt;P&gt;Key : Analysis.System&lt;BR /&gt;Value: CreateObject&lt;/P&gt;
&lt;P&gt;Key : WER.OS.Branch&lt;BR /&gt;Value: 19h1_release&lt;/P&gt;
&lt;P&gt;Key : WER.OS.Timestamp&lt;BR /&gt;Value: 2019-03-18T12:02:00Z&lt;/P&gt;
&lt;P&gt;Key : WER.OS.Version&lt;BR /&gt;Value: 10.0.18362.1&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ADDITIONAL_XML: 1&lt;/P&gt;
&lt;P&gt;OS_BUILD_LAYERS: 1&lt;/P&gt;
&lt;P&gt;VIRTUAL_MACHINE: VMware&lt;/P&gt;
&lt;P&gt;BUGCHECK_CODE: 139&lt;/P&gt;
&lt;P&gt;BUGCHECK_P1: 3&lt;/P&gt;
&lt;P&gt;BUGCHECK_P2: fffff80737292bf0&lt;/P&gt;
&lt;P&gt;BUGCHECK_P3: fffff80737292b48&lt;/P&gt;
&lt;P&gt;BUGCHECK_P4: 0&lt;/P&gt;
&lt;P&gt;TRAP_FRAME: fffff80737292bf0 -- (.trap 0xfffff80737292bf0)&lt;BR /&gt;NOTE: The trap frame does not contain all registers.&lt;BR /&gt;Some register values may be zeroed or incorrect.&lt;BR /&gt;rax=fffff8072f41f728 rbx=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt; rcx=&lt;A href="tel:0000000000000003" target="_blank"&gt;0000000000000003&lt;/A&gt;&lt;BR /&gt;rdx=fffff8072f41f728 rsi=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt; rdi=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt;&lt;BR /&gt;rip=fffff80732a29400 rsp=fffff80737292d80 rbp=fffff80737292e80&lt;BR /&gt;r8=0000003c0916f062 r9=ffffb10c8e948180 r10=fffff8072f41d800&lt;BR /&gt;r11=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt; r12=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt; r13=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt;&lt;BR /&gt;r14=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt; r15=&lt;A href="tel:0000000000000000" target="_blank"&gt;0000000000000000&lt;/A&gt;&lt;BR /&gt;iopl=0 nv up ei pl nz na po nc&lt;BR /&gt;nt!KiRetireDpcList+0x167630:&lt;BR /&gt;fffff807`32a29400 cd29 int 29h&lt;BR /&gt;Resetting default scope&lt;/P&gt;
&lt;P&gt;EXCEPTION_RECORD: fffff80737292b48 -- (.exr 0xfffff80737292b48)&lt;BR /&gt;ExceptionAddress: fffff80732a29400 (nt!KiRetireDpcList+0x0000000000167630)&lt;BR /&gt;ExceptionCode: c0000409 (Security check failure or stack buffer overrun)&lt;BR /&gt;ExceptionFlags: &lt;A href="tel:00000001" target="_blank"&gt;00000001&lt;/A&gt;&lt;BR /&gt;NumberParameters: 1&lt;BR /&gt;Parameter[0]: &lt;A href="tel:0000000000000003" target="_blank"&gt;0000000000000003&lt;/A&gt;&lt;BR /&gt;Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY&lt;/P&gt;
&lt;P&gt;BLACKBOXBSD: 1 (!blackboxbsd)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;BLACKBOXNTFS: 1 (!blackboxntfs)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;BLACKBOXPNP: 1 (!blackboxpnp)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;BLACKBOXWINLOGON: 1&lt;/P&gt;
&lt;P&gt;PROCESS_NAME: vmtoolsd.exe&lt;/P&gt;
&lt;P&gt;ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.&lt;/P&gt;
&lt;P&gt;EXCEPTION_CODE_STR: c0000409&lt;/P&gt;
&lt;P&gt;EXCEPTION_PARAMETER1: &lt;A href="tel:0000000000000003" target="_blank"&gt;0000000000000003&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;DPC_STACK_BASE: FFFFF80737292FB0&lt;/P&gt;
&lt;P&gt;EXCEPTION_STR: 0xc0000409&lt;/P&gt;
&lt;P&gt;STACK_TEXT:&lt;BR /&gt;fffff807`372928c8 fffff807`329d5929 : 00000000`00000139 00000000`00000003 fffff807`37292bf0 fffff807`37292b48 : nt!KeBugCheckEx&lt;BR /&gt;fffff807`372928d0 fffff807`329d5d50 : 00000000`00000004 00000000`0000001a 40200342`00000000 fffff832`00000000 : nt!KiBugCheckDispatch+0x69&lt;BR /&gt;fffff807`37292a10 fffff807`329d40e3 : ffffb10c`00000000 ffffb10c`8d740180 00000000`00000f44 00000000`00400a02 : nt!KiFastFailDispatch+0xd0&lt;BR /&gt;fffff807`37292bf0 fffff807`32a29400 : 00000000`00000016 00000000`00989680 00000000`000f0245 fffff807`2f41d800 : nt!KiRaiseSecurityCheckFailure+0x323&lt;BR /&gt;fffff807`37292d80 fffff807`329cab25 : 00000000`00000000 fffff807`2f41a180 fffff807`33325100 00000000`104ce33f : nt!KiRetireDpcList+0x167630&lt;BR /&gt;fffff807`37292fb0 fffff807`329ca910 : 00000000`00000054 fffff807`329ca1b1 00000000`01000010 00000000`00000286 : nt!KxRetireDpcList+0x5&lt;BR /&gt;fffffe0c`327c6ac0 fffff807`329ca1c5 : 00000000`104ce33f fffff807`329c5b91 00000000`00000001 fffffe0c`327c6b80 : nt!KiDispatchInterruptContinue&lt;BR /&gt;fffffe0c`327c6af0 fffff807`329c5b91 : 00000000`00000001 fffffe0c`327c6b80 fffff807`33325100 ffffb10c`8eac33e0 : nt!KiDpcInterruptBypass+0x25&lt;BR /&gt;fffffe0c`327c6b00 00007ffc`2bff9f50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1&lt;BR /&gt;000000ca`32bff308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bff9f50&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;SYMBOL_NAME: nt!KiFastFailDispatch+d0&lt;/P&gt;
&lt;P&gt;MODULE_NAME: nt&lt;/P&gt;
&lt;P&gt;IMAGE_NAME: ntkrnlmp.exe&lt;/P&gt;
&lt;P&gt;STACK_COMMAND: .thread ; .cxr ; kb&lt;/P&gt;
&lt;P&gt;BUCKET_ID_FUNC_OFFSET: d0&lt;/P&gt;
&lt;P&gt;FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch&lt;/P&gt;
&lt;P&gt;OS_VERSION: 10.0.18362.1&lt;/P&gt;
&lt;P&gt;BUILDLAB_STR: 19h1_release&lt;/P&gt;
&lt;P&gt;OSPLATFORM_TYPE: x64&lt;/P&gt;
&lt;P&gt;OSNAME: Windows 10&lt;/P&gt;
&lt;P&gt;FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}&lt;/P&gt;
&lt;P&gt;Followup: MachineOwner&lt;BR /&gt;---------&lt;/P&gt;
&lt;/LI-SPOILER&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Feb 2021 20:31:11 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828241#M168664</guid>
      <dc:creator>nkaufman</dc:creator>
      <dc:date>2021-02-07T20:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: WS15 Crash on resume</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828256#M168666</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This is obviously more useful for VMware engineers than for any other forum visitor.&lt;/P&gt;&lt;P&gt;I do however have two questions when I see the memory dump output.&lt;/P&gt;&lt;P&gt;1. Are you on the latest vmware tools? (my guess is yes, but.. guessing is dangerous when troubleshooting)&lt;BR /&gt;2. Is your VM on the latest virtual hardware?&lt;/P&gt;&lt;P&gt;It would probably also be useful for VMware to attach a vmware.log file that has the crash time in there.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Sun, 07 Feb 2021 19:32:45 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828256#M168666</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2021-02-07T19:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: WS15 Crash on resume</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828274#M168668</link>
      <description>&lt;P&gt;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/2121542"&gt;@nkaufman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Moderator: The “spoiler” function on the extended toolbar of the post creator/editor (a triangle with exclamation mark) is ideal for posting text dumps, making the thread easier to scroll through. I have amended your initial post above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Feb 2021 20:33:07 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828274#M168668</guid>
      <dc:creator>scott28tt</dc:creator>
      <dc:date>2021-02-07T20:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: WS15 Crash on resume</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828961#M168725</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/274885"&gt;@scott28tt&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 16:40:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/WS15-Crash-on-resume/m-p/2828961#M168725</guid>
      <dc:creator>nkaufman</dc:creator>
      <dc:date>2021-02-10T16:40:23Z</dc:date>
    </item>
  </channel>
</rss>

