ralish's Posts

Just reporting a minor bug I've consistently noticed in the last several releases of VMware Workstation. From the Virtual Machine Settings page -> Network Adapter (any if multiple) -> Advanced. D... See more...
Just reporting a minor bug I've consistently noticed in the last several releases of VMware Workstation. From the Virtual Machine Settings page -> Network Adapter (any if multiple) -> Advanced. Dismissing the Network Adapter Advanced Settings dialogue always requires two clicks of the OK button. The first click is seemingly ignored, though the OK button does highlight on mouse-over, while the second click works as expected. I've not noticed this issue on any other VMware Workstation dialogue. Like I said, minor, but hopefully an easy fix that can be implemented in a future release!
Yes, that is correct. I guess the catalyst is EFI with some additional impact when using a USB 3.0 virtual controller.
Is there any news on this issue from VMware? This thread has gone a bit quiet of late but the issue remains. I can also confirm I'm seeing heap corruption crashes on a Windows 8.1 x64 VM, so e... See more...
Is there any news on this issue from VMware? This thread has gone a bit quiet of late but the issue remains. I can also confirm I'm seeing heap corruption crashes on a Windows 8.1 x64 VM, so either the issue isn't specific to Windows 10 guests, or there's another heap corruption regression present in Workstation 12.5.
I have KB3194496 installed on my host system and just witnessed the crash so can say with reasonable confidence this update does not have a bearing on the issue. Ironically, the Windows 10 VM cra... See more...
I have KB3194496 installed on my host system and just witnessed the crash so can say with reasonable confidence this update does not have a bearing on the issue. Ironically, the Windows 10 VM crashed while rebooting to complete installation of KB3194496.
Just advising that I have just had a crash while running a Windows 10 VM with full debugging information (i.e. using the vmware-vmx-debug.exe process). So it would seem my earlier potential worka... See more...
Just advising that I have just had a crash while running a Windows 10 VM with full debugging information (i.e. using the vmware-vmx-debug.exe process). So it would seem my earlier potential workaround isn't guaranteed to work, but it does seem to reduce the occurrence of the crash. This is the first time I've seen a crash in debug mode and it happened while rebooting to install Windows Updates, so perhaps there's some sort of race condition at play, and high load during early boot makes the crash more likely?
Just in case it has any bearing on the troubleshooting being performed by VMware I can reproduce the crash even with a fully updated VMware Tools installation on the VM (v10.0.10 Build 4301679).
Purely for the reference of the VMware employees participating in this thread, the support case I've opened is SR16245102909. May prove useful to help avoid duplication of effort as we all work t... See more...
Purely for the reference of the VMware employees participating in this thread, the support case I've opened is SR16245102909. May prove useful to help avoid duplication of effort as we all work toward getting this resolved.
Just adding that I've opened a support case with VMware regarding this issue. I'll post here anything pertinent (e.g. new workarounds) and hopefully an eventual solution.
I'm seeing the same issue with the vmware-vmx.exe process crashing with a 0xc0000374 (Heap Corruption) exception. I can reliably reproduce the crash on a snapshot of a Windows 10 Build 1607 ("Ann... See more...
I'm seeing the same issue with the vmware-vmx.exe process crashing with a 0xc0000374 (Heap Corruption) exception. I can reliably reproduce the crash on a snapshot of a Windows 10 Build 1607 ("Anniversary Edition") VM. The point of the crash is during the Windows 10 loading screen, immediately after the BIOS, but before what becomes the logon screen. Like JC Morris, the VM is configured in UEFI mode, though so is the underlying host system. The same system ran flawlessly under Workstation v12.1.1. Interestingly, if I set the VM configuration to gather full debugging information, resulting in the vmware-vmx-debug.exe process being used, I can't reproduce the crash. This may suggest some sort of optimisation in the regular build may be the culprit? Can someone from VMware please comment?
Just belatedly updating this thread to note that I did get a response from Ben Armstrong & Theo Thompson of the Hyper-V virtualisation team confirming that interoperability with 3rd-party virtual... See more...
Just belatedly updating this thread to note that I did get a response from Ben Armstrong & Theo Thompson of the Hyper-V virtualisation team confirming that interoperability with 3rd-party virtualisation solutions via nested virtualisation is definitely on the roadmap.
Thanks for the reply & info. That's interesting and makes a lot of sense re: lack of support for nested virtualisation in Hyper-V. The good news is that this appears to be changing: Windows Ins... See more...
Thanks for the reply & info. That's interesting and makes a lot of sense re: lack of support for nested virtualisation in Hyper-V. The good news is that this appears to be changing: Windows Insider Preview: Nested Virtualization - Windows Virtualization Team Blog - Site Home - TechNet Blogs Nested Virtualization‌ I've emailed their virtualisation team to see if we can get some insight on plans for supporting 3rd-party hypervisors w/ nested Hyper-V, co-existence w/ Windows 10 VBS features, and a combination of both of these. I'll update this thread with the response (if I get one).
Any chance of getting a reply to this from anyone at VMware? It'd be really great to get some visibility into how VMware intends to co-exist with these features, if at all, and a timeline for suc... See more...
Any chance of getting a reply to this from anyone at VMware? It'd be really great to get some visibility into how VMware intends to co-exist with these features, if at all, and a timeline for such a capability to be supported.
Hi all, The release of Windows 10 has introduced several new security features that are of particular interest to those of us who operate on secured networks. In particular, Device Guard and C... See more...
Hi all, The release of Windows 10 has introduced several new security features that are of particular interest to those of us who operate on secured networks. In particular, Device Guard and Credential Guard (Isolated User Mode). Together, these features provide what Microsoft refers to as Virtualisation Based Security. It's worth taking the time to read up on both of these features for the technical details, but at a high-level, they provide code integrity and credential theft protection respectively by virtualising the bulk of the OS with a small "secure kernel" and "secure user-mode" being responsible for enforcing the relevant security controls across the rest of the system. The idea is that compromise of the underlying OS, even up to and including kernel-mode privileges, shouldn't undermine the protections these features can provide short of a hypervisor exploit as the secure system runs at a higher privilege level than the rest of the operating system, including the NT kernel itself. The problem is that both of these features require Hyper-V to be enabled, as they're built on top of the virtualisation technology it provides. This is a problem for VMware Workstation as it refuses to run when Hyper-V is enabled. Does VMware have any plans to support coexistence with Hyper-V in certain contexts? Particularly wrt. support for systems where Device and/or Credential Guard are enabled? Are there any unofficial/unsupported workarounds for being able to use VMware Workstation without having to remove these features? Thanks in advance, -SDL
Thanks Darius! LuKeJerry: No worries unkilbeeg: That sounds unrelated to me.
Hey all, Hoping I can reach someone from VMware to report an annoying regression in the VMware Tools shipped with VMware Workstation 11.1.2. The VMware Tools for Windows 2000 and later have... See more...
Hey all, Hoping I can reach someone from VMware to report an annoying regression in the VMware Tools shipped with VMware Workstation 11.1.2. The VMware Tools for Windows 2000 and later have been compiled with an application manifest that references multiple XML schemas within a single tag. This trips over a nasty Windows XP bug: KB921337: The computer may restart when you add a manifest that has the Windows Vista extension to an .exe file or to a .dll file in Windows XP Service Pack 2 (SP2) or in WEPOS The effect is that older Windows XP VMs will immediately crash on loading VMware Tools. The exact set of affected systems is: Any Windows XP system prior to SP2 Any Windows XP SP2 system without the KB921337 hotfix Windows XP SP3 is safe (includes KB921337) This bug was introduced in Workstation 11.1.2. Installing VMware Tools using the windows.iso from Workstation 11.1.1 will not trigger the bug. I recognise this is a bit of a niche case, but the VMware guest OS compatibility guide states Windows XP is supported at all patch levels, and many people installing a Windows XP VM using older installation media may install VMware Tools prior to patching the OS, and so will encounter this bug. The bug will effectively trigger a reboot loop. As a workaround, you can start in Safe Mode and stop the vmtoolsd.exe process from automatically starting. Thanks, -SDL
Hopefully this issue will be fixed in the next maintenance release of VMware Workstation, but I just thought I'd quickly add for anyone else who comes across this thread, that I've discovered dur... See more...
Hopefully this issue will be fixed in the next maintenance release of VMware Workstation, but I just thought I'd quickly add for anyone else who comes across this thread, that I've discovered during further work that the issue only affects 64-bit installs of Windows Server 2008 Core. All my 32-bit installs of Windows Server 2008 Core are unaffected and so the usage of the above workaround is not required.
Hi mudaltsov, I'd already marked your response as the correct answer but had to head out before I could actually reply. Just confirming your workaround below does fix the crash. Thanks!
Thanks dariusd. I'll keep an eye on this thread for any further info. Hoping this can be fixed in a subsequent maintenance release!
On a fresh installation of Microsoft Windows Server 2008 Core x64 SP2 on VMware Workstation 9.0.1 I am reliably seeing a crash in the VMware Tools Core Service (vmtoolsd.exe) nearly everytime imm... See more...
On a fresh installation of Microsoft Windows Server 2008 Core x64 SP2 on VMware Workstation 9.0.1 I am reliably seeing a crash in the VMware Tools Core Service (vmtoolsd.exe) nearly everytime immediately on logon. The installation is completely fresh with VMware Tools installed immediately after the initial operating system configuration completed. The exact error I'm receiving is as follows: VMware Tools unrecoverable error: (vthread-3) Exception 0xc0000005 (access violation) has occurred. I took a look at the VMware KB but nothing really seemed to match what I'm seeing: VMware Tools on a Windows virtual machine fails with the error: Exception 0xc0000005 (access violation) Error is identical but only seems to apply to a Tools upgrade scenario and this is a fresh install. I checked for duplicates anyway but found none. Upgrading VMware Tools to Fusion 4 or Workstation 8 fails with error: VMware Tools unrecoverable error Error is identical but this issue was fixed back in Workstation 8.0.1 so shouldn't apply. Upgrading to VMware Tools 5.1 causes log spew in the Windows Event Log: Error in the RPC receive loop This error is the closest and on adding in the tools.conf configuration the subsequent reboot didn't crash so I initially thought it was fixed. However, the subsequent reboot had the same problem again; I verified the tools.conf was still in place to be sure (which it was). Interestingly, at the time of this issue I was also setting up several other VMs listed below. Only the Server 2008 Core VM sees this issue making me think it's something specific to this particular OS. Perhaps a missing DLL VMware expects to exist given this is a Core type install? Other VMs installed fine: Microsoft Windows Server 2008 x64 SP2 Microsoft Windows Server 2008 R2 x64 SP1 Microsoft Windows Server 2008 R2 Core x64 SP1 Microsoft Windows Server 2012 x64 Microsoft Windows Server 2012 Core x64 I've attached a couple of crash dumps if anyone from VMware wishes to investigate futher. If anyone else has advice it'd be greatly appreciated!
Just for the record, I'm not saying conclusively this is VMware's problem, but we were able to repeatedly cause the machine to BSoD when powering on a virtual machine under VMware Workstation wit... See more...
Just for the record, I'm not saying conclusively this is VMware's problem, but we were able to repeatedly cause the machine to BSoD when powering on a virtual machine under VMware Workstation with Driver Verifier running. A basic analysis of the crash dump consistently shows vmx86 driver calls in the stack trace immediately leading up to the crash, with the only other calls being low-level OS functions. The analysis does seem to point towards vmx86 being a likely culprit. This may not be a fault with VMware's code but it's also plausible that it could be and may well be worth a look. Disclaimer: I'm not a professional kernel debugger or even particularly experienced, this is just a best effort troubleshooting a difficult problem. If I'm completely wrong, I apologise to both Nazgulled and any VMware technician that might choose to take a look out of charity.