Hello, A devoted Arch user who's a friend of mine pointed me to your post on the Arch forum (). I'm the VMware/Windows loving friend who gave you that apparently not so useful advice Coinci...
See more...
Hello, A devoted Arch user who's a friend of mine pointed me to your post on the Arch forum (). I'm the VMware/Windows loving friend who gave you that apparently not so useful advice Coincidentally, I woke up this morning and remembered your problem and did a quick search, and find this moderately sized thread on the VMware forums by you, and I happen to have an account on these forums, so it's only decent that I try to offer some (better) advice! It's pretty rare to be in a situation where getting a BSoD is a better outcome than the results you're actually getting, and you seem to be in the latter category; at least with a BSoD you'd have some crash data to sift through that has a reasonable chance of leading you to the culprit. I've read the thread, and you seem to have tried all the basics and some of the more advanced stuff through the help of the VMware community. The way the system does a hard lock-up makes me think there is something going on in kernel mode that is definitely not good (even if whatever it is is being prompted by some mundane user-mode code). Further, you can't really even say that VMware code is the cause, but possibly merely the catalyst. Kernels are complex beasts, and misbehaving code from one completely unrelated module can have ramifications on other code that at first seems to have no links at all. Seeing as the machine is not blue-screening, I'd suggest trying to MAKE it bluescreen. Follow these instructions to prepare your system: Once completed, do a test to see if it works. If successful, I'd reproduce your VMware crash and see if you can force a memory dump using the above procedure. This, if it works, could provide valuable insight into exactly what is going on inside the kernel at the time of the freeze. It may be ambiguous at first, in which case, making several memory dumps and analyzing each, to see which similarities they have, particularly the last instructions on the stack, will help to determine if the code running before the crash is consistently similar or even identical. The driver responsible for calling the memory dump runs at a very high priority, so while the system may have frozen, elements of the system may still be responsive, even if they can't typically be interacted with directly by the user, which is why I'd hold some hope that this may work. If it doesn't, the next step may well be to run Driver Verifier: http://support.microsoft.com/kb/244617 I'd simply create standard settings when setting it up, reboot, and once again, try and reproduce the crash. This will enable a significant number of additional checks on kernel code. The result will be a significant performance penalty (which is why you shouldn't run Driver Verifier on production machines, but purely for debugging bad code), however, it may well catch the fault as a result. In fact, it may well catch the fault well before the system usually crashes. Note, that when if it catches a fault, it'll BSoD the system, however, you'll have a memory dump to analyze. This dump may well be more useful than prior dumps, as DV is likely to have caught what was going wrong at the precise time it happened, and not a memory dump of what was going on well after the damage had been done. In any cases, you'll need Debugging Tools for Windows (). You should setup WinDbg to use the Microsoft Symbol Server to pull down debugging information on-demand (). You can then open the crash dumps (typically saved in %SystemRoot%\MEMORY.DMP) in WinDbg and, once it's loaded them, run an !analyze -v to perform a thorough automated analysis, which will often reveal the culprit without any further forensics, which you don't want, as that takes a lot of time and skill. There are various guides out there that illustrate the basics of using WinDbg to analyze kernel memory dumps. While this may all sound very initimidating, a basic analysis of a kernel crash dump is not at all difficult to do, and is in fact mostly automated, requiring very little programming expertise, if any. Further, I think the data gleaned from it in your case may well be invaluable. Let us know how it goes, and attach any WinDbg analyses you make !http://communities.vmware.com/images/emoticons/happy.gif!