Quantcast
Channel: VMware Communities : Discussion List - VMware Fusion® (for Mac)
Viewing all articles
Browse latest Browse all 12061

Windows 8 VM bluescreening since upgrading to Mavericks

$
0
0

Hi all,

 

My Windows 8 VM, which had been rock solid, has started blue screening every couple of days since upgrading to Mavericks last week.

 

I was wondering if there was a know bug or something.

 

Here is the contents of the mindmp

 

 

Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

 

 

Loading Dump File [C:\Windows\Minidump\021314-63406-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

 

 

************* Symbol Path validation summary **************

Response                         Time (ms)     Location

Deferred                                       srv*

 

************* Symbol Path validation summary **************

Response                         Time (ms)     Location

Deferred                                       srv*

Symbol search path is: srv*

Executable search path is: srv*

Windows 8 Kernel Version 9600 MP (2 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505

Machine Name:

Kernel base = 0xfffff803`68a7b000 PsLoadedModuleList = 0xfffff803`68d3f990

Debug session time: Thu Feb 13 23:05:27.166 2014 (UTC - 5:00)

System Uptime: 1 days 11:03:31.015

Loading Kernel Symbols

.

 

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.

Run !sym noisy before .reload to track down problems loading symbols.

 

..............................................................

................................................................

.................................

Loading User Symbols

Loading unloaded module list

............

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

 

Use !analyze -v to get detailed debugging information.

 

BugCheck 3B, {c0000005, fffff80368d0bef0, ffffd00021e04e20, 0}

 

*** WARNING: Unable to verify timestamp for acsock64.sys

*** ERROR: Module load completed but symbols could not be loaded for acsock64.sys

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+c0 )

 

Followup: Pool_corruption

---------

 

0: kd> !analyze -v

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

 

SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the bugcheck

Arg2: fffff80368d0bef0, Address of the instruction which caused the bugcheck

Arg3: ffffd00021e04e20, Address of the context record for the exception that caused the bugcheck

Arg4: 0000000000000000, zero.

 

Debugging Details:

------------------

 

 

DUMP_FILE_ATTRIBUTES: 0x8

  Kernel Generated Triage Dump

 

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

 

FAULTING_IP:

nt!ExDeferredFreePool+c0

fffff803`68d0bef0 488b10          mov     rdx,qword ptr [rax]

 

CONTEXT:  ffffd00021e04e20 -- (.cxr 0xffffd00021e04e20;r)

rax=760e000200451db4 rbx=0000000000000000 rcx=fffff80368d54250

rdx=760e000200451db4 rsi=0000000000000000 rdi=fffff80368d540c0

rip=fffff80368d0bef0 rsp=ffffd00021e05850 rbp=000000000000000d

r8=ffffe00000451fb0  r9=0000000000000000 r10=0000000000000001

r11=0000000000000000 r12=0000000000000000 r13=fffff80368d540c8

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up ei pl nz na po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206

nt!ExDeferredFreePool+0xc0:

fffff803`68d0bef0 488b10          mov     rdx,qword ptr [rax] ds:002b:760e0002`00451db4=????????????????

Last set context:

rax=760e000200451db4 rbx=0000000000000000 rcx=fffff80368d54250

rdx=760e000200451db4 rsi=0000000000000000 rdi=fffff80368d540c0

rip=fffff80368d0bef0 rsp=ffffd00021e05850 rbp=000000000000000d

r8=ffffe00000451fb0  r9=0000000000000000 r10=0000000000000001

r11=0000000000000000 r12=0000000000000000 r13=fffff80368d540c8

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up ei pl nz na po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206

nt!ExDeferredFreePool+0xc0:

fffff803`68d0bef0 488b10          mov     rdx,qword ptr [rax] ds:002b:760e0002`00451db4=????????????????

Resetting default scope

 

CUSTOMER_CRASH_COUNT:  1

 

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

 

BUGCHECK_STR:  0x3B

 

PROCESS_NAME:  svchost.exe

 

CURRENT_IRQL:  2

 

ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre

 

LAST_CONTROL_TRANSFER:  from fffff80368d0ca03 to fffff80368d0bef0

 

STACK_TEXT:

ffffd000`21e05850 fffff803`68d0ca03 : ffffe000`00454ed0 ffffe000`00451c00 00000000`00000000 00000000`00000002 : nt!ExDeferredFreePool+0xc0

ffffd000`21e058d0 fffff800`0260d2f3 : 00000000`00000002 ffffd000`21e05a20 ffffe000`033a5cd0 00000000`4563676e : nt!ExFreePoolWithTag+0x733

ffffd000`21e059a0 00000000`00000002 : ffffd000`21e05a20 ffffe000`033a5cd0 00000000`4563676e ffffd000`21e06140 : acsock64+0xd2f3

ffffd000`21e059a8 ffffd000`21e05a20 : ffffe000`033a5cd0 00000000`4563676e ffffd000`21e06140 fffff800`02609166 : 0x2

ffffd000`21e059b0 ffffe000`033a5cd0 : 00000000`4563676e ffffd000`21e06140 fffff800`02609166 ffffe000`004fc050 : 0xffffd000`21e05a20

ffffd000`21e059b8 00000000`4563676e : ffffd000`21e06140 fffff800`02609166 ffffe000`004fc050 fffff800`02613318 : 0xffffe000`033a5cd0

ffffd000`21e059c0 ffffd000`21e06140 : fffff800`02609166 ffffe000`004fc050 fffff800`02613318 ffffd000`21e06110 : 0x4563676e

ffffd000`21e059c8 fffff800`02609166 : ffffe000`004fc050 fffff800`02613318 ffffd000`21e06110 ffffd000`21e06140 : 0xffffd000`21e06140

ffffd000`21e059d0 ffffe000`004fc050 : fffff800`02613318 ffffd000`21e06110 ffffd000`21e06140 00000000`00000000 : acsock64+0x9166

ffffd000`21e059d8 fffff800`02613318 : ffffd000`21e06110 ffffd000`21e06140 00000000`00000000 00000000`00000000 : 0xffffe000`004fc050

ffffd000`21e059e0 ffffd000`21e06110 : ffffd000`21e06140 00000000`00000000 00000000`00000000 fffff800`02612a88 : acsock64+0x13318

ffffd000`21e059e8 ffffd000`21e06140 : 00000000`00000000 00000000`00000000 fffff800`02612a88 ffffe000`00503098 : 0xffffd000`21e06110

ffffd000`21e059f0 00000000`00000000 : 00000000`00000000 fffff800`02612a88 ffffe000`00503098 00000001`00020003 : 0xffffd000`21e06140

 

 

FOLLOWUP_IP:

nt!ExDeferredFreePool+c0

fffff803`68d0bef0 488b10          mov     rdx,qword ptr [rax]

 

SYMBOL_STACK_INDEX:  0

 

SYMBOL_NAME:  nt!ExDeferredFreePool+c0

 

FOLLOWUP_NAME:  Pool_corruption

 

IMAGE_NAME:  Pool_Corruption

 

DEBUG_FLR_IMAGE_TIMESTAMP:  0

 

IMAGE_VERSION:  6.3.9600.16452

 

MODULE_NAME: Pool_Corruption

 

STACK_COMMAND:  .cxr 0xffffd00021e04e20 ; kb

 

BUCKET_ID_FUNC_OFFSET:  c0

 

FAILURE_BUCKET_ID:  0x3B_nt!ExDeferredFreePool

 

BUCKET_ID:  0x3B_nt!ExDeferredFreePool

 

ANALYSIS_SOURCE:  KM

 

FAILURE_ID_HASH_STRING:  km:0x3b_nt!exdeferredfreepool

 

FAILURE_ID_HASH:  {01cb89fa-88ba-cf86-3adc-276add63f538}

 

Followup: Pool_corruption

---------


Viewing all articles
Browse latest Browse all 12061

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>