Quantcast
Channel: VMware Communities : All Content - Workstation Pro
Viewing all articles
Browse latest Browse all 18268

BSOD on Windows x64 host Workstation 9.0.1 in hcmon.sys start

$
0
0

Reporting BSOD upon startup of Windows 7 x64 host, sometimes even before the first login.

It happens quite often when USB Corsair Flash Voyager mini is plugged into the Gearhead

usb hub (UH7200BLK) which in turn is connected to the laptop.

 

VMWare Workstation 9.0.1 build 894247

OS: Windows x64

Hardware: Dell Latitude E6520 with 8GB RAM.

 

Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`04057000 PsLoadedModuleList = 0xfffff800`0429a6d0
Debug session time: Mon Jan 20 11:42:42.971 2014 (UTC - 8:00)
System Uptime: 0 days 0:00:38.188
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff8a00420e550, 2, 1, fffff80004197588}

*** ERROR: Module load completed but symbols could not be loaded for hcmon.sys
Probably caused by : hcmon.sys ( hcmon+6289 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a00420e550, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80004197588, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'vstor2_mntapi10_shared' and 'rimmpx64.sys' overlap

WRITE_ADDRESS:  fffff8a00420e550 Paged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!IoEnumerateDeviceObjectList+68
fffff800`04197588 48895d00        mov     qword ptr [rbp],rbx

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  vmware-usbarbi

TRAP_FRAME:  fffff88008136550 -- (.trap 0xfffff88008136550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=fffffa8009304440
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80004197588 rsp=fffff880081366e0 rbp=fffff8a00420e550
r8=0000000000000000  r9=0000000000000000 r10=fffffa800694e148
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!IoEnumerateDeviceObjectList+0x68:
fffff800`04197588 48895d00        mov     qword ptr [rbp],rbx ss:0018:fffff8a0`0420e550=0000000000000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800040cc169 to fffff800040ccbc0

STACK_TEXT: 
fffff880`08136408 fffff800`040cc169 : 00000000`0000000a fffff8a0`0420e550 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`08136410 fffff800`040cade0 : 00000000`00000006 fffffa80`09304440 00000000`00000000 fffffa80`09304440 : nt!KiBugCheckDispatch+0x69
fffff880`08136550 fffff800`04197588 : fffffa80`09304440 00000000`00000000 fffff8a0`0420e530 fffff880`08136780 : nt!KiPageFault+0x260
fffff880`081366e0 fffff880`058c0289 : 00000000`00000000 fffff980`10680fd0 fffff8a0`0420e530 00000000`000007ff : nt!IoEnumerateDeviceObjectList+0x68
fffff880`08136720 fffff880`058bda9c : 00000000`00000015 fffff980`10680fd0 fffff980`10680fd0 00000000`00000250 : hcmon+0x6289
fffff880`08136780 fffff880`058be136 : 00000000`00000000 00000000`81012368 fffffa80`09986a40 fffffa80`09e70240 : hcmon+0x3a9c
fffff880`081367f0 fffff800`04575d26 : fffffa80`09e70240 00000000`00000009 fffffa80`09c29f20 fffffa80`09e70240 : hcmon+0x4136
fffff880`08136870 fffff800`043e93a7 : fffffa80`09c29f20 fffff880`08136b60 fffffa80`09c29f20 fffffa80`09e4c580 : nt!IovCallDriver+0x566
fffff880`081368d0 fffff800`043e9c06 : 00000000`00000001 00000000`0000014c 00000000`00000000 00000001`3f88ac40 : nt!IopXxxControlFile+0x607
fffff880`08136a00 fffff800`040cbe53 : fffffa80`0a1fb3e0 fffff880`08136b60 fffff880`746c6644 fffff880`08136af8 : nt!NtDeviceIoControlFile+0x56
fffff880`08136a70 00000000`76d9132a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0197f928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d9132a


STACK_COMMAND:  kb

FOLLOWUP_IP:
hcmon+6289
fffff880`058c0289 3bc3            cmp     eax,ebx

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  hcmon+6289

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hcmon

IMAGE_NAME:  hcmon.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5077611f

FAILURE_BUCKET_ID:  X64_0xA_VRF_hcmon+6289

BUCKET_ID:  X64_0xA_VRF_hcmon+6289

Followup: MachineOwner
---------


Viewing all articles
Browse latest Browse all 18268

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>