New issue
Advanced search Search tips

Issue 313 attachment: no_special_pool313.txt (8.1 KB)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180

*** Fatal System Error: 0x00000050
(0xFE400264,0x00000001,0x82A8C240,0x00000000)

Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

Connected to Windows 7 7601 x86 compatible target at (Tue Mar 31 15:10:44.409 2015 (UTC + 2:00)), ptr64 FALSE
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
.........................
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fe400264, 1, 82a8c240, 0}

Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 )

Followup: MachineOwner
---------

Assertion: *** DPC watchdog timeout
This is NOT a break in update time
This is most likely a BUG in an ISR
Perform a stack trace to find the culprit
The period will be doubled on continuation
Use gh to continue!!

nt!KeAccumulateTicks+0x3c5:
82acd38c cd2c int 2Ch
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fe400264, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 82a8c240, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


WRITE_ADDRESS: fe400264 Paged session pool

FAULTING_IP:
nt!RtlFillMemoryUlong+10
82a8c240 f3ab rep stos dword ptr es:[edi]

MM_INTERNAL_CODE: 0

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x50

PROCESS_NAME: notepad.exe

CURRENT_IRQL: 1c

TRAP_FRAME: 89fd3244 -- (.trap 0xffffffff89fd3244)
ErrCode = 00000002
eax=00ffffff ebx=00000277 ecx=00000077 edx=000000bb esi=fe196154 edi=fe400264
eip=82a8c240 esp=89fd32b8 ebp=89fd32ec iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!RtlFillMemoryUlong+0x10:
82a8c240 f3ab rep stos dword ptr es:[edi]
Resetting default scope

LAST_CONTROL_TRANSFER: from 82acc853 to 82acd38c

STACK_TEXT:
89fd2c68 82acc853 0002625a 00000000 00003d00 nt!KeAccumulateTicks+0x3c5
89fd2ca8 82acc700 82a340a8 a9afaab8 00000000 nt!KeUpdateRunTime+0x145
89fd2d00 82acbf03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613
89fd2d00 82a340a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
89fd2d84 82a22b8c 00001000 00000000 89fd2de4 hal!READ_PORT_USHORT+0x8
89fd2d94 82a22cf5 82b30f92 2fffb59a 00000065 hal!HalpCheckPowerButton+0x2e
89fd2d98 82b30f92 2fffb59a 00000065 00000000 hal!HaliHaltSystem+0x7
89fd2de4 82b31a39 00000003 00000000 00000000 nt!KiBugCheckDebugBreak+0x73
89fd31a8 82adf9ad 00000050 fe400264 00000001 nt!KeBugCheck2+0x68b
89fd322c 82a92a78 00000001 fe400264 00000000 nt!MmAccessFault+0x104
89fd322c 82a8c240 00000001 fe400264 00000000 nt!KiTrap0E+0xdc
89fd32b8 82629c5b fe400264 000001dc 00ffffff nt!RtlFillMemoryUlong+0x10
89fd32ec 82629b0c 89fd3320 00000001 fe0ff154 win32k!vSolidFillRect1+0x107
89fd348c 8260bd44 82629b54 89fd3650 89fd37e8 win32k!vDIBSolidBlt+0x1f5
89fd3500 827373f4 fe0ff010 00000000 00000000 win32k!EngBitBlt+0x258
89fd3610 8261bfb8 fe0ff010 00000000 00000000 win32k!PanBitBlt+0xf6
89fd3670 826181e0 827372fe 89fd3914 ffb83018 win32k!OffBitBlt+0x97
89fd3928 82630b37 ffb83018 00000000 00000000 win32k!SpBitBlt+0x46c
89fd398c 82630cbf fe08e648 89fd39f4 89fd39e4 win32k!GrePatBltLockedDC+0x22b
89fd3a38 825c1a4e 89fd3a68 0000f0f0 89fd3a98 win32k!GrePolyPatBltInternal+0x176
89fd3a74 825c1ac5 23010242 00f00021 89fd3a98 win32k!GrePolyPatBlt+0x45
89fd3aac 825a0637 23010242 89fd3af0 01100060 win32k!FillRect+0x58
89fd3ad0 825a0548 fea47658 fea47658 23010242 win32k!xxxPaintRect+0x72
89fd3b00 825a06e4 fea47658 fea47658 23010242 win32k!xxxFillWindow+0x39
89fd3b28 825ff86b fea47658 00000014 23010242 win32k!xxxDWP_EraseBkgnd+0x8f
89fd3ba4 8260d8dc fea47658 00000014 23010242 win32k!xxxRealDefWindowProc+0x33a
89fd3bbc 825d83af fea47658 00000014 23010242 win32k!xxxWrapRealDefWindowProc+0x2b
89fd3bd8 8260d798 fea47658 00000014 23010242 win32k!NtUserfnNCDESTROY+0x27
89fd3c10 82a8f896 000401ca 00000014 23010242 win32k!NtUserMessageCall+0xcf
89fd3c10 77c170f4 000401ca 00000014 23010242 nt!KiSystemServicePostCall
0016f604 76aa4f51 76aa517d 000401ca 00000014 ntdll!KiFastSystemCallRet
0016f608 76aa517d 000401ca 00000014 23010242 USER32!NtUserMessageCall+0xc
0016f68c 76aa5138 000401ca 00000014 23010242 USER32!RealDefWindowProcWorker+0x72
0016f6a8 74741e60 000401ca 00000014 23010242 USER32!RealDefWindowProcW+0x47
0016f704 74741f20 00000000 00000000 23010242 uxtheme!_ThemeDefWindowProc+0x197
0016f720 76aa5fc3 000401ca 00000014 23010242 uxtheme!ThemeDefWindowProcW+0x18
0016f768 00e21554 000401ca 00000014 23010242 USER32!DefWindowProcW+0x68
0016f788 76aac4e7 000401ca 00000014 23010242 notepad!NPWndProc+0x16d
0016f7b4 76aa5f9f 00e214de 000401ca 00000014 USER32!InternalCallWinProc+0x23
0016f82c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0
0016f888 76aa4f7d 00e97658 00000014 23010242 USER32!DispatchClientMessage+0xda
0016f8b0 77c1702e 0016f8c8 00000018 0016f9b8 USER32!__fnDWORD+0x24
0016f8dc 76aa4f51 76aa517d 000401ca 0000000f ntdll!KiUserCallbackDispatcher+0x2e
0016f8e0 76aa517d 000401ca 0000000f 00000000 USER32!NtUserMessageCall+0xc
0016f964 76aa5138 000401ca 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72
0016f980 76aa50d1 000401ca 0000000f 00000000 USER32!RealDefWindowProcW+0x47
0016f9c8 00e21554 000401ca 0000000f 00000000 USER32!DefWindowProcW+0x6f
0016f9e8 76aac4e7 000401ca 0000000f 00000000 notepad!NPWndProc+0x16d
0016fa14 76aa5f9f 00e214de 000401ca 0000000f USER32!InternalCallWinProc+0x23
0016fa8c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0
0016fae8 76aa4f7d 00e97658 0000000f 00000000 USER32!DispatchClientMessage+0xda
0016fb10 77c1702e 0016fb28 00000018 0016fb74 USER32!__fnDWORD+0x24
0016fb3c 76aa5d0c 76aa5d33 0016fbac 369bad71 ntdll!KiUserCallbackDispatcher+0x2e
0016fb40 76aa5d33 0016fbac 369bad71 76aacde8 USER32!NtUserDispatchMessage+0xc
0016fb84 76aacc70 00e214de 00000000 0016fbc8 USER32!DispatchMessageWorker+0x3d5
0016fb94 00e214d7 0016fbac 00000000 00e2c25c USER32!DispatchMessageW+0xf
0016fbc8 00e216ec 00e20000 00000000 001e3872 notepad!WinMain+0xdd
0016fc58 768aee1c 7ffdf000 0016fca4 77c337eb notepad!_initterm_e+0x1a1
0016fc64 77c337eb 7ffdf000 77dfe2df 00000000 kernel32!BaseThreadInitThunk+0xe
0016fca4 77c337be 00e23689 7ffdf000 00000000 ntdll!__RtlUserThreadStart+0x70
0016fcbc 00000000 00e23689 7ffdf000 00000000 ntdll!_RtlUserThreadStart+0x1b


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!vSolidFillRect1+107
82629c5b 8b55f4 mov edx,dword ptr [ebp-0Ch]

SYMBOL_STACK_INDEX: c

SYMBOL_NAME: win32k!vSolidFillRect1+107

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd

FAILURE_BUCKET_ID: 0x50_win32k!vSolidFillRect1+107

BUCKET_ID: 0x50_win32k!vSolidFillRect1+107

Followup: MachineOwner