New issue
Advanced search Search tips

Issue 321 attachment: crash321.txt (9.1 KB)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
Connected to Windows 7 7601 x86 compatible target at (Wed Apr 8 12:51:04.114 2015 (UTC + 2:00)), ptr64 FALSE
Kernel Debugger connection established.
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols;srv*c:\symbols*http://chromium-browser-symsrv.commondatastorage.googleapis.comSRV*c:\symbols\*http://symbols.mozilla.org/firefox;srv*c:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is:
Windows 7 Kernel Version 7601 MP (1 procs) Free x86 compatible
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82a3f000 PsLoadedModuleList = 0x82b895b0
System Uptime: not available
nt!DbgLoadImageSymbols+0x47:
82a57578 cc int 3
kd> g
*******************************************************************************
*
* This is the string you add to your checkin description
* Driver Verifier: Enabled for win32k.sys on Build 7601 Swoke0cxHt9I3y4CfWvmAH
*
*******************************************************************************
nt!DbgLoadImageSymbols+0x47:
82a57578 cc int 3
kd> g

*** Fatal System Error: 0x00000050
(0x80E7B7BC,0x00000001,0x82A79240,0x00000002)

Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

Connected to Windows 7 7601 x86 compatible target at (Wed Apr 8 13:07:03.186 2015 (UTC + 2:00)), ptr64 FALSE
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
...............
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {80e7b7bc, 1, 82a79240, 2}

*** WARNING: Unable to verify timestamp for a43.exe
*** ERROR: Module load completed but symbols could not be loaded for a43.exe
Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 )

Followup: MachineOwner
---------

Assertion: *** DPC watchdog timeout
This is NOT a break in update time
This is most likely a BUG in an ISR
Perform a stack trace to find the culprit
The period will be doubled on continuation
Use gh to continue!!

nt!KeAccumulateTicks+0x3c5:
82aba38c cd2c int 2Ch
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 80e7b7bc, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 82a79240, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


WRITE_ADDRESS: 80e7b7bc

FAULTING_IP:
nt!RtlFillMemoryUlong+10
82a79240 f3ab rep stos dword ptr es:[edi]

MM_INTERNAL_CODE: 2

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x50

PROCESS_NAME: a43.exe

CURRENT_IRQL: 1c

TRAP_FRAME: 957275cc -- (.trap 0xffffffff957275cc)
ErrCode = 00000002
eax=00ffffff ebx=00000001 ecx=00000069 edx=0000006a esi=80e7b7b8 edi=80e7b7bc
eip=82a79240 esp=95727640 ebp=95727674 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!RtlFillMemoryUlong+0x10:
82a79240 f3ab rep stos dword ptr es:[edi]
Resetting default scope

LAST_CONTROL_TRANSFER: from 82ab9853 to 82aba38c

STACK_TEXT:
95726ff0 82ab9853 0002625a 00000000 0000f100 nt!KeAccumulateTicks+0x3c5
95727030 82ab9700 82a210a8 81aa1d2a 00000000 nt!KeUpdateRunTime+0x145
95727088 82ab8f03 95727002 95727002 000000d1 nt!KeUpdateSystemTime+0x613
95727088 82a210a8 95727002 95727002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
9572710c 82a0fb8c 00001000 00000000 9572716c hal!READ_PORT_USHORT+0x8
9572711c 82a0fcf5 82b1df92 792fe921 00000065 hal!HalpCheckPowerButton+0x2e
95727120 82b1df92 792fe921 00000065 00000000 hal!HaliHaltSystem+0x7
9572716c 82b1ea39 00000003 c0602038 80e7b7bc nt!KiBugCheckDebugBreak+0x73
95727530 82acc9ad 00000050 80e7b7bc 00000001 nt!KeBugCheck2+0x68b
957275b4 82a7fa78 00000001 80e7b7bc 00000000 nt!MmAccessFault+0x104
957275b4 82a79240 00000001 80e7b7bc 00000000 nt!KiTrap0E+0xdc
95727640 824e9c5b 80e7b7bc 000001a4 00ffffff nt!RtlFillMemoryUlong+0x10
95727674 824e9a63 95727944 00000001 01440000 win32k!vSolidFillRect1+0x107
95727814 824cbd44 824e9b54 95727944 00000000 win32k!vDIBSolidBlt+0x14c
95727888 824f0b37 faea6db8 00000000 00000000 win32k!EngBitBlt+0x258
957278ec 824f0cbf fa5c2d68 95727954 95727944 win32k!GrePatBltLockedDC+0x22b
95727998 82481a4e 957279c8 0000f0f0 95727a10 win32k!GrePolyPatBltInternal+0x176
957279d4 82459f46 1a010869 00f00021 957279fc win32k!GrePolyPatBlt+0x45
95727a68 82462f0f 1a010869 95727ab4 00000002 win32k!DrawEdge+0x25b
95727ae4 82461a40 fca40030 1a010869 0000980c win32k!xxxDrawCaptionBar+0x1ea
95727b28 824bfc43 fca40030 1a010869 00000000 win32k!xxxDrawWindowFrame+0x143
95727ba4 824cd8dc fca40030 00000085 00000001 win32k!xxxRealDefWindowProc+0x712
95727bbc 824983af fca40030 00000085 00000001 win32k!xxxWrapRealDefWindowProc+0x2b
95727bd8 824cd798 fca40030 00000085 00000001 win32k!NtUserfnNCDESTROY+0x27
95727c10 82a7c896 000c00d4 00000085 00000001 win32k!NtUserMessageCall+0xcf
95727c10 777570f4 000c00d4 00000085 00000001 nt!KiSystemServicePostCall
0021f220 77864f51 7786517d 000c00d4 00000085 ntdll!KiFastSystemCallRet
0021f224 7786517d 000c00d4 00000085 00000001 USER32!NtUserMessageCall+0xc
0021f2a8 77865138 000c00d4 00000085 00000001 USER32!RealDefWindowProcWorker+0x72
0021f2c4 74281e60 000c00d4 00000085 00000001 USER32!RealDefWindowProcW+0x47
0021f320 74281f20 00000000 00000000 00000001 uxtheme!_ThemeDefWindowProc+0x197
0021f33c 77865fc3 000c00d4 00000085 00000001 uxtheme!ThemeDefWindowProcW+0x18
0021f384 77874ec7 000c00d4 00000085 00000001 USER32!DefWindowProcW+0x68
0021f3a8 7786c4e7 000c00d4 00000085 00000001 USER32!DDEMLServerWndProc+0x71
0021f3d4 77865f9f 77874e86 000c00d4 00000085 USER32!InternalCallWinProc+0x23
0021f44c 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0
0021f4a8 77864f7d 00610030 00000085 00000001 USER32!DispatchClientMessage+0xda
0021f4d0 7775702e 0021f4e8 00000018 0021f5d8 USER32!__fnDWORD+0x24
0021f4fc 77864f51 7786517d 000c00d4 0000000f ntdll!KiUserCallbackDispatcher+0x2e
0021f500 7786517d 000c00d4 0000000f 00000000 USER32!NtUserMessageCall+0xc
0021f584 77865138 000c00d4 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72
0021f5a0 778650d1 000c00d4 0000000f 00000000 USER32!RealDefWindowProcW+0x47
0021f5e8 77874ec7 000c00d4 0000000f 00000000 USER32!DefWindowProcW+0x6f
0021f60c 7786c4e7 000c00d4 0000000f 00000000 USER32!DDEMLServerWndProc+0x71
0021f638 77865f9f 77874e86 000c00d4 0000000f USER32!InternalCallWinProc+0x23
0021f6b0 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0
0021f70c 77864f7d 00610030 0000000f 00000000 USER32!DispatchClientMessage+0xda
0021f734 7775702e 0021f74c 00000018 0021f868 USER32!__fnDWORD+0x24
0021f760 77866445 7786647a 0021f7d4 00010010 ntdll!KiUserCallbackDispatcher+0x2e
0021f764 7786647a 0021f7d4 00010010 00000000 USER32!NtUserPeekMessage+0xc
0021f78c 77862b1b 0021f7d4 00010010 00000000 USER32!_PeekMessage+0x73
0021f7b8 013410f6 0021f7d4 00010010 00000000 USER32!PeekMessageA+0x12a
WARNING: Stack unwind information not available. Following frames may be wrong.
0021f830 013412ff 00000002 003d1168 003d4f00 a43+0x10f6
0021f878 7634ee1c 7ffd8000 0021f8c4 777737eb a43+0x12ff
0021f884 777737eb 7ffd8000 7751e6e1 00000000 kernel32!BaseThreadInitThunk+0xe
0021f8c4 777737be 0134137c 7ffd8000 00000000 ntdll!__RtlUserThreadStart+0x70
0021f8dc 00000000 0134137c 7ffd8000 00000000 ntdll!_RtlUserThreadStart+0x1b


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!vSolidFillRect1+107
824e9c5b 8b55f4 mov edx,dword ptr [ebp-0Ch]

SYMBOL_STACK_INDEX: c

SYMBOL_NAME: win32k!vSolidFillRect1+107

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd

FAILURE_BUCKET_ID: 0x50_VRF_win32k!vSolidFillRect1+107

BUCKET_ID: 0x50_VRF_win32k!vSolidFillRect1+107

Followup: MachineOwner