New issue
Advanced search Search tips

Issue 747 attachment: special_pool.txt (5.7 KB)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
*** Fatal System Error: 0x000000d5
(0xFAAE6DF0,0x00000000,0x8EBDE0CB,0x00000000)

Driver at fault:
*** win32k.sys - Address 8EBDE0CB base at 8EB10000, DateStamp 56422bfd
.
Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

Connected to Windows 7 7601 x86 compatible target at (Fri Feb 26 10:16:40.668 2016 (UTC - 8:00)), ptr64 FALSE
Loading Kernel Symbols
...............................................................
............................

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

....................................
.......
Loading User Symbols
...................
Loading unloaded module list
.....*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll -

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D5, {faae6df0, 0, 8ebde0cb, 0}

Probably caused by : win32k.sys ( win32k!hbmSelectBitmap+ca )

Followup: MachineOwner
---------

nt!RtlpBreakWithStatusInstruction:
82cb9308 cc int 3
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
Memory was referenced after it was freed.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: faae6df0, memory referenced
Arg2: 00000000, value 0 = read operation, 1 = write operation
Arg3: 8ebde0cb, if non-zero, the address which referenced memory.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


READ_ADDRESS: faae6df0 Special pool

FAULTING_IP:
win32k!hbmSelectBitmap+ca
8ebde0cb 854748 test dword ptr [edi+48h],eax

MM_INTERNAL_CODE: 0

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 56422bfd

MODULE_NAME: win32k

FAULTING_MODULE: 8eb10000 win32k

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xD5

PROCESS_NAME: c8.exe

CURRENT_IRQL: 2

TRAP_FRAME: 9067faac -- (.trap 0xffffffff9067faac)
ErrCode = 00000000
eax=04000000 ebx=00000001 ecx=00000000 edx=fa89a728 esi=ffa0ada8 edi=faae6da8
eip=8ebde0cb esp=9067fb20 ebp=9067fb50 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
win32k!hbmSelectBitmap+0xca:
8ebde0cb 854748 test dword ptr [edi+48h],eax ds:0023:faae6df0=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from 82d1dce7 to 82cb9308

STACK_TEXT:
9067f5fc 82d1dce7 00000003 976ccf4e 00000065 nt!RtlpBreakWithStatusInstruction
9067f64c 82d1e7e5 00000003 00000000 000fad5e nt!KiBugCheckDebugBreak+0x1c
9067fa10 82ccc3c1 00000050 faae6df0 00000000 nt!KeBugCheck2+0x68b
9067fa94 82c7ebe8 00000000 faae6df0 00000000 nt!MmAccessFault+0x104
9067fa94 8ebde0cb 00000000 faae6df0 00000000 nt!KiTrap0E+0xdc
9067fb50 8ebde67a ffa06f68 0185000f 00000001 win32k!hbmSelectBitmap+0xca
9067fba4 8ebdef9a 00000000 1eb5a930 00000000 win32k!XDCOBJ::bCleanDC+0xaa
9067fbe0 8ebdef44 9067fc00 00000001 00000001 win32k!bDeleteDCInternalWorker+0x1b
9067fc0c 8ebe110e b10101cc 00000001 00000001 win32k!bDeleteDCInternal+0x30
9067fc28 8ebe130a 0000024c 0000024c fc09ee28 win32k!vCleanupDCs+0x2a
9067fc44 8ebdda35 fc09ee28 00000000 00000000 win32k!NtGdiCloseProcess+0x3f
9067fc64 8ebdd77c fc09ee28 00000000 8a56a488 win32k!GdiProcessCallout+0x151
9067fc80 82eab2a1 8ac3d3f8 00000000 976cc5fe win32k!W32pProcessCallout+0x5d
9067fcfc 82e9d957 00000000 ffffffff 0023f7c8 nt!PspExitThread+0x46f
9067fd24 82c7ba06 ffffffff 00000000 0023f7d4 nt!NtTerminateProcess+0x1fa
9067fd24 778b71b4 ffffffff 00000000 0023f7d4 nt!KiSystemServicePostCall
WARNING: Stack unwind information not available. Following frames may be wrong.
0023f7d4 76bebd26 00000000 77e8f3b0 ffffffff ntdll!KiFastSystemCallRet
0023f7e8 008d4d0a 00000000 0023f82c 008d4ca0 kernel32!ExitProcessStub+0x12
0023f7f4 008d4ca0 00000000 e16eef34 008e9d68 c8+0x4d0a
0023f82c 008d4e45 00000000 00000000 00000000 c8+0x4ca0
0023f840 008d18ef 00000000 e16eef98 00000000 c8+0x4e45
0023f880 76bdee6c 7ffd8000 0023f8cc 778d3ab3 c8+0x18ef
0023f88c 778d3ab3 7ffd8000 77d63cad 00000000 kernel32!BaseThreadInitThunk+0xe
0023f8cc 778d3a86 008d1951 7ffd8000 00000000 ntdll!RtlInitializeExceptionChain+0xef
0023f8e4 00000000 008d1951 7ffd8000 00000000 ntdll!RtlInitializeExceptionChain+0xc2


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!hbmSelectBitmap+ca
8ebde0cb 854748 test dword ptr [edi+48h],eax

SYMBOL_STACK_INDEX: 5

SYMBOL_NAME: win32k!hbmSelectBitmap+ca

FOLLOWUP_NAME: MachineOwner

FAILURE_BUCKET_ID: 0xD5_VRF_win32k!hbmSelectBitmap+ca

BUCKET_ID: 0xD5_VRF_win32k!hbmSelectBitmap+ca

Followup: MachineOwner
---------