Connected to Windows 7 7601 x86 compatible target at (Wed Apr 22 10:39:46.550 2015 (UTC + 2:00)), ptr64 FALSE
|
Kernel Debugger connection established.
|
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols;srv*c:\symbols*http://chromium-browser-symsrv.commondatastorage.googleapis.comSRV*c:\symbols\*http://symbols.mozilla.org/firefox;srv*c:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com
|
Executable search path is:
|
Windows 7 Kernel Version 7601 MP (1 procs) Free x86 compatible
|
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
|
Machine Name:
|
Kernel base = 0x82a19000 PsLoadedModuleList = 0x82b635b0
|
System Uptime: not available
|
nt!DbgLoadImageSymbols+0x47:
|
82a31578 cc int 3
|
kd> g
|
*******************************************************************************
|
*
|
* This is the string you add to your checkin description
|
* Driver Verifier: Enabled for ntoskrnl.exe on Build 7601 4nqNCsg3BESvIkx4R3hsvH
|
*
|
*******************************************************************************
|
Shutdown occurred at (Wed Apr 22 10:40:34.390 2015 (UTC + 2:00))...unloading all symbol tables.
|
Waiting to reconnect...
|
Connected to Windows 7 7601 x86 compatible target at (Wed Apr 22 10:41:18.371 2015 (UTC + 2:00)), ptr64 FALSE
|
Kernel Debugger connection established.
|
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols;srv*c:\symbols*http://chromium-browser-symsrv.commondatastorage.googleapis.comSRV*c:\symbols\*http://symbols.mozilla.org/firefox;srv*c:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com;srv*
|
Executable search path is: srv*
|
Windows 7 Kernel Version 7601 MP (1 procs) Free x86 compatible
|
Built by: 7601.18798.x86fre.win7sp1_gdr.150316-1654
|
Machine Name:
|
Kernel base = 0x82a02000 PsLoadedModuleList = 0x82b4c5b0
|
System Uptime: not available
|
nt!DbgLoadImageSymbols+0x47:
|
82a1a584 cc int 3
|
kd> g
|
*******************************************************************************
|
*
|
* This is the string you add to your checkin description
|
* Driver Verifier: Enabled for ntoskrnl.exe on Build 7601 4nqNCsg3BESvIkx4R3hsvH
|
*
|
*******************************************************************************
|
*******************************************************************************
|
*
|
* This is the string you add to your checkin description
|
* Driver Verifier: Enabled for win32k.sys on Build 7601 Swoke0cxHt9I3y4CfWvmAH
|
*
|
*******************************************************************************
|
nt!DbgLoadImageSymbols+0x47:
|
82a1a584 cc int 3
|
kd> g
|
|
*** Fatal System Error: 0x000000d5
|
(0xFB18AFEC,0x00000001,0x9E14C3B1,0x00000000)
|
|
Driver at fault:
|
*** win32k.sys - Address 9E14C3B1 base at 9E080000, DateStamp 54ee8ecd
|
.
|
Break instruction exception - code 80000003 (first chance)
|
|
A fatal system error has occurred.
|
Debugger entered on first try; Bugcheck callbacks have not been invoked.
|
|
A fatal system error has occurred.
|
|
Connected to Windows 7 7601 x86 compatible target at (Wed Apr 22 13:01:09.048 2015 (UTC + 2:00)), ptr64 FALSE
|
Loading Kernel Symbols
|
...............................................................
|
................................................................
|
.........................
|
Loading User Symbols
|
....................
|
Loading unloaded module list
|
....
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
Use !analyze -v to get detailed debugging information.
|
|
BugCheck D5, {fb18afec, 1, 9e14c3b1, 0}
|
|
*** WARNING: Unable to verify checksum for a53.exe
|
*** ERROR: Module load completed but symbols could not be loaded for a53.exe
|
Probably caused by : win32k.sys ( win32k!ThreadUnlock1+1a )
|
|
Followup: MachineOwner
|
---------
|
|
Assertion: *** DPC watchdog timeout
|
This is NOT a break in update time
|
This is most likely a BUG in an ISR
|
Perform a stack trace to find the culprit
|
The period will be doubled on continuation
|
Use gh to continue!!
|
|
nt!KeAccumulateTicks+0x3c5:
|
82a7d9ec cd2c int 2Ch
|
kd> !analyze -v
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
|
Memory was referenced after it was freed.
|
This cannot be protected by try-except.
|
When possible, the guilty driver's name (Unicode string) is printed on
|
the bugcheck screen and saved in KiBugCheckDriver.
|
Arguments:
|
Arg1: fb18afec, memory referenced
|
Arg2: 00000001, value 0 = read operation, 1 = write operation
|
Arg3: 9e14c3b1, if non-zero, the address which referenced memory.
|
Arg4: 00000000, (reserved)
|
|
Debugging Details:
|
------------------
|
|
|
WRITE_ADDRESS: fb18afec Special pool
|
|
FAULTING_IP:
|
win32k!ThreadUnlock1+1a
|
9e14c3b1 834004ff add dword ptr [eax+4],0FFFFFFFFh
|
|
MM_INTERNAL_CODE: 0
|
|
IMAGE_NAME: win32k.sys
|
|
DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd
|
|
MODULE_NAME: win32k
|
|
FAULTING_MODULE: 9e080000 win32k
|
|
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
|
|
BUGCHECK_STR: 0xD5
|
|
PROCESS_NAME: a53.exe
|
|
CURRENT_IRQL: 1c
|
|
TRAP_FRAME: aa787b9c -- (.trap 0xffffffffaa787b9c)
|
ErrCode = 00000002
|
eax=fb18afe8 ebx=9e0cedd6 ecx=aa787c18 edx=aa767934 esi=00000001 edi=0076025b
|
eip=9e14c3b1 esp=aa787c10 ebp=aa787c24 iopl=0 nv up ei ng nz na pe nc
|
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
|
win32k!ThreadUnlock1+0x1a:
|
9e14c3b1 834004ff add dword ptr [eax+4],0FFFFFFFFh ds:0023:fb18afec=????????
|
Resetting default scope
|
|
LAST_CONTROL_TRANSFER: from 82a7ceb3 to 82a7d9ec
|
|
STACK_TEXT:
|
aa7875c0 82a7ceb3 0002625a 00000000 00083500 nt!KeAccumulateTicks+0x3c5
|
aa787600 82a7cd60 82e300a8 fdf67d36 00000000 nt!KeUpdateRunTime+0x145
|
aa787658 82a7c563 aa787602 aa787602 000000d1 nt!KeUpdateSystemTime+0x613
|
aa787658 82e300a8 aa787602 aa787602 000000d1 nt!KeUpdateSystemTimeAssist+0x13
|
aa7876dc 82e1eb8c 00001000 00000000 aa78773c hal!READ_PORT_USHORT+0x8
|
aa7876ec 82e1ecf5 82ae1582 a742f78a 00000065 hal!HalpCheckPowerButton+0x2e
|
aa7876f0 82ae1582 a742f78a 00000065 00000000 hal!HaliHaltSystem+0x7
|
aa78773c 82ae2029 00000003 00000000 ffffffff nt!KiBugCheckDebugBreak+0x73
|
aa787b00 82a8fff9 00000050 fb18afec 00000001 nt!KeBugCheck2+0x68b
|
aa787b84 82a42a88 00000001 fb18afec 00000000 nt!MmAccessFault+0x104
|
aa787b84 9e14c3b1 00000001 fb18afec 00000000 nt!KiTrap0E+0xdc
|
aa787c0c 9e0cee22 0239f570 aa767934 fb18afe8 win32k!ThreadUnlock1+0x1a
|
aa787c24 82a3f8a6 0076025b 00000000 0239f570 win32k!NtUserEndDeferWindowPosEx+0x4c
|
aa787c24 77047074 0076025b 00000000 0239f570 nt!KiSystemServicePostCall
|
0239f55c 7541a69e 7541a689 0076025b 00000000 ntdll!KiFastSystemCallRet
|
0239f560 7541a689 0076025b 00000000 0239f580 USER32!NtUserEndDeferWindowPosEx+0xc
|
0239f570 00301423 0076025b 00000006 0239f5ac USER32!EndDeferWindowPos+0xf
|
WARNING: Stack unwind information not available. Following frames may be wrong.
|
0239f580 7542c4e7 000a027e 00000024 00000000 a53+0x1423
|
0239f5ac 7542c5e7 003013c0 000a027e 00000024 USER32!InternalCallWinProc+0x23
|
0239f624 75424f0e 00000000 003013c0 000a027e USER32!UserCallWinProcCheckWow+0x14b
|
0239f680 7541ee19 0068a010 00000024 00000000 USER32!DispatchClientMessage+0xda
|
0239f6a8 77046fae 0239f6c0 0000003c 0239f7d4 USER32!__fnINOUTLPPOINT5+0x27
|
0239f6f8 75424f51 7541fe29 000a027e 00000046 ntdll!KiUserCallbackDispatcher+0x2e
|
0239f6fc 7541fe29 000a027e 00000046 00000000 USER32!NtUserMessageCall+0xc
|
0239f780 7541bb13 000a027e 00000046 00000000 USER32!RealDefWindowProcWorker+0x553
|
0239f79c 7541bb70 000a027e 00000046 00000000 USER32!RealDefWindowProcA+0x47
|
0239f7e4 0030144d 000a027e 00000046 00000000 USER32!DefWindowProcA+0x6f
|
0239f800 7542c4e7 000a027e 00000046 00000000 a53+0x144d
|
0239f82c 75425f9f 003013c0 000a027e 00000046 USER32!InternalCallWinProc+0x23
|
0239f8a4 75424f0e 00000000 003013c0 000a027e USER32!UserCallWinProcCheckWow+0xe0
|
0239f900 7541fdc6 0068a010 00000046 00000000 USER32!DispatchClientMessage+0xda
|
0239f928 77046fae 0239f940 00000030 0239f9c0 USER32!__fnINOUTLPWINDOWPOS+0x27
|
0239f96c 7541f2b5 00301091 000a027e 00000001 ntdll!KiUserCallbackDispatcher+0x2e
|
0239f970 00301091 000a027e 00000001 000a027e USER32!NtUserShowWindow+0xc
|
0239f984 7679ee1c 00000000 0239f9d0 7706399b a53+0x1091
|
0239f990 7706399b 00000000 754b9dc9 00000000 kernel32!BaseThreadInitThunk+0xe
|
0239f9d0 7706396e 00301020 00000000 00000000 ntdll!__RtlUserThreadStart+0x70
|
0239f9e8 00000000 00301020 00000000 00000000 ntdll!_RtlUserThreadStart+0x1b
|
|
|
STACK_COMMAND: kb
|
|
FOLLOWUP_IP:
|
win32k!ThreadUnlock1+1a
|
9e14c3b1 834004ff add dword ptr [eax+4],0FFFFFFFFh
|
|
SYMBOL_STACK_INDEX: b
|
|
SYMBOL_NAME: win32k!ThreadUnlock1+1a
|
|
FOLLOWUP_NAME: MachineOwner
|
|
FAILURE_BUCKET_ID: 0xD5_VRFK_win32k!ThreadUnlock1+1a
|
|
BUCKET_ID: 0xD5_VRFK_win32k!ThreadUnlock1+1a
|
|
Followup: MachineOwner
|
---------
|