*******************************************************************************
|
*
|
* This is the string you add to your checkin description
|
* Driver Verifier: Enabled for win32k.sys on Build 7601 Swoke0cxHt9I3y4CfWvmAH
|
*
|
*******************************************************************************
|
nt!DbgLoadImageSymbols+0x47:
|
82a2f578 cc int 3
|
kd> g
|
|
*** Fatal System Error: 0x00000050
|
(0xDEADBEEF,0x00000008,0xDEADBEEF,0x00000002)
|
|
Break instruction exception - code 80000003 (first chance)
|
|
A fatal system error has occurred.
|
Debugger entered on first try; Bugcheck callbacks have not been invoked.
|
|
A fatal system error has occurred.
|
|
Connected to Windows 7 7601 x86 compatible target at (Tue Mar 31 13:54:11.041 2015 (UTC + 2:00)), ptr64 FALSE
|
Loading Kernel Symbols
|
...............................................................
|
................................................................
|
.........................
|
Loading User Symbols
|
................
|
Loading unloaded module list
|
....
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
Use !analyze -v to get detailed debugging information.
|
|
BugCheck 50, {deadbeef, 8, deadbeef, 2}
|
|
*** WARNING: Unable to verify checksum for a32.exe
|
*** ERROR: Module load completed but symbols could not be loaded for a32.exe
|
Probably caused by : win32k.sys ( win32k!OffCopyBits+7d )
|
|
Followup: MachineOwner
|
---------
|
|
Assertion: *** DPC watchdog timeout
|
This is NOT a break in update time
|
This is most likely a BUG in an ISR
|
Perform a stack trace to find the culprit
|
The period will be doubled on continuation
|
Use gh to continue!!
|
|
nt!KeAccumulateTicks+0x3c5:
|
82a9238c cd2c int 2Ch
|
kd> !analyze -v
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
PAGE_FAULT_IN_NONPAGED_AREA (50)
|
Invalid system memory was referenced. This cannot be protected by try-except,
|
it must be protected by a Probe. Typically the address is just plain bad or it
|
is pointing at freed memory.
|
Arguments:
|
Arg1: deadbeef, memory referenced.
|
Arg2: 00000008, value 0 = read operation, 1 = write operation.
|
Arg3: deadbeef, If non-zero, the instruction address which referenced the bad memory
|
address.
|
Arg4: 00000002, (reserved)
|
|
Debugging Details:
|
------------------
|
|
|
READ_ADDRESS: deadbeef
|
|
FAULTING_IP:
|
+0
|
deadbeef ?? ???
|
|
MM_INTERNAL_CODE: 2
|
|
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
|
|
BUGCHECK_STR: 0x50
|
|
PROCESS_NAME: a32.exe
|
|
CURRENT_IRQL: 1c
|
|
TRAP_FRAME: 9791b020 -- (.trap 0xffffffff9791b020)
|
ErrCode = 00000010
|
eax=9791b0bc ebx=00000000 ecx=bebebfd9 edx=00000001 esi=ffffffa4 edi=fffffee5
|
eip=deadbeef esp=9791b094 ebp=9791b0d8 iopl=0 nv up ei ng nz ac po nc
|
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010292
|
deadbeef ?? ???
|
Resetting default scope
|
|
LAST_CONTROL_TRANSFER: from 82a91853 to 82a9238c
|
|
FAILED_INSTRUCTION_ADDRESS:
|
+0
|
deadbeef ?? ???
|
|
STACK_TEXT:
|
9791aa48 82a91853 0002625a 00000000 00004c00 nt!KeAccumulateTicks+0x3c5
|
9791aa88 82a91700 82e440a8 1a6bd1bc 00000000 nt!KeUpdateRunTime+0x145
|
9791aae0 82a90f03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613
|
9791aae0 82e440a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
|
9791ab64 82e32b8c 00001000 00000000 9791abc4 hal!READ_PORT_USHORT+0x8
|
9791ab74 82e32cf5 82af5f92 32861bf1 00000065 hal!HalpCheckPowerButton+0x2e
|
9791ab78 82af5f92 32861bf1 00000065 00000000 hal!HaliHaltSystem+0x7
|
9791abc4 82af6a39 00000003 c06037a8 deadbeef nt!KiBugCheckDebugBreak+0x73
|
9791af88 82aa49ad 00000050 deadbeef 00000008 nt!KeBugCheck2+0x68b
|
9791b008 82a57a78 00000008 deadbeef 00000000 nt!MmAccessFault+0x104
|
9791b008 deadbeef 00000008 deadbeef 00000000 nt!KiTrap0E+0xdc
|
WARNING: Frame IP not in any known module. Following frames may be wrong.
|
9791b090 825c7f27 fd8de010 001e0000 00000000 0xdeadbeef
|
9791b0d8 825e18a1 deadbeef 9791b168 fd8de010 win32k!OffCopyBits+0x7d
|
9791b184 825b76f0 fef78178 00000034 00000000 win32k!vSpRedrawArea+0x226
|
9791b240 825b820f 9791b4d4 9791b4b8 9791b4e0 win32k!ENUMUNDERLAYS::bEnum+0x20c
|
9791b4cc 82574d7e fef10db8 00000000 00000000 win32k!SpBitBlt+0x49b
|
9791b630 8263aebc 00000000 9791b7c8 00000008 win32k!BLTRECORD::bBitBlt+0x844
|
9791b750 8263ab69 9791b7c8 9791b7d4 fe5d6728 win32k!GreRectBlt+0x1ad
|
9791bbb0 8263a667 02010930 2228d244 7778db3e win32k!GreRectangle+0x4dc
|
9791bc18 82a54896 02010930 2228d244 7778db3e win32k!NtGdiRectangle+0x7c
|
9791bc18 773770f4 02010930 2228d244 7778db3e nt!KiSystemServicePostCall
|
0013fdcc 008f10c0 00000000 02010930 2228d244 ntdll!KiFastSystemCallRet
|
0013fdec 008f138d 02010930 2228d244 7778db3e a32+0x10c0
|
0013fe80 008f160d 00000001 0026ee48 00274ef0 a32+0x138d
|
0013fec8 774cee1c 7ffd9000 0013ff14 773937eb a32+0x160d
|
0013fed4 773937eb 7ffd9000 7757ddc1 00000000 kernel32!BaseThreadInitThunk+0xe
|
0013ff14 773937be 008f168a 7ffd9000 00000000 ntdll!__RtlUserThreadStart+0x70
|
0013ff2c 00000000 008f168a 7ffd9000 00000000 ntdll!_RtlUserThreadStart+0x1b
|
|
|
STACK_COMMAND: kb
|
|
FOLLOWUP_IP:
|
win32k!OffCopyBits+7d
|
825c7f27 894514 mov dword ptr [ebp+14h],eax
|
|
SYMBOL_STACK_INDEX: c
|
|
SYMBOL_NAME: win32k!OffCopyBits+7d
|
|
FOLLOWUP_NAME: MachineOwner
|
|
MODULE_NAME: win32k
|
|
IMAGE_NAME: win32k.sys
|
|
DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd
|
|
FAILURE_BUCKET_ID: 0x50_VRF_BAD_IP_win32k!OffCopyBits+7d
|
|
BUCKET_ID: 0x50_VRF_BAD_IP_win32k!OffCopyBits+7d
|
|
Followup: MachineOwner
|
---------
|