none
Windows 8 Release Preview BSOD RRS feed

  • Question

  • When I enable kernel debugging on Windows 8 Release Preview x64 Checked build, I get a number of assert failures followed by a BSOD. When kernel debugging is off, I do not see the issue. I'm running Win 8 on VMware Workstation 8.0.

    Any ideas why this is occuring?

    Reproduction Steps:

    1. bcdedit /debug ON

    2. Reboot

    3. Run Windbg and start a kernel debugging session

    Here is the output from Windbg:

    Microsoft (R) Windows Debugger Version 6.2.8400.4218 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.

    Opened \\.\pipe\com_w8
    Waiting to reconnect...
    Connected to Windows 8 8400 x64 target at (Fri Jul 13 08:50:12.454 2012 (UTC + 1:00)), ptr64 TRUE
    Kernel Debugger connection established.
    Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 8 Kernel Version 8400 MP (1 procs) Checked x64
    Built by: 8400.0.amd64chk.winmain_win8rc.120518-1423
    Machine Name:
    Kernel base = 0xfffff800`bae0b000 PsLoadedModuleList = 0xfffff800`bb54b2e0
    System Uptime: 0 days 0:00:00.056 (checked kernels begin at 49 days)
    KDTARGET: Refreshing KD connection
    IntelPPM.sys: RegisterIdleStates() Failed! rc=0xc00000bb
    Assertion failure - code c0000420 (first chance)
    dxgkrnl!DMMVIDPNSOURCE::SetMultisamplingMethodSet+0x80:

    if I use ahi to ingnore the assert I get a number of "Assertion failure - code c0000420 (first chance)" messages before I see

    *** Fatal System Error: 0x0000001e
                           (0xFFFFFFFFC0000420,0xFFFFF880030DE8F9,0x0000000000000000,0x00000000000000E9)

    !analyze

    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000420, The exception code that was not handled
    Arg2: fffff880030de8f9, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 00000000000000e9, Parameter 1 of the exception

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000420 - An assertion failure has occurred.

    FAULTING_IP:
    dxgkrnl!DxgNotifyInterruptCB+39
    fffff880`030de8f9 cd2c            int     2Ch

    EXCEPTION_PARAMETER2:  00000000000000e9

    BUGCHECK_STR:  0x1E_c0000420

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    PROCESS_NAME:  csrss.exe

    CURRENT_IRQL:  2

    EXCEPTION_RECORD:  0000000000000110 -- (.exr 0x110)
    Cannot read Exception record @ 0000000000000110

    TRAP_FRAME:  fffff800ba4f49a0 -- (.trap 0xfffff800ba4f49a0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff800ba4f4b01 rbx=0000000000000000 rcx=fffffa8008087bc0
    rdx=00000000000018c6 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880030de8f9 rsp=fffff800ba4f4b30 rbp=fffff800ba4f4c69
     r8=fffffa8008087bc0  r9=0000000000000000 r10=00000000000000e9
    r11=fffff800ba4f4bd8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    dxgkrnl!DxgNotifyInterruptCB+0x39:
    fffff880`030de8f9 cd2c            int     2Ch
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff800bae8fb14 to fffff800bb03a2e0

    STACK_TEXT: 
    fffff800`ba4f30c8 fffff800`bae8fb14 : 00000000`000000e9 00000000`00000000 00000000`00000000 00000000`00000065 : nt!DbgBreakPointWithStatus
    fffff800`ba4f30d0 fffff800`bae90b37 : fffff800`00000003 fffff800`00000000 fffff800`bb0446b0 00000000`0000001e : nt!KiBugCheckDebugBreak+0x14
    fffff800`ba4f3140 fffff800`bb034f74 : fffff800`0000001e ffffffff`c0000420 fffff880`030de8f9 00000000`00000000 : nt!KeBugCheck2+0x8df
    fffff800`ba4f3840 fffff800`bae88053 : 00000000`0000001e ffffffff`c0000420 fffff880`030de8f9 00000000`00000000 : nt!KeBugCheckEx+0x104
    fffff800`ba4f3880 fffff800`bb03adad : fffff800`ba4f48f8 fffff800`ba4f4fb0 fffff800`ba4f4010 fffff800`ba4f3980 : nt!KiFatalExceptionHandler+0x37
    fffff800`ba4f38c0 fffff800`bafb485b : fffff800`00000001 fffff800`bae0b000 fffff800`bb038a35 fffff800`bb5d2ec0 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`ba4f38f0 fffff800`bae9c0da : fffff800`ba4f48f8 fffff800`ba4f4010 fffff800`ba4f48f8 fffff800`ba4f4010 : nt!RtlDispatchException+0x28b
    fffff800`ba4f3fe0 fffff800`bb03f542 : fffff800`ba4f48f8 fffff800`ba4f47c0 fffff800`ba4f49a0 fffff880`01c71800 : nt!KiDispatchException+0x162
    fffff800`ba4f47c0 fffff800`bb03eaad : 00000000`00000000 00000000`00000000 fffff880`01f4970c 00000000`0000003a : nt!KiExceptionDispatch+0xc2
    fffff800`ba4f49a0 fffff880`030de8f9 : fffffa80`08087bc0 fffffa80`03e94000 fffffa80`03e887e0 00000000`00000000 : nt!KiRaiseAssertion+0xed
    fffff800`ba4f4b30 fffff880`030b0ee0 : fffffa80`081cb040 fffff800`ba4f4b80 fffffa80`03e94000 fffffa80`03e887e0 : dxgkrnl!DxgNotifyInterruptCB+0x39
    fffff800`ba4f4b60 fffff800`baea03ba : fffff800`bb4b0180 fffffa80`03e88830 fffff800`ba4f4e68 00000000`00000000 : vm3dmp+0x3ee0
    fffff800`ba4f4be0 fffff800`baea093f : fffff800`bb4b0180 fffff800`ba4f4e60 fffff800`bb4b2f80 00000000`00000001 : nt!KiProcessExpiredTimerList+0x25a
    fffff800`ba4f4cd0 fffff800`baea0aca : fffff800`bb4b0180 fffff800`bb4b2f80 fffff880`09c1ece8 fffff800`00000001 : nt!KiExpireTimerTable+0x4bf
    fffff800`ba4f4d80 fffff800`bae9fec9 : fffff800`bb4b0180 fffffa80`09c1ece8 00002707`b3a1f02a fffff800`ba4f4e60 : nt!KiTimerExpiration+0x15a
    fffff800`ba4f4e40 fffff800`bb038a35 : fffff800`bb4b0180 fffff800`bb4b0180 fffff880`03c43880 00000000`00000000 : nt!KiRetireDpcList+0x239
    fffff800`ba4f4fb0 fffff800`bb038824 : fffff880`03c43800 00000000`00000000 fffff880`03c437e0 ffffffff`ffd0f000 : nt!KxRetireDpcList+0x5
    fffff880`03c437c0 fffff800`bb039725 : 00000000`ffffffff fffff800`bb0376c9 fffff800`bbc10580 00000000`00000000 : nt!KiDispatchInterruptContinue
    fffff880`03c437f0 fffff800`bb0376c9 : fffff800`bbc10580 00000000`00000000 fffff880`03c43a94 fffff800`bbc10580 : nt!KiDpcInterruptBypass+0x25
    fffff880`03c43800 fffff960`0035fb07 : 00000000`00000110 fffff960`00000000 fffff880`03d0ebf8 fffff880`03c43a90 : nt!KiInterruptDispatchLBControl+0x259
    fffff880`03c43990 fffff960`0030f72c : fffff880`03c43a94 00000000`00000001 fffff901`02400000 fffff6fb`00001400 : win32k!vSolidFillRect1+0x1a7
    fffff880`03c43a10 fffff960`001eed3a : fffff901`000f6cb0 fffff880`03c44160 fffff880`03c44490 fffff880`00000000 : win32k!vDIBSolidBlt+0x358
    fffff880`03c43c30 fffff960`0098e42a : fffff901`000f6cc8 00000000`00000000 00000000`00000000 fffff880`03c44490 : win32k!EngBitBlt+0xa66
    fffff880`03c43dc0 fffff960`0098d61a : fffff901`000dd568 00000000`00000000 00000000`00000000 fffff880`03c44490 : cdd!DrvBitBltInternal+0xe02
    fffff880`03c44040 fffff960`0032c18e : fffff901`000dd568 00000000`00000000 00000000`00000000 fffff880`03c44490 : cdd!DrvBitBlt+0x7a
    fffff880`03c440b0 fffff960`002072ed : fffff960`0098d5a0 fffff880`03c44260 fffff901`000dd568 fffff960`0045ac30 : win32k!OffBitBlt+0x18e
    fffff880`03c441d0 fffff960`0028880e : fffff901`000dd568 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SpBitBlt+0x5e1
    fffff880`03c446c0 fffff960`002890bb : fffff880`03c44980 fffff880`03c448d8 00000000`0000f0f0 fffff901`000dd550 : win32k!GrePatBltLockedDC+0x316
    fffff880`03c44790 fffff960`0028973e : fffff880`03c44980 00000000`00f00021 fffff880`03c449d0 fffff800`00000001 : win32k!GrePolyPatBltInternal+0x49b
    fffff880`03c44930 fffff960`001a63aa : 00000000`03010050 00000000`00f00021 fffff880`03c449d0 fffff960`00000001 : win32k!GrePolyPatBlt+0x12a
    fffff880`03c449b0 fffff960`00096d16 : 00000000`03010050 fffff901`00601be0 00000000`01100072 00000000`00000000 : win32k!FillRect+0x76
    fffff880`03c44a00 fffff960`000712b2 : fffff901`000de320 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!InitUserScreen+0x61a
    fffff880`03c44a90 fffff960`00071f42 : 00000000`00000000 fffff880`03c44b79 00000000`00000001 00000000`00000000 : win32k!InitVideo+0x17e
    fffff880`03c44b30 fffff960`00072e96 : fffffa80`0255c080 fffff960`003a8090 00000000`00000020 000007fb`82d5f900 : win32k!UserInitialize+0x2f6
    fffff880`03c44be0 fffff800`bb03f123 : 00000000`00000054 00000000`00000058 fffffa80`0255cb00 fffff880`03c44cc0 : win32k!NtUserInitialize+0x1ba
    fffff880`03c44c40 000007fb`82d0825a : 000007fb`82cf469c 000007fb`00000008 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    0000003f`629ef898 000007fb`82cf469c : 000007fb`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : winsrv!NtUserInitialize+0xa
    0000003f`629ef8a0 000007fb`82d54624 : 0000003f`62b86fc0 00000000`00000000 0000003f`00000000 0000003f`629ef970 : winsrv!UserServerDllInitialization+0x1c8
    0000003f`629ef920 000007fb`82d530f3 : 0000003f`62b81ea5 0000003f`62b81eac 0000003f`00000003 000000ff`ffffffff : CSRSRV!CsrLoadServerDll+0x234
    0000003f`629ef9f0 000007fb`82d52a89 : 00000000`0000000a 0000003f`62b81d20 00000000`00000000 0000003f`62b81a01 : CSRSRV!CsrParseServerCommandLine+0x413
    0000003f`629efc20 000007f6`2f3d11d7 : 00000000`0000000a 0000003f`62b81d20 00000000`0000000a 00000000`00000000 : CSRSRV!CsrServerInitialization+0x251
    0000003f`629efcb0 000007f6`2f3d15c6 : 0000003f`0000000a 0000003f`62b81d20 00000000`0000000a 00000000`000000f0 : csrss!main+0x8f
    0000003f`629efcf0 000007fb`860951a7 : 000007f6`2e42f000 00000000`00000000 00000000`00000000 00000000`00000000 : csrss!NtProcessStartup_AfterSecurityCookieInitialized+0x366
    0000003f`629efd80 00000000`00000000 : 000007f6`2f3d15fc 000007f6`2e42f000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x43


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    dxgkrnl!DxgNotifyInterruptCB+39
    fffff880`030de8f9 cd2c            int     2Ch

    SYMBOL_STACK_INDEX:  a

    SYMBOL_NAME:  dxgkrnl!DxgNotifyInterruptCB+39

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: dxgkrnl

    IMAGE_NAME:  dxgkrnl.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  4fb70b21

    BUCKET_ID_FUNC_OFFSET:  39

    FAILURE_BUCKET_ID:  0x1E_c0000420_dxgkrnl!DxgNotifyInterruptCB

    BUCKET_ID:  0x1E_c0000420_dxgkrnl!DxgNotifyInterruptCB

    Followup: MachineOwner
    ---------

    Friday, July 13, 2012 8:35 AM