Details
-
Bug
-
Resolution: Fixed
-
Major
-
September 2016
Description
Hello everyone,
I've been hunting the recent handle corruption issue and I did a small bat file with the following code:
:loop
|
dir C:\
|
goto loop
|
After creating bat file on a desktop and executing it three times I noticed that the process locks and I am unable to kill it.
If I break in debugger I see the following stack trace (I am on revision 72609):
kd> kv
|
ChildEBP RetAddr Args to Child
|
f5194948 80515ffa 00000001 f5194d14 00f6f420 nt!RtlpBreakWithStatusInstruction (FPO: [1,0,0])
|
f5194be4 80515bf6 8059d031 ffffffff 00000000 nt!vDbgPrintExWithPrefixInternal+0x1ca (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\sdk\lib\rtl\debug.c @ 148]
|
f5194c0c 80437540 80561bb4 80561b98 00000335 nt!DbgPrint+0x26 (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\sdk\lib\rtl\debug.c @ 211]
|
f5194cac 80438771 0013aa38 00007fff f5194cd4 nt!QSISystemProcessInformation+0x110 (FPO: [Non-Fpo]) (CONV: cdecl) [c:\documents and settings\volodymyr\reactos\ntoskrnl\ex\sysinfo.c @ 820]
|
f5194cfc 8050468b 00000005 0013aa38 00007fff nt!NtQuerySystemInformation+0xf1 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\documents and settings\volodymyr\reactos\ntoskrnl\ex\sysinfo.c @ 2512]
|
f5194d1c 80502a4f 80438680 00f6f410 00000010 nt!KiSystemCallTrampoline+0x1b (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\ntoskrnl\include\internal\i386\ke.h @ 742]
|
f5194d5c 80403e23 00f6f460 7c92c46e badb0d00 nt!KiSystemServiceHandler+0x22f (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1738]
|
f5194d5c 7c92c46e 00f6f460 7c92c46e badb0d00 nt!KiFastCallEntry+0x8c (FPO: [0,0] TrapFrame @ f5194d64)
|
WARNING: Frame IP not in any known module. Following frames may be wrong.
|
00f6f460 0040f6ab 00a63f78 00000200 00f6f488 0x7c92c46e
|
00f6f494 0040f968 00f6f4d0 00f6f4d8 00000003 0x40f6ab
|
00f6fd24 0040d247 0053a100 00f6fd3c 00f6fd40 0x40f968
|
00f6fd44 0040dbd8 00535041 7c77a6b0 00a9cf80 0x40d247
|
00f6ffcc 805022d1 00f6ffc4 f5194c6c ffffffff 0x40dbd8
|
00f6ffd4 f5194c6c ffffffff 7c7ab00e 7c7cc538 nt!KiEoiHelper+0x81 (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\i386\traphdlr.c @ 143]
|
00f6ffd8 ffffffff 7c7ab00e 7c7cc538 00000000 0xf5194c6c
|
00f6ffdc 7c7ab00e 7c7cc538 00000000 00000000 0xffffffff
|
00f6ffe0 7c7cc538 00000000 00000000 00000000 0x7c7ab00e
|
00f6ffe4 00000000 00000000 00000000 0045de21 0x7c7cc538
|
It seems like the process is a zombie because I can see that it prints a message SystemProcessInformation:
SpiCurrent = (PSYSTEM_PROCESS_INFORMATION) Current;
|
|
if ((Process->ProcessExiting) &&
|
(Process->Pcb.Header.SignalState) &&
|
!(Process->ActiveThreads) &&
|
(IsListEmpty(&Process->Pcb.ThreadListHead)))
|
{
|
DPRINT1("Process %p (%s:%p) is a zombie\n",
|
Process, Process->ImageFileName, Process->UniqueProcessId);
|
CurrentSize = 0;
|
ImageNameMaximumLength = 0;
|
goto Skip;
|
}
|
kd> ?? Process
|
struct _EPROCESS * 0xb23b0430
|
+0x000 Pcb : _KPROCESS
|
+0x078 ProcessLock : _EX_PUSH_LOCK
|
+0x080 CreateTime : _LARGE_INTEGER 0x1d20a16`9a162bf2
|
+0x088 ExitTime : _LARGE_INTEGER 0x1d20a16`9a5a20b3
|
+0x090 RundownProtect : _EX_RUNDOWN_REF
|
+0x094 UniqueProcessId : 0x000001a8 Void
|
+0x098 ActiveProcessLinks : _LIST_ENTRY [ 0xb238de20 - 0xb23b80b8 ]
|
+0x0a0 QuotaUsage : [3] 0xa0
|
+0x0ac QuotaPeak : [3] 0x2d8
|
+0x0b8 CommitCharge : 0x3f
|
+0x0bc PeakVirtualSize : 0x128d000
|
+0x0c0 VirtualSize : 0x114b000
|
+0x0c4 SessionProcessLinks : _LIST_ENTRY [ 0xb238de4c - 0xb23b80e4 ]
|
+0x0cc DebugPort : (null)
|
+0x0d0 ExceptionPort : 0xe1420590 Void
|
+0x0d4 ObjectTable : (null)
|
+0x0d8 Token : _EX_FAST_REF
|
+0x0dc WorkingSetPage : 0x3b420
|
+0x0e0 AddressCreationLock : _KGUARDED_MUTEX
|
+0x100 HyperSpaceLock : 0
|
+0x104 ForkInProgress : (null)
|
+0x108 HardwareTrigger : 0
|
+0x10c PhysicalVadRoot : (null)
|
+0x110 CloneRoot : (null)
|
+0x114 NumberOfPrivatePages : 0x51
|
+0x118 NumberOfLockedPages : 0
|
+0x11c Win32Process : (null)
|
+0x120 Job : (null)
|
+0x124 SectionObject : (null)
|
+0x128 SectionBaseAddress : 0x00400000 Void
|
+0x12c QuotaBlock : 0x805a7ac0 _EPROCESS_QUOTA_BLOCK
|
+0x130 WorkingSetWatch : (null)
|
+0x134 Win32WindowStation : (null)
|
+0x138 InheritedFromUniqueProcessId : 0x000000c0 Void
|
+0x13c LdtInformation : (null)
|
+0x140 VadFreeHint : (null)
|
+0x144 VdmObjects : (null)
|
+0x148 DeviceMap : (null)
|
+0x14c Spare0 : [3] (null)
|
+0x158 PageDirectoryPte : _HARDWARE_PTE_X86
|
+0x158 Filler : 0
|
+0x160 Session : 0xf66ba000 Void
|
+0x164 ImageFileName : [16] "userinit.exe"
|
+0x174 JobLinks : _LIST_ENTRY [ 0x0 - 0x0 ]
|
+0x17c LockedPagesList : (null)
|
+0x180 ThreadListHead : _LIST_ENTRY [ 0xb23b05b0 - 0xb23b05b0 ]
|
+0x188 SecurityPort : 0x00000001 Void
|
+0x18c PaeTop : (null)
|
+0x190 ActiveThreads : 0
|
+0x194 GrantedAccess : 0x1f07fb
|
+0x198 DefaultHardErrorProcessing : 1
|
+0x19c LastThreadExitStatus : 0n0
|
+0x1a0 Peb : 0x7ffdd000 _PEB
|
+0x1a4 PrefetchTrace : _EX_FAST_REF
|
+0x1a8 ReadOperationCount : _LARGE_INTEGER 0x1c
|
+0x1b0 WriteOperationCount : _LARGE_INTEGER 0x6
|
+0x1b8 OtherOperationCount : _LARGE_INTEGER 0x56
|
+0x1c0 ReadTransferCount : _LARGE_INTEGER 0x382
|
+0x1c8 WriteTransferCount : _LARGE_INTEGER 0x184
|
+0x1d0 OtherTransferCount : _LARGE_INTEGER 0x5b0
|
+0x1d8 CommitChargeLimit : 0
|
+0x1dc CommitChargePeak : 0x3f
|
+0x1e0 AweInfo : (null)
|
+0x1e4 SeAuditProcessCreationInfo : _SE_AUDIT_PROCESS_CREATION_INFO
|
+0x1e8 Vm : _MMSUPPORT
|
+0x230 MmProcessLinks : _LIST_ENTRY [ 0xb238dfb8 - 0xb23b8250 ]
|
+0x238 ModifiedPageCount : 1
|
+0x23c JobStatus : 0
|
+0x240 CreateReported : 0y1
|
+0x240 NoDebugInherit : 0y0
|
+0x240 ProcessExiting : 0y1
|
+0x240 ProcessDelete : 0y1
|
+0x240 Wow64SplitPages : 0y0
|
+0x240 VmDeleted : 0y1
|
+0x240 OutswapEnabled : 0y0
|
+0x240 Outswapped : 0y0
|
+0x240 ForkFailed : 0y0
|
+0x240 Wow64VaSpace4Gb : 0y0
|
+0x240 AddressSpaceInitialized : 0y10
|
+0x240 SetTimerResolution : 0y0
|
+0x240 BreakOnTermination : 0y0
|
+0x240 SessionCreationUnderway : 0y0
|
+0x240 WriteWatch : 0y0
|
+0x240 ProcessInSession : 0y0
|
+0x240 OverrideAddressSpace : 0y0
|
+0x240 HasAddressSpace : 0y1
|
+0x240 LaunchPrefetched : 0y0
|
+0x240 InjectInpageErrors : 0y0
|
+0x240 VmTopDown : 0y0
|
+0x240 ImageNotifyDone : 0y1
|
+0x240 PdeUpdateNeeded : 0y0
|
+0x240 VdmAllowed : 0y0
|
+0x240 SmapAllowed : 0y0
|
+0x240 CreateFailed : 0y0
|
+0x240 DefaultIoPriority : 0y000
|
+0x240 Spare1 : 0y0
|
+0x240 Spare2 : 0y0
|
+0x240 Flags : 0x44082d
|
+0x244 ExitStatus : 0n0
|
+0x248 NextPageColor : 0xe931
|
+0x24a SubSystemMinorVersion : 0 ''
|
+0x24b SubSystemMajorVersion : 0 ''
|
+0x24a SubSystemVersion : 0
|
+0x24c PriorityClass : 0x2 ''
|
+0x250 VadRoot : _MM_AVL_TABLE
|
+0x270 Cookie : 0x9bc9a831
|
|
kd> ?? Process->ActiveThreads
|
unsigned long 0
|
kd> ?? Process->ProcessExiting
|
unsigned long 1
|
kd> ?? Process->Pcb.Header.SignalState
|
long 0n1
|
If I simplify my scenario and do not kill the cmd.exe I can see that the processes are stuck in file system handler:
!stacks 2
|
[...]
|
[b2308bf0 cmd.exe]
|
320.000324 b2307c70 00000e7 Blocked nt!KiSwapContext+0x19
|
nt!KeWaitForSingleObject+0x48f
|
nt!ExpWaitForResource+0x45
|
nt!ExAcquireResourceExclusiveLite+0x14d
|
fastfat!DoQuery+0x2b7
|
fastfat!VfatDirectoryControl+0x3b
|
fastfat!VfatDispatchRequest+0xf6
|
fastfat!VfatBuildRequest+0xa3
|
nt!IofCallDriver+0xad
|
nt!IopPerformSynchronousRequest+0x32
|
nt!NtQueryDirectoryFile+0x4ac
|
nt!KiSystemCallTrampoline+0x1b
|
nt!KiSystemServiceHandler+0x22f
|
nt!KiFastCallEntry+0x8c
|
ntdll!KiFastSystemCallRet
|
|
[b23cf7c0 cmd.exe]
|
364.000368 b22fcc68 000031f Blocked nt!KiSwapContext+0x19
|
nt!KeWaitForSingleObject+0x48f
|
nt!IopCloseFile+0x190
|
nt!ObpDecrementHandleCount+0x244
|
nt!ObpCloseHandleTableEntry+0x13e
|
nt!ObpCloseHandle+0x152
|
nt!NtClose+0x17
|
nt!KiSystemCallTrampoline+0x1b
|
nt!KiSystemServiceHandler+0x22f
|
nt!KiFastCallEntry+0x8c
|
ntdll!KiFastSystemCallRet
|
|
[b23b7020 cmd.exe]
|
38c.000390 b23ca020 00000e5 Blocked nt!KiSwapContext+0x19
|
nt!KeWaitForSingleObject+0x48f
|
nt!ExpWaitForResource+0x45
|
nt!ExAcquireResourceExclusiveLite+0x14d
|
fastfat!VfatCreate+0x92
|
fastfat!VfatDispatchRequest+0x7e
|
fastfat!VfatBuildRequest+0xa3
|
nt!IofCallDriver+0xad
|
nt!IopParseDevice+0xd58
|
nt!ObpLookupObjectName+0x7da
|
nt!ObOpenObjectByName+0x15b
|
nt!IopCreateFile+0x9a0
|
nt!IoCreateFile+0x46
|
nt!NtCreateFile+0x3c
|
nt!KiSystemCallTrampoline+0x1b
|
nt!KiSystemServiceHandler+0x22f
|
nt!KiFastCallEntry+0x8c
|
ntdll!KiFastSystemCallRet
|
|
kd> .thread b23ca020
|
Implicit thread is now b23ca020
|
kd> kv
|
*** Stack trace for last set context - .thread/.cxr resets it
|
ChildEBP RetAddr Args to Child
|
f4fa4824 8048990f 7ffd8000 8c3444fa 14857200 nt!KiSwapContext+0x19
|
f4fa4890 80431a45 b24ee3c0 0000001b 00000000 nt!KeWaitForSingleObject+0x48f (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\wait.c @ 547]
|
f4fa48f0 80431ecd 00000000 b25ac104 b26da000 nt!ExpWaitForResource+0x45 (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\ex\resource.c @ 638]
|
f4fa492c f7ba3932 b25ac0d0 00000001 00000001 nt!ExAcquireResourceExclusiveLite+0x14d (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ex\resource.c @ 830]
|
f4fa4948 f7bb1c7e b232a640 00000000 00000001 fastfat!VfatCreate+0x92 (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\drivers\filesystems\fastfat\create.c @ 1044]
|
f4fa496c f7bb1ba3 b232a640 00000001 00000001 fastfat!VfatDispatchRequest+0x7e (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\drivers\filesystems\fastfat\misc.c @ 124]
|
f4fa4990 804662fd b25ac018 b23bde70 b26a0e10 fastfat!VfatBuildRequest+0xa3 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\drivers\filesystems\fastfat\misc.c @ 235]
|
f4fa49b8 8045c618 00000018 00000000 00000000 nt!IofCallDriver+0xad (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\irp.c @ 1225]
|
f4fa4ae4 804d4e6a b26a0480 00000000 b2329cc0 nt!IopParseDevice+0xd58 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\file.c @ 900]
|
f4fa4b78 804cdefb 00000000 f4fa4bac 00000040 nt!ObpLookupObjectName+0x7da (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ob\obname.c @ 809]
|
f4fa4bd0 8045aac0 001248b4 00000000 00000001 nt!ObOpenObjectByName+0x15b (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ob\obhandle.c @ 2602]
|
f4fa4c58 80459336 001248dc 00120089 001248b4 nt!IopCreateFile+0x9a0 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\file.c @ 2479]
|
f4fa4ca0 8045d9ec 001248dc 00120089 001248b4 nt!IoCreateFile+0x46 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\file.c @ 2649]
|
f4fa4ce0 8050468b 001248dc 00120089 001248b4 nt!NtCreateFile+0x3c (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\file.c @ 3343]
|
f4fa4d1c 80502a4f 8045d9b0 00124888 0000002c nt!KiSystemCallTrampoline+0x1b (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\ntoskrnl\include\internal\i386\ke.h @ 742]
|
f4fa4d5c 80403e23 001248e8 7c92c46e badb0d00 nt!KiSystemServiceHandler+0x22f (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1738]
|
f4fa4d5c 7c92c46e 001248e8 7c92c46e badb0d00 nt!KiFastCallEntry+0x8c (FPO: [0,0] TrapFrame @ f4fa4d64)
|
001248e8 00000000 00000000 00000000 00000000 ntdll!KiFastSystemCallRet (FPO: [0,0,0])
|
kd> .thread b22fcc68
|
Implicit thread is now b22fcc68
|
kd> kv
|
*** Stack trace for last set context - .thread/.cxr resets it
|
ChildEBP RetAddr Args to Child
|
f5199b38 8048990f 00000000 00000000 b22fcc68 nt!KiSwapContext+0x19
|
f5199ba4 8045a0d0 f5199bc0 00000006 00000000 nt!KeWaitForSingleObject+0x48f (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\wait.c @ 547]
|
f5199be8 804cf004 b23cf7c0 b23c2550 00100001 nt!IopCloseFile+0x190 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\file.c @ 2011]
|
f5199c48 804ce9de b23c2550 b23cf7c0 00100001 nt!ObpDecrementHandleCount+0x244 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ob\obhandle.c @ 639]
|
f5199c74 804ce632 e21e2f58 e1598158 000000ac nt!ObpCloseHandleTableEntry+0x13e (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ob\obhandle.c @ 767]
|
f5199cf8 804ccc97 000000ac 00000001 f5199d1c nt!ObpCloseHandle+0x152 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ob\obhandle.c @ 1771]
|
f5199d08 8050468b 000000ac 00000000 00000007 nt!NtClose+0x17 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ob\obhandle.c @ 3396]
|
f5199d1c 80502a4f 804ccc80 001260d4 00000004 nt!KiSystemCallTrampoline+0x1b (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\ntoskrnl\include\internal\i386\ke.h @ 742]
|
f5199d5c 80403e23 00126110 7c92c46e badb0d00 nt!KiSystemServiceHandler+0x22f (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1738]
|
f5199d5c 7c92c46e 00126110 7c92c46e badb0d00 nt!KiFastCallEntry+0x8c (FPO: [0,0] TrapFrame @ f5199d64)
|
00126110 00000000 00000000 00000000 00000000 ntdll!KiFastSystemCallRet (FPO: [0,0,0])
|
kd> .thread b2307c70
|
Implicit thread is now b2307c70
|
kd> kv
|
*** Stack trace for last set context - .thread/.cxr resets it
|
ChildEBP RetAddr Args to Child
|
f4fb47e4 8048990f f4fb4860 80492b25 1480de80 nt!KiSwapContext+0x19
|
f4fb4850 80431a45 b24ee3c0 0000001b 00000000 nt!KeWaitForSingleObject+0x48f (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\wait.c @ 547]
|
f4fb48b0 80431ecd 00000000 b25ac104 00000000 nt!ExpWaitForResource+0x45 (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\ex\resource.c @ 638]
|
f4fb48ec f7ba4ce7 b25ac0d0 00000001 00000000 nt!ExAcquireResourceExclusiveLite+0x14d (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\ex\resource.c @ 830]
|
f4fb4ba8 f7ba513b b23528a0 00000001 00000000 fastfat!DoQuery+0x2b7 (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\drivers\filesystems\fastfat\dir.c @ 507]
|
f4fb4bbc f7bb1cf6 b23528a0 00000000 00000001 fastfat!VfatDirectoryControl+0x3b (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\drivers\filesystems\fastfat\dir.c @ 635]
|
f4fb4be0 f7bb1ba3 b23528a0 00000001 00000001 fastfat!VfatDispatchRequest+0xf6 (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\drivers\filesystems\fastfat\misc.c @ 148]
|
f4fb4c04 804662fd b25ac018 b23cad18 b26a0e10 fastfat!VfatBuildRequest+0xa3 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\drivers\filesystems\fastfat\misc.c @ 235]
|
f4fb4c2c 8045fb82 b23cad28 f4fb4c64 80466a61 nt!IofCallDriver+0xad (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\irp.c @ 1225]
|
f4fb4c50 80460f1c b25ac018 b23cad18 b2309e38 nt!IopPerformSynchronousRequest+0x32 (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\iofunc.c @ 139]
|
f4fb4ce0 8050468b 00000230 00000000 00000000 nt!NtQueryDirectoryFile+0x4ac (FPO: [Non-Fpo]) (CONV: stdcall) [c:\users\volodymyr\reactos\ntoskrnl\io\iomgr\iofunc.c @ 2030]
|
f4fb4d1c 80502a4f 80460a70 0012203c 0000002c nt!KiSystemCallTrampoline+0x1b (FPO: [Non-Fpo]) (CONV: cdecl) [c:\users\volodymyr\reactos\ntoskrnl\include\internal\i386\ke.h @ 742]
|
f4fb4d5c 80403e23 001260ec 7c92c46e badb0d00 nt!KiSystemServiceHandler+0x22f (FPO: [Non-Fpo]) (CONV: fastcall) [c:\users\volodymyr\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1738]
|
f4fb4d5c 7c92c46e 001260ec 7c92c46e badb0d00 nt!KiFastCallEntry+0x8c (FPO: [0,0] TrapFrame @ f4fb4d64)
|
001260ec 00000000 00000000 00000000 00000000 ntdll!KiFastSystemCallRet (FPO: [0,0,0])
|
|
Attachments
Issue Links
- is duplicated by
-
CORE-11913 Running explorer.exe via stress.bat causes access violation in co_UserDestroyWindow
- Resolved