Assertion 'Class->cWndReferenceCount == 0' failed at E:\drivers\REACTOS\win32ss\user\ntuser\class.c line 210 Break instruction exception - code 80000003 (first chance) nt!DbgBreakPoint: 80515182 cc int 3 kd> !analyze -v Connected to Windows Server 2003 3790 x86 compatible target at (Wed Jan 9 15:14:29.740 2013 (UTC + 2:00)), ptr64 FALSE Loading Kernel Symbols ..................................................... Loading User Symbols ............................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Unknown bugcheck code (0) Unknown bugcheck description Arguments: Arg1: 00000000 Arg2: 00000000 Arg3: 00000000 Arg4: 526484ad Debugging Details: ------------------ *** ERROR: Module load completed but symbols could not be loaded for procexp.exe PROCESS_NAME: procexp.exe FAULTING_IP: nt!DbgBreakPoint+0 80515182 cc int 3 EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 80515182 (nt!DbgBreakPoint) ExceptionCode: 80000003 (Break instruction exception) ExceptionFlags: 00000000 NumberParameters: 3 Parameter[0]: 00000000 Parameter[1]: 00000000 Parameter[2]: 00000000 ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached. EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000000 EXCEPTION_PARAMETER3: 00000000 DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO BUGCHECK_STR: 0x0 CURRENT_IRQL: 0 ASSERT_DATA: Class->cWndReferenceCount == 0 ASSERT_FILE_LOCATION: E:\drivers\REACTOS\win32ss\user\ntuser\class.c at Line 210 LAST_CONTROL_TRANSFER: from 8050a0c6 to 80515182 STACK_TEXT: f98d7b2c 8050a0c6 f98d7b60 f9b8afb6 f9cac270 nt!DbgBreakPoint f98d7b34 f9b8afb6 f9cac270 f9cac240 000000d2 nt!RtlAssert+0x46 [e:\drivers\reactos\lib\rtl\assert.c @ 119] f98d7b60 f9b8af70 be2522c8 00000001 00000001 win32k!IntDestroyClass+0x26 [e:\drivers\reactos\win32ss\user\ntuser\class.c @ 210] f98d7b80 f9b7123c 00000001 00000001 00000001 win32k!DestroyProcessClasses+0xe0 [e:\drivers\reactos\win32ss\user\ntuser\class.c @ 281] f98d7bb8 f9b714a2 b06d5580 00000001 f98d7bd8 win32k!UserDestroyThreadInfo+0x32c [e:\drivers\reactos\win32ss\user\ntuser\main.c @ 503] f98d7bd4 804dbbfb b06d5580 00000001 00000001 win32k!Win32kThreadCallback+0xc2 [e:\drivers\reactos\win32ss\user\ntuser\main.c @ 573] f98d7ca4 804dc298 00000000 b06d57c0 00000001 nt!PspExitThread+0x7eb [e:\drivers\reactos\ntoskrnl\ps\kill.c @ 697] f98d7cc4 804dc690 b06d5580 00000000 00000001 nt!PspTerminateThreadByPointer+0xf8 [e:\drivers\reactos\ntoskrnl\ps\kill.c @ 971] f98d7cf4 804fdaa9 ffffffff 00000000 00000010 nt!NtTerminateProcess+0x1b0 [e:\drivers\reactos\ntoskrnl\ps\kill.c @ 1200] f98d7d0c 804fda56 804dc4e0 0012f55c 00000008 nt!KiSystemCallTrampoline+0x19 [e:\drivers\reactos\ntoskrnl\include\internal\i386\ke.h @ 667] f98d7d44 804fd49d f98d7d64 0012f55c 0012f55c nt!KiSystemCall+0x206 [e:\drivers\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1619] f98d7d5c 804fba28 0012f568 77f2c3be badb0d00 nt!KiFastCallEntryHandler+0x6d [e:\drivers\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1665] f98d7d5c 77f2c3be 0012f568 77f2c3be badb0d00 nt!KiFastCallEntry+0x71 0012f550 77f4c14e 77dafa21 ffffffff 00000000 ntdll!KiFastSystemCallRet 0012f554 77dafa21 ffffffff 00000000 00000006 ntdll!ZwTerminateProcess+0xc 0012f568 00423c26 ffffffff 00000000 0042a7a3 kernel32!TerminateProcess+0x21 [e:\drivers\reactos\dll\win32\kernel32\client\proc.c @ 1800] WARNING: Stack unwind information not available. Following frames may be wrong. 0012f658 77ab3b79 00343100 0004008a 00000010 procexp+0x23c26 0012f680 77ab449b 00343100 0004008a 00000010 user32!IntCallMessageProc+0x189 [e:\drivers\reactos\win32ss\user\user32\windows\message.c @ 1634] 0012f6e4 77a93d5e 0004008a 00000010 00000000 user32!SendMessageW+0x10b [e:\drivers\reactos\win32ss\user\user32\windows\message.c @ 2233] 0012f718 77a95e09 0004008a 0000f060 0041029a user32!DefWndHandleSysCommand+0x19e [e:\drivers\reactos\win32ss\user\user32\windows\defwnd.c @ 785] 0012f880 77a97184 0004008a 00000112 0000f060 user32!User32DefWindowProc+0x859 [e:\drivers\reactos\win32ss\user\user32\windows\defwnd.c @ 1369] 0012f8cc 77a97813 0004008a 00000112 0000f060 user32!RealDefWindowProcA+0x3b4 [e:\drivers\reactos\win32ss\user\user32\windows\defwnd.c @ 2032] 0012f914 00422c91 0004008a 00000112 0000f060 user32!DefWindowProcA+0x83 [e:\drivers\reactos\win32ss\user\user32\windows\defwnd.c @ 2221] 0012f9f8 77ab3b79 00343100 0004008a 00000112 procexp+0x22c91 0012fa20 77ab449b 00343100 0004008a 00000112 user32!IntCallMessageProc+0x189 [e:\drivers\reactos\win32ss\user\user32\windows\message.c @ 1634] 0012fa84 77ab7d42 0004008a 00000112 0000f060 user32!SendMessageW+0x10b [e:\drivers\reactos\win32ss\user\user32\windows\message.c @ 2233] 0012fadc 77ab7e4a 0004008a 00000014 00000012 user32!DefWndDoButton+0x242 [e:\drivers\reactos\win32ss\user\user32\windows\nonclient.c @ 979] 0012faf8 77a957dc 0004008a 00000014 0041029a user32!DefWndNCLButtonDown+0xfa [e:\drivers\reactos\win32ss\user\user32\windows\nonclient.c @ 1025] 0012fc60 77a97184 0004008a 000000a1 00000014 user32!User32DefWindowProc+0x22c [e:\drivers\reactos\win32ss\user\user32\windows\defwnd.c @ 1082] 0012fcac 77a97813 0004008a 000000a1 00000014 user32!RealDefWindowProcA+0x3b4 [e:\drivers\reactos\win32ss\user\user32\windows\defwnd.c @ 2032] 0012fcf4 00409cfa 0004008a 000000a1 00000014 user32!DefWindowProcA+0x83 [e:\drivers\reactos\win32ss\user\user32\windows\defwnd.c @ 2221] 0012fddc 77ab3b9c 00343100 0004008a 000000a1 procexp+0x9cfa 0012fe04 77ab390c 00343100 0004008a 000000a1 user32!IntCallMessageProc+0x1ac [e:\drivers\reactos\win32ss\user\user32\windows\message.c @ 1637] 0012fe74 00452f9e 0012fe98 fffffffe 00000000 user32!DispatchMessageA+0x1dc [e:\drivers\reactos\win32ss\user\user32\windows\message.c @ 1797] 0012feb4 77f36deb 00000000 0012fecc 77db7cd9 procexp+0x52f9e 00131efb 01000d00 00000300 131f7008 131fb000 ntdll!RtlLeaveCriticalSection+0xb [e:\drivers\reactos\lib\rtl\critical.c @ 617] 00131f03 131f7008 131fb000 13200000 13204000 0x1000d00 00131f07 131fb000 13200000 13204000 13206800 0x131f7008 00131f0b 13200000 13204000 13206800 13209000 0x131fb000 00131f0f 13204000 13206800 13209000 1320b000 0x13200000 00131f13 13206800 13209000 1320b000 1320d000 0x13204000 00131f17 13209000 1320b000 1320d000 1320e800 0x13206800 00131f1b 1320b000 1320d000 1320e800 13214000 0x13209000 00131f1f 1320d000 1320e800 13214000 13216800 0x1320b000 00131f23 1320e800 13214000 13216800 13219000 0x1320d000 00131f27 13214000 13216800 13219000 1321e000 0x1320e800 00131f2b 13216800 13219000 1321e000 13332000 0x13214000 00131f2f 13219000 1321e000 13332000 13334000 0x13216800 00131f33 1321e000 13332000 13334000 13220000 0x13219000 00131f37 13332000 13334000 13220000 13336800 0x1321e000 00131f3b 13334000 13220000 13336800 13338000 0x13332000 00131f3f 13220000 13336800 13338000 1333a000 0x13334000 00131f43 13336800 13338000 1333a000 1333d000 0x13220000 00131f47 13338000 1333a000 1333d000 13340000 0x13336800 00131f4b 1333a000 1333d000 13340000 13341800 0x13338000 00131f4f 1333d000 13340000 13341800 13345800 0x1333a000 00131f53 13340000 13341800 13345800 00000000 0x1333d000 00131f57 13341800 13345800 00000000 01000800 0x13340000 00131f5b 13345800 00000000 01000800 00000d00 0x13341800 00131f5f 00000000 01000800 00000d00 4c4c410c 0x13345800 STACK_COMMAND: kb FOLLOWUP_IP: win32k!IntDestroyClass+26 [e:\drivers\reactos\win32ss\user\ntuser\class.c @ 210] f9b8afb6 c745f000000000 mov dword ptr [ebp-10h],0 FAULTING_SOURCE_CODE: 206: { 207: PDESKTOP pDesk; 208: 209: /* There shouldn't be any clones anymore */ > 210: ASSERT(Class->cWndReferenceCount == 0); 211: ASSERT(Class->pclsClone == NULL); 212: 213: if (Class->pclsBase == Class) 214: { 215: PCALLPROCDATA CallProc, NextCallProc; SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: win32k!IntDestroyClass+26 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 50eaeecd FAILURE_BUCKET_ID: 0x0_win32k!IntDestroyClass+26 BUCKET_ID: 0x0_win32k!IntDestroyClass+26 Followup: MachineOwner ---------