Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86 Copyright (c) Microsoft Corporation. All rights reserved. (ntoskrnl\kd64\kdinit.c:74) ----------------------------------------------------- (ntoskrnl\kd64\kdinit.c:75) ReactOS 0.4.14-dev (Build 20191029-0.4.14-dev-178-g90c5cac) (Commit 90c5cac72c361ad83df2384bb94963e8dcfbfac4) (ntoskrnl\kd64\kdinit.c:76) 1 System Processor [2048 MB Memory] (ntoskrnl\kd64\kdinit.c:80) Command Line: DEBUG DEBUGPORT=COM1 BAUDRATE=115200 SOS (ntoskrnl\kd64\kdinit.c:81) ARC Paths: multi(0)disk(0)rdisk(0)partition(1) \ multi(0)disk(0)rdisk(0)partition(1) \ReactOS\ Connected to Windows Server 2003 3790 x86 compatible target at (Tue Oct 29 14:12:49.310 2019 (UTC - 6:00)), ptr64 FALSE Kernel Debugger connection established. ************* Symbol Path validation summary ************** Response Time (ms) Location OK X:\sysgen\msvc\reactos\rgtest\msvc_pdb Symbol search path is: X:\sysgen\msvc\reactos\rgtest\msvc_pdb Executable search path is: Windows Server 2003 Kernel Version 3790 UP Checked x86 compatible Built by: 20191029-0.4.14-dev-178-g90c5cac.MSVC_19.0.24213.1 Machine Name: Kernel base = 0x80400000 PsLoadedModuleList = 0x8059c300 System Uptime: not available (ntoskrnl\ke\i386\cpu.c:450) Supported CPU features : KF_V86_VIS KF_RDTSC KF_CR4 KF_CMOV KF_GLOBAL_PAGE KF_LARGE_PAGE KF_MTRR KF_CMPXCHG8B KF_MMX KF_WORKING_PTE KF_PAT KF_FXSR KF_FAST_SYSCALL KF_XMMI KF_XMMI64 KF_DTS KF_NX_BIT (ntoskrnl\ke\i386\cpu.c:722) Prefetch Cache: 64 bytes L2 Cache: 262144 bytes L2 Cache Line: 64 bytes L2 Cache Associativity: 8 (hal\halx86\acpi\halacpi.c:835) Your machine has a SRAT, but NUMA/HotPlug are not supported! (hal\halx86\acpi\halacpi.c:782) ACPI Timer at: 1008h (EXT: 0) (hal\halx86\acpi\halacpi.c:533) ACPI Boot table found, but not supported! (hal\halx86\acpi\halacpi.c:891) ACPI 2.0 Detected. Tables: [XSDT] [FACP] [SRAT] [BOOT] (ntoskrnl\mm\ARM3\mminit.c:1452) HAL I/O Mapping at FFFE0000 is unsafe (ntoskrnl\mm\mminit.c:131) 0x80000000 - 0x83000000 Boot Loaded Image (ntoskrnl\mm\mminit.c:135) 0xB0000000 - 0xB0E01000 PFN Database (ntoskrnl\mm\mminit.c:139) 0xB0E01000 - 0xB4DE1000 ARM3 Non Paged Pool (ntoskrnl\mm\mminit.c:143) 0xB9400000 - 0xBB400000 System View Space (ntoskrnl\mm\mminit.c:147) 0xBB400000 - 0xC0000000 Session Space (ntoskrnl\mm\mminit.c:150) 0xC0000000 - 0xC03FFFFF Page Tables (ntoskrnl\mm\mminit.c:153) 0xC0300000 - 0xC0300FFF Page Directories (ntoskrnl\mm\mminit.c:156) 0xC0400000 - 0xC07FFFFF Hyperspace (ntoskrnl\mm\mminit.c:159) 0xC1000000 - 0xE0FFFFFF System Cache (ntoskrnl\mm\mminit.c:163) 0xE1000000 - 0xECC00000 ARM3 Paged Pool (ntoskrnl\mm\mminit.c:166) 0xECC00000 - 0xF7BE0000 System PTE Space (ntoskrnl\mm\mminit.c:169) 0xF7BE0000 - 0xFFBE0000 Non Paged Pool Expansion PTE Space (ntoskrnl\config\cmcheck.c:25) CmCheckRegistry(0xB4D80008, 2) is UNIMPLEMENTED! ACPI Compatible Eisa/Isa HAL Detected .... .... .... (dll\win32\kernel32\client\loader.c:386) LoadLibraryExW(D:\WDStrage\Epic\UT_1\System\SoldierSkins.dll) failing with status c0000135 (dll\win32\kernel32\client\loader.c:386) LoadLibraryExW(_D:\WDStrage\Epic\UT_1\System\SoldierSkins.dll) failing with status c0000135 err:(dll\opengl\opengl32\icdload.c:117) Overriding the default OGL ICD with vmx_fb (win32ss\gdi\eng\pdevobj.c:522) PDEVOBJ_bSwitchMode, ppdev = E1542180, pSurface = E1526188 (win32ss\gdi\eng\pdevobj.c:585) leave, ppdev = E1542180, pSurface = E1906A78 (win32ss\user\ntuser\display.c:875) err: BitCount New 32 Orig 32 ChkNew 32 Access violation - code c0000005 (!!! second chance !!!) nt!IoBuildDeviceIoControlRequest+0x2d: 8046ce6d 0fb64830 movzx ecx,byte ptr [eax+30h] .... kd> !analyze -v Connected to Windows Server 2003 3790 x86 compatible target at (Tue Oct 29 14:15:10.592 2019 (UTC - 6:00)), ptr64 FALSE Loading Kernel Symbols .......................................................... Loading User Symbols ................................................ *** ERROR: Module load completed but symbols could not be loaded for vmx_fb.dll ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Unknown bugcheck code (0) Unknown bugcheck description Arguments: Arg1: 00000000 Arg2: 00000000 Arg3: 00000000 Arg4: e43c8675 Debugging Details: ------------------ *** ERROR: Module load completed but symbols could not be loaded for vmwogl32.DLL DUMP_CLASS: 1 DUMP_QUALIFIER: 0 BUILD_VERSION_STRING: 20191029-0.4.14-dev-178-g90c5cac.MSVC_19.0.24213.1 DUMP_TYPE: 0 BUGCHECK_P1: 0 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffe43c8675 PROCESS_NAME: UnrealTournament.exe FAULTING_IP: nt!IoBuildDeviceIoControlRequest+2d [x:\src\master\reactos\ntoskrnl\io\iomgr\irp.c @ 896] 8046ce6d 0fb64830 movzx ecx,byte ptr [eax+30h] ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 000011b0 FOLLOWUP_IP: vmx_fb+233b7 ef1ab3b7 85c0 test eax,eax READ_ADDRESS: Target machine operating system not supported 000011b0 BUGCHECK_STR: ACCESS_VIOLATION CPU_COUNT: 1 CPU_MHZ: 9e5 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 5 CPU_STEPPING: 5 CPU_MICROCODE: 6,5,5,0 (F,M,S,R) SIG: 7'00000000 (cache) 0'00000000 (init) DEFAULT_BUCKET_ID: DRIVER_FAULT CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: A64-WNTX1ADM ANALYSIS_SESSION_TIME: 10-29-2019 14:15:17.0140 ANALYSIS_VERSION: 10.0.14321.1024 x86fre LAST_CONTROL_TRANSFER: from ef415bfe to 8046ce6d STACK_TEXT: eef06b54 ef415bfe 00232044 00001180 eef06be8 nt!IoBuildDeviceIoControlRequest+0x2d [x:\src\master\reactos\ntoskrnl\io\iomgr\irp.c @ 896] eef06bb0 ef1ab3b7 00001180 00232044 eef06be8 win32k!EngDeviceIoControl+0xbe [x:\src\master\reactos\win32ss\gdi\eng\device.c @ 497] WARNING: Stack unwind information not available. Following frames may be wrong. eef06bdc ef18aedd e1545000 00000001 e18425e0 vmx_fb+0x233b7 eef06bf0 ef191773 e1545000 ef1914d8 e18425e0 vmx_fb+0x2edd eef06c08 ef191905 e1526198 eef06d10 e1526198 vmx_fb+0x9773 eef06c4c ef1a6fbe e1526198 00030004 00000020 vmx_fb+0x9905 eef06c74 ef4f1563 00000000 00030004 00000020 vmx_fb+0x1efbe eef06ce8 8051897b 24010141 00000000 00000000 win32k!NtGdiExtEscape+0x343 [x:\src\master\reactos\win32ss\gdi\ntgdi\print.c @ 239] eef06d18 8051690c ef4f1220 0012ca40 00000020 nt!KiSystemCallTrampoline+0x1b [x:\src\master\reactos\ntoskrnl\include\internal\i386\ke.h @ 766] eef06d5c 80403da3 0012ca60 7c932ece badb0d00 nt!KiSystemServiceHandler+0x25c [x:\src\master\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1833] eef06d5c 7c932ece 0012ca60 7c932ece badb0d00 nt!KiFastCallEntry+0x8c 0012ca34 7c4dee6c 7c4b3dc6 24010141 00000000 ntdll!KiFastSystemCallRet 0012ca38 7c4b3dc6 24010141 00000000 00000000 gdi32!NtGdiExtEscape+0xc 0012ca60 049e12a3 24010141 00030004 00000020 gdi32!ExtEscape+0x26 [x:\src\master\reactos\win32ss\gdi\gdi32\misc\misc.c @ 225] 0012cae0 049e3cc0 055d3f50 00000000 055d4450 vmwogl32+0x12a3 0012cc24 049fe08c 6b010190 00000000 7aac95d9 vmwogl32+0x3cc0 00000000 00000000 00000000 00000000 00000000 vmwogl32+0x1e08c STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 180a72f6bceda7eb627ad1e13dc5555a28718c37 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9efd52eaee37876a7eee2f39c82fec1738d24bde THREAD_SHA1_HASH_MOD: 441eccefb681e0687e03b8817b6d232487f063dd FAULT_INSTR_CODE: 575c085 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: vmx_fb+233b7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: vmx_fb IMAGE_NAME: vmx_fb.dll DEBUG_FLR_IMAGE_TIMESTAMP: 546ab99b IMAGE_VERSION: 12.1.8.0 FAILURE_BUCKET_ID: ACCESS_VIOLATION_vmx_fb+233b7 BUCKET_ID: ACCESS_VIOLATION_vmx_fb+233b7 PRIMARY_PROBLEM_CLASS: ACCESS_VIOLATION_vmx_fb+233b7 TARGET_TIME: 2019-10-29T20:13:58.000Z OSBUILD: 3790 OSSERVICEPACK: 3959 SERVICEPACK_NUMBER: 3 OS_REVISION: 0 SUITE_MASK: 0 PRODUCT_TYPE: 0 OSPLATFORM_TYPE: x86 OSNAME: Windows Server 2003 OSEDITION: Windows Server 2003 OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-10-29 11:08:13 BUILDDATESTAMP_STR: 0 BUILDLAB_STR: MSVC_19 BUILDOSVER_STR: 5.2.20191029-0.4.14-dev-178-g90c5cac.MSVC_19.0.24213.1 ANALYSIS_SESSION_ELAPSED_TIME: 24a5 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:access_violation_vmx_fb+233b7 FAILURE_ID_HASH: {cb544568-fd52-7862-c289-ed994ca7f496} Followup: MachineOwner --------- .... kd> g - ReactOS doesn't crash/BSoD after this, but the desktop freezes with only mouse cursor being alive - - Forced reboot required -