kd> !analyze -v Connected to Windows Server 2003 3790 x86 compatible target at (Sun Dec 29 05:22:05.600 2024 (UTC - 9:00)), ptr64 FALSE *** Unable to resolve unqualified symbol in Bp expression 'win32k|Surface_AllocaSurface'. Loading Kernel Symbols ..................................................... Loading User Symbols .................. *** Unable to resolve unqualified symbol in Bp expression 'win32k|Surface_AllocaSurface'. *** Unable to resolve unqualified symbol in Bp expression 'win32k|Surface_AllocaSurface'. *** Unable to resolve unqualified symbol in Bp expression 'win32k|Surface_AllocaSurface'. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Unknown bugcheck code (0) Unknown bugcheck description Arguments: Arg1: 00000000 Arg2: 00000000 Arg3: 00000000 Arg4: e43c8675 Debugging Details: ------------------ *** Unable to resolve unqualified symbol in Bp expression 'win32k|Surface_AllocaSurface'. PROCESS_NAME: csrss.exe FAULTING_IP: nv3_f551c000!DrvSetPointerShape+23 f552e769 8b4710 mov eax,dword ptr [edi+10h] ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000010 READ_ADDRESS: 00000010 FOLLOWUP_IP: nv3_f551c000!DrvSetPointerShape+23 f552e769 8b4710 mov eax,dword ptr [edi+10h] BUGCHECK_STR: ACCESS_VIOLATION DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) x86fre LAST_CONTROL_TRANSFER: from f571c84d to f552e769 STACK_TEXT: f560066c f571c84d e15f7f18 00000000 e163c010 nv3_f551c000!DrvSetPointerShape+0x23 f56006b8 f571c72b e15f7f18 00000000 e163c010 win32k!IntEngSetPointerShape+0x8d [c:\reactos\win32ss\gdi\eng\mouse.c @ 642] f5600774 f579a0c9 0001004a 00000000 01050053 win32k!GreSetPointerShape+0x30b [c:\reactos\win32ss\gdi\eng\mouse.c @ 767] f56007d8 f575117c f56008fc f5600868 cccccccc win32k!UserSetCursor+0x219 [c:\reactos\win32ss\user\ntuser\msgqueue.c @ 152] f5600854 f578cdcb 00020026 02000000 f56008c8 win32k!DesktopWindowProc+0x19c [c:\reactos\win32ss\user\ntuser\desktop.c @ 1515] f56008fc f578c8d4 00020026 02000000 00000000 win32k!co_IntSendMessageTimeoutSingle+0x3bb [c:\reactos\win32ss\user\ntuser\message.c @ 1583] f5600934 f578c7a4 00020026 02000000 00000000 win32k!co_IntSendMessageTimeout+0x54 [c:\reactos\win32ss\user\ntuser\message.c @ 1721] f5600964 f579e12b 00020026 02000000 f5600ad0 win32k!co_IntSendMessage+0x44 [c:\reactos\win32ss\user\ntuser\message.c @ 1502] f5600a58 f579d222 f5600ae4 f5600b28 f5600b10 win32k!co_IntProcessMouseMessage+0x9bb [c:\reactos\win32ss\user\ntuser\msgqueue.c @ 1703] f5600a78 f579e715 f5600ae4 f5600b28 f5600b10 win32k!co_IntProcessHardwareMessage+0x52 [c:\reactos\win32ss\user\ntuser\msgqueue.c @ 1901] f5600b1c f5791090 b0c9f168 00000001 00000000 win32k!co_MsqPeekHardwareMessage+0x265 [c:\reactos\win32ss\user\ntuser\msgqueue.c @ 2009] f5600b94 f5790be1 f5600c14 00000000 00000000 win32k!co_IntPeekMessage+0x230 [c:\reactos\win32ss\user\ntuser\message.c @ 1108] f5600be8 f575550c f5600c14 00000000 00000000 win32k!co_IntGetPeekMessage+0xf1 [c:\reactos\win32ss\user\ntuser\message.c @ 1274] f5600c38 f57473bd f5600c6c cccccccc 00000002 win32k!DesktopThreadMain+0x6c [c:\reactos\win32ss\user\ntuser\desktop.c @ 1580] f5600c60 f57b4595 00000000 f5600d08 00a1fff0 win32k!UserSystemThreadProc+0x19d [c:\reactos\win32ss\user\ntuser\csr.c @ 237] f5600cf8 8040405e 00000000 00000022 f58dfd5c win32k!NtUserCallOneParam+0x5e5 [c:\reactos\win32ss\user\ntuser\simplecall.c @ 403] f5600d10 8056b618 f57b3fb0 00a1ffe8 00000008 nt!KiSystemCallTrampoline+0x19 f5600d5c 80403ea5 00a1fff4 7c935f9e badb0d00 nt!KiSystemServiceHandler+0x278 [c:\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1840] f5600d5c 7c935f9e 00a1fff4 7c935f9e badb0d00 nt!KiFastCallEntry+0x96 00c4ff30 00000000 00000000 00000000 00000000 ntdll!KiFastSystemCallRet STACK_COMMAND: kb SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nv3_f551c000!DrvSetPointerShape+23 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nv3_f551c000 IMAGE_NAME: nv3.dll DEBUG_FLR_IMAGE_TIMESTAMP: 3b7dfec3 IMAGE_VERSION: 5.1.3528.343 FAILURE_BUCKET_ID: ACCESS_VIOLATION_nv3_f551c000!DrvSetPointerShape+23 BUCKET_ID: ACCESS_VIOLATION_nv3_f551c000!DrvSetPointerShape+23 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:access_violation_nv3_f551c000!drvsetpointershape+23 FAILURE_ID_HASH: {e8d8db78-3323-a898-02db-3187dc3e2b31} Followup: MachineOwner ---------