MySQL Forums
Forum List  »  MySQL Workbench

Re: Windows blue screen - DataGrid
Posted by: Subaru Takanashi
Date: July 03, 2017 11:01PM

+1 for this issue.
MySQL Workbench 6.3.9 Community, Windows 10 Pro x64
Whenever I select an schema and display table, I get an "Unexpected Kernel Mode Trap".

Windows Event log don't have more information, but I analyzed Crash Dump using WinDbg.

From this result, target process name is "MySQLWorkbench.exe", so I also think this is bug for MySQL Workbench.


This is result for analyze.



Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 15063 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff802`ee08a000 PsLoadedModuleList = 0xfffff802`ee3d65a0
Debug session time: Tue Jul 4 13:05:46.519 2017 (UTC + 9:00)
System Uptime: 14 days 13:08:29.400
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000099`06a73018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, ffff9a0018956af0, ffff9a001ec8e980, fffff802ee54acd1}

Probably caused by : win32kfull.sys ( win32kfull!xxxDCEWindowHitTest2Internal+803 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff9a0018956af0
Arg3: ffff9a001ec8e980
Arg4: fffff802ee54acd1

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: Microsoft Corporation

SYSTEM_PRODUCT_NAME: Surface Pro 3

SYSTEM_SKU: Surface_Pro_3

SYSTEM_VERSION: 1

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 3.11.2150

BIOS_DATE: 04/26/2017

BASEBOARD_MANUFACTURER: Microsoft Corporation

BASEBOARD_PRODUCT: Surface Pro 3

BASEBOARD_VERSION: 1

DUMP_TYPE: 1

BUGCHECK_P1: 8

BUGCHECK_P2: ffff9a0018956af0

BUGCHECK_P3: ffff9a001ec8e980

BUGCHECK_P4: fffff802ee54acd1

BUGCHECK_STR: 0x7f_8

TRAP_FRAME: ffff9a0018956af0 -- (.trap 0xffff9a0018956af0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff475a094dd97e rbx=0000000000000000 rcx=ffffffffffffffff
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802ee54acd1 rsp=ffff9a001ec8e980 rbp=ffff9a001ec8f380
r8=ffff9a001ec8f508 r9=0000000000000008 r10=fffff802ee54aca0
r11=fffff802ee2012f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!NtQueryInformationProcess+0x31:
fffff802`ee54acd1 48894c2468 mov qword ptr [rsp+68h],rcx ss:0018:ffff9a00`1ec8e9e8=????????????????
Resetting default scope

CPU_COUNT: 4

CPU_MHZ: 9be

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 45

CPU_STEPPING: 1

CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1D'00000000 (cache) 1D'00000000 (init)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: MySQLWorkbench.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: WALHALLA

ANALYSIS_SESSION_TIME: 07-04-2017 13:41:01.0643

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

STACK_OVERFLOW: Stack Limit: ffff9a001ec8f000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffffead97e72af3 was blamed for the stack overflow. It is using 10368 bytes of stack total in 24 instances (likely recursion).

FOLLOWUP_IP:
win32kfull!xxxDCEWindowHitTest2Internal+803
fffffead`97e72af3 488bd8 mov rbx,rax

STACK_TEXT:
ffff9a00`1ec8e980 fffff802`ee201313 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryInformationProcess+0x31
ffff9a00`1ec8f290 fffff802`ee1f95d0 : fffffead`97e6e67e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
ffff9a00`1ec8f498 fffffead`97e6e67e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffff9a00`1ec8f4a0 fffffead`97e6dfff : fffffedf`809b21f0 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxHkCallHook+0x9e
ffff9a00`1ec8f5e0 fffffead`97e6d520 : 00000000`00000000 00070000`00070007 00000000`01ab0329 00000000`00000000 : win32kfull!xxxCallHook2+0x36f
ffff9a00`1ec8f830 fffffead`97e72c34 : fffffedf`00000000 fffffedf`80e63b20 00000000`00000000 00000000`01ab0329 : win32kfull!xxxSendTransformableMessageTimeout+0x1c0
ffff9a00`1ec8f990 fffffead`97e7229b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x944
ffff9a00`1ec8fb40 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec8fca0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec8fba0 fffffead`97e7229b : 00000000`00000000 ffff9a00`1ec907b8 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec8fd50 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec8feb0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec8fdb0 fffffead`97e7229b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec8ff60 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec900c0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec8ffc0 fffffead`97e7229b : 00000000`00000206 fffff802`ee1fb55f ffff9a00`188ce180 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec90170 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec902d0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec901d0 fffffead`97e7229b : ffffc10e`00000000 00000000`0000cae2 fffff802`ec576180 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec90380 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec904e0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec903e0 fffffead`97e7229b : 00000000`00000000 00000000`00000000 8a000001`c2e85963 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec90590 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec906f0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec905f0 fffffead`97e7229b : fffffedf`809b21f0 fffffead`97e6e846 fffffedf`00000010 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec907a0 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec90900 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec90800 fffffead`97e7229b : 00000000`00000000 fffffead`97e6edd7 fffffedf`83c7b4f0 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec909b0 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec90b10 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec90a10 fffffead`97e7229b : ffff9a00`00000084 00000000`00030704 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec90bc0 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec90d20 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec90c20 fffffead`97e7229b : 00000000`98320000 00000000`00000000 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec90dd0 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec90f30 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec90e30 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e71d20 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec90fe0 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91140 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91040 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e71b80 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec911f0 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91350 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91250 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e72500 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec91400 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91560 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91460 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e719e0 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec91610 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91770 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91670 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e71840 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec91820 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91980 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91880 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e60870 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec91a30 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91b90 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91a90 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e716a0 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec91c40 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91da0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91ca0 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e6f6a0 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec91e50 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec91fb0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec91eb0 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e6fb80 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec92060 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec921c0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec920c0 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e70420 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec92270 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec923d0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec922d0 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e72360 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec92480 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec925e0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec924e0 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e6c570 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec92690 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec927f0 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec926f0 fffffead`97e7229b : ffff83c5`99799f87 fffffedf`80e6c3d0 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec928a0 fffffead`97e72af3 : 000001ab`00000329 000001ab`00000329 000001ab`00000329 ffff9a00`1ec92a00 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec92900 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e6c230 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec92ab0 fffffead`97e72af3 : 00000281`000004bd 00000281`000004bd 00000281`000004bd ffff9a00`1ec92c10 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec92b10 fffffead`97e7229b : ffff9a00`1ec94228 fffffedf`80e6c090 00000000`00000000 00000000`00000001 : win32kfull!xxxDCEWindowHitTest2Internal+0x803
ffff9a00`1ec92cc0 fffffead`97fd40bb : 00000281`000004bd 00000281`000004bd 00000281`000004bd ffff9a00`1ec92e90 : win32kfull!xxxDCEWindowHitTestIndirect+0x12b
ffff9a00`1ec92d20 fffffead`97fd5014 : 00000281`000004bd 00000281`000004bd fffffedf`83c7b4f0 000001ab`00000329 : win32kfull!xxxWindowHitTestWithoutTargeting+0x63
ffff9a00`1ec92d90 fffffead`97fd4275 : 00000000`00000000 ffff83c5`997995e7 00000000`00000010 ffff9a00`1ec94288 : win32kfull!xxxPointerWindowHitTest+0xe8
ffff9a00`1ec92f00 fffffead`982e07af : ffff9a00`1ec93360 fffffedf`84e09cd8 00000000`00000000 00070000`00070007 : win32kfull!EditionPointerWindowHitTest+0xd5
ffff9a00`1ec93050 fffffead`982c233b : fffffedf`80007ea0 ffff9a00`1ec932a0 fffffedf`84e09cd8 fffffead`97e724a4 : win32kbase!ApiSetEditionPointerWindowHitTest+0xf7
ffff9a00`1ec931a0 fffffead`982c25c5 : 00000000`00000010 ffff9a00`1ec94288 fffffedf`80e6af60 00000000`00000000 : win32kbase!CTouchProcessor::DeterminePointerTargetWindow+0x213
ffff9a00`1ec93540 fffffead`982cba18 : fffffedf`80007f68 ffff9a00`1ec937b0 fffffedf`80007f68 00000000`00000249 : win32kbase!CTouchProcessor::DetermineTouchpadPointerTargetWindow+0xb9
ffff9a00`1ec936b0 fffffead`97fbe5f3 : fffffedf`83c7b750 fffffedf`809b21f0 0000028b`41b426a0 00000000`00000020 : win32kbase!CTouchProcessor::SetPointerFrameTargetWindows+0x658
ffff9a00`1ec93c60 fffffead`97f57a78 : fffffedf`80000f40 00000000`00000000 00000000`00000000 ffffc10e`ffffffff : win32kfull!xxxRetrievePointerInputMessage+0xdb
ffff9a00`1ec93fd0 fffffead`97e6bcde : fffffedf`83c7b4f0 ffff9a00`1ec94b80 fffffedf`83c7b4f0 00000000`00001000 : win32kfull!InkDevice::`vector deleting destructor'+0x231b8
ffff9a00`1ec94890 fffffead`97e6afc6 : ffff9a00`1ec94a48 00000000`0000c240 ffff9a00`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0xc9e
ffff9a00`1ec94a00 fffff802`ee201313 : ffffc10e`e4647080 00000099`06ffe7b8 ffff9a00`1ec94aa8 00000099`06ffe920 : win32kfull!NtUserPeekMessage+0x96
ffff9a00`1ec94a90 00007ffe`762f10a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000099`06ffe798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`762f10a4


STACK_COMMAND: .trap 0xffff9a0018956af0 ; kb

THREAD_SHA1_HASH_MOD_FUNC: da733919dd7f8f161352d1074e8b2dabeec76023

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fa8d8dc6be6b950b0e67d2fd20732ba9e57fda93

THREAD_SHA1_HASH_MOD: 51ed543b51bc6e017c9bd5159762572978ca2a12

FAULT_INSTR_CODE: ffd88b48

SYMBOL_STACK_INDEX: 8

SYMBOL_NAME: win32kfull!xxxDCEWindowHitTest2Internal+803

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 104c5f6b

MODULE_NAME: win32kfull

BUCKET_ID_FUNC_OFFSET: 803

FAILURE_BUCKET_ID: OLD_IMAGE_win32kfull.sys

BUCKET_ID: OLD_IMAGE_win32kfull.sys

PRIMARY_PROBLEM_CLASS: OLD_IMAGE_win32kfull.sys

TARGET_TIME: 2017-07-04T04:05:46.000Z

OSBUILD: 15063

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-06-03 17:53:36

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 618

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:old_image_win32kfull.sys

FAILURE_ID_HASH: {82623c84-b248-63a9-bf6b-8baba6170086}

Followup: MachineOwner
---------

Options: ReplyQuote




Sorry, only registered users may post in this forum.

Content reproduced on this site is the property of the respective copyright holders. It is not reviewed in advance by Oracle and does not necessarily represent the opinion of Oracle or any other party.