Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-22089-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0d000 PsLoadedModuleList = 0xfffff800`02e4ae50
Debug session time: Mon Dec 27 11:36:38.851 2010 (UTC - 5:00)
System Uptime: 0 days 0:44:04.427
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002c80905, fffff880079d83f0, 0}
Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : win32k.sys ( win32k+862a0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c80905, Address of the instruction which caused the bugcheck
Arg3: fffff880079d83f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02c80905 498b08 mov rcx,qword ptr [r8]
CONTEXT: fffff880079d83f0 -- (.cxr 0xfffff880079d83f0)
rax=00000001f3d10015 rbx=0000000000000000 rcx=fffff900000004c0
rdx=611c1c1c90131314 rsi=fffff900000004c0 rdi=0000000000000021
rip=fffff80002c80905 rsp=fffff880079d8dc0 rbp=fffff88001fa0cc0
r8=611c1c1c90131313 r9=fffff80002c0d000 r10=fffff900000004c0
r11=fffffa8003f8cb60 r12=0000000000000009 r13=0000000000000000
r14=0000000000000002 r15=00000000746c7847
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02c80905 498b08 mov rcx,qword ptr [r8] ds:002b:611c1c1c`90131313=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002db1cdd to fffff80002c80905
STACK_TEXT:
fffff880`079d8dc0 fffff800`02db1cdd : 00000000`05200000 fffffa80`05e1c7f0 00000008`000008fe 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault16
fffff880`079d8dd0 fffff960`001262a0 : 00000000`00000000 00000000`00000000 00000000`00ffffff 00000000`00000000 : nt!ExAllocatePoolWithTag+0x90d
fffff880`079d8ec0 00000000`00000000 : 00000000`00000000 00000000`00ffffff 00000000`00000000 00000000`00000000 : win32k+0x862a0
FOLLOWUP_IP:
win32k+862a0
fffff960`001262a0 ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k+862a0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c
STACK_COMMAND: .cxr 0xfffff880079d83f0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k+862a0
BUCKET_ID: X64_0x3B_win32k+862a0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-21247-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e59e50
Debug session time: Mon Dec 27 11:37:54.920 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:32.231
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff90000812000, f86, f7000001d0c}
Probably caused by : win32k.sys ( win32k!memset+80 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff90000812000
Arg3: 0000000000000f86
Arg4: 00000f7000001d0c
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880028657d0 -- (.trap 0xfffff880028657d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff900c0673000 rbx=0000000000000000 rcx=fffff900c0678000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000183e20 rsp=fffff88002865968 rbp=fffff96000184451
r8=0000000000000028 r9=00000000000000c8 r10=0000000000000080
r11=0000000000000034 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32k!memset+0x80:
fffff960`00183e20 488911 mov qword ptr [rcx],rdx ds:047c:fffff900`c0678000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cfbe58 to fffff80002c8c740
STACK_TEXT:
fffff880`02865468 fffff800`02cfbe58 : 00000000`0000001a 00000000`00005003 fffff900`00812000 00000000`00000f86 : nt!KeBugCheckEx
fffff880`02865470 fffff800`02ca8ca2 : 00000000`00000001 fffff900`c0678000 fffff880`028657d0 fffff6fc`806033c0 : nt! ?? ::FNODOBFM::`string'+0x29f57
fffff880`02865560 fffff800`02ca6cf1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDispatchFault+0x8c2
fffff880`02865670 fffff800`02c8a82e : 00000000`00000001 fffff900`c0673000 00000000`00000000 00000000`050506d0 : nt!MmAccessFault+0x8f1
fffff880`028657d0 fffff960`00183e20 : fffff960`00172c6e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`02865968 fffff960`00172c6e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!memset+0x80
fffff880`02865970 fffff960`0017418f : 00000000`00000000 fffff880`02865af0 fffff960`00184451 fffff800`02caa10e : win32k!AllocateObject+0xf2
fffff880`028659b0 fffff960`00174d03 : fffff900`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SURFMEM::bCreateDIB+0x1fb
fffff880`02865aa0 fffff960`00176efb : fffff880`02865ca0 00000000`00000001 00000000`00000000 00000000`00000000 : win32k!GreCreateBitmap+0x11b
fffff880`02865b30 fffff800`02c8b993 : 00000000`00000100 00000000`00000400 00000000`00000001 0000007f`00000001 : win32k!NtGdiCreateBitmap+0x133
fffff880`02865bb0 000007fe`fe4d1f6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000cedd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fe4d1f6a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!memset+80
fffff960`00183e20 488911 mov qword ptr [rcx],rdx
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!memset+80
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c
FAILURE_BUCKET_ID: X64_0x1a_5003_win32k!memset+80
BUCKET_ID: X64_0x1a_5003_win32k!memset+80
Followup: MachineOwner
---------