Advertisement
chenshaoju

BOSD 0x0000003B win32k.sys

May 1st, 2012
378
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.99 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [D:\My Documents\Desktop\050212-30872-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols
  10. Executable search path is:
  11. Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Built by: 7601.17790.amd64fre.win7sp1_gdr.120305-1505
  14. Machine Name:
  15. Kernel base = 0xfffff800`02063000 PsLoadedModuleList = 0xfffff800`022a7650
  16. Debug session time: Wed May 2 09:21:06.361 2012 (UTC + 8:00)
  17. System Uptime: 6 days 18:32:18.888
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ......................................................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ..................................................
  25. *******************************************************************************
  26. * *
  27. * Bugcheck Analysis *
  28. * *
  29. *******************************************************************************
  30.  
  31. Use !analyze -v to get detailed debugging information.
  32.  
  33. BugCheck 3B, {c0000005, fffff960001bff92, fffff8800f6f5ff0, 0}
  34.  
  35. Probably caused by : win32k.sys ( win32k!xxxTrackPopupMenuEx+9ba )
  36.  
  37. Followup: MachineOwner
  38. ---------
  39.  
  40. 0: kd> !analyze -v
  41. *******************************************************************************
  42. * *
  43. * Bugcheck Analysis *
  44. * *
  45. *******************************************************************************
  46.  
  47. SYSTEM_SERVICE_EXCEPTION (3b)
  48. An exception happened while executing a system service routine.
  49. Arguments:
  50. Arg1: 00000000c0000005, Exception code that caused the bugcheck
  51. Arg2: fffff960001bff92, Address of the instruction which caused the bugcheck
  52. Arg3: fffff8800f6f5ff0, Address of the context record for the exception that caused the bugcheck
  53. Arg4: 0000000000000000, zero.
  54.  
  55. Debugging Details:
  56. ------------------
  57.  
  58.  
  59. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
  60.  
  61. FAULTING_IP:
  62. win32k!xxxTrackPopupMenuEx+9ba
  63. fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8
  64.  
  65. CONTEXT: fffff8800f6f5ff0 -- (.cxr 0xfffff8800f6f5ff0)
  66. rax=0000000000000000 rbx=0000000000000001 rcx=fffff900c3127741
  67. rdx=fffff900c3f26101 rsi=0000000000000182 rdi=fffff900c2dd8260
  68. rip=fffff960001bff92 rsp=fffff8800f6f69d0 rbp=fffff900c081b6d0
  69. r8=fffff900c3f26100 r9=0000000000000080 r10=fffff90000000540
  70. r11=fffff900c3127740 r12=fffff900c68cf5d0 r13=fffff900c097ef10
  71. r14=fffff900c09a5b10 r15=0000000000000000
  72. iopl=0 nv up ei pl zr na po nc
  73. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  74. win32k!xxxTrackPopupMenuEx+0x9ba:
  75. fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8 ds:002b:00000000`00000008=????????
  76. Resetting default scope
  77.  
  78. CUSTOMER_CRASH_COUNT: 1
  79.  
  80. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  81.  
  82. BUGCHECK_STR: 0x3B
  83.  
  84. PROCESS_NAME: explorer.exe
  85.  
  86. CURRENT_IRQL: 0
  87.  
  88. LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960001bff92
  89.  
  90. STACK_TEXT:
  91. fffff880`0f6f69d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxTrackPopupMenuEx+0x9ba
  92.  
  93.  
  94. FOLLOWUP_IP:
  95. win32k!xxxTrackPopupMenuEx+9ba
  96. fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8
  97.  
  98. SYMBOL_STACK_INDEX: 0
  99.  
  100. SYMBOL_NAME: win32k!xxxTrackPopupMenuEx+9ba
  101.  
  102. FOLLOWUP_NAME: MachineOwner
  103.  
  104. MODULE_NAME: win32k
  105.  
  106. IMAGE_NAME: win32k.sys
  107.  
  108. DEBUG_FLR_IMAGE_TIMESTAMP: 4f2b63bd
  109.  
  110. STACK_COMMAND: .cxr 0xfffff8800f6f5ff0 ; kb
  111.  
  112. FAILURE_BUCKET_ID: X64_0x3B_win32k!xxxTrackPopupMenuEx+9ba
  113.  
  114. BUCKET_ID: X64_0x3B_win32k!xxxTrackPopupMenuEx+9ba
  115.  
  116. Followup: MachineOwner
  117. ---------
  118.  
  119. 0: kd> lmvm win32k
  120. start end module name
  121. fffff960`00090000 fffff960`003a5000 win32k (pdb symbols) d:\symbols\win32k.pdb\35DCD16E200141D2951315F923361A822\win32k.pdb
  122. Loaded symbol image file: win32k.sys
  123. Mapped memory image file: d:\symbols\win32k.sys\4F2B63BD315000\win32k.sys
  124. Image path: \SystemRoot\System32\win32k.sys
  125. Image name: win32k.sys
  126. Timestamp: Fri Feb 03 12:34:05 2012 (4F2B63BD)
  127. CheckSum: 00309DBE
  128. ImageSize: 00315000
  129. File version: 6.1.7601.17772
  130. Product version: 6.1.7601.17772
  131. File flags: 0 (Mask 3F)
  132. File OS: 40004 NT Win32
  133. File type: 3.7 Driver
  134. File date: 00000000.00000000
  135. Translations: 0409.04b0
  136. CompanyName: Microsoft Corporation
  137. ProductName: Microsoft® Windows® Operating System
  138. InternalName: win32k.sys
  139. OriginalFilename: win32k.sys
  140. ProductVersion: 6.1.7601.17772
  141. FileVersion: 6.1.7601.17772 (win7sp1_gdr.120202-1527)
  142. FileDescription: Multi-User Win32 Driver
  143. LegalCopyright: © Microsoft Corporation. All rights reserved.
  144. 0: kd> .cxr 0xfffff8800f6f5ff0
  145. rax=0000000000000000 rbx=0000000000000001 rcx=fffff900c3127741
  146. rdx=fffff900c3f26101 rsi=0000000000000182 rdi=fffff900c2dd8260
  147. rip=fffff960001bff92 rsp=fffff8800f6f69d0 rbp=fffff900c081b6d0
  148. r8=fffff900c3f26100 r9=0000000000000080 r10=fffff90000000540
  149. r11=fffff900c3127740 r12=fffff900c68cf5d0 r13=fffff900c097ef10
  150. r14=fffff900c09a5b10 r15=0000000000000000
  151. iopl=0 nv up ei pl zr na po nc
  152. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  153. win32k!xxxTrackPopupMenuEx+0x9ba:
  154. fffff960`001bff92 410fba670808 bt dword ptr [r15+8],8 ds:002b:00000000`00000008=????????
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement