*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960002c8083, fffff880048fdef0, 0}
Probably caused by : win32k.sys ( win32k!DEVLOCKBLTOBJ::bLock+6ff )
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960002c8083, Address of the instruction which caused the bugcheck
Arg3: fffff880048fdef0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
MODULE_NAME: win32k
FAULTING_MODULE: fffff80003061000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e83ef5b
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!DEVLOCKBLTOBJ::bLock+6ff
fffff960`002c8083 483bc8 cmp rcx,rax
CONTEXT: fffff880048fdef0 -- (.cxr 0xfffff880048fdef0)
rax=fffff900c3961420 rbx=fffff880048fea40 rcx=fffff900c208f3a0
rdx=fffff900c1dc1630 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960002c8083 rsp=fffff880048fe8c0 rbp=000000000000000b
r8=0000000000001009 r9=0000000000000000 r10=fffff900c0200000
r11=fffffa8003cbfb60 r12=fffff880048fe9f0 r13=fffff880048fe9d8
r14=fffff880048fea90 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
win32k!DEVLOCKBLTOBJ::bLock+0x6ff:
fffff960`002c8083 483bc8 cmp rcx,rax
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960002c8083
STACK_TEXT:
fffff880`048fe8c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!DEVLOCKBLTOBJ::bLock+0x6ff
FOLLOWUP_IP:
win32k!DEVLOCKBLTOBJ::bLock+6ff
fffff960`002c8083 483bc8 cmp rcx,rax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!DEVLOCKBLTOBJ::bLock+6ff
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: win32k.sys
STACK_COMMAND: .cxr 0xfffff880048fdef0 ; kb
Followup: MachineOwner