Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020911-18408-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03060000 PsLoadedModuleList = 0xfffff800`0329de50
Debug session time: Wed Feb 9 09:34:51.151 2011 (UTC - 5:00)
System Uptime: 0 days 0:23:24.149
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000310097a, fffff8800bda2ff0, 0}
Probably caused by : memory_corruption ( nt!MiGetPreviousNode+4a )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000310097a, Address of the instruction which caused the bugcheck
Arg3: fffff8800bda2ff0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiGetPreviousNode+4a
fffff800`0310097a 488b4910 mov rcx,qword ptr [rcx+10h]
CONTEXT: fffff8800bda2ff0 -- (.cxr 0xfffff8800bda2ff0)
rax=ffffffffffffffff rbx=00000000ffff0000 rcx=ffffffffffffffff
rdx=00000000000fafc0 rsi=00000000000fffff rdi=0000000000000010
rip=fffff8000310097a rsp=fffff8800bda39c8 rbp=00000000000ffff0
r8=ffffffffffff0000 r9=fffffa8005434ac0 r10=0000000000001000
r11=fffffa8005434ac0 r12=fffffa80040a74a0 r13=fffffa8003e5f3b0
r14=fffffa80045a0c60 r15=0000000000001000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!MiGetPreviousNode+0x4a:
fffff800`0310097a 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:00000000`0000000f=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AssassinsCreed
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000310097a
STACK_TEXT:
fffff880`0bda39c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPreviousNode+0x4a
FOLLOWUP_IP:
nt!MiGetPreviousNode+4a
fffff800`0310097a 488b4910 mov rcx,qword ptr [rcx+10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiGetPreviousNode+4a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff8800bda2ff0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiGetPreviousNode+4a
BUCKET_ID: X64_0x3B_nt!MiGetPreviousNode+4a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020911-18501-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0304a000 PsLoadedModuleList = 0xfffff800`03287e50
Debug session time: Wed Feb 9 23:08:59.877 2011 (UTC - 5:00)
System Uptime: 0 days 4:45:07.235
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960000d2f12, fffff880053fa0d0, 0}
Probably caused by : win32k.sys ( win32k!TimersProc+126 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000d2f12, Address of the instruction which caused the bugcheck
Arg3: fffff880053fa0d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!TimersProc+126
fffff960`000d2f12 ff80e4010000 inc dword ptr [rax+1E4h]
CONTEXT: fffff880053fa0d0 -- (.cxr 0xfffff880053fa0d0)
rax=0000000000000000 rbx=fffff900c01093f0 rcx=0000000000000000
rdx=fffff900c0109450 rsi=000000000000000a rdi=fffff900c0109408
rip=fffff960000d2f12 rsp=fffff880053faaa0 rbp=000000000000000f
r8=000000000000001b r9=0000000000000000 r10=fffff8000304a000
r11=fffff880053fa9d0 r12=0000000000000000 r13=fffff960002f02c0
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32k!TimersProc+0x126:
fffff960`000d2f12 ff80e4010000 inc dword ptr [rax+1E4h] ds:002b:00000000`000001e4=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960000d3964 to fffff960000d2f12
STACK_TEXT:
fffff880`053faaa0 fffff960`000d3964 : 00000000`00000000 fffff960`002f0a90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x126
fffff880`053faaf0 fffff960`000646d4 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`800002bc : win32k!RawInputThread+0x9b4
fffff880`053fabc0 fffff960`000e419a : fffffa80`00000002 fffff880`053d8f40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`053fabf0 fffff800`030b9993 : fffffa80`06231b60 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`053fac20 000007fe`fdb53d5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`014ef9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdb53d5a
FOLLOWUP_IP:
win32k!TimersProc+126
fffff960`000d2f12 ff80e4010000 inc dword ptr [rax+1E4h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!TimersProc+126
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d23ecb0
STACK_COMMAND: .cxr 0xfffff880053fa0d0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!TimersProc+126
BUCKET_ID: X64_0x3B_win32k!TimersProc+126
Followup: MachineOwner
---------