Přidat otázku mezi oblíbenéZasílat nové odpovědi e-mailem ntoskrnl.exe - BSOD

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff96000166923, Address of the instruction which caused the bugcheck
Arg3: fffff880065c7030, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
win32k!HmgLockEx+a3
fffff960`00166923 0fb7430c movzx eax,word ptr [rbx+0Ch]

CONTEXT: fffff880065c7030 -- (.cxr 0xfffff880065c7030)
rax=fffff900c0210000 rbx=0000000000000000 rcx=fffffa8005740380
rdx=fffff900c0210000 rsi=0000000000010000 rdi=fffff900c0210000
rip=fffff96000166923 rsp=fffff880065c7a00 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=fffff880065c7a68 r12=00000000036cc200 r13=0000000000000000
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!HmgLockEx+0xa3:
fffff960`00166923 0fb7430c movzx eax,word ptr [rbx+0Ch] ds:002b:00000000`0000000c=????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: dwm.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff9600032c1e0 to fffff96000166923

STACK_TEXT:
fffff880`065c7a00 fffff960`0032c1e0 : fffff900`c2300420 00000000`00000001 ffffffff`c5120c68 fffff900`c2168cd0 : win32k!HmgLockEx+0xa3
fffff880`065c7a70 fffff960`0032b6de : fffff900`c2300420 00000000`00000000 00000c68`624d4653 00000000`0000001d : win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x40
fffff880`065c7aa0 fffff960`0032c5e3 : 00000000`00000000 ffffffff`c5120c68 fffff900`c2300420 00000000`036cc2e0 : win32k!SFMLOGICALSURFACE::DeInitialize+0x4e
fffff880`065c7ae0 fffff960`00287c9f : 00000000`00000000 fffff900`c00c0010 fffff900`c2300420 00000000`00000020 : win32k!bhLSurfDestroyLogicalSurfaceObject+0x4b
fffff880`065c7b20 fffff960`002a9278 : 00000800`00000001 00000000`00000001 fffff880`065c7c60 00000000`00000000 : win32k!GreSfmCloseCompositorRef+0x10f
fffff880`065c7b60 fffff800`0307e953 : fffffa80`05740380 00000000`020cf7a0 000007fe`f950d610 00000000`00000000 : win32k!NtGdiHLSurfSetInformation+0x1a8
fffff880`065c7be0 000007fe`fdab4efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`020cf1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdab4efa


FOLLOWUP_IP:
win32k!HmgLockEx+a3
fffff960`00166923 0fb7430c movzx eax,word ptr [rbx+0Ch]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32k!HmgLockEx+a3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 54163648

STACK_COMMAND: .cxr 0xfffff880065c7030 ; kb

FAILURE_BUCKET_ID: X64_0x3B_win32k!HmgLockEx+a3

BUCKET_ID: X64_0x3B_win32k!HmgLockEx+a3

Followup: MachineOwner
---------

DAlší!

Reakce na odpověď

1 Zadajte svou přezdívku:
2 Napište svou odpověď:
3 Pokud chcete dostat ban, zadejte libovolný text:

Zpět do poradny