*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff96000156923, Address of the instruction which caused the bugcheck
Arg3: fffff8800ad37030, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L
FAULTING_IP:
win32k!HmgLockEx+a3
fffff960`00156923 0fb7430c movzx eax,word ptr [rbx+0Ch]
CONTEXT: fffff8800ad37030 -- (.cxr 0xfffff8800ad37030)
rax=fffff900c0210000 rbx=0000000000000000 rcx=fffffa800fa47060
rdx=fffff900c0210000 rsi=0000000000000000 rdi=fffff900c0210000
rip=fffff96000156923 rsp=fffff8800ad37a00 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=fffff8800ad37a68 r12=000000000b600b00 r13=0000000000000000
r14=0000000000000001 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!HmgLockEx+0xa3:
fffff960`00156923 0fb7430c movzx eax,word ptr [rbx+0Ch] ds:002b:00000000`0000000c=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff9600031c1e0 to fffff96000156923
STACK_TEXT:
fffff880`0ad37a00 fffff960`0031c1e0 : fffff900`c1acc250 00000000`00000001 ffffffff`e7120de6 fffff900`c1ac2cd0 : win32k!HmgLockEx+0xa3
fffff880`0ad37a70 fffff960`0031b6de : fffff900`c1acc250 00000000`00000000 00000de6`624d4653 00000000`0000001d : win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x40
fffff880`0ad37aa0 fffff960`0031c5e3 : 00000000`00000000 ffffffff`e7120de6 fffff900`c1acc250 00000000`0b600b7c : win32k!SFMLOGICALSURFACE:
eInitialize+0x4e
fffff880`0ad37ae0 fffff960`00277c9f : 00000000`00000000 fffff900`c0123010 fffff900`c1acc250 00000000`00000000 : win32k!bhLSurfDestroyLogicalSurfaceObject+0x4b
fffff880`0ad37b20 fffff960`00299278 : 00000000`00000001 00000000`00000001 fffff880`0ad37c60 fffff960`002990d0 : win32k!GreSfmCloseCompositorRef+0x10f
fffff880`0ad37b60 fffff800`02e72a93 : fffffa80`0fa47060 fffff880`0ad37c60 00000000`03934560 fffffa80`0fa478f0 : win32k!NtGdiHLSurfSetInformation+0x1a8
fffff880`0ad37be0 000007fe`fe454efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0247f2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fe454efa
FOLLOWUP_IP:
win32k!HmgLockEx+a3
fffff960`00156923 0fb7430c movzx eax,word ptr [rbx+0Ch]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!HmgLockEx+a3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54163648
STACK_COMMAND: .cxr 0xfffff8800ad37030 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!HmgLockEx+a3
BUCKET_ID: X64_0x3B_win32k!HmgLockEx+a3
Followup: MachineOwner