Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [E:\dumps\121614-11013-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred srv*E:\Symbols*http://msdl.microsoft.com/download/symbols ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred srv*E:\Symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: srv*E:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: srv*E:\Symbols*http://msdl.microsoft.com/download/symbols Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330 Machine Name: Kernel base = 0xfffff800`03a05000 PsLoadedModuleList = 0xfffff800`03c49650 Debug session time: Mon Dec 15 20:43:02.441 2014 (UTC + 2:00) System Uptime: 2 days 5:54:47.409 Loading Kernel Symbols . Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. .............................................................. ................................................................ ................................ Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c000001d, fffff80003a77e66, fffff88006bd70b0, 0} Probably caused by : memory_corruption Followup: memory_corruption --------- 1: kd> kd: Reading initial command '.locale .1251; !analyze -v; q' Locale: Russian_Russia.1251 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c000001d, Exception code that caused the bugcheck Arg2: fffff80003a77e66, Address of the instruction which caused the bugcheck Arg3: fffff88006bd70b0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {ИСКЛЮЧЕНИЕ} Недопустимая инструкция Произведена попытка выполнения недопустимой инструкции. FAULTING_IP: nt!KiInsertQueue+196 fffff800`03a77e66 ff ??? CONTEXT: fffff88006bd70b0 -- (.cxr 0xfffff88006bd70b0;r) rax=0000000000000003 rbx=fffffa800c2eba80 rcx=fffffa800b507c00 rdx=fffffa8006d06400 rsi=fffff80003bf6e01 rdi=fffffa800b507b60 rip=fffff80003a77e66 rsp=fffff88006bd7a90 rbp=0000000001134c00 r8=0000000000000000 r9=0000000000000000 r10=fffffa8006734400 r11=00000000001f0003 r12=fffff880009ef180 r13=fffffa800c2eba88 r14=fffffa800b507c68 r15=fffffa800c2eba88 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!KiInsertQueue+0x196: fffff800`03a77e66 ff ??? Last set context: rax=0000000000000003 rbx=fffffa800c2eba80 rcx=fffffa800b507c00 rdx=fffffa8006d06400 rsi=fffff80003bf6e01 rdi=fffffa800b507b60 rip=fffff80003a77e66 rsp=fffff88006bd7a90 rbp=0000000001134c00 r8=0000000000000000 r9=0000000000000000 r10=fffffa8006734400 r11=00000000001f0003 r12=fffff880009ef180 r13=fffffa800c2eba88 r14=fffffa800b507c68 r15=fffffa800c2eba88 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!KiInsertQueue+0x196: fffff800`03a77e66 ff ??? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x3B PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre MISALIGNED_IP: nt!KiInsertQueue+196 fffff800`03a77e66 ff ??? LAST_CONTROL_TRANSFER: from fffff80003d10eac to fffff80003a77e66 STACK_TEXT: fffff880`06bd7a90 fffff800`03d10eac : 00000000`00000000 fffffa80`06d06400 00000000`01134c00 00000000`00000000 : nt!KiInsertQueue+0x196 fffff880`06bd7b10 fffff800`03a80fd3 : fffffa80`06caf060 fffff880`06bd7c60 00000000`047de458 00000000`00000000 : nt!NtSetIoCompletion+0x9c fffff880`06bd7b70 00000000`771e297a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`047de438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771e297a CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 19 errors : !nt (fffff80003a77083-fffff80003a77e63) fffff80003a77080 0f 85 ba *08 00 00 41 bf 01 00 00 00 48 39 6b 30 ......A.....H9k0 ... fffff80003a77110 01 00 0f 84 50 5e f9 ff 81 fe 22 *08 01 00 0f 84 ....P^...."..... ... fffff80003a77170 2a 5c f9 *fb ff 4b 40 4c 89 43 30 41 ff 84 24 2c *\...K@L.C0A..$, ... fffff80003a77220 24 30 4b 00 00 45 84 f6 0f 84 f6 *ee ff ff e9 b3 $0K..E.......... ... fffff80003a77390 38 04 b9 80 00 00 00 66 09 4b 1a *fd c8 4c 89 7b 8......f.K...L.{ ... fffff80003a774e0 30 00 0f 83 fd fe ff ff eb d8 90 *91 90 90 90 90 0............... ... fffff80003a77520 cc 02 00 00 65 48 8b 3c 25 20 00 *80 00 45 33 e4 ....eH.<% ...E3. ... fffff80003a77630 4c 8b e8 *2f b6 45 02 48 2b 97 40 47 00 00 48 03 L../.E.H+.@G..H. ... fffff80003a77790 08 00 48 8b 4e 28 48 8b 46 20 48 *99 01 48 89 48 ..H.N(H.F H..H.H ... fffff80003a777b0 30 1c 02 *01 00 ff ff ff ff 45 39 *26 24 de ff ff 0........E9&$... ... fffff80003a77970 ff c1 88 4a 2b 45 84 c9 0f 84 c2 *19 08 00 41 ff ...J+E........A. ... fffff80003a77a10 83 8e fb *fe ff eb d0 41 8b ec ff c5 85 2d 1a b9 .......A.....-.. ... fffff80003a77b90 48 8b c5 e9 4f fb ff ff 48 8b 83 *a0 00 00 00 48 H...O...H......H ... fffff80003a77bb0 00 00 00 *91 01 a8 20 0f 85 a9 39 08 00 b8 01 01 ...... ...9..... ... fffff80003a77d20 82 15 03 00 00 8b 43 04 48 89 6c *64 48 4c 89 74 ......C.H.ldHL.t fffff80003a77d30 24 40 4c 89 7c 24 38 89 84 24 80 *08 00 00 4d 39 $@L.|$8..$....M9 ... fffff80003a77d70 32 f6 49 *8f 0e 49 8b c7 49 89 0f 48 89 41 08 49 2.I..I..I..H.A.I ... fffff80003a77e60 00 00 f0 *01 23 7f ff ff ff 49 8b 9c 24 88 20 00 ....#....I..$. . MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE STACK_COMMAND: .cxr 0xfffff88006bd70b0 ; kb FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_memory_corruption_stride FAILURE_ID_HASH: {54f6a81e-bd17-9afc-f167-0352818951c1} Followup: memory_corruption --------- quit: