Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\xxxxx\Desktop\20140107JAEMEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: srv*c:\users\xxxxx\downloads\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff80002c1e000 PsLoadedModuleList = 0xfffff800
02e616d0
Debug session time: Tue Jan 7 15:37:08.839 2014 (UTC - 6:00)
System Uptime: 0 days 23:11:08.667
Loading Kernel Symbols
…
…
…
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type “.hh dbgerr001” for details
Loading unloaded module list
…
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa80081e0970, ffff, 0}
Page 3ce4e0 not present in the dump file. Type “.hh dbgerr004” for details
Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3c8 )
Followup: MachineOwner
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80081e0970
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
BUGCHECK_STR: 0x1a_41790
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: xxxxxxx.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002d04d50 to fffff80002c93bc0
STACK_TEXT:
fffff88008d6cf28 fffff800
02d04d50 : 000000000000001a 00000000
00041790 fffffa80081e0970 00000000
0000ffff : nt!KeBugCheckEx
fffff88008d6cf30 fffff800
02c803df : fffffa8000000000 00000000
2ed70fff 0000000000000000 00000000
00000000 : nt! ?? ::FNODOBFM::string'+0x35084 fffff880
08d6d0f0 fffff80002c92e53 : ffffffff
ffffffff fffff88008d6d3c0 fffff880
08d6d428 0000000000008000 : nt!NtFreeVirtualMemory+0x61f fffff880
08d6d1f0 fffff80002c8f410 : fffff960
0011745c 0000000000000001 fffff900
c01e9010 fffff900c5387cc0 : nt!KiSystemServiceCopyEnd+0x13 fffff880
08d6d388 fffff9600011745c : 00000000
00000001 fffff900c01e9010 fffff900
c5387cc0 0000000000000000 : nt!KiServiceLinkage fffff880
08d6d390 fffff960001177ac : 00000000
00000000 fffff88000000000 fffff900
c5387cc0 0000000000000000 : win32k!SURFACE::bDeleteSurface+0x3c8 fffff880
08d6d4e0 fffff960000d82a5 : 00000000
16050f80 fffff900c5387cc0 00000000
16050f80 0000000000000001 : win32k!bDeleteSurface+0x34 fffff880
08d6d510 fffff80002c92e53 : fffffa80
0f06ab50 fffff88008d6d5c0 00000000
0185000f 0000000025b78380 : win32k!NtGdiDeleteObjectApp+0xd5 fffff880
08d6d540 000007fefdc1108a : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x13 00000000
0016dba8 fffff80002c8b210 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x7fe
fdc1108a
fffff88008d6d720 fffff880
08d6da28 : fffff80002c96e53 fffff880
08d6d780 0000000000000000 fffff900
c066a5c0 : nt!KiCallUserMode
fffff88008d6d728 fffff800
02c96e53 : fffff88008d6d780 00000000
00000000 fffff900c066a5c0 fffff880
08d6dc70 : 0xfffff88008d6da28 fffff880
08d6d730 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 00000000`00000000 : nt!SwapContext_PatchXSave+0xa3
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3c8
fffff9600011745c e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960
00117611)
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 52705fba
FAILURE_BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3c8
BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3c8