Om jag fattat rätt så har det någonting med win32k att göra?
Det här är inget jag fattar något av alltså.... jag skulle lika gärna kunna gå ut på balkongen och försöka avgära hur många sandkorn det ligger på vägen utanför
Det här är det jag fick upp av min senaste dumpfil den som gjordes idag alltså.. jag har 2 till men då det blev så mycket text känns det onödigt att posta dom?
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, a5ca001, 245b, fffff70001080000}
Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3c8 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 000000000a5ca001
Arg3: 000000000000245b
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ad1a63 to fffff80002a7af00
STACK_TEXT:
fffff880`081ef5d8 fffff800`02ad1a63 : 00000000`0000001a 00000000`00041284 00000000`0a5ca001 00000000`0000245b : nt!KeBugCheckEx
fffff880`081ef5e0 fffff800`02aabc15 : fffff700`01080000 c5b00001`90b69867 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`081ef620 fffff800`02abcc4a : 00000000`00000000 00000000`0a678fff fffffa80`00000000 fffffa80`05825060 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`081ef7e0 fffff800`02a7a153 : ffffffff`ffffffff fffff880`081efaa0 fffff880`081efb08 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`081ef8d0 fffff800`02a766f0 : fffff960`001050f0 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 : nt!KiSystemServiceCopyEnd+0x13
fffff880`081efa68 fffff960`001050f0 : 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 00000000`00000000 : nt!KiServiceLinkage
fffff880`081efa70 fffff960`0010544c : 00000000`00000000 fffff880`00000000 fffff900`c41a1650 fffffa80`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8
fffff880`081efbc0 fffff960`000c661d : 00000000`27051440 fffff900`c41a1650 00000000`00001440 00000000`73f1f2bc : win32k!bDeleteSurface+0x34
fffff880`081efbf0 fffff800`02a7a153 : fffffa80`05816b60 fffff880`081efca0 00000000`7efa7000 fffffa80`06e19f40 : win32k!NtGdiDeleteObjectApp+0xd5
fffff880`081efc20 00000000`73ea2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`012fea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73ea2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3c8
fffff960`001050f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001052a5)
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 000000000a5ca001
Arg3: 000000000000245b
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ad1a63 to fffff80002a7af00
STACK_TEXT:
fffff880`081ef5d8 fffff800`02ad1a63 : 00000000`0000001a 00000000`00041284 00000000`0a5ca001 00000000`0000245b : nt!KeBugCheckEx
fffff880`081ef5e0 fffff800`02aabc15 : fffff700`01080000 c5b00001`90b69867 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`081ef620 fffff800`02abcc4a : 00000000`00000000 00000000`0a678fff fffffa80`00000000 fffffa80`05825060 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`081ef7e0 fffff800`02a7a153 : ffffffff`ffffffff fffff880`081efaa0 fffff880`081efb08 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`081ef8d0 fffff800`02a766f0 : fffff960`001050f0 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 : nt!KiSystemServiceCopyEnd+0x13
fffff880`081efa68 fffff960`001050f0 : 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 00000000`00000000 : nt!KiServiceLinkage
fffff880`081efa70 fffff960`0010544c : 00000000`00000000 fffff880`00000000 fffff900`c41a1650 fffffa80`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8
fffff880`081efbc0 fffff960`000c661d : 00000000`27051440 fffff900`c41a1650 00000000`00001440 00000000`73f1f2bc : win32k!bDeleteSurface+0x34
fffff880`081efbf0 fffff800`02a7a153 : fffffa80`05816b60 fffff880`081efca0 00000000`7efa7000 fffffa80`06e19f40 : win32k!NtGdiDeleteObjectApp+0xd5
fffff880`081efc20 00000000`73ea2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`012fea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73ea2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3c8
fffff960`001050f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001052a5)
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 000000000a5ca001
Arg3: 000000000000245b
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ad1a63 to fffff80002a7af00
STACK_TEXT:
fffff880`081ef5d8 fffff800`02ad1a63 : 00000000`0000001a 00000000`00041284 00000000`0a5ca001 00000000`0000245b : nt!KeBugCheckEx
fffff880`081ef5e0 fffff800`02aabc15 : fffff700`01080000 c5b00001`90b69867 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`081ef620 fffff800`02abcc4a : 00000000`00000000 00000000`0a678fff fffffa80`00000000 fffffa80`05825060 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`081ef7e0 fffff800`02a7a153 : ffffffff`ffffffff fffff880`081efaa0 fffff880`081efb08 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`081ef8d0 fffff800`02a766f0 : fffff960`001050f0 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 : nt!KiSystemServiceCopyEnd+0x13
fffff880`081efa68 fffff960`001050f0 : 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 00000000`00000000 : nt!KiServiceLinkage
fffff880`081efa70 fffff960`0010544c : 00000000`00000000 fffff880`00000000 fffff900`c41a1650 fffffa80`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8
fffff880`081efbc0 fffff960`000c661d : 00000000`27051440 fffff900`c41a1650 00000000`00001440 00000000`73f1f2bc : win32k!bDeleteSurface+0x34
fffff880`081efbf0 fffff800`02a7a153 : fffffa80`05816b60 fffff880`081efca0 00000000`7efa7000 fffffa80`06e19f40 : win32k!NtGdiDeleteObjectApp+0xd5
fffff880`081efc20 00000000`73ea2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`012fea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73ea2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3c8
fffff960`001050f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001052a5)
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 000000000a5ca001
Arg3: 000000000000245b
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ad1a63 to fffff80002a7af00
STACK_TEXT:
fffff880`081ef5d8 fffff800`02ad1a63 : 00000000`0000001a 00000000`00041284 00000000`0a5ca001 00000000`0000245b : nt!KeBugCheckEx
fffff880`081ef5e0 fffff800`02aabc15 : fffff700`01080000 c5b00001`90b69867 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`081ef620 fffff800`02abcc4a : 00000000`00000000 00000000`0a678fff fffffa80`00000000 fffffa80`05825060 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`081ef7e0 fffff800`02a7a153 : ffffffff`ffffffff fffff880`081efaa0 fffff880`081efb08 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`081ef8d0 fffff800`02a766f0 : fffff960`001050f0 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 : nt!KiSystemServiceCopyEnd+0x13
fffff880`081efa68 fffff960`001050f0 : 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 00000000`00000000 : nt!KiServiceLinkage
fffff880`081efa70 fffff960`0010544c : 00000000`00000000 fffff880`00000000 fffff900`c41a1650 fffffa80`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8
fffff880`081efbc0 fffff960`000c661d : 00000000`27051440 fffff900`c41a1650 00000000`00001440 00000000`73f1f2bc : win32k!bDeleteSurface+0x34
fffff880`081efbf0 fffff800`02a7a153 : fffffa80`05816b60 fffff880`081efca0 00000000`7efa7000 fffffa80`06e19f40 : win32k!NtGdiDeleteObjectApp+0xd5
fffff880`081efc20 00000000`73ea2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`012fea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73ea2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3c8
fffff960`001050f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001052a5)
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 000000000a5ca001
Arg3: 000000000000245b
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ad1a63 to fffff80002a7af00
STACK_TEXT:
fffff880`081ef5d8 fffff800`02ad1a63 : 00000000`0000001a 00000000`00041284 00000000`0a5ca001 00000000`0000245b : nt!KeBugCheckEx
fffff880`081ef5e0 fffff800`02aabc15 : fffff700`01080000 c5b00001`90b69867 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`081ef620 fffff800`02abcc4a : 00000000`00000000 00000000`0a678fff fffffa80`00000000 fffffa80`05825060 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`081ef7e0 fffff800`02a7a153 : ffffffff`ffffffff fffff880`081efaa0 fffff880`081efb08 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`081ef8d0 fffff800`02a766f0 : fffff960`001050f0 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 : nt!KiSystemServiceCopyEnd+0x13
fffff880`081efa68 fffff960`001050f0 : 00000000`00000001 fffff900`c00bf010 fffff900`c41a1650 00000000`00000000 : nt!KiServiceLinkage
fffff880`081efa70 fffff960`0010544c : 00000000`00000000 fffff880`00000000 fffff900`c41a1650 fffffa80`00000000 : win32k!SURFACE::bDeleteSurface+0x3c8
fffff880`081efbc0 fffff960`000c661d : 00000000`27051440 fffff900`c41a1650 00000000`00001440 00000000`73f1f2bc : win32k!bDeleteSurface+0x34
fffff880`081efbf0 fffff800`02a7a153 : fffffa80`05816b60 fffff880`081efca0 00000000`7efa7000 fffffa80`06e19f40 : win32k!NtGdiDeleteObjectApp+0xd5
fffff880`081efc20 00000000`73ea2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`012fea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73ea2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3c8
fffff960`001050f0 e9b0010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001052a5)
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
BUCKET_ID: X64_0x1a_41284_win32k!SURFACE::bDeleteSurface+3c8
Followup: MachineOwner