- Joined
- Feb 18, 2009
- Messages
- 1,825 (0.33/day)
- Location
- Slovenia
System Name | Multiple - Win7, Win10, Kubuntu |
---|---|
Processor | Intel Core i7 3820 OC@ 4.0 GHz |
Motherboard | Asus P9X79 |
Cooling | Noctua NH-L12 |
Memory | Corsair Vengeance 32GB 1333MHz |
Video Card(s) | Sapphire ATI Radeon RX 480 8GB |
Storage | Samsung SSD: 970 EVO 1TB, 2x870 EVO 250GB,860 Evo 250GB,850 Evo 250GB, WD 4x1TB, 2x2TB, 4x4TB |
Display(s) | Asus PB328Q 32' 1440p@75hz |
Case | Cooler Master CM Storm Trooper |
Power Supply | Corsair HX750, HX550, Galaxy 520W |
Mouse | Multiple, Razer Mamba Elite, Logitech M500 |
Keyboard | Multiple - Lenovo, HP, Dell, Logitech |
Seems like something's playing dirty.
The bugcheck points to win32k.sys which is obviously not the cause of the problem, but it does list firefox.exe as the process.
The dump is full 16 GB. And no, nothing is wrong with this computer.
The BSOD happend twice a week, when watching flash video, and having stuff open. But it never crahsed in games, it crashed precisely when viewing web video.
The bugcheck points to win32k.sys which is obviously not the cause of the problem, but it does list firefox.exe as the process.
The dump is full 16 GB. And no, nothing is wrong with this computer.
The BSOD happend twice a week, when watching flash video, and having stuff open. But it never crahsed in games, it crashed precisely when viewing web video.
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Complete Dump File: Full address space is available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols;C:\Symbols;symsrv*symsrv.dll*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\Symbols
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c4e000 PsLoadedModuleList = 0xfffff800`02e93670
Debug session time: Tue Jun 19 20:00:13.678 2012 (UTC + 2:00)
System Uptime: 0 days 11:00:41.896
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
.....
Loading unloaded module list
........
Loading Wow64 Symbols
................................................................
.............................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 103b2, 4822015}
"kernel32.dll" was not found in the image list.
Debugger will attempt to load "kernel32.dll" at given base 00000000`00000000.
Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to add module at 00000000`00000000
Probably caused by : win32k.sys ( win32k!vSolidFillRect1+14f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000103b2
Arg4: 0000000004822015
Debugging Details:
------------------
"kernel32.dll" was not found in the image list.
Debugger will attempt to load "kernel32.dll" at given base 00000000`00000000.
Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to add module at 00000000`00000000
BUGCHECK_STR: 0x1a_5003
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800c79e9c0 -- (.trap 0xfffff8800c79e9c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000077dbfd8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960000aa393 rsp=fffff8800c79eb50 rbp=00000000ffffffff
r8=0000000000000016 r9=00000000077db418 r10=0000000000000049
r11=0000000000000781 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
win32k!vSolidFillRect1+0x14f:
fffff960`000aa393 48894828 mov qword ptr [rax+28h],rcx ds:d750:c000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c5e74c to fffff80002ccac40
STACK_TEXT:
fffff880`0c79e858 fffff800`02c5e74c : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`000103b2 : nt!KeBugCheckEx
fffff880`0c79e860 fffff800`02cc8d6e : 00000000`00000001 00000000`077dc000 fffffa80`0ce0c500 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x46f0d
fffff880`0c79e9c0 fffff960`000aa393 : fffff960`000aa244 fffff900`c0f30670 00000000`00000000 00000000`077d0000 : nt!KiPageFault+0x16e
fffff880`0c79eb50 fffff960`000aa124 : fffff880`0c79efa0 fffff880`00000781 00000000`077d0000 00000000`00000000 : win32k!vSolidFillRect1+0x14f
fffff880`0c79eb90 fffff960`00085d99 : 00000000`00000005 fffff880`0c79efa0 00000000`00000000 fffff880`00000000 : win32k!vDIBSolidBlt+0x204
fffff880`0c79ed70 fffff960`0006f919 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff900`c0f30670 : win32k!EngBitBlt+0x79d
fffff880`0c79ee80 fffff960`0006f500 : 00000000`00000000 fffff880`0c79f2a0 fffff880`0c79f110 fffff900`0000f0f0 : win32k!GrePatBltLockedDC+0x2f9
fffff880`0c79ef30 fffff960`002473e8 : fffff880`0c79f110 fffff800`02f6e2a2 00000000`0011cc90 fffff960`00000000 : win32k!GrePolyPatBltInternal+0x2ec
fffff880`0c79f080 fffff800`02cc9ed3 : 00000000`0011c3d8 00000000`00f00021 00000000`0011cc90 00000000`00000001 : win32k!NtGdiPolyPatBlt+0x308
fffff880`0c79f1b0 00000000`73a704ca : 00000000`73a4ff46 00000000`00000000 00000000`73a561c2 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0011c3b8 00000000`73a4ff46 : 00000000`00000000 00000000`73a561c2 00000000`00000000 00000000`00000028 : wow64win!NtGdiPolyPatBlt+0xa
00000000`0011c3c0 00000000`73a9cf87 : 00000000`002eab14 00000000`fffdb000 00000000`fffdd000 00000000`fffdd000 : wow64win!whNtGdiPolyPatBlt+0x9a
00000000`0011c420 00000000`73a22776 : 00000000`00200246 00000000`73a98e32 00000000`00200246 00000000`002e0023 : wow64!Wow64SystemServiceEx+0xd7
00000000`0011cce0 00000000`73a9d07e : 00000000`002ecd10 00000000`73a21904 00000000`00000020 00000000`73a2198b : wow64cpu!TurboDispatchJumpAddressEnd+0x2d
00000000`0011cda0 00000000`73a98a40 : 00000002`00000000 00000000`0011dad0 00000018`002ecd50 00000000`773100dc : wow64!RunCpuSimulation+0xa
00000000`0011cdf0 00000000`73a62c4e : 00000000`0011d170 00000000`00000002 00000000`0011dad0 00000000`00000020 : wow64!Wow64KiUserCallbackDispatcher+0x204
00000000`0011d140 00000000`77171225 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : wow64win!whcbfnDWORD+0xe2
00000000`0011db30 00000000`73a7013a : 00000000`73a6281b 00000000`0000c227 00000000`73a454b0 00000000`73a45358 : ntdll!KiUserCallbackDispatcherContinue
00000000`0011dbb8 00000000`73a6281b : 00000000`0000c227 00000000`73a454b0 00000000`73a45358 00000000`0000000f : wow64win!ZwUserDispatchMessage+0xa
00000000`0011dbc0 00000000`73a4c0f7 : 00000000`002ecdb0 00000000`002ecdec 00000000`fffdb000 00000000`fffdd000 : wow64win!Wow64DoMessageThunk+0x8b
00000000`0011dc00 00000000`73a9cf87 : 00000000`002ecda0 00000000`002ec70c 00000000`fffdb000 00000000`73aafbfc : wow64win!whNtUserDispatchMessage+0x33
00000000`0011dc70 00000000`73a22776 : 00000000`74fd0735 00000000`73a90023 00000000`00200246 00000000`002ecd98 : wow64!Wow64SystemServiceEx+0xd7
00000000`0011e530 00000000`73a9d07e : 00000000`00000000 00000000`73a21920 00000000`0011e7c0 00000000`7714ecd1 : wow64cpu!TurboDispatchJumpAddressEnd+0x2d
00000000`0011e5f0 00000000`73a9c549 : 00000000`00000000 00000000`00000000 00000000`73a94ac8 00000000`7ffe0030 : wow64!RunCpuSimulation+0xa
00000000`0011e640 00000000`77164956 : 00000000`003c33e0 00000000`00000000 00000000`77252670 00000000`77225978 : wow64!Wow64LdrpInitialize+0x429
00000000`0011eb90 00000000`77161a17 : 00000000`00000000 00000000`77164061 00000000`0011f140 00000000`00000000 : ntdll!LdrpInitializeProcess+0x17e4
00000000`0011f080 00000000`7714c32e : 00000000`0011f140 00000000`00000000 00000000`fffdf000 00000000`00000000 : ntdll! ?? ::FNODOBFM::`string'+0x29220
00000000`0011f0f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!vSolidFillRect1+14f
fffff960`000aa393 48894828 mov qword ptr [rax+28h],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!vSolidFillRect1+14f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4f10ff24
FAILURE_BUCKET_ID: X64_0x1a_5003_win32k!vSolidFillRect1+14f
BUCKET_ID: X64_0x1a_5003_win32k!vSolidFillRect1+14f
Followup: MachineOwner
---------