Loading Dump File [D:\SIV\021815-14461-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location OK D:\SIV ************* Symbol Path validation summary ************** Response Time (ms) Location OK D:\SIV Deferred srv*G:\SymbolServer*http://msdl.microsoft.com/download/symbols Symbol search path is: D:\SIV;srv*G:\SymbolServer*http://msdl.microsoft.com/download/symbols Executable search path is: D:\SIV Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`04464000 PsLoadedModuleList = 0xfffff800`046a1e50 Debug session time: Wed Feb 18 06:26:56.582 2015 (UTC + 0:00) System Uptime: 0 days 12:09:05.002 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ................ Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff900c3358048, 0, fffff960002fbc38, 0} Could not read faulting driver name Probably caused by : win32k.sys ( win32k!SFMLOGICALSURFACE::GetSoSurfaceData+14 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff900c3358048, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff960002fbc38, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000470c0e0 GetUlongFromAddress: unable to read from fffff8000470c198 fffff900c3358048 FAULTING_IP: win32k!SFMLOGICALSURFACE::GetSoSurfaceData+14 fffff960`002fbc38 418b4120 mov eax,dword ptr [r9+20h] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre TRAP_FRAME: fffff88009465970 -- (.trap 0xfffff88009465970) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff900c2aad720 rdx=fffff88009465bc8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff960002fbc38 rsp=fffff88009465b00 rbp=fffffa8008e15310 r8=0000000000000000 r9=fffff900c3358028 r10=fffff9600027a590 r11=fffff88009465b48 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc win32k!SFMLOGICALSURFACE::GetSoSurfaceData+0x14: fffff960`002fbc38 418b4120 mov eax,dword ptr [r9+20h] ds:fffff900`c3358048=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800045551e4 to fffff800044d5f00 STACK_TEXT: fffff880`09465808 fffff800`045551e4 : 00000000`00000050 fffff900`c3358048 00000000`00000000 fffff880`09465970 : nt!KeBugCheckEx fffff880`09465810 fffff800`044d3fee : 00000000`00000000 fffff900`c2aad7b8 00000000`00000000 fffff800`044d5153 : nt! ?? ::FNODOBFM::`string'+0x42907 fffff880`09465970 fffff960`002fbc38 : fffffa80`08e15312 fffff900`c0132010 fffffa80`00000000 fffff800`044e1cab : nt!KiPageFault+0x16e fffff880`09465b00 fffff960`002565cd : ffffffff`f3123086 fffffa80`08e15310 fffffa80`08e13310 00000000`00000007 : win32k!SFMLOGICALSURFACE::GetSoSurfaceData+0x14 fffff880`09465b50 fffff960`0027a6dd : 00000000`c000000d fffff880`09465ca0 00000000`00000030 00000000`00000000 : win32k!GreDwmGetSurfaceData+0x119 fffff880`09465b90 fffff800`044d5153 : fffffa80`09036060 00000000`03d7f718 00000000`00000020 00000000`00000000 : win32k!NtGdiHLSurfGetInformation+0x14d fffff880`09465c20 000007fe`fef7133a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`03d7f4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`fef7133a STACK_COMMAND: kb FOLLOWUP_IP: win32k!SFMLOGICALSURFACE::GetSoSurfaceData+14 fffff960`002fbc38 418b4120 mov eax,dword ptr [r9+20h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: win32k!SFMLOGICALSURFACE::GetSoSurfaceData+14 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0 IMAGE_VERSION: 6.1.7600.16385 FAILURE_BUCKET_ID: X64_0x50_win32k!SFMLOGICALSURFACE::GetSoSurfaceData+14 BUCKET_ID: X64_0x50_win32k!SFMLOGICALSURFACE::GetSoSurfaceData+14 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x50_win32k!sfmlogicalsurface::getsosurfacedata+14 FAILURE_ID_HASH: {088629bf-ed85-0a9d-8c89-113c2426da9f} Followup: MachineOwner --------- 1: kd> .trap 0xfffff88009465970 NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff900c2aad720 rdx=fffff88009465bc8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff960002fbc38 rsp=fffff88009465b00 rbp=fffffa8008e15310 r8=0000000000000000 r9=fffff900c3358028 r10=fffff9600027a590 r11=fffff88009465b48 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc win32k!SFMLOGICALSURFACE::GetSoSurfaceData+0x14: fffff960`002fbc38 418b4120 mov eax,dword ptr [r9+20h] ds:fffff900`c3358048=????????