View Single Post
05 May 2010  
Jonathan_King

Windows 7 Professional x64
 
 

I suggest a memory test. Download a copy of Memtest86 and burn the ISO to a CD using Iso Recorder. Boot from the CD, and run at least 5 passes.

If it comes out clean, follow these instructions for enabling Driver Verifier: http://www.sevenforums.com/crash-loc...s-drivers.html

Please upload the new dmps that result. I suggest deleting the dmps in the minidump folder now, to avoid confusion with the new dmps.

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Jonathan\AppData\Local\Temp\Temp5_Minidump.zip\Minidump\050510-35240-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c51e50
Debug session time: Wed May  5 10:35:53.430 2010 (GMT-4)
System Uptime: 0 days 2:25:26.100
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960001c6269, fffff8800605d9b0, 0}

Probably caused by : win32k.sys ( win32k!SetOrClrWF+69 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960001c6269, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800605d9b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
win32k!SetOrClrWF+69
fffff960`001c6269 488b4808        mov     rcx,qword ptr [rax+8]

CONTEXT:  fffff8800605d9b0 -- (.cxr 0xfffff8800605d9b0)
rax=000000cc4b91650f rbx=fffffa8005b724f0 rcx=0000000000000004
rdx=0000000003218e30 rsi=000000000008ca80 rdi=fffffa8005b724f0
rip=fffff960001c6269 rsp=fffff8800605e380 rbp=fffff8800605e520
 r8=00000000000004fb  r9=0000000000000001 r10=00000000fffff880
r11=0000000006055000 r12=00000000734db1cc r13=000000000008fd20
r14=000000000008d420 r15=0000000073442450
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
win32k!SetOrClrWF+0x69:
fffff960`001c6269 488b4808        mov     rcx,qword ptr [rax+8] ds:002b:000000cc`4b916517=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  steam.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff960001c6269

STACK_TEXT:  
fffff880`0605e380 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SetOrClrWF+0x69


FOLLOWUP_IP: 
win32k!SetOrClrWF+69
fffff960`001c6269 488b4808        mov     rcx,qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!SetOrClrWF+69

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc5e0

STACK_COMMAND:  .cxr 0xfffff8800605d9b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_win32k!SetOrClrWF+69

BUCKET_ID:  X64_0x3B_win32k!SetOrClrWF+69

Followup: MachineOwner
---------
My System SpecsSystem Spec