Loading Dump File [C:/Windows/Minidump/060811-41671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*D:/down/TEMP*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x8401e000 PsLoadedModuleList = 0x84166810
Debug session time: Wed Jun 8 23:26:29.525 2011 (GMT+8)
System Uptime: 0 days 0:16:04.587
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
......
0: kd> !analysis -v
No export analysis found
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: bec1f430, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 99d67335, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 84186718
Unable to read MiSystemVaType memory at 84166160
bec1f430
FAULTING_IP:
win32k!vSrcCopyS32D32Identity+5e
99d67335 ff4d08 dec dword ptr [ebp+8]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9ec1f3a4 -- (.trap 0xffffffff9ec1f3a4)
ErrCode = 00000002
eax=fdec2100 ebx=fdec2100 ecx=00000000 edx=00000000 esi=9ec1f5a8 edi=0be77528
eip=99d67335 esp=9ec1f418 ebp=bec1f428 iopl=0 nv up ei ng nz ac pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010296
win32k!vSrcCopyS32D32Identity+0x5e:
99d67335 ff4d08 dec dword ptr [ebp+8] ss:0010:bec1f430=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 84064628 to 840a39eb
STACK_TEXT:
9ec1f38c 84064628 00000001 bec1f430 00000000 nt!MmAccessFault+0x106
9ec1f38c 99d67335 00000001 bec1f430 00000000 nt!KiTrap0E+0xdc
9ec1f428 99d67272 000001f2 072d86f4 ffb7c450 win32k!vSrcCopyS32D32Identity+0x5e
9ec1f668 99d6fb2b ffb7c460 fd21cdc0 9ec1f9f4 win32k!EngCopyBits+0x604
9ec1f6e0 99f6479d ffb7c460 fd21cdc0 00000000 win32k!EngBitBlt+0x4ec
9ec1f890 99f6482f ffb7c6b8 fd21cdc0 00000000 cdd!DrvBitBlt+0xaeb
9ec1f8c4 99d9903b ffb7c6b8 fd21cdc0 9ec1f9f4 cdd!DrvCopyBits+0x27
9ec1f90c 99d7ecd4 99f64808 9ec1fb9c ffb7c6b8 win32k!OffCopyBits+0x7d
9ec1fbb0 99d9c618 ffb7c6b8 fd21cdc0 00000000 win32k!SpBitBlt+0x252
9ec1fbe4 99d9ce6a ffb7c6b8 fd21cdc0 fd635ee8 win32k!SpCopyBits+0x27
9ec1fccc 99d85046 fe47fb80 fe637ad0 ffbbd550 win32k!NtGdiBitBltInternal+0x6ab
9ec1fd00 8406143a 0a011856 00000000 00000000 win32k!NtGdiBitBlt+0x2f
9ec1fd00 77c36344 0a011856 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0013f3ac 00000000 00000000 00000000 00000000 0x77c36344
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!DrvBitBlt+aeb
99f6479d 894520 mov dword ptr [ebp+20h],eax
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: cdd!DrvBitBlt+aeb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bd992
FAILURE_BUCKET_ID: 0x50_cdd!DrvBitBlt+aeb
BUCKET_ID: 0x50_cdd!DrvBitBlt+aeb
Followup: MachineOwner
---------