Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:/Windows/Minidump/060811-41671-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*D:/down/TEMP*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16695.x86fre.win7_gdr.101026-1503 Machine Name: Kernel base = 0x8401e000 PsLoadedModuleList = 0x84166810 Debug session time: Wed Jun 8 23:26:29.525 2011 (GMT+8) System Uptime: 0 days 0:16:04.587 Loading Kernel Symbols . Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. .............................................................. ................................................................ .......................................... Loading User Symbols Loading unloaded module list ...... 0: kd> !analysis -v No export analysis found 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: bec1f430, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 99d67335, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from 84186718 Unable to read MiSystemVaType memory at 84166160 bec1f430 FAULTING_IP: win32k!vSrcCopyS32D32Identity+5e 99d67335 ff4d08 dec dword ptr [ebp+8] MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: chrome.exe CURRENT_IRQL: 0 TRAP_FRAME: 9ec1f3a4 -- (.trap 0xffffffff9ec1f3a4) ErrCode = 00000002 eax=fdec2100 ebx=fdec2100 ecx=00000000 edx=00000000 esi=9ec1f5a8 edi=0be77528 eip=99d67335 esp=9ec1f418 ebp=bec1f428 iopl=0 nv up ei ng nz ac pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010296 win32k!vSrcCopyS32D32Identity+0x5e: 99d67335 ff4d08 dec dword ptr [ebp+8] ss:0010:bec1f430=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 84064628 to 840a39eb STACK_TEXT: 9ec1f38c 84064628 00000001 bec1f430 00000000 nt!MmAccessFault+0x106 9ec1f38c 99d67335 00000001 bec1f430 00000000 nt!KiTrap0E+0xdc 9ec1f428 99d67272 000001f2 072d86f4 ffb7c450 win32k!vSrcCopyS32D32Identity+0x5e 9ec1f668 99d6fb2b ffb7c460 fd21cdc0 9ec1f9f4 win32k!EngCopyBits+0x604 9ec1f6e0 99f6479d ffb7c460 fd21cdc0 00000000 win32k!EngBitBlt+0x4ec 9ec1f890 99f6482f ffb7c6b8 fd21cdc0 00000000 cdd!DrvBitBlt+0xaeb 9ec1f8c4 99d9903b ffb7c6b8 fd21cdc0 9ec1f9f4 cdd!DrvCopyBits+0x27 9ec1f90c 99d7ecd4 99f64808 9ec1fb9c ffb7c6b8 win32k!OffCopyBits+0x7d 9ec1fbb0 99d9c618 ffb7c6b8 fd21cdc0 00000000 win32k!SpBitBlt+0x252 9ec1fbe4 99d9ce6a ffb7c6b8 fd21cdc0 fd635ee8 win32k!SpCopyBits+0x27 9ec1fccc 99d85046 fe47fb80 fe637ad0 ffbbd550 win32k!NtGdiBitBltInternal+0x6ab 9ec1fd00 8406143a 0a011856 00000000 00000000 win32k!NtGdiBitBlt+0x2f 9ec1fd00 77c36344 0a011856 00000000 00000000 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 0013f3ac 00000000 00000000 00000000 00000000 0x77c36344 STACK_COMMAND: kb FOLLOWUP_IP: cdd!DrvBitBlt+aeb 99f6479d 894520 mov dword ptr [ebp+20h],eax SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: cdd!DrvBitBlt+aeb FOLLOWUP_NAME: MachineOwner MODULE_NAME: cdd IMAGE_NAME: cdd.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bd992 FAILURE_BUCKET_ID: 0x50_cdd!DrvBitBlt+aeb BUCKET_ID: 0x50_cdd!DrvBitBlt+aeb Followup: MachineOwner ---------