Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010611-28922-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a54000 PsLoadedModuleList = 0x82b9c810
Debug session time: Thu Jan 6 13:05:21.213 2011 (UTC - 5:00)
System Uptime: 0 days 0:38:32.764
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fe00f204, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9a4d1983, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from 82bbc718
Unable to read MiSystemVaType memory at 82b9c160
fe00f204
FAULTING_IP:
cdd!CopySurfBitsFast+c7
9a4d1983 8b06 mov eax,dword ptr [esi]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9efb7268 -- (.trap 0xffffffff9efb7268)
ErrCode = 00000000
eax=00000002 ebx=00000001 ecx=00000002 edx=00000004 esi=fe00f204 edi=a175b588
eip=9a4d1983 esp=9efb72dc ebp=9efb72f4 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
cdd!CopySurfBitsFast+0xc7:
9a4d1983 8b06 mov eax,dword ptr [esi] ds:0023:fe00f204=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82a9a638 to 82ad9903
STACK_TEXT:
9efb7250 82a9a638 00000000 fe00f204 00000000 nt!MmAccessFault+0x106
9efb7250 9a4d1983 00000000 fe00f204 00000000 nt!KiTrap0E+0xdc
9efb72f4 9a4d1d09 a175b588 00001a80 fe00f204 cdd!CopySurfBitsFast+0xc7
9efb7350 9a4e33bb a1758088 00001a80 fe20f14c cdd!CopySurfBits+0x81
9efb76dc 9a4e3d74 ffb89010 fe258190 fe20f010 cdd!BitBltBitmap+0x3eb
9efb7890 9a4e482f fe258190 fe20f010 00000000 cdd!DrvBitBlt+0xc2
9efb78c4 9a318fa3 fe258190 fe20f010 00000000 cdd!DrvCopyBits+0x27
9efb790c 9a2fec34 9a4e4808 9efb7b9c fe258190 win32k!OffCopyBits+0x7d
9efb7bb0 9a31c580 fe258190 fe20f010 00000000 win32k!SpBitBlt+0x252
9efb7be4 9a31cdd2 fe258190 fe20f010 00000000 win32k!SpCopyBits+0x27
9efb7ccc 9a304fae ffbbd550 9a4552f0 ffbbd550 win32k!NtGdiBitBltInternal+0x6ab
9efb7d00 82a9744a 05010e03 00000000 00000000 win32k!NtGdiBitBlt+0x2f
9efb7d00 770a64f4 05010e03 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
024eef88 00000000 00000000 00000000 00000000 0x770a64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!CopySurfBitsFast+c7
9a4d1983 8b06 mov eax,dword ptr [esi]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: cdd!CopySurfBitsFast+c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bd992
FAILURE_BUCKET_ID: 0x50_cdd!CopySurfBitsFast+c7
BUCKET_ID: 0x50_cdd!CopySurfBitsFast+c7
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010611-28922-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a54000 PsLoadedModuleList = 0x82b9c810
Debug session time: Thu Jan 6 13:05:21.213 2011 (UTC - 5:00)
System Uptime: 0 days 0:38:32.764
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
1: kd> !analyze-v
No export analyze-v found
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fe00f204, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9a4d1983, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from 82bbc718
Unable to read MiSystemVaType memory at 82b9c160
fe00f204
FAULTING_IP:
cdd!CopySurfBitsFast+c7
9a4d1983 8b06 mov eax,dword ptr [esi]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9efb7268 -- (.trap 0xffffffff9efb7268)
ErrCode = 00000000
eax=00000002 ebx=00000001 ecx=00000002 edx=00000004 esi=fe00f204 edi=a175b588
eip=9a4d1983 esp=9efb72dc ebp=9efb72f4 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
cdd!CopySurfBitsFast+0xc7:
9a4d1983 8b06 mov eax,dword ptr [esi] ds:0023:fe00f204=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 82a9a638 to 82ad9903
STACK_TEXT:
9efb7250 82a9a638 00000000 fe00f204 00000000 nt!MmAccessFault+0x106
9efb7250 9a4d1983 00000000 fe00f204 00000000 nt!KiTrap0E+0xdc
9efb72f4 9a4d1d09 a175b588 00001a80 fe00f204 cdd!CopySurfBitsFast+0xc7
9efb7350 9a4e33bb a1758088 00001a80 fe20f14c cdd!CopySurfBits+0x81
9efb76dc 9a4e3d74 ffb89010 fe258190 fe20f010 cdd!BitBltBitmap+0x3eb
9efb7890 9a4e482f fe258190 fe20f010 00000000 cdd!DrvBitBlt+0xc2
9efb78c4 9a318fa3 fe258190 fe20f010 00000000 cdd!DrvCopyBits+0x27
9efb790c 9a2fec34 9a4e4808 9efb7b9c fe258190 win32k!OffCopyBits+0x7d
9efb7bb0 9a31c580 fe258190 fe20f010 00000000 win32k!SpBitBlt+0x252
9efb7be4 9a31cdd2 fe258190 fe20f010 00000000 win32k!SpCopyBits+0x27
9efb7ccc 9a304fae ffbbd550 9a4552f0 ffbbd550 win32k!NtGdiBitBltInternal+0x6ab
9efb7d00 82a9744a 05010e03 00000000 00000000 win32k!NtGdiBitBlt+0x2f
9efb7d00 770a64f4 05010e03 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
024eef88 00000000 00000000 00000000 00000000 0x770a64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!CopySurfBitsFast+c7
9a4d1983 8b06 mov eax,dword ptr [esi]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: cdd!CopySurfBitsFast+c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bd992
FAILURE_BUCKET_ID: 0x50_cdd!CopySurfBitsFast+c7
BUCKET_ID: 0x50_cdd!CopySurfBitsFast+c7
Followup: MachineOwner
---------