Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:/Windows/Minidump/060411-37265-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*D:/down/TEMP*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16695.x86fre.win7_gdr.101026-1503 Machine Name: Kernel base = 0x84049000 PsLoadedModuleList = 0x84191810 Debug session time: Sat Jun 4 14:26:01.878 2011 (GMT+8) System Uptime: 0 days 1:27:20.019 Loading Kernel Symbols ............................................................... ................................................................ ...................................... Loading User Symbols Loading unloaded module list ...... 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: bd1a7332, memory referenced. Arg2: 00000008, value 0 = read operation, 1 = write operation. Arg3: bd1a7332, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 841b1718 Unable to read MiSystemVaType memory at 84191160 bd1a7332 FAULTING_IP: +6b2e952f0370d9d4 bd1a7332 ?? ??? MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: chrome.exe CURRENT_IRQL: 0 TRAP_FRAME: 88ac3914 -- (.trap 0xffffffff88ac3914) ErrCode = 00000010 eax=023bf31c ebx=023bf31c ecx=00000000 edx=00000000 esi=88ac3b24 edi=01eedc7c eip=bd1a7332 esp=88ac3988 ebp=88ac39a4 iopl=0 nv up ei pl nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202 bd1a7332 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from 8408f628 to 840ce9eb STACK_TEXT: 88ac38fc 8408f628 00000008 bd1a7332 00000000 nt!MmAccessFault+0x106 88ac38fc bd1a7332 00000008 bd1a7332 00000000 nt!KiTrap0E+0xdc WARNING: Frame IP not in any known module. Following frames may be wrong. 88ac3984 023bf31c 01eedc7c 000006a4 fdef4b68 0xbd1a7332 88ac39a4 991a7272 00000089 119c4cb3 fe548728 0x23bf31c 88ac3be4 991dce6a fe6287c8 fdef4b68 00000000 win32k!EngCopyBits+0x604 88ac3ccc 991c5046 fe9be008 ffa54378 fe1aa370 win32k!NtGdiBitBltInternal+0x6ab 88ac3d00 8408c43a 8b010ec5 00000007 00000000 win32k!NtGdiBitBlt+0x2f 88ac3d00 777c6344 8b010ec5 00000007 00000000 nt!KiFastCallEntry+0x12a 0013ee1c 00000000 00000000 00000000 00000000 0x777c6344 STACK_COMMAND: kb FOLLOWUP_IP: win32k!EngCopyBits+604 991a7272 c745fcfeffffff mov dword ptr [ebp-4],0FFFFFFFEh SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: win32k!EngCopyBits+604 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f0b7b FAILURE_BUCKET_ID: 0x50_win32k!EngCopyBits+604 BUCKET_ID: 0x50_win32k!EngCopyBits+604 Followup: MachineOwner ---------