BSchwarz
Administrator
Hi everybody. I got a blue-screen error in Windows 7 32-bit. I checked my RAM by HirenBoot disc but there's no issue found.
Here is the report I found:
--------------------------------------------------------------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\122409-14866-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x8281b000 PsLoadedModuleList = 0x82963810
Debug session time: Thu Dec 24 21:59:10.672 2009 (GMT+7)
System Uptime: 0 days 1:09:35.248
Loading Kernel Symbols
.................................................. .............
.................................................. ..............
....................
Loading User Symbols
Loading unloaded module list
..........
1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffb885dc, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9670b768, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\cdd.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for cdd.dll
*** ERROR: Module load completed but symbols could not be loaded for cdd.dll
*** WARNING: Unable to verify timestamp for klif.sys
*** ERROR: Module load completed but symbols could not be loaded for klif.sys
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from 82983718
Unable to read MiSystemVaType memory at 82963160
ffb885dc
FAULTING_IP:
cdd+b768
9670b768 3b81cc050000 cmp eax,dword ptr [ecx+5CCh]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: TS3EP01.exe
CURRENT_IRQL: 0
TRAP_FRAME: 93082a98 -- (.trap 0xffffffff93082a98)
ErrCode = 00000000
eax=8592f1d0 ebx=8d89d07e ecx=ffb88010 edx=00000001 esi=fdb3d018 edi=00000000
eip=9670b768 esp=93082b0c ebp=93082b38 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246
cdd+0xb768:
9670b768 3b81cc050000 cmp eax,dword ptr [ecx+5CCh] ds:0023:ffb885dc=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 828615f8 to 828a08e3
STACK_TEXT:
93082a80 828615f8 00000000 ffb885dc 00000000 nt!MmAccessFault+0x106
93082a80 9670b768 00000000 ffb885dc 00000000 nt!KiTrap0E+0xdc
WARNING: Stack unwind information not available. Following frames may be wrong.
93082b38 96701753 fdb3d018 93082bd8 9653d304 cdd+0xb768
93082b44 9653d304 fdb3d018 00000002 93082bfc cdd+0x1753
93082bd8 9653e718 00000001 00000000 7105179f win32k!SURFACE::bDeleteSurface+0x235
93082bec 96540c0f 00000001 00000001 fe1b6db0 win32k!SURFREF::bDeleteSurface+0x14
93082c00 965403af 00000be8 00000001 00000be8 win32k!vCleanupSurfaces+0x43
93082c20 9653c052 ff53b818 00000000 00000000 win32k!NtGdiCloseProcess+0xc5
93082c40 9653e937 ff53b818 00000000 8637ac18 win32k!GdiProcessCallout+0x151
93082c5c 82a63b0c 860566c8 00000000 b4bddeed win32k!W32pProcessCallout+0x5d
93082cd8 82a7cd37 00000000 ffffffff 0012fe8c nt!PspExitThread+0x46d
93082d00 8d83000d ffffffff 00000000 0012fe8c nt!NtTerminateProcess+0x1fa
93082d24 8285e42a ffffffff 00000000 0012fe98 klif+0x2000d
93082d24 773664f4 ffffffff 00000000 0012fe98 nt!KiFastCallEntry+0x12a
0012fe98 00000000 00000000 00000000 00000000 0x773664f4
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd+b768
9670b768 3b81cc050000 cmp eax,dword ptr [ecx+5CCh]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: cdd+b768
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x50_cdd+b768
BUCKET_ID: 0x50_cdd+b768
Followup: MachineOwner
--------------------------------------------------------------
Please help me. Thank you so much!
More...
Here is the report I found:
--------------------------------------------------------------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\122409-14866-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x8281b000 PsLoadedModuleList = 0x82963810
Debug session time: Thu Dec 24 21:59:10.672 2009 (GMT+7)
System Uptime: 0 days 1:09:35.248
Loading Kernel Symbols
.................................................. .............
.................................................. ..............
....................
Loading User Symbols
Loading unloaded module list
..........
1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffb885dc, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9670b768, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\cdd.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for cdd.dll
*** ERROR: Module load completed but symbols could not be loaded for cdd.dll
*** WARNING: Unable to verify timestamp for klif.sys
*** ERROR: Module load completed but symbols could not be loaded for klif.sys
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from 82983718
Unable to read MiSystemVaType memory at 82963160
ffb885dc
FAULTING_IP:
cdd+b768
9670b768 3b81cc050000 cmp eax,dword ptr [ecx+5CCh]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: TS3EP01.exe
CURRENT_IRQL: 0
TRAP_FRAME: 93082a98 -- (.trap 0xffffffff93082a98)
ErrCode = 00000000
eax=8592f1d0 ebx=8d89d07e ecx=ffb88010 edx=00000001 esi=fdb3d018 edi=00000000
eip=9670b768 esp=93082b0c ebp=93082b38 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246
cdd+0xb768:
9670b768 3b81cc050000 cmp eax,dword ptr [ecx+5CCh] ds:0023:ffb885dc=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 828615f8 to 828a08e3
STACK_TEXT:
93082a80 828615f8 00000000 ffb885dc 00000000 nt!MmAccessFault+0x106
93082a80 9670b768 00000000 ffb885dc 00000000 nt!KiTrap0E+0xdc
WARNING: Stack unwind information not available. Following frames may be wrong.
93082b38 96701753 fdb3d018 93082bd8 9653d304 cdd+0xb768
93082b44 9653d304 fdb3d018 00000002 93082bfc cdd+0x1753
93082bd8 9653e718 00000001 00000000 7105179f win32k!SURFACE::bDeleteSurface+0x235
93082bec 96540c0f 00000001 00000001 fe1b6db0 win32k!SURFREF::bDeleteSurface+0x14
93082c00 965403af 00000be8 00000001 00000be8 win32k!vCleanupSurfaces+0x43
93082c20 9653c052 ff53b818 00000000 00000000 win32k!NtGdiCloseProcess+0xc5
93082c40 9653e937 ff53b818 00000000 8637ac18 win32k!GdiProcessCallout+0x151
93082c5c 82a63b0c 860566c8 00000000 b4bddeed win32k!W32pProcessCallout+0x5d
93082cd8 82a7cd37 00000000 ffffffff 0012fe8c nt!PspExitThread+0x46d
93082d00 8d83000d ffffffff 00000000 0012fe8c nt!NtTerminateProcess+0x1fa
93082d24 8285e42a ffffffff 00000000 0012fe98 klif+0x2000d
93082d24 773664f4 ffffffff 00000000 0012fe98 nt!KiFastCallEntry+0x12a
0012fe98 00000000 00000000 00000000 00000000 0x773664f4
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd+b768
9670b768 3b81cc050000 cmp eax,dword ptr [ecx+5CCh]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: cdd+b768
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x50_cdd+b768
BUCKET_ID: 0x50_cdd+b768
Followup: MachineOwner
--------------------------------------------------------------
Please help me. Thank you so much!
More...