Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini051811-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed May 18 19:34:36.781 2011 (UTC + 2:00)
System Uptime: 0 days 0:27:59.504
Loading Kernel Symbols
...............................................................
..............................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, c002d001, 11d, c0883000}
Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+188 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041284, A PTE or the working set list is corrupt.
Arg2: c002d001
Arg3: 0000011d
Arg4: c0883000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: chrome.exe
LAST_CONTROL_TRANSFER: from 80523339 to 804f9f43
STACK_TEXT:
b341ca4c 80523339 0000001a 00041284 c002d001 nt!KeBugCheckEx+0x1b
b341ca84 80523bbf 0000011d 05c00000 c0600168 nt!MiLocateWsle+0xc1
b341cab8 8052404f c0600168 c002d000 00000000 nt!MiDeletePte+0x1fd
b341cb80 8051a648 00000b80 061cefff 00000000 nt!MiDeleteVirtualAddresses+0x1db
b341cb9c 805b33e0 05a90000 061cefff b341cc54 nt!MiDeleteFreeVm+0x20
b341cc3c 8054167c ffffffff b341cd1c b341cd28 nt!NtFreeVirtualMemory+0x42e
b341cc3c 805003c9 ffffffff b341cd1c b341cd28 nt!KiFastCallEntry+0xfc
b341ccc4 bf8095ed ffffffff b341cd1c b341cd28 nt!ZwFreeVirtualMemory+0x11
b341cd20 bf809658 00000000 00000000 b341cd44 win32k!SURFACE::bDeleteSurface+0x188
b341cd30 bf813822 00000000 00000000 e22e0008 win32k!SURFREF::bDeleteSurface+0x12
b341cd44 bf8138fb 780506e6 0012f460 b341cd64 win32k!bDeleteSurface+0x20
b341cd58 8054167c 780506e6 0012f474 7c91e514 win32k!NtGdiDeleteObjectApp+0x74
b341cd58 7c91e514 780506e6 0012f474 7c91e514 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012f474 00000000 00000000 00000000 00000000 0x7c91e514
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+188
bf8095ed e964ffffff jmp win32k!SURFACE::bDeleteSurface+0x1a8 (bf809556)
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+188
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f95bd
FAILURE_BUCKET_ID: 0x1a_41284_win32k!SURFACE::bDeleteSurface+188
BUCKET_ID: 0x1a_41284_win32k!SURFACE::bDeleteSurface+188
Followup: MachineOwner
---------