New
#1
Win7 x64 - SYSTEM_SERVICE_EXCEPTION win32k.dll / cdd.dll
Hey guys... I get really randomly bluescreens - mostly if I try to ALT+TAB from games or if I try to exit them.
The last one occured after exiting a game named APB - All Points Bulletin.
I've already analyzed the last dump - hopefully you can help me figure out what's the exactly problem.
Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: SRV*C:\WINDOWS\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e90e50 Debug session time: Fri Aug 13 23:21:16.067 2010 (UTC + 2:00) System Uptime: 0 days 1:39:23.066 Loading Kernel Symbols ............................................................... ................................................................ .............................................. Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`fffdf018). Type ".hh dbgerr001" for details Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff96000659a65, fffff8800c34cf40, 0} Probably caused by : cdd.dll ( cdd!BitBltBitmap+e4d ) Followup: MachineOwner --------- 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff96000659a65, Address of the instruction which caused the bugcheck Arg3: fffff8800c34cf40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. FAULTING_IP: cdd!BitBltBitmap+e4d fffff960`00659a65 ff5010 call qword ptr [rax+10h] CONTEXT: fffff8800c34cf40 -- (.cxr 0xfffff8800c34cf40) rax=0000000000000000 rbx=0000000000000000 rcx=fffff900c1e7f6b0 rdx=fffff8800c34e160 rsi=fffff8800c34e160 rdi=0000000000000001 rip=fffff96000659a65 rsp=fffff8800c34d910 rbp=fffff8800c34db88 r8=fffff8800c34da50 r9=0000000000000000 r10=0000000000000000 r11=fffff96000662150 r12=0000000000000000 r13=fffff900c1e7f6b0 r14=fffff900c1e816a8 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 cdd!BitBltBitmap+0xe4d: fffff960`00659a65 ff5010 call qword ptr [rax+10h] ds:002b:00000000`00000010=???????????????? Resetting default scope DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: APB.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff9600065a12b to fffff96000659a65 STACK_TEXT: fffff880`0c34d910 fffff960`0065a12b : 00000000`00000000 fffff900`c1e38ce8 fffff900`c1e816a8 00000000`00000000 : cdd!BitBltBitmap+0xe4d fffff880`0c34dea0 fffff960`0065b138 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : cdd!DrvBitBlt+0x17b fffff880`0c34e0c0 fffff960`0030c267 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : cdd!DrvCopyBits+0x44 fffff880`0c34e130 fffff960`002516a4 : 00000000`00000000 00000000`00000000 00000000`0000cccc 00000000`00000000 : win32k!OffCopyBits+0xc7 fffff880`0c34e190 fffff960`00251b38 : fffff900`c1e38ce8 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SpBitBlt+0x418 fffff880`0c34e580 fffff960`002e1918 : fffffa80`08782c70 fffff960`00163cc9 fffffa80`00000000 fffff800`00000001 : win32k!SpCopyBits+0x44 fffff880`0c34e5f0 fffff960`002b4cd0 : fffff900`c1e38cd0 fffff900`c1e38650 fffff900`c1e38668 00000000`00002154 : win32k!MulCopyBits+0xd4 fffff880`0c34e680 fffff960`002b53c3 : 00000000`00000000 fffff8a0`0e97a880 00000000`00000000 00000000`00000000 : win32k!bMigrateSurfaceForConversion+0x170 fffff880`0c34e7b0 fffff960`002b54af : fffff900`00000000 fffffa80`08c9da60 00000000`00000001 00000000`00000000 : win32k!pConvertDfbSurfaceToDibInternal+0x1cb fffff880`0c34e890 fffff960`002b13af : fffff900`c0106010 fffff900`c0106010 00000000`00000000 00000000`00000000 : win32k!pConvertDfbSurfaceToDib+0x8f fffff880`0c34e8c0 fffff960`002b1c67 : fffff900`c0106010 00000000`00000001 fffff900`c4dc9280 fffff900`c0106010 : win32k!bDynamicRemoveAllDriverRealizations+0x4f fffff880`0c34e8f0 fffff960`002740ca : 00000000`00000000 fffff900`00000000 fffff900`00000000 0a5bb430`00000004 : win32k!bDynamicModeChange+0x1d7 fffff880`0c34e9d0 fffff960`000bb771 : 00000000`00000000 fffffa80`00000000 00000000`fffffffe 0a5bb430`00000004 : win32k!DrvInternalChangeDisplaySettings+0x101a fffff880`0c34ec10 fffff960`001a2cf1 : 00000000`00000004 fffff900`c00ba010 00000000`00000000 0a5bb430`00000004 : win32k!DrvChangeDisplaySettings+0x13a1 fffff880`0c34edf0 fffff960`001a2f4e : 00000000`00000000 00000000`00000000 00000000`02e5d920 fffff880`046d1983 : win32k!xxxInternalUserChangeDisplaySettings+0x329 fffff880`0c34eeb0 fffff960`00190948 : 00000000`02e5d920 00000000`00000000 00000000`00000000 00000000`00000004 : win32k!xxxUserChangeDisplaySettings+0x92 fffff880`0c34efa0 fffff800`02cc2993 : fffffa80`0ac22950 fffff880`0c34f060 00000000`00000000 fffffa80`0aaefa00 : win32k!NtUserChangeDisplaySettings+0x98 fffff880`0c34efe0 00000000`753b244a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`02e5d8f8 fffff800`02cbb080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x753b244a fffff880`0c34f3e0 fffffa80`0a1fa9a8 : fffff880`031d5180 fffff880`009b2180 fffffa80`0a1fa8a0 fffff880`009b2180 : nt!KiCallUserMode fffff880`0c34f3e8 fffff880`031d5180 : fffff880`009b2180 fffffa80`0a1fa8a0 fffff880`009b2180 fffff880`0c34fdb0 : 0xfffffa80`0a1fa9a8 fffff880`0c34f3f0 fffff880`009b2180 : fffffa80`0a1fa8a0 fffff880`009b2180 fffff880`0c34fdb0 da852470`da85eb78 : 0xfffff880`031d5180 fffff880`0c34f3f8 fffffa80`0a1fa8a0 : fffff880`009b2180 fffff880`0c34fdb0 da852470`da85eb78 da85ed30`da8599a8 : 0xfffff880`009b2180 fffff880`0c34f400 fffff880`009b2180 : fffff880`0c34fdb0 da852470`da85eb78 da85ed30`da8599a8 da857e80`da85ed88 : 0xfffffa80`0a1fa8a0 fffff880`0c34f408 fffff880`0c34fdb0 : da852470`da85eb78 da85ed30`da8599a8 da857e80`da85ed88 c97ea6b8`e48748e0 : 0xfffff880`009b2180 fffff880`0c34f410 da852470`da85eb78 : da85ed30`da8599a8 da857e80`da85ed88 c97ea6b8`e48748e0 00000000`00000000 : 0xfffff880`0c34fdb0 fffff880`0c34f418 da85ed30`da8599a8 : da857e80`da85ed88 c97ea6b8`e48748e0 00000000`00000000 00000000`00000000 : 0xda852470`da85eb78 fffff880`0c34f420 da857e80`da85ed88 : c97ea6b8`e48748e0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xda85ed30`da8599a8 fffff880`0c34f428 c97ea6b8`e48748e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xda857e80`da85ed88 fffff880`0c34f430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xc97ea6b8`e48748e0 FOLLOWUP_IP: cdd!BitBltBitmap+e4d fffff960`00659a65 ff5010 call qword ptr [rax+10h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: cdd!BitBltBitmap+e4d FOLLOWUP_NAME: MachineOwner MODULE_NAME: cdd IMAGE_NAME: cdd.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4bf4408a STACK_COMMAND: .cxr 0xfffff8800c34cf40 ; kb FAILURE_BUCKET_ID: X64_0x3B_cdd!BitBltBitmap+e4d BUCKET_ID: X64_0x3B_cdd!BitBltBitmap+e4d Followup: MachineOwner --------- 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff96000659a65, Address of the instruction which caused the bugcheck Arg3: fffff8800c34cf40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. FAULTING_IP: cdd!BitBltBitmap+e4d fffff960`00659a65 ff5010 call qword ptr [rax+10h] CONTEXT: fffff8800c34cf40 -- (.cxr 0xfffff8800c34cf40) rax=0000000000000000 rbx=0000000000000000 rcx=fffff900c1e7f6b0 rdx=fffff8800c34e160 rsi=fffff8800c34e160 rdi=0000000000000001 rip=fffff96000659a65 rsp=fffff8800c34d910 rbp=fffff8800c34db88 r8=fffff8800c34da50 r9=0000000000000000 r10=0000000000000000 r11=fffff96000662150 r12=0000000000000000 r13=fffff900c1e7f6b0 r14=fffff900c1e816a8 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 cdd!BitBltBitmap+0xe4d: fffff960`00659a65 ff5010 call qword ptr [rax+10h] ds:002b:00000000`00000010=???????????????? Resetting default scope DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: APB.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff9600065a12b to fffff96000659a65 STACK_TEXT: fffff880`0c34d910 fffff960`0065a12b : 00000000`00000000 fffff900`c1e38ce8 fffff900`c1e816a8 00000000`00000000 : cdd!BitBltBitmap+0xe4d fffff880`0c34dea0 fffff960`0065b138 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : cdd!DrvBitBlt+0x17b fffff880`0c34e0c0 fffff960`0030c267 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : cdd!DrvCopyBits+0x44 fffff880`0c34e130 fffff960`002516a4 : 00000000`00000000 00000000`00000000 00000000`0000cccc 00000000`00000000 : win32k!OffCopyBits+0xc7 fffff880`0c34e190 fffff960`00251b38 : fffff900`c1e38ce8 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SpBitBlt+0x418 fffff880`0c34e580 fffff960`002e1918 : fffffa80`08782c70 fffff960`00163cc9 fffffa80`00000000 fffff800`00000001 : win32k!SpCopyBits+0x44 fffff880`0c34e5f0 fffff960`002b4cd0 : fffff900`c1e38cd0 fffff900`c1e38650 fffff900`c1e38668 00000000`00002154 : win32k!MulCopyBits+0xd4 fffff880`0c34e680 fffff960`002b53c3 : 00000000`00000000 fffff8a0`0e97a880 00000000`00000000 00000000`00000000 : win32k!bMigrateSurfaceForConversion+0x170 fffff880`0c34e7b0 fffff960`002b54af : fffff900`00000000 fffffa80`08c9da60 00000000`00000001 00000000`00000000 : win32k!pConvertDfbSurfaceToDibInternal+0x1cb fffff880`0c34e890 fffff960`002b13af : fffff900`c0106010 fffff900`c0106010 00000000`00000000 00000000`00000000 : win32k!pConvertDfbSurfaceToDib+0x8f fffff880`0c34e8c0 fffff960`002b1c67 : fffff900`c0106010 00000000`00000001 fffff900`c4dc9280 fffff900`c0106010 : win32k!bDynamicRemoveAllDriverRealizations+0x4f fffff880`0c34e8f0 fffff960`002740ca : 00000000`00000000 fffff900`00000000 fffff900`00000000 0a5bb430`00000004 : win32k!bDynamicModeChange+0x1d7 fffff880`0c34e9d0 fffff960`000bb771 : 00000000`00000000 fffffa80`00000000 00000000`fffffffe 0a5bb430`00000004 : win32k!DrvInternalChangeDisplaySettings+0x101a fffff880`0c34ec10 fffff960`001a2cf1 : 00000000`00000004 fffff900`c00ba010 00000000`00000000 0a5bb430`00000004 : win32k!DrvChangeDisplaySettings+0x13a1 fffff880`0c34edf0 fffff960`001a2f4e : 00000000`00000000 00000000`00000000 00000000`02e5d920 fffff880`046d1983 : win32k!xxxInternalUserChangeDisplaySettings+0x329 fffff880`0c34eeb0 fffff960`00190948 : 00000000`02e5d920 00000000`00000000 00000000`00000000 00000000`00000004 : win32k!xxxUserChangeDisplaySettings+0x92 fffff880`0c34efa0 fffff800`02cc2993 : fffffa80`0ac22950 fffff880`0c34f060 00000000`00000000 fffffa80`0aaefa00 : win32k!NtUserChangeDisplaySettings+0x98 fffff880`0c34efe0 00000000`753b244a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`02e5d8f8 fffff800`02cbb080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x753b244a fffff880`0c34f3e0 fffffa80`0a1fa9a8 : fffff880`031d5180 fffff880`009b2180 fffffa80`0a1fa8a0 fffff880`009b2180 : nt!KiCallUserMode fffff880`0c34f3e8 fffff880`031d5180 : fffff880`009b2180 fffffa80`0a1fa8a0 fffff880`009b2180 fffff880`0c34fdb0 : 0xfffffa80`0a1fa9a8 fffff880`0c34f3f0 fffff880`009b2180 : fffffa80`0a1fa8a0 fffff880`009b2180 fffff880`0c34fdb0 da852470`da85eb78 : 0xfffff880`031d5180 fffff880`0c34f3f8 fffffa80`0a1fa8a0 : fffff880`009b2180 fffff880`0c34fdb0 da852470`da85eb78 da85ed30`da8599a8 : 0xfffff880`009b2180 fffff880`0c34f400 fffff880`009b2180 : fffff880`0c34fdb0 da852470`da85eb78 da85ed30`da8599a8 da857e80`da85ed88 : 0xfffffa80`0a1fa8a0 fffff880`0c34f408 fffff880`0c34fdb0 : da852470`da85eb78 da85ed30`da8599a8 da857e80`da85ed88 c97ea6b8`e48748e0 : 0xfffff880`009b2180 fffff880`0c34f410 da852470`da85eb78 : da85ed30`da8599a8 da857e80`da85ed88 c97ea6b8`e48748e0 00000000`00000000 : 0xfffff880`0c34fdb0 fffff880`0c34f418 da85ed30`da8599a8 : da857e80`da85ed88 c97ea6b8`e48748e0 00000000`00000000 00000000`00000000 : 0xda852470`da85eb78 fffff880`0c34f420 da857e80`da85ed88 : c97ea6b8`e48748e0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xda85ed30`da8599a8 fffff880`0c34f428 c97ea6b8`e48748e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xda857e80`da85ed88 fffff880`0c34f430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xc97ea6b8`e48748e0 FOLLOWUP_IP: cdd!BitBltBitmap+e4d fffff960`00659a65 ff5010 call qword ptr [rax+10h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: cdd!BitBltBitmap+e4d FOLLOWUP_NAME: MachineOwner MODULE_NAME: cdd IMAGE_NAME: cdd.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4bf4408a STACK_COMMAND: .cxr 0xfffff8800c34cf40 ; kb FAILURE_BUCKET_ID: X64_0x3B_cdd!BitBltBitmap+e4d BUCKET_ID: X64_0x3B_cdd!BitBltBitmap+e4d Followup: MachineOwner ---------