locked
Bad Pool Header BSOD's RRS feed

  • Question

  • I'm using Windows 7 Ultimate 64 bit:

    I've been getting some bad pool header crashes.  The only relevant article I can find is this: http://www.dumpanalysis.org/blog/index.php/2007/08/25/

    Strangely when I run windbg,  it comes up with Windows Debugger "AMD64" which is odd, since I'm using an intel quad core processor.

    Here is the minidump file on skydrive:

    091412-29218-01.dmp

    1.       Here is my bugcheck analy, I was unsure about the -i ImagePath argument  (windbg -y SymbolPath -i ImagePath -z DumpFilePath

    ), because the Microsoft KB article (http://support.microsoft.com/kb/315263) is assuming a windows XP system, and gives an example as such (Sample 2. If you prefer the graphical version of the debugger instead of the command line version, type the following command instead:

    windbg -y srv*c:\symbols*http://msdl.microsoft.com/download/symbols -i c:\windows\i386 -z c:\windows\minidump\minidump.dmp)

    **************************************************************************************************************************************************

    Here is my windbg Output:

    C:\Program Files\Debugging Tools for Windows (x64)>windbg -y srv*c:\symbols*http

    ://msdl.microsoft.com/download/symbols -i C:\Windows\System32\drivers -z C:\Wind

    ows\Minidump\091412-29218-01.dmp

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64

    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\Windows\Minidump\091412-29218-01.dmp]

    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols

    Executable search path is: C:\Windows\System32\drivers

    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64

    Product: WinNt, suite: TerminalServer SingleUserTS

    Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030

    Machine Name:

    Kernel base = 0xfffff800`02e0a000 PsLoadedModuleList = 0xfffff800`0304e670

    Debug session time: Fri Sep 14 05:13:23.566 2012 (UTC - 4:00)

    System Uptime: 0 days 2:24:19.971

    Loading Kernel Symbols

    ...............................................................

    ................................................................

    ..........................................

    Loading User Symbols

    Loading unloaded module list

    .......

    *******************************************************************************

    *                                                                             *

    *                        Bugcheck Analysis                                    *

    *                                                                             *

    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 19, {3, fffffa800a322350, 7c00000838000000, fffffa800a322358}

    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+cbb )

    Followup: Pool_corruption

    ---------

    3: kd> !analyze -v

    *******************************************************************************

    *                                                                             *

    *                        Bugcheck Analysis                                    *

    *                                                                             *

    *******************************************************************************

    BAD_POOL_HEADER (19)

    The pool is already corrupt at the time of the current request.

    This may or may not be due to the caller.

    The internal pool links must be walked to figure out a possible cause of

    the problem, and then special pool applied to the suspect tags or the driver

    verifier to a suspect driver.

    Arguments:

    Arg1: 0000000000000003, the pool freelist is corrupt.

    Arg2: fffffa800a322350, the pool entry being checked.

    Arg3: 7c00000838000000, the read back flink freelist value (should be the same as 2).

    Arg4: fffffa800a322358, the read back blink freelist value (should be the same as 2).

    Debugging Details:

    ------------------

    BUGCHECK_STR:  0x19_3

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    PROCESS_NAME:  OUTLOOK.EXE

    CURRENT_IRQL:  2

    LAST_CONTROL_TRANSFER:  from fffff80002fb370f to fffff80002e891c0

    STACK_TEXT: 

    fffff880`0b448998 fffff800`02fb370f : 00000000`00000019 00000000`00000003 fffffa80`0a322350 7c000008`38000000 : nt!KeBugCheckEx

    fffff880`0b4489a0 fffff800`02fb51a1 : 00000000`00000000 fffffa80`0a4cb000 00000000`00000000 00000000`00000070 : nt!ExDeferredFreePool+0xcbb

    fffff880`0b448a30 fffff800`02e923dc : fffffa80`0a4cb030 fffffa80`0a7f6b30 fffffa80`6e657645 00000000`00000000 : nt!ExFreePoolWithTag+0x411

    fffff880`0b448ae0 fffff800`0317bb94 : fffffa80`0a7f6b30 00000000`00000000 fffffa80`04fe6710 00000000`00000000 : nt!ObfDereferenceObject+0xdc

    fffff880`0b448b40 fffff800`0317c144 : 00000000`00003a20 fffffa80`0a7f6b30 fffff8a0`071fa2c0 00000000`00003a20 : nt!ObpCloseHandleTableEntry+0xc4

    fffff880`0b448bd0 fffff800`02e88453 : fffffa80`04fe6710 fffff880`0b448ca0 00000000`7ef7d000 00000000`52c7eb00 : nt!ObpCloseHandle+0x94

    fffff880`0b448c20 00000000`76e1140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

    00000000`04a7e298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e1140a

    STACK_COMMAND:  kb

    FOLLOWUP_IP:

    nt!ExDeferredFreePool+cbb

    fffff800`02fb370f cc              int     3

    SYMBOL_STACK_INDEX:  1

    SYMBOL_NAME:  nt!ExDeferredFreePool+cbb

    FOLLOWUP_NAME:  Pool_corruption

    IMAGE_NAME:  Pool_Corruption

    DEBUG_FLR_IMAGE_TIMESTAMP:  0

    MODULE_NAME: Pool_Corruption

    FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+cbb

    BUCKET_ID:  X64_0x19_3_nt!ExDeferredFreePool+cbb

    Followup: Pool_corruption


    • Edited by charlestek Saturday, September 15, 2012 7:11 PM
    Saturday, September 15, 2012 7:09 PM

Answers

All replies