Windows 7 BSOD - Bad Pool Header

Tizgone

New Member
Joined
Jun 28, 2011
I'm here, obviously, because I'm having computer problems. (Isn't it funny how you never hear from some people until they have problems?) I had gone to eat and came back to my computer to see it working fine. I sat down and continued typing happily on my documents and then BAM. BSOD. I said,"Okay, self. This could just be a fluke! Maybe it won't happen again!" Unfortunately, it did. I did catch, however, that the second time (and third) it was a "BAD_POOL_HEADER" error. I don't know a lot about computers, but I do know how to find people to help me fix things, and hopefully I've done well this time. I'm only able to type this out now because, well, I don't know. But I read somewhere (on my phone) that if you unplug all peripherals, wonderful things might happen. I unplugged my G930 Wireless Logictech Headset (it was charging) and here I am. Any and all help would be greatly appreciated. Thanks!

EDIT: When I tried to open up the recovered Word document in Word Safe Mode it gave me another BSoD this one called "PAGE_FAULT_IN_NONPAGED_AREA". I'm staying away from that file until this is all fixed.
 

Attachments

  • Minidump.zip
    205.8 KB · Views: 282
  • Capture2.PNG
    Capture2.PNG
    41.5 KB · Views: 549
  • Capture1.PNG
    Capture1.PNG
    38 KB · Views: 575
Last edited:
Hello there,

The dump files weren't really helpful. First of all I would recommend to run Hardware Diagnostic Hardware Diagnostic | Captain Debugger
Uninstall AVG complete for the time being.
Run SFC /SCANNOW to Repair Windows 7 Files | Captain Debugger

Code:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c2b72000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff960000c23b4, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

OVERLAPPED_MODULE: Address regions for 'ladfBakerRamd64' and 'ladfBakerCam' overlap

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c20e0
 fffff900c2b72000 

FAULTING_IP: 
win32k!sfac_GetLongGlyphIDs+84
fffff960`000c23b4 44891e          mov     dword ptr [rsi],r11d

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800ca3e460 -- (.trap 0xfffff8800ca3e460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000004056196
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960000c23b4 rsp=fffff8800ca3e5f0 rbp=0000000000000a82
 r8=0000000004056254  r9=000000000405618e r10=0000000000000a82
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
win32k!sfac_GetLongGlyphIDs+0x84:
fffff960`000c23b4 44891e          mov     dword ptr [rsi],r11d ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000310b024 to fffff8000308a700

STACK_TEXT:  
fffff880`0ca3e2f8 fffff800`0310b024 : 00000000`00000050 fffff900`c2b72000 00000000`00000001 fffff880`0ca3e460 : nt!KeBugCheckEx
fffff880`0ca3e300 fffff800`030887ee : 00000000`00000001 00000000`0000390f fffffa80`08dc4e00 fffff880`0ca3e630 : nt! ?? ::FNODOBFM::`string'+0x427f7
fffff880`0ca3e460 fffff960`000c23b4 : 00000000`0000390f fffff900`c2b72000 00000000`0000ffff fffff960`000c1cd8 : nt!KiPageFault+0x16e
fffff880`0ca3e5f0 fffff960`000c22fb : fffff960`000c2760 00000000`00000696 00000000`00001b4c 00000000`00003cfb : win32k!sfac_GetLongGlyphIDs+0x84
fffff880`0ca3e640 fffff960`000c222a : 00000000`04056154 00000000`00003cfb 00000000`000038a8 00000000`000038a8 : win32k!sfac_GetWinNTGlyphIDs+0xbb
fffff880`0ca3e6b0 fffff960`000c2102 : 00000000`00000000 00000000`00000000 fffff880`0ca3e840 00000000`00000034 : win32k!fs_WinNTGetGlyphIDs+0x6a
fffff880`0ca3e700 fffff960`000c1e52 : 00000000`04051a06 fffff880`0ca3e840 00000000`00004390 00000000`04050696 : win32k!cjComputeGLYPHSET_MSFT_UNICODE+0x252
fffff880`0ca3e7c0 fffff960`000b9167 : fffff900`c07a9790 00000000`00000001 00000000`00000001 00000000`00000000 : win32k!bLoadGlyphSet+0x13a
fffff880`0ca3e7f0 fffff960`000b9316 : fffff900`c07a9790 fffff900`00000001 fffff900`c07a9790 fffff960`00228eac : win32k!bReloadGlyphSet+0x24b
fffff880`0ca3eeb0 fffff960`000b926a : 00000000`00000000 fffff900`c07a9790 fffff900`00000001 fffff900`c01bb854 : win32k!ttfdQueryFontTree+0x66
fffff880`0ca3ef00 fffff960`001046c3 : fffff960`000b9210 fffff900`c069c780 00000000`00000001 00000000`00000000 : win32k!ttfdSemQueryFontTree+0x5a
fffff880`0ca3ef40 fffff960`00104563 : fffff880`0ca3f050 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!PDEVOBJ::QueryFontTree+0x63
fffff880`0ca3efc0 fffff960`000c0086 : fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 : win32k!PFEOBJ::pfdg+0xa3
fffff880`0ca3f020 fffff960`00118cd8 : fffff900`c01bb740 fffff880`0ca3f2b0 fffff880`0ca3f1b0 fffff880`0ca3f280 : win32k!RFONTOBJ::bRealizeFont+0x46
fffff880`0ca3f140 fffff960`000bbf10 : 00000000`00000000 fffff900`00000000 00000000`00000000 fffffa80`00000002 : win32k!RFONTOBJ::bInit+0x548
fffff880`0ca3f260 fffff960`000c6f47 : 00000000`00000000 fffff960`000c6f28 00000000`00000000 00000000`00000000 : win32k!GreGetTextMetricsW+0x4c
fffff880`0ca3f2a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtGdiGetTextMetricsW+0x1f


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!sfac_GetLongGlyphIDs+84
fffff960`000c23b4 44891e          mov     dword ptr [rsi],r11d

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  win32k!sfac_GetLongGlyphIDs+84

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4de066b5

FAILURE_BUCKET_ID:  X64_0x50_win32k!sfac_GetLongGlyphIDs+84

BUCKET_ID:  X64_0x50_win32k!sfac_GetLongGlyphIDs+84

Followup: MachineOwner
---------
 
Back
Top Bottom