Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-37689-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c1a000 PsLoadedModuleList = 0xfffff800`02e57e50
Debug session time: Sat Apr 16 17:17:17.602 2011 (UTC - 4:00)
System Uptime: 9 days 22:55:40.658
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffffa8005fe5528, fffffa800b25f2c0, fffffa8006b31ce0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+c7b )
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8005fe5528, the pool entry being checked.
Arg3: fffffa800b25f2c0, the read back flink freelist value (should be the same as 2).
Arg4: fffffa8006b31ce0, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002dbd10b to fffff80002c8a740
STACK_TEXT:
fffff880`02ffb978 fffff800`02dbd10b : 00000000`00000019 00000000`00000003 fffffa80`05fe5528 fffffa80`0b25f2c0 : nt!KeBugCheckEx
fffff880`02ffb980 fffff800`02dbf4c1 : 00000000`00000040 fffffa80`082e9260 00000000`00000000 fffff800`031f969a : nt!ExDeferredFreePool+0xc7b
fffff880`02ffba10 fffff880`04240557 : 00000000`54627255 00000000`000006c0 fffffa80`70627375 fffffa80`000003ed : nt!ExFreePoolWithTag+0x411
fffff880`02ffbac0 fffff880`0422b5bc : fffffa80`066c2050 fffffa80`07e5b002 00000000`00000000 fffffa80`066c21a0 : USBPORT!USBPORT_DereferenceDeviceHandle+0xff
fffff880`02ffbb20 fffff880`0422bab7 : fffffa80`062d8902 fffffa80`056fe610 00000000`ffffffff fffffa80`066c2ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x9f8
fffff880`02ffbc00 fffff880`0422964f : fffffa80`066c2ea8 fffffa80`066c21a0 fffffa80`066c3040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02ffbc60 fffff880`0421af89 : fffffa80`066c2050 00000000`00000000 fffffa80`066c2e02 fffffa80`066c2ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02ffbca0 fffff800`02c95bfc : fffff880`02fd3180 fffffa80`066c2ea8 fffffa80`066c2ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02ffbcd0 fffff800`02c92eea : fffff880`02fd3180 fffff880`02fddfc0 00000000`00000000 fffff880`0421adb0 : nt!KiRetireDpcList+0x1bc
fffff880`02ffbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+c7b
fffff800`02dbd10b cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+c7b
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+c7b
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+c7b
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040111-27190-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
Debug session time: Fri Apr 1 12:36:47.907 2011 (UTC - 4:00)
System Uptime: 0 days 0:22:20.437
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88001840064, fffff880031af998, fffff880031af200}
Probably caused by : CLASSPNP.SYS ( CLASSPNP!SqmLogUnknownSenseData+54 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88001840064, The address that the exception occurred at
Arg3: fffff880031af998, Exception Record Address
Arg4: fffff880031af200, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
CLASSPNP!SqmLogUnknownSenseData+54
fffff880`01840064 488b4640 mov rax,qword ptr [rsi+40h]
EXCEPTION_RECORD: fffff880031af998 -- (.exr 0xfffff880031af998)
ExceptionAddress: fffff88001840064 (CLASSPNP!SqmLogUnknownSenseData+0x0000000000000054)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000040
Attempt to read from address 0000000000000040
CONTEXT: fffff880031af200 -- (.cxr 0xfffff880031af200)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880031afc70
rdx=0000000000000000 rsi=0000000000000000 rdi=fffffa8005374310
rip=fffff88001840064 rsp=fffff880031afbd0 rbp=fffff80002c2d5f8
r8=0000000000000000 r9=0000000000000000 r10=fffff80002a18000
r11=fffffa8005374310 r12=fffffa8005374310 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
CLASSPNP!SqmLogUnknownSenseData+0x54:
fffff880`01840064 488b4640 mov rax,qword ptr [rsi+40h] ds:002b:00000000`00000040=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000040
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e0
0000000000000040
FOLLOWUP_IP:
CLASSPNP!SqmLogUnknownSenseData+54
fffff880`01840064 488b4640 mov rax,qword ptr [rsi+40h]
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffff80002d84c43 to fffff88001840064
STACK_TEXT:
fffff880`031afbd0 fffff800`02d84c43 : fffffa80`07382570 fffff800`02c2d5f8 fffffa80`04efab60 fffffa80`05374310 : CLASSPNP!SqmLogUnknownSenseData+0x54
fffff880`031afc80 fffff800`02a95961 : fffff800`02c2d500 fffff800`02d84c20 fffffa80`04efab60 fffffa80`00000299 : nt!IopProcessWorkItem+0x23
fffff880`031afcb0 fffff800`02d2cc06 : 35739e3e`5ff66ee4 fffffa80`04efab60 00000000`00000080 fffffa80`04ee5ae0 : nt!ExpWorkerThread+0x111
fffff880`031afd40 fffff800`02a66c26 : fffff880`02f63180 fffffa80`04efab60 fffff880`02f6dfc0 fbf1fd61`f7df43df : nt!PspSystemThreadStartup+0x5a
fffff880`031afd80 00000000`00000000 : fffff880`031b0000 fffff880`031aa000 fffff880`031af9f0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: CLASSPNP!SqmLogUnknownSenseData+54
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CLASSPNP
IMAGE_NAME: CLASSPNP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11e
STACK_COMMAND: .cxr 0xfffff880031af200 ; kb
FAILURE_BUCKET_ID: X64_0x7E_CLASSPNP!SqmLogUnknownSenseData+54
BUCKET_ID: X64_0x7E_CLASSPNP!SqmLogUnknownSenseData+54
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040211-19562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0c000 PsLoadedModuleList = 0xfffff800`02e49e50
Debug session time: Sat Apr 2 13:10:25.904 2011 (UTC - 4:00)
System Uptime: 0 days 1:16:05.636
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff9600017e207, fffff8800b7fae70, 0}
Probably caused by : win32k.sys ( win32k!xxxCallHook2+10b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff9600017e207, Address of the instruction which caused the bugcheck
Arg3: fffff8800b7fae70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!xxxCallHook2+10b
fffff960`0017e207 8b8198010000 mov eax,dword ptr [rcx+198h]
CONTEXT: fffff8800b7fae70 -- (.cxr 0xfffff8800b7fae70)
rax=0000000000000003 rbx=fffff900c0815230 rcx=fefff900c294ec30
rdx=0000000000000000 rsi=0000000000000003 rdi=fffff900c28e89a0
rip=fffff9600017e207 rsp=fffff8800b7fb840 rbp=fffff8800b7fbca0
r8=fffff8800b7fb9e0 r9=0000000001100100 r10=fffff8800b7fbb68
r11=0000000000000003 r12=0000000000000001 r13=fffff8800b7fbb68
r14=0000000000000108 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!xxxCallHook2+0x10b:
fffff960`0017e207 8b8198010000 mov eax,dword ptr [rcx+198h] ds:002b:fefff900`c294edc8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: mswinext.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff9600017e207
STACK_TEXT:
fffff880`0b7fb840 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!xxxCallHook2+0x10b
FOLLOWUP_IP:
win32k!xxxCallHook2+10b
fffff960`0017e207 8b8198010000 mov eax,dword ptr [rcx+198h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!xxxCallHook2+10b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c483f
STACK_COMMAND: .cxr 0xfffff8800b7fae70 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!xxxCallHook2+10b
BUCKET_ID: X64_0x3B_win32k!xxxCallHook2+10b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041711-21091-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c12000 PsLoadedModuleList = 0xfffff800`02e4fe50
Debug session time: Sun Apr 17 09:42:39.787 2011 (UTC - 4:00)
System Uptime: 0 days 16:18:14.504
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffffa8009a82200, fffffa8009a82200, f7fffa8009a82200}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+c7b )
Followup: Pool_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8009a82200, the pool entry being checked.
Arg3: fffffa8009a82200, the read back flink freelist value (should be the same as 2).
Arg4: f7fffa8009a82200, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002db510b to fffff80002c82740
STACK_TEXT:
fffff880`0ae69908 fffff800`02db510b : 00000000`00000019 00000000`00000003 fffffa80`09a82200 fffffa80`09a82200 : nt!KeBugCheckEx
fffff880`0ae69910 fffff800`02db74c1 : 00000000`00000001 fffffa80`079b9c70 00000000`00000000 000007ff`fffaa000 : nt!ExDeferredFreePool+0xc7b
fffff880`0ae699a0 fffff800`02f695c6 : 000007ff`fffabfff fffffa80`0860ea10 00000000`6c646156 fffff800`00001fff : nt!ExFreePoolWithTag+0x411
fffff880`0ae69a50 fffff800`02f6598c : 000007ff`fffaa000 00000000`00000000 00000000`00000000 fffffa80`057f0360 : nt!MmDeleteTeb+0xe2
fffff880`0ae69ad0 fffff800`02f6941d : fffff880`00000000 fffff800`02f96300 000007ff`fffaa000 00000000`00000000 : nt!PspExitThread+0x7fc
fffff880`0ae69b90 fffff800`02f69659 : fffffa80`057f0360 00000000`00000000 fffffa80`057f0360 00000000`0000ff00 : nt!PspTerminateThreadByPointer+0x4d
fffff880`0ae69be0 fffff800`02c81993 : fffffa80`057f0360 fffff880`0ae69ca0 00000000`77be5270 fffffa80`09300e60 : nt!NtTerminateThread+0x45
fffff880`0ae69c20 00000000`77b2fbea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02d6f588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b2fbea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+c7b
fffff800`02db510b cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+c7b
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+c7b
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+c7b
Followup: Pool_corruption
---------