New
#11
These types of crashes are usually caused by an underlying driver. The driver was not named in the crash. Recommend running Driver Verifier to determine the driver that is incompatible/conflicting with your system. To run Driver verifier, do the following:Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\beeswax\011412-23072-01 - Copy.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`03217000 PsLoadedModuleList = 0xfffff800`0345c670 Debug session time: Sat Jan 14 07:01:17.891 2012 (UTC - 7:00) System Uptime: 0 days 13:52:26.421 Loading Kernel Symbols ............................................................... ................................................................ ........................ Loading User Symbols Loading unloaded module list .......................... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 19, {20, fffffa80091051c0, fffffa8009105950, c792f38} GetPointerFromAddress: unable to read from fffff800034c6100 GetUlongFromAddress: unable to read from fffff80003434a18 Probably caused by : ntkrnlmp.exe ( nt!FsRtlTeardownPerStreamContexts+e2 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_HEADER (19) The pool is already corrupt at the time of the current request. This may or may not be due to the caller. The internal pool links must be walked to figure out a possible cause of the problem, and then special pool applied to the suspect tags or the driver verifier to a suspect driver. Arguments: Arg1: 0000000000000020, a pool block header size is corrupt. Arg2: fffffa80091051c0, The pool entry we were looking for within the page. Arg3: fffffa8009105950, The next pool entry. Arg4: 000000000c792f38, (reserved) Debugging Details: ------------------ GetUlongFromAddress: unable to read from fffff80003434a18 BUGCHECK_STR: 0x19_20 POOL_ADDRESS: fffffa80091051c0 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff800033c1cae to fffff80003293c40 STACK_TEXT: fffff880`0318c898 fffff800`033c1cae : 00000000`00000019 00000000`00000020 fffffa80`091051c0 fffffa80`09105950 : nt!KeBugCheckEx fffff880`0318c8a0 fffff800`0354c90e : 00000000`00000705 fffff880`012901b3 fffff8a0`7ffffa80 00000000`00000000 : nt!ExDeferredFreePool+0x12da fffff880`0318c950 fffff880`0128fbac : fffff8a0`15153140 fffffa80`06a1ab60 fffff880`0318ca28 00000000`00000706 : nt!FsRtlTeardownPerStreamContexts+0xe2 fffff880`0318c9a0 fffff880`01294cc1 : 00000000`01000000 00000000`00000000 fffff800`03434200 00000000`00000001 : Ntfs!NtfsDeleteScb+0x108 fffff880`0318c9e0 fffff880`0120d85c : fffff8a0`15153040 fffff8a0`15153140 fffff800`03434200 fffff880`0318cb52 : Ntfs!NtfsRemoveScb+0x61 fffff880`0318ca20 fffff880`0129264c : fffff8a0`15153010 fffff800`03434260 fffff880`0318cb52 fffffa80`0a2b68d0 : Ntfs!NtfsPrepareFcbForRemoval+0x50 fffff880`0318ca50 fffff880`012140e2 : fffffa80`0a2b68d0 fffffa80`0a2b68d0 fffff8a0`15153010 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xdc fffff880`0318cad0 fffff880`012a2193 : fffffa80`0a2b68d0 fffff800`03434260 fffff8a0`15153010 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2 fffff880`0318cb10 fffff880`01291357 : fffffa80`0a2b68d0 fffff8a0`15153140 fffff8a0`15153010 fffffa80`07ba3180 : Ntfs!NtfsCommonClose+0x353 fffff880`0318cbe0 fffff800`0329e001 : 00000000`00000000 fffff800`0358a900 fffff800`03495801 00000000`00000002 : Ntfs!NtfsFspClose+0x15f fffff880`0318ccb0 fffff800`0352efee : 00000000`00000000 fffffa80`06a1ab60 00000000`00000080 fffffa80`069a49e0 : nt!ExpWorkerThread+0x111 fffff880`0318cd40 fffff800`032855e6 : fffff880`02f64180 fffffa80`06a1ab60 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a fffff880`0318cd80 00000000`00000000 : fffff880`0318d000 fffff880`03187000 fffff880`0318c9e0 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!FsRtlTeardownPerStreamContexts+e2 fffff800`0354c90e 448a5e07 mov r11b,byte ptr [rsi+7] SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!FsRtlTeardownPerStreamContexts+e2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3 FAILURE_BUCKET_ID: X64_0x19_20_nt!FsRtlTeardownPerStreamContexts+e2 BUCKET_ID: X64_0x19_20_nt!FsRtlTeardownPerStreamContexts+e2 Followup: MachineOwner ---------
- Backup your system and user files
- Create a system restore point
- If you do not have a Windows 7 DVD, Create a system repair disc
- Run Driver Verifier
If Windows cannot start in normal mode with driver verifier running, start in safe mode. If it cannot start in safe mode or normal mode, restore the system restore point using System Restore OPTION TWO.
Thanks to zigzag3143 for contributing to the above steps.
If you are unable to start Windows with all drivers being verified or if the blue screen crashes fail to create .dmp files, run them in groups of 5 or 10 until you find a group that causes blue screen crashes and stores the blue screen .dmp files.