Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Kingston\BSODDmpFiles\symetric\030412-19234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e61000 PsLoadedModuleList = 0xfffff800`030a6670
Debug session time: Sun Mar 4 06:50:20.748 2012 (UTC - 7:00)
System Uptime: 1 days 12:10:07.606
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffff8a00c01a8e0, fffff8a00c01b6d0, 3ddf9bcc}
GetPointerFromAddress: unable to read from fffff80003110100
Probably caused by : ntkrnlmp.exe ( nt!IopDeleteFile+168 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a00c01a8e0, The pool entry we were looking for within the page.
Arg3: fffff8a00c01b6d0, The next pool entry.
Arg4: 000000003ddf9bcc, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: fffff8a00c01a8e0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000300bcae to fffff80002eddc40
STACK_TEXT:
fffff880`031fca18 fffff800`0300bcae : 00000000`00000019 00000000`00000020 fffff8a0`0c01a8e0 fffff8a0`0c01b6d0 : nt!KeBugCheckEx
fffff880`031fca20 fffff800`031da3d8 : fffffa80`047e0940 00000000`00000001 fffffa80`61a19383 fffffa80`047e0940 : nt!ExDeferredFreePool+0x12da
fffff880`031fcad0 fffff800`02ee7af4 : 00000000`00000001 00000000`00000000 fffffa80`039f0f30 00000000`00000000 : nt!IopDeleteFile+0x168
fffff880`031fcb60 fffff800`0317d285 : 00000000`00000000 00000000`00084081 fffffa80`05d7c540 fffffa80`0765ad60 : nt!ObfDereferenceObject+0xd4
fffff880`031fcbc0 fffff800`02f2b18d : fffffa80`05d7c548 00000000`00000001 00000000`00000000 03555209`00000631 : nt!MiSegmentDelete+0xa1
fffff880`031fcc00 fffff800`02f2b051 : 00000000`00000000 00000000`00000080 fffffa80`039e0040 fffffa80`00000012 : nt!MiProcessDereferenceList+0x131
fffff880`031fccc0 fffff800`03178fee : 82287000`0002d700 00020000`00002000 2549c880`00880500 12003200`00142901 : nt!MiDereferenceSegmentThread+0x10d
fffff880`031fcd40 fffff800`02ecf5e6 : fffff880`02f63180 fffffa80`039f8400 fffff880`02f6dfc0 7d3f3f3f`9f7f7f3f : nt!PspSystemThreadStartup+0x5a
fffff880`031fcd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IopDeleteFile+168
fffff800`031da3d8 488b8bb0000000 mov rcx,qword ptr [rbx+0B0h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!IopDeleteFile+168
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x19_20_nt!IopDeleteFile+168
BUCKET_ID: X64_0x19_20_nt!IopDeleteFile+168
Followup: MachineOwner
---------
That crash indicates an underlying driver problem. Unfortunately, the analysis does not indicate which driver. It may be the USB receiver as suspected. The only other suspect driver I really see is:
Code:
ctac32k fffff880`04ad7000 fffff880`04b85000 Wed Jul 02 02:38:22 2008 (486b3e7e) 00095082 ctac32k.sys
ctac32k.sys
but we should focus on seeing if the problems are resolved with the wired mouse and keyboard and RAM change. We don't want to address too many things at once.