Help interpreting minidump


  1. Posts : 25
    Windows 7 Professional x64
       #1

    Help interpreting minidump


    hi

    I've been getting random BSOD for the past couple of weeks with the message The computer has rebooted from a bugcheck. The bugcheck was: 0x00000019 (0x0000000000000003, 0xfffffa8005839558, 0xfffffa80096efb60, 0xfffffa8005839558).

    Can someone take a look at the minidump and point me towards what might be causing the issue.

    Thanks
      My Computer


  2. Posts : 13,354
    Windows 7 Professional x64
       #2

    Do you have any virtual CD emulators installed, like MagicDisc? If so, I would recommend uninstalling them competely.

    They often use sptd.sys, which causes a lot of BSODs.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Jonathan\Desktop\032110-30217-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02a4f000 PsLoadedModuleList = 0xfffff800`02c8ce50
    Debug session time: Sun Mar 21 08:37:49.366 2010 (GMT-4)
    System Uptime: 0 days 5:37:31.413
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {3, fffffa8005839558, fffffa80096efb60, fffffa8005839558}
    
    Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for sptd.sys
    *** ERROR: Module load completed but symbols could not be loaded for sptd.sys
    Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : Pool_Corruption ( nt!ExFreePool+75b )
    
    Followup: Pool_corruption
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000003, the pool freelist is corrupt.
    Arg2: fffffa8005839558, the pool entry being checked.
    Arg3: fffffa80096efb60, the read back flink freelist value (should be the same as 2).
    Arg4: fffffa8005839558, the read back blink freelist value (should be the same as 2).
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  arma2.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002bf210b to fffff80002ac0f00
    
    STACK_TEXT:  
    fffff880`009b0b28 fffff800`02bf210b : 00000000`00000019 00000000`00000003 fffffa80`05839558 fffffa80`096efb60 : nt!KeBugCheckEx
    fffff880`009b0b30 fffff800`02bf44c1 : fffffa80`066b18e0 fffffa80`0a555190 00000000`00000000 00000000`00000002 : nt!ExFreePool+0x75b
    fffff880`009b0bc0 fffff880`04815fed : fffffa80`085a34d0 fffff880`048174c8 fffffa80`70627375 00000000`000003ed : nt!ExFreePoolWithTag+0x411
    fffff880`009b0c70 fffff880`048135ff : 00000000`00000002 fffffa80`0a5551a0 fffffa80`06844050 00000000`00000000 : USBPORT!USBPORT_Core_DecIoRequestCount+0xc5
    fffff880`009b0cb0 fffff880`04813ab7 : fffffa80`0a1e7902 fffffa80`066b18e0 00000000`ffffffff fffffa80`06844ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa3b
    fffff880`009b0d90 fffff880`0481164f : fffffa80`06844ea8 fffffa80`068441a0 fffffa80`06845040 fffff880`0ff5ba81 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
    fffff880`009b0df0 fffff880`04802f89 : fffffa80`06844050 00000000`00000000 fffffa80`066ec702 fffffa80`06844ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
    fffff880`009b0e30 fffff880`0111a4ce : fffffa80`066ec000 fffffa80`06844ea8 fffffa80`066ec750 fffffa80`06844ec0 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
    fffff880`009b0e60 fffffa80`066ec000 : fffffa80`06844ea8 fffffa80`066ec750 fffffa80`06844ec0 fffff880`0ff5b959 : sptd+0x424ce
    fffff880`009b0e68 fffffa80`06844ea8 : fffffa80`066ec750 fffffa80`06844ec0 fffff880`0ff5b959 fffff880`0ff5b9bd : 0xfffffa80`066ec000
    fffff880`009b0e70 fffffa80`066ec750 : fffffa80`06844ec0 fffff880`0ff5b959 fffff880`0ff5b9bd 00000000`74fc2450 : 0xfffffa80`06844ea8
    fffff880`009b0e78 fffffa80`06844ec0 : fffff880`0ff5b959 fffff880`0ff5b9bd 00000000`74fc2450 00000000`00000022 : 0xfffffa80`066ec750
    fffff880`009b0e80 fffff880`0ff5b959 : fffff880`0ff5b9bd 00000000`74fc2450 00000000`00000022 00000000`00000000 : 0xfffffa80`06844ec0
    fffff880`009b0e88 fffff880`0ff5b9bd : 00000000`74fc2450 00000000`00000022 00000000`00000000 00000000`00000000 : nvlddmkm+0xa4959
    fffff880`009b0e90 00000000`74fc2450 : 00000000`00000022 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0xa49bd
    fffff880`009b0e98 00000000`00000022 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`06844ec0 : 0x74fc2450
    fffff880`009b0ea0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`06844ec0 fffffa80`06844ea8 : 0x22
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExFreePool+75b
    fffff800`02bf210b cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!ExFreePool+75b
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExFreePool+75b
    
    BUCKET_ID:  X64_0x19_3_nt!ExFreePool+75b
    
    Followup: Pool_corruption
    ---------
      My Computer


  3. Posts : 25
    Windows 7 Professional x64
    Thread Starter
       #3

    Thanks Johnathan. I do have Daemon tools installed but that's been there for a couple of months without any issues.

    I noted that nvlddmkm.sys gets a mention in the dump. I installed a beta version of the Nvidia driver a while back that I've uninstalled today. So I think it might be that.

    I'll give it a few days and if there another BSOD try removing Daemon tools.
      My Computer


  4. Posts : 13,354
    Windows 7 Professional x64
       #4

    Sounds good. Good luck!

    ~JK
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 17:09.
Find Us