BAD_POOL_HEADER

S

soccerzortz

I am running on Win XP Pro (SP3) ona DELL Dimension.

Shortly after I click on my profile and windows starts up, I receive the
Blue screen of death and it says the following:

BAD_POOL_HEADER

Stop: 0x00000019(0x00000020, 0x85124568, 0x85124580, 0x1A030001)

Beginning dump of physical memory

Physical memory dump Complete

C:\Windows\Minidump\Mini061609-01.dmp

Event ID: 1001


Below is the contents of the dump file. I am hoping somebody can help me to
figure out what exactly is causing the problem and how to fix it. Thanks in
advance for your help.


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\mini061809-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\windows\symbols
Executable search path is: d:\i386
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86
compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Thu Jun 18 22:49:44.640 2009 (GMT-4)
System Uptime: 0 days 0:01:12.343
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
................................................................
.................................................................
..............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*
*
* Bugcheck Analysis
*
*

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {20, 85bbe2e0, 85bbe2f8, 1a030001}

*** WARNING: Unable to verify timestamp for fltmgr.sys
Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegments+3e3 )

Followup: MachineOwner
---------

1: kd> !analyze -
*******************************************************************************
*
*
* Bugcheck Analysis
*
*

*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> lm N T
Unknown option 'N'
Unknown option 'T'
start end module name
804d7000 806ff000 nt M (pdb symbols)
c:\windows\symbols\exe\ntoskrnl.pdb
806ff000 8071fd00 hal (deferred)
aec11000 aec251e0 NAVENG (deferred)
aec26000 aecfa440 NAVEX15 (deferred)
aed23000 aed75000 SRTSP (deferred)
aed75000 aedb5a80 HTTP (deferred)
af7e6000 af837880 srv (deferred)
af958000 af9e8000 CVPNDRVA (deferred)
afc40000 afc6c180 mrxdav (deferred)
aff1d000 aff47180 kmixer (deferred)
aff48000 aff6ad00 aec (deferred)
aff6b000 aff7f480 wdmaud (deferred)
b0068000 b006b900 ndisuio (deferred)
b00c0000 b00d88c0 tfsnudfa (deferred)
b00d9000 b00f1160 tfsnudf (deferred)
b00f2000 b0107320 tfsnifs (deferred)
b2308000 b23c6000 dump_iastor (deferred)
b23c6000 b2408000 BHDrvx86 (deferred)
b2408000 b2483000 ccHPx86 (deferred)
b2483000 b24a0000 EraserUtilRebootDrv (deferred)
b24a0000 b24fe000 eeCtrl (deferred)
b24fe000 b256d280 mrxsmb (deferred)
b256e000 b2598e80 rdbss (deferred)
b2599000 b25bad00 afd (deferred)
b25bb000 b25e2c00 netbt (deferred)
b25e3000 b262b000 IDSxpx86 (deferred)
b262b000 b263f480 SYMFW (deferred)
b2640000 b2665000 SYMEVENT (deferred)
b2665000 b2698700 SYMTDI (deferred)
b2699000 b26be500 ipnat (deferred)
b26bf000 b26e4800 pctgntdi (deferred)
b26e5000 b273d480 tcpip (deferred)
b273e000 b2750600 ipsec (deferred)
b2763000 b2785480 DVDVRRdr_xp (deferred)
b2798000 b27dd900 cdudf_xp (deferred)
bf000000 bf011600 dxg (deferred)
bf012000 bf065000 ati2dvag (deferred)
bf065000 bf0fe000 ati2cqag (deferred)
bf0fe000 bf182000 atikvmag (deferred)
bf182000 bf1cd000 atiok3x2 (deferred)
bf1cd000 bf571200 ati3duag (deferred)
bf572000 bf7fde00 ativvaxx (deferred)
bf800000 bf9c2f80 win32k (deferred)
bffa0000 bffe5c00 ATMFD (deferred)
ebfb0000 ec00df00 update (deferred)
ec00e000 ec03de80 rdpdr (deferred)
ec03e000 ec04ee00 psched (deferred)
ec04f000 ec065580 ndiswan (deferred)
ec066000 ec083b80 dne2000 (deferred)
ec084000 ec0a0a00 pwd_2k (deferred)
ec0a1000 ec0b4900 parport (deferred)
ec0b5000 ec167f00 senfilt (deferred)
ec168000 ec18ba80 portcls (deferred)
ec18c000 ec1cb900 smwdm (deferred)
ec1cc000 ec260b60 IntelC52 (deferred)
ec261000 ec3876a0 IntelC51 (deferred)
ec388000 ec3aa700 ks (deferred)
ec3ab000 ec3ce200 USBPORT (deferred)
ec3cf000 ec3eca80 b57xp32 (deferred)
ec3ed000 ec400f00 VIDEOPRT (deferred)
ec401000 ec7b7000 ati2mtag (deferred)
eebd8000 eebda280 rasacd (deferred)
eef6f000 eef6fd00 dxgthk (deferred)
eefc7000 eefc7fe0 tfsndrct (deferred)
eefe0000 eefe3f00 MODEMCSA (deferred)
eeff6000 eeff6880 tfsndres (deferred)
ef188000 ef1945c0 hphid411 (deferred)
ef1ea000 ef1eba80 ParVdm (deferred)
efb89000 efb92000 HIDCLASS (deferred)
f1b46000 f1b49c80 mssmbios (deferred)
f1dcd000 f1dce100 swenum (deferred)
f1dcf000 f1dd05c0 sscdbhk5 (deferred)
f263f000 f2640080 Beep (deferred)
f2641000 f2642f00 Fs_Rec (deferred)
f2643000 f2644280 USBD (deferred)
f3011000 f3012080 RDPCDD (deferred)
f3013000 f3014080 mnmdd (deferred)
f30f7000 f3101480 imapi (deferred)
f3107000 f3116c00 serial (deferred)
f3117000 f3123d00 i8042prt (deferred)
f3127000 f3135b00 drmk (deferred)
f3137000 f3145220 IntelC53 (deferred)
f3147000 f314fe00 intelppm (deferred)
f37f0000 f37f48e0 hphius11 (deferred)
f3874000 f3876780 ndistapi (deferred)
f3880000 f3883d80 serenum (deferred)
f389b000 f38a37e0 tfsncofs (deferred)
f38ab000 f38b45a0 drvnddm (deferred)
f38cb000 f38d5e00 Fips (deferred)
f38db000 f38e4080 SRTSPX (deferred)
f38eb000 f38f3780 netbios (deferred)
f38fb000 f3903700 wanarp (deferred)
f391b000 f3929880 usbhub (deferred)
f3959000 f3959b80 drmkaud (deferred)
f395b000 f395bb80 Null (deferred)
f395c000 f395ca00 Cdralw2k (deferred)
f395d000 f395d980 Cdr4_xp (deferred)
f3ce4000 f3cea440 tfsnboio (deferred)
f3eb8000 f3ec1e80 NDProxy (deferred)
f3ee8000 f3ef1f00 termdd (deferred)
f3ef8000 f3f00900 msgpc (deferred)
f3f08000 f3f13d00 raspptp (deferred)
f3f18000 f3f22200 raspppoe (deferred)
f3f28000 f3f34880 rasl2tp (deferred)
f3f38000 f3f42000 GEARAspiWDM (deferred)
f3f48000 f3f56100 redbook (deferred)
f421d000 f4220aa0 tfsnopio (deferred)
f4357000 f4357c00 audstub (deferred)
f439c000 f43ab600 cdrom (deferred)
f43ac000 f43b4c00 AFS2K (deferred)
f5888000 f588e180 HIDPARSE (deferred)
f5d4a000 f5d58d80 sysaudio (deferred)
f681d000 f6820de0 hphipr11 (deferred)
f6829000 f682bf80 mouhid (deferred)
f682d000 f6830b00 usbscan (deferred)
f748a000 f748c880 hidusb (deferred)
f749e000 f74a0f00 ws2ifsl (deferred)
f7533000 f754cb80 Mup (deferred)
f754d000 f7579980 NDIS (deferred)
f757a000 f7606600 Ntfs (deferred)
f7607000 f761d880 KSecDD (deferred)
f761e000 f762f000 TfFsMon (deferred)
f762f000 f76440c0 drvmcdb (deferred)
f7645000 f7694000 SYMEFA (deferred)
f7694000 f76b7000 PCTCore (deferred)
f76b7000 f76c8f00 sr (deferred)
f76c9000 f76e8b00 fltmgr M (pdb symbols)
c:\windows\symbols\sys\fltmgr.pdb
f76e9000 f77a7000 iaStor (deferred)
f77a7000 f77be900 atapi (deferred)
f77bf000 f77e4700 dmio (deferred)
f77e5000 f7803880 ftdisk (deferred)
f7804000 f7814a80 pci (deferred)
f7815000 f7842d80 ACPI (deferred)
f7864000 f786d180 isapnp (deferred)
f7874000 f787e580 MountMgr (deferred)
f7884000 f7890c80 VolSnap (deferred)
f7894000 f789ce00 disk (deferred)
f78a4000 f78b0180 CLASSPNP (deferred)
f78b4000 f78c1000 TfSysMon (deferred)
f78c4000 f78ccb80 PxHelp20 (deferred)
f7ae4000 f7aea180 PCIIDEX (deferred)
f7aec000 f7af0d00 PartMgr (deferred)
f7b0c000 f7b11bc0 ssrtln (deferred)
f7b14000 f7b19200 vga (deferred)
f7b1c000 f7b20a80 Msfs (deferred)
f7b24000 f7b2b880 Npfs (deferred)
f7b2c000 f7b33780 SYMNDIS (deferred)
f7b34000 f7b3ad80 SYMIDS (deferred)
f7b8c000 f7b90500 watchdog (deferred)
f7bbc000 f7bc2700 USBSTOR (deferred)
f7be4000 f7be9080 usbuhci (deferred)
f7bec000 f7bf3600 usbehci (deferred)
f7bfc000 f7c01be0 mohfilt (deferred)
f7c04000 f7c0b580 Modem (deferred)
f7c0c000 f7c0d000 fdc (deferred)
f7c24000 f7c2c000 TfKbMon (deferred)
f7c2c000 f7c32000 kbdclass (deferred)
f7c34000 f7c38a80 TDI (deferred)
f7c3c000 f7c40580 ptilink (deferred)
f7c44000 f7c48080 raspti (deferred)
f7c4c000 f7c52780 RimSerial (deferred)
f7c54000 f7c59a00 mouclass (deferred)
f7c5c000 f7c63400 SymIM (deferred)
f7c64000 f7c69c80 dvd_2K (deferred)
f7c6c000 f7c71000 flpydisk (deferred)
f7c74000 f7c77000 BOOTVID (deferred)
f7d3c000 f7d3e900 Dxapi (deferred)
f7d64000 f7d65b80 kdcom (deferred)
f7d66000 f7d67100 WMILIB (deferred)
f7d68000 f7d69580 intelide (deferred)
f7d6a000 f7d6b700 dmload (deferred)
f7e14000 f7e158a0 tfsnpool (deferred)
f7e2c000 f7e2cd00 pciide (deferred)

Unloaded modules:
eeaf4000 eeb01000 DMusic.sys
ef158000 ef166000 swmidi.sys
f1dd9000 f1ddb000 splitter.sys
f7afc000 f7b01000 Cdaudio.SYS
eefd4000 eefd7000 Sfloppy.SYS
f4359000 f435a000 Cdralw2k.SYS
f435a000 f435b000 Cdr4_xp.SYS


1: kd> !analyze -show
Unknown bugcheck code (0)
Unknown bugcheck description
Arguments:
Arg1: 00000000
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
 
J

ju.c

Check this forum:

http://www.tomshardware.com/forum/235701-45-stop-header-pool-error


ju.c


soccerzortz said:
I am running on Win XP Pro (SP3) ona DELL Dimension.

Shortly after I click on my profile and windows starts up, I receive the
Blue screen of death and it says the following:

BAD_POOL_HEADER

Stop: 0x00000019(0x00000020, 0x85124568, 0x85124580, 0x1A030001)

Beginning dump of physical memory

Physical memory dump Complete

C:\Windows\Minidump\Mini061609-01.dmp

Event ID: 1001


Below is the contents of the dump file. I am hoping somebody can help me to
figure out what exactly is causing the problem and how to fix it. Thanks in
advance for your help.


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\mini061809-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\windows\symbols
Executable search path is: d:\i386
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86
compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Thu Jun 18 22:49:44.640 2009 (GMT-4)
System Uptime: 0 days 0:01:12.343
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {20, 85bbe2e0, 85bbe2f8, 1a030001}

*** WARNING: Unable to verify timestamp for fltmgr.sys
Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegments+3e3 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> lm N T
Unknown option 'N'
Unknown option 'T'
start end module name
804d7000 806ff000 nt M (pdb symbols)
c:\windows\symbols\exe\ntoskrnl.pdb
806ff000 8071fd00 hal (deferred)
aec11000 aec251e0 NAVENG (deferred)
aec26000 aecfa440 NAVEX15 (deferred)
aed23000 aed75000 SRTSP (deferred)
aed75000 aedb5a80 HTTP (deferred)
af7e6000 af837880 srv (deferred)
af958000 af9e8000 CVPNDRVA (deferred)
afc40000 afc6c180 mrxdav (deferred)
aff1d000 aff47180 kmixer (deferred)
aff48000 aff6ad00 aec (deferred)
aff6b000 aff7f480 wdmaud (deferred)
b0068000 b006b900 ndisuio (deferred)
b00c0000 b00d88c0 tfsnudfa (deferred)
b00d9000 b00f1160 tfsnudf (deferred)
b00f2000 b0107320 tfsnifs (deferred)
b2308000 b23c6000 dump_iastor (deferred)
b23c6000 b2408000 BHDrvx86 (deferred)
b2408000 b2483000 ccHPx86 (deferred)
b2483000 b24a0000 EraserUtilRebootDrv (deferred)
b24a0000 b24fe000 eeCtrl (deferred)
b24fe000 b256d280 mrxsmb (deferred)
b256e000 b2598e80 rdbss (deferred)
b2599000 b25bad00 afd (deferred)
b25bb000 b25e2c00 netbt (deferred)
b25e3000 b262b000 IDSxpx86 (deferred)
b262b000 b263f480 SYMFW (deferred)
b2640000 b2665000 SYMEVENT (deferred)
b2665000 b2698700 SYMTDI (deferred)
b2699000 b26be500 ipnat (deferred)
b26bf000 b26e4800 pctgntdi (deferred)
b26e5000 b273d480 tcpip (deferred)
b273e000 b2750600 ipsec (deferred)
b2763000 b2785480 DVDVRRdr_xp (deferred)
b2798000 b27dd900 cdudf_xp (deferred)
bf000000 bf011600 dxg (deferred)
bf012000 bf065000 ati2dvag (deferred)
bf065000 bf0fe000 ati2cqag (deferred)
bf0fe000 bf182000 atikvmag (deferred)
bf182000 bf1cd000 atiok3x2 (deferred)
bf1cd000 bf571200 ati3duag (deferred)
bf572000 bf7fde00 ativvaxx (deferred)
bf800000 bf9c2f80 win32k (deferred)
bffa0000 bffe5c00 ATMFD (deferred)
ebfb0000 ec00df00 update (deferred)
ec00e000 ec03de80 rdpdr (deferred)
ec03e000 ec04ee00 psched (deferred)
ec04f000 ec065580 ndiswan (deferred)
ec066000 ec083b80 dne2000 (deferred)
ec084000 ec0a0a00 pwd_2k (deferred)
ec0a1000 ec0b4900 parport (deferred)
ec0b5000 ec167f00 senfilt (deferred)
ec168000 ec18ba80 portcls (deferred)
ec18c000 ec1cb900 smwdm (deferred)
ec1cc000 ec260b60 IntelC52 (deferred)
ec261000 ec3876a0 IntelC51 (deferred)
ec388000 ec3aa700 ks (deferred)
ec3ab000 ec3ce200 USBPORT (deferred)
ec3cf000 ec3eca80 b57xp32 (deferred)
ec3ed000 ec400f00 VIDEOPRT (deferred)
ec401000 ec7b7000 ati2mtag (deferred)
eebd8000 eebda280 rasacd (deferred)
eef6f000 eef6fd00 dxgthk (deferred)
eefc7000 eefc7fe0 tfsndrct (deferred)
eefe0000 eefe3f00 MODEMCSA (deferred)
eeff6000 eeff6880 tfsndres (deferred)
ef188000 ef1945c0 hphid411 (deferred)
ef1ea000 ef1eba80 ParVdm (deferred)
efb89000 efb92000 HIDCLASS (deferred)
f1b46000 f1b49c80 mssmbios (deferred)
f1dcd000 f1dce100 swenum (deferred)
f1dcf000 f1dd05c0 sscdbhk5 (deferred)
f263f000 f2640080 Beep (deferred)
f2641000 f2642f00 Fs_Rec (deferred)
f2643000 f2644280 USBD (deferred)
f3011000 f3012080 RDPCDD (deferred)
f3013000 f3014080 mnmdd (deferred)
f30f7000 f3101480 imapi (deferred)
f3107000 f3116c00 serial (deferred)
f3117000 f3123d00 i8042prt (deferred)
f3127000 f3135b00 drmk (deferred)
f3137000 f3145220 IntelC53 (deferred)
f3147000 f314fe00 intelppm (deferred)
f37f0000 f37f48e0 hphius11 (deferred)
f3874000 f3876780 ndistapi (deferred)
f3880000 f3883d80 serenum (deferred)
f389b000 f38a37e0 tfsncofs (deferred)
f38ab000 f38b45a0 drvnddm (deferred)
f38cb000 f38d5e00 Fips (deferred)
f38db000 f38e4080 SRTSPX (deferred)
f38eb000 f38f3780 netbios (deferred)
f38fb000 f3903700 wanarp (deferred)
f391b000 f3929880 usbhub (deferred)
f3959000 f3959b80 drmkaud (deferred)
f395b000 f395bb80 Null (deferred)
f395c000 f395ca00 Cdralw2k (deferred)
f395d000 f395d980 Cdr4_xp (deferred)
f3ce4000 f3cea440 tfsnboio (deferred)
f3eb8000 f3ec1e80 NDProxy (deferred)
f3ee8000 f3ef1f00 termdd (deferred)
f3ef8000 f3f00900 msgpc (deferred)
f3f08000 f3f13d00 raspptp (deferred)
f3f18000 f3f22200 raspppoe (deferred)
f3f28000 f3f34880 rasl2tp (deferred)
f3f38000 f3f42000 GEARAspiWDM (deferred)
f3f48000 f3f56100 redbook (deferred)
f421d000 f4220aa0 tfsnopio (deferred)
f4357000 f4357c00 audstub (deferred)
f439c000 f43ab600 cdrom (deferred)
f43ac000 f43b4c00 AFS2K (deferred)
f5888000 f588e180 HIDPARSE (deferred)
f5d4a000 f5d58d80 sysaudio (deferred)
f681d000 f6820de0 hphipr11 (deferred)
f6829000 f682bf80 mouhid (deferred)
f682d000 f6830b00 usbscan (deferred)
f748a000 f748c880 hidusb (deferred)
f749e000 f74a0f00 ws2ifsl (deferred)
f7533000 f754cb80 Mup (deferred)
f754d000 f7579980 NDIS (deferred)
f757a000 f7606600 Ntfs (deferred)
f7607000 f761d880 KSecDD (deferred)
f761e000 f762f000 TfFsMon (deferred)
f762f000 f76440c0 drvmcdb (deferred)
f7645000 f7694000 SYMEFA (deferred)
f7694000 f76b7000 PCTCore (deferred)
f76b7000 f76c8f00 sr (deferred)
f76c9000 f76e8b00 fltmgr M (pdb symbols)
c:\windows\symbols\sys\fltmgr.pdb
f76e9000 f77a7000 iaStor (deferred)
f77a7000 f77be900 atapi (deferred)
f77bf000 f77e4700 dmio (deferred)
f77e5000 f7803880 ftdisk (deferred)
f7804000 f7814a80 pci (deferred)
f7815000 f7842d80 ACPI (deferred)
f7864000 f786d180 isapnp (deferred)
f7874000 f787e580 MountMgr (deferred)
f7884000 f7890c80 VolSnap (deferred)
f7894000 f789ce00 disk (deferred)
f78a4000 f78b0180 CLASSPNP (deferred)
f78b4000 f78c1000 TfSysMon (deferred)
f78c4000 f78ccb80 PxHelp20 (deferred)
f7ae4000 f7aea180 PCIIDEX (deferred)
f7aec000 f7af0d00 PartMgr (deferred)
f7b0c000 f7b11bc0 ssrtln (deferred)
f7b14000 f7b19200 vga (deferred)
f7b1c000 f7b20a80 Msfs (deferred)
f7b24000 f7b2b880 Npfs (deferred)
f7b2c000 f7b33780 SYMNDIS (deferred)
f7b34000 f7b3ad80 SYMIDS (deferred)
f7b8c000 f7b90500 watchdog (deferred)
f7bbc000 f7bc2700 USBSTOR (deferred)
f7be4000 f7be9080 usbuhci (deferred)
f7bec000 f7bf3600 usbehci (deferred)
f7bfc000 f7c01be0 mohfilt (deferred)
f7c04000 f7c0b580 Modem (deferred)
f7c0c000 f7c0d000 fdc (deferred)
f7c24000 f7c2c000 TfKbMon (deferred)
f7c2c000 f7c32000 kbdclass (deferred)
f7c34000 f7c38a80 TDI (deferred)
f7c3c000 f7c40580 ptilink (deferred)
f7c44000 f7c48080 raspti (deferred)
f7c4c000 f7c52780 RimSerial (deferred)
f7c54000 f7c59a00 mouclass (deferred)
f7c5c000 f7c63400 SymIM (deferred)
f7c64000 f7c69c80 dvd_2K (deferred)
f7c6c000 f7c71000 flpydisk (deferred)
f7c74000 f7c77000 BOOTVID (deferred)
f7d3c000 f7d3e900 Dxapi (deferred)
f7d64000 f7d65b80 kdcom (deferred)
f7d66000 f7d67100 WMILIB (deferred)
f7d68000 f7d69580 intelide (deferred)
f7d6a000 f7d6b700 dmload (deferred)
f7e14000 f7e158a0 tfsnpool (deferred)
f7e2c000 f7e2cd00 pciide (deferred)

Unloaded modules:
eeaf4000 eeb01000 DMusic.sys
ef158000 ef166000 swmidi.sys
f1dd9000 f1ddb000 splitter.sys
f7afc000 f7b01000 Cdaudio.SYS
eefd4000 eefd7000 Sfloppy.SYS
f4359000 f435a000 Cdralw2k.SYS
f435a000 f435b000 Cdr4_xp.SYS


1: kd> !analyze -show
Unknown bugcheck code (0)
Unknown bugcheck description
Arguments:
Arg1: 00000000
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
 
S

soccerzortz

Thanks for your help, ju.c

I will check out the article and see I can do what they suggest.

ju.c said:
Check this forum:

http://www.tomshardware.com/forum/235701-45-stop-header-pool-error


ju.c


soccerzortz said:
I am running on Win XP Pro (SP3) ona DELL Dimension.

Shortly after I click on my profile and windows starts up, I receive the
Blue screen of death and it says the following:

BAD_POOL_HEADER

Stop: 0x00000019(0x00000020, 0x85124568, 0x85124580, 0x1A030001)

Beginning dump of physical memory

Physical memory dump Complete

C:\Windows\Minidump\Mini061609-01.dmp

Event ID: 1001


Below is the contents of the dump file. I am hoping somebody can help me to
figure out what exactly is causing the problem and how to fix it. Thanks in
advance for your help.


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\mini061809-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\windows\symbols
Executable search path is: d:\i386
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86
compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Thu Jun 18 22:49:44.640 2009 (GMT-4)
System Uptime: 0 days 0:01:12.343
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {20, 85bbe2e0, 85bbe2f8, 1a030001}

*** WARNING: Unable to verify timestamp for fltmgr.sys
Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegments+3e3 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 85bbe2e0, The pool entry we were looking for within the page.
Arg3: 85bbe2f8, The next pool entry.
Arg4: 1a030001, (reserved)

Debugging Details:
------------------


BUGCHECK_STR: 0x19_20

POOL_ADDRESS: 85bbe2e0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from 80551fc5 to 8053767a

STACK_TEXT:
f7caf784 80551fc5 00000019 00000020 85bbe2e0 nt!MiRemoveUnusedSegments+0x3e3
f7caf7d4 804f2a9f 85bbe2e8 00000000 00000103 nt!KiProfileLock+0x1
f7caf82c 805707d9 838c6d90 f7caf870 f7caf85c nt!MmUnmapViewInSystemCache+0xf7
f7caf854 8057ca50 83971cc0 80000005 85e09858 nt!NtCreateKey+0x389
f7caf8dc 804dd99f 800004a0 f7caf9dc e5059008 nt!MiDoMappedCopy+0xed
f7caf8fc badb0d00 f7caf970 ffffffff f76db6d4 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7caf90c f76e1f59 84175008 84162dc8 f7caf990 0xbadb0d00
f7caf930 00000000 00000007 00000001 01000100 fltmgr!FltOpenVolume+0x65


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0x19_20_nt!MiRemoveUnusedSegments+3e3
 
Joined
Jul 1, 2010
Messages
1
Reaction score
0
bsod

Hey guys, I also have this problem on a WinXP Pro SP3.
Can you help me please?
I attached the minidump. I changed the extension to txt.
This is what the windbg says:

Loading Dump File [E:\minidump\Mini063010-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Wed Jun 30 05:54:47.062 2010 (GMT+3)
System Uptime: 1 days 4:39:22.764
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
..........................................
Loading User Symbols
Loading unloaded module list
........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck BA, {1, 1, f70d52c0, 1f}

Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegments+3e3 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SESSION_HAS_VALID_VIEWS_ON_EXIT (ba)
Caused by a session driver not unmapping its mapped views prior to a
session unload. This indicates a bug in win32k.sys, atmfd.dll,
rdpdd.dll or a video driver.
Arguments:
Arg1: 00000001, session ID
Arg2: 00000001, number of mapped views that are leaking
Arg3: f70d52c0, address of this session's mapped views table
Arg4: 0000001f, size of this session's mapped views table.

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xBA

PROCESS_NAME: smss.exe

LAST_CONTROL_TRANSFER: from 8062d304 to 8053767a

STACK_TEXT:
b716eb44 8062d304 000000ba 00000001 00000001 nt!MiRemoveUnusedSegments+0x3e3
b716eba4 805afd2b 00000004 00000000 b716ed50 nt!PopThermalDeviceHandler+0x4c
b716ebb4 805aad99 00000001 b716ed64 002efe28 nt!NtQueryInformationJobObject+0x6e0
b716ed50 804dd99f 00000030 4858c00c 00000004 nt!SeCaptureSecurityDescriptor+0x320
b716ed68 badb0d00 002efe1c 00007d31 ffffffb0 nt!ZwSetSystemPowerState+0xf
WARNING: Frame IP not in any known module. Following frames may be wrong.
b716ed78 00000000 00000000 00000000 00000000 0xbadb0d00


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3e3
8053767a 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegments+3e3

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 498c19b5

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0xBA_nt!MiRemoveUnusedSegments+3e3

BUCKET_ID: 0xBA_nt!MiRemoveUnusedSegments+3e3

Followup: MachineOwner
---------

1: kd> lmvm nt
start end module name
804d7000 806ff000 nt M (pdb symbols) c:\windows\symbols\exe\ntoskrnl.pdb
Loaded symbol image file: ntoskrnl.exe
Image path: ntoskrnl.exe
Image name: ntoskrnl.exe
Timestamp: Fri Feb 06 13:06:29 2009 (498C19B5)
CheckSum: 0020F6CA
ImageSize: 00228000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 

Attachments

  • Mini063010-01.txt
    88 KB · Views: 133

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top