BSoD -> 0x50

Hello everyone,

Firstly, I’d like to apologise if I am doing anything wrong or breaking any rules by posting here; I am not a driver developer, or even a programmer, but just a power user/sysadmin experiencing a BSoD on a Windows Server 2003 box that I can not seem to resolve. I have been experiencing this crash for about 3 months now, so I’m posting here as something of a last resort (I wasn’t sure if I should post here, so tried many other resources first). Any help however would be greatly appreciated, as I am at a total loss. Just let me know if I shouldn’t be posting here, and I won’t bother you again.

As for the crash, the system in question is a Windows Server 2003, Enterprise x64 Edition, R2 box, with all of the latest updates from Microsoft installed. The system has very new drivers installed for all components, if not the latest.

A rundown of the core hardware in the machine:
***ASUS A8N32-SLI Deluxe Motherboard
***AMD Athlon 64 X2 Dual-Core 4200+
***Kingston DDR-400 2GB
***NVIDIA GeForce 7800GT Graphics Card
***SoundBlaster Audigy 4 Sound Card

The current system configuration relevant to the crash is as follows:
***The system is set for Complete Memory Dumps in the event of a BSoD.
***The system is running Driver Verifier with the Default Options; this amounts to all options enabled except for the following: Enhanced I/O verification, Low resources simulation, Disk integrity checking
***I have not noted any change in the actual BSoD messages since turning on Driver Verifier a few months ago

The circumstances in which the crash occurs is somewhat random:
***The crash almost certainly has something to do with media players, as I am a devout Winamp user, and it is usually running when I am at the machine, and the BSoD always listed winamp.exe as the responsible process. However, just a few minutes ago, the system died, and it was as I was closing Windows Media Player v.10. This leads me to the conclusion it is media player related.
***I often need to use WinImage for the creation and modification of floppy disk images, and have noted WinImage often seems to cause the crash, as the system seems to BSoD when I am closing the WinImage program (once again, random, I can run WinImage tens if not hundreds of time before it occurs), however, Winamp is still listed as the causing process. Does this point to WinImage being something of a catalyst?

Things I have tried to narrow down the cause of the crash:
***Disable Audigy 4 soundcard in device manager, hence, disabling drivers (no effect)
***With above, use onboard sound card (AC’97) and latest drivers (no effect)
***Disable nView (NVIDIA multi-display and virtual-display functionality) (no effect)
And others, which I can’t remember right now, regardless, they didn’t fix the problem

Also worth noting, is that the crash can be very random, a few days ago I managed to get the system to stay up for 7days despite continual use of Winamp and occassional use of WinImage without a crash. It eventually crashed as it was approaching 8days uptime. This was during the time I had the Audigy4 disabled and was using the AC’97 audio. Usually, the system will crash within 2-3days of reboot.

Below is the result output from loading the latest crash dump into WinDbg (this crash is somewhat unique in that Windows Media Player caused it, Winamp was not running at the time, but had been run in the same session previously). I have performed an !analyze -v and a few other simple commands to provide what I hope is a useful starting point. Please remember I am not a developer, and all of this is sadly well out of my realm of expertise, so I can’t really interpret this very well (many parts not at all), despite some reading up on it.

Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete Memory.dmp]
Kernel Complete Dump File: Full address space is available

Symbol search path is: SRV*C:\Program Files\Debugging Tools for Windows 64-bit\symbols*http://msdl.microsoft.com/download/symbols

Executable search path is:
Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs) Free x64
Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS
Built by: 3790.srv03_sp1_gdr.060315-1609
Kernel base = 0xfffff80001000000 PsLoadedModuleList = 0xfffff800011d60c0
Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)
System Uptime: 1 days 16:13:16.334
Loading Kernel Symbols

Loading User Symbols

Loading unloaded module list

Loading Wow64 Symbols

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}

Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )

Followup: MachineOwner

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8006d73000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff97fff177fd4, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:

READ_ADDRESS: fffffa8006d73000 Paged pool

FAULTING_IP:
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h]

MM_INTERNAL_CODE: 0

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e

MODULE_NAME: win32k

FAULTING_MODULE: fffff97fff000000 win32k

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x50

PROCESS_NAME: wmplayer.exe

CURRENT_IRQL: 1

TRAP_FRAME: fffffadfbfdd1bb0 – (.trap fffffadfbfdd1bb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed.
rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0
rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0
r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000
r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32k!NtUserfnINDEVICECHANGE+0x1bb:
fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h] ds:e30a:7385=???
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890

STACK_TEXT:
fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050 fffffa8006d73000 0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx
fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d 0000000078b9b308 fadfcb4449580400 fffff8000102de7c : nt!MmAccessFault+0xa22
fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000 000000000365e8f0 0000000000000000 000000000000002c : nt!KiPageFault+0x119
fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90 00000000000603ac 000000000000002c fffffa8006d72fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8 0000000000000000 fffff6fb7dbed000 fffff6fd40005fa8 : win32k!NtUserMessageCall+0x142
fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512 0074006e006f0043 0053006c006f0072 0043005c00740065 : nt!KiSystemServiceCopyEnd+0x3
000000000365d6d8 0000000078bac512 : 0074006e006f0043 0053006c006f0072 0043005c00740065 0000000078b823a9 : wow64win!NtUserMessageCall+0xa
000000000365d6e0 0000000078bbfddf : 0000000000000000 0000000078ba0b08 0000000078b9f460 0000000000000219 : wow64win!whNT32NtUserMessageCallCB+0x32
000000000365d730 0000000078bac647 : 000000007efa6000 000000007efa4000 0000000000000000 000000007efa6000 : wow64win!Wow64DoMessageThunk+0xaf
000000000365d790 0000000078be6866 : 000000000361f710 000000000361f74c 000000007efa6000 000000007efa4000 : wow64win!whNtUserMessageCall+0x127
000000000365d820 0000000078b83c7d : 0000000000000000 0000000000000000 000000000365e8f0 000000007efa4800 : wow64!Wow64SystemServiceEx+0xd6
000000000365e0e0 0000000078be6a5a : 000000000365e6d0 000000000000001c 000000000365e8b0 0000000000000038 : wow64cpu!ServiceNoTurbo+0x28
000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c 535c53574f444e49 5c3436574f577379 6c642e6970617370 : wow64!RunCpuSimulation+0xa
000000000365e1a0 0000000078ba61c5 : 0000000000000000 0000000000000000 0000000000000103 000000007efdf000 : wow64!Wow64KiUserCallbackDispatcher+0x114
000000000365e4e0 0000000078ef39ff : 0000000000020019 fffffadffa794bf0 000000000361ff20 fffffadfbfdd2c70 : wow64win!whcbfnINDEVICECHANGE+0x195
000000000365e6d0 0000000078bc5dca : 0000000078bac464 0000000000020019 0000000078bee47c 000000000365e808 : ntdll!KiUserCallbackDispatcherContinue
000000000365e7c8 0000000078bac464 : 0000000000020019 0000000078bee47c 000000000365e808 000000000361fc30 : wow64win!NtUserGetMessage+0xa
000000000365e7d0 0000000078be6866 : 000000000361f9ac 000000000361fb24 000000000361ff08 000000007efa4000 : wow64win!whNtUserGetMessage+0x34
000000000365e830 0000000078b83c7d : 0000000000189744 000000000000000c 0000000000000000 000000000361ff44 : wow64!Wow64SystemServiceEx+0xd6
000000000365f0f0 0000000000000000 : fffffa800576e010 fffff800010551fb fffffadfbfdd26e0 0000000000008006 : wow64cpu!ServiceNoTurbo+0x28

STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h]

SYMBOL_STACK_INDEX: 3

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb

FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb

BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb

Followup: MachineOwner

1: kd> !pool fffffa8006d73000
Pool page fffffa8006d73000 region is Paged pool
fffffa8006d73000 is not a valid small pool allocation, checking large pool…
fffffa8006d73000 is not a valid large pool allocation, checking large session pool…
fffffa8006d73000 is freed (or corrupt) pool
Bad allocation size @fffffa8006d73000, too large

***
*** An error (or corruption) in the pool was detected;
*** Attempting to diagnose the problem.
***
*** Use !poolval fffffa8006d73000 for more details.
***

Pool page [fffffa8006d73000] is __inVALID.

Analyzing linked list…

Scanning for single bit errors…

None found

1: kd> !poolval fffffa8006d73000
Pool page fffffa8006d73000 region is Paged pool

Validating Pool headers for pool page: fffffa8006d73000

Pool page [fffffa8006d73000] is __inVALID.

Analyzing linked list…

Scanning for single bit errors…

None found

1: kd> !pte fffffa8006d73000
VA fffffa8006d73000
PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at FFFFF6FB7EA001B0 PTE at FFFFF6FD40036B98
contains 0000000002256863 contains 000000007EF85863 contains 000000002818A863 contains 0029F99C00000000
pfn 2256 —DA–KWEV pfn 7ef85 —DA–KWEV pfn 2818a —DA–KWEV not valid
PageFile: 0
Offset: 29f99c
Protect: 0

I will be watching this thread carefully, so please post any questions you have so that I may help out any way I can as soon as I can. I’ll retain the crash dump as a seperate copy to work on (prevent overwrite incase of another crash). Please let me know of any other commands you would like me to run on the crash dump from WinDbg, and I’ll post the feedback ASAP.

Once again, thank-you for any help at all, I’m at my wits end with this BSoD, it’s been three months and still no luck solving it. Apologies for the length of the post, I’m trying to be very comprehensive to give as much information as I can.

Thanks in advance,

-SDL

SDL:

I can’t say that I know off the top of my head what is causing this (I
haven’t really even had a chance to look yet), but, as a fellow WinAmp
user, I will gladly do so.

For the record, you did a much better job describing your problem than
most developers do.

mm

>> xxxxx@gmail.com 2007-01-02 23:47 >>>
Hello everyone,

Firstly, I’d like to apologise if I am doing anything wrong or breaking
any rules by posting here; I am not a driver developer, or even a
programmer, but just a power user/sysadmin experiencing a BSoD on a
Windows Server 2003 box that I can not seem to resolve. I have been
experiencing this crash for about 3 months now, so I’m posting here as
something of a last resort (I wasn’t sure if I should post here, so
tried many other resources first). Any help however would be greatly
appreciated, as I am at a total loss. Just let me know if I shouldn’t be
posting here, and I won’t bother you again.

As for the crash, the system in question is a Windows Server 2003,
Enterprise x64 Edition, R2 box, with all of the latest updates from
Microsoft installed. The system has very new drivers installed for all
components, if not the latest.

A rundown of the core hardware in the machine:
***ASUS A8N32-SLI Deluxe Motherboard
***AMD Athlon 64 X2 Dual-Core 4200+
***Kingston DDR-400 2GB
***NVIDIA GeForce 7800GT Graphics Card
***SoundBlaster Audigy 4 Sound Card

The current system configuration relevant to the crash is as follows:
***The system is set for Complete Memory Dumps in the event of a BSoD.
***The system is running Driver Verifier with the Default Options; this
amounts to all options enabled except for the following: Enhanced I/O
verification, Low resources simulation, Disk integrity checking
***I have not noted any change in the actual BSoD messages since
turning on Driver Verifier a few months ago

The circumstances in which the crash occurs is somewhat random:
***The crash almost certainly has something to do with media players,
as I am a devout Winamp user, and it is usually running when I am at the
machine, and the BSoD always listed winamp.exe as the responsible
process. However, just a few minutes ago, the system died, and it was as
I was closing Windows Media Player v.10. This leads me to the conclusion
it is media player related.
***I often need to use WinImage for the creation and modification of
floppy disk images, and have noted WinImage often seems to cause the
crash, as the system seems to BSoD when I am closing the WinImage
program (once again, random, I can run WinImage tens if not hundreds of
time before it occurs), however, Winamp is still listed as the causing
process. Does this point to WinImage being something of a catalyst?

Things I have tried to narrow down the cause of the crash:
***Disable Audigy 4 soundcard in device manager, hence, disabling
drivers (no effect)
***With above, use onboard sound card (AC’97) and latest drivers (no
effect)
***Disable nView (NVIDIA multi-display and virtual-display
functionality) (no effect)
And others, which I can’t remember right now, regardless, they didn’t
fix the problem

Also worth noting, is that the crash can be very random, a few days ago
I managed to get the system to stay up for 7days despite continual use
of Winamp and occassional use of WinImage without a crash. It eventually
crashed as it was approaching 8days uptime. This was during the time I
had the Audigy4 disabled and was using the AC’97 audio. Usually, the
system will crash within 2-3days of reboot.

Below is the result output from loading the latest crash dump into
WinDbg (this crash is somewhat unique in that Windows Media Player
caused it, Winamp was not running at the time, but had been run in the
same session previously). I have performed an !analyze -v and a few
other simple commands to provide what I hope is a useful starting point.
Please remember I am not a developer, and all of this is sadly well out
of my realm of expertise, so I can’t really interpret this very well
(many parts not at all), despite some reading up on it.

Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete
Memory.dmp]
Kernel Complete Dump File: Full address space is available

Symbol search path is: SRV*C:\Program Files\Debugging Tools for Windows
64-bit\symbols*http://msdl.microsoft.com/download/symbols

Executable search path is:
Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs)
Free x64
Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS
Built by: 3790.srv03_sp1_gdr.060315-1609
Kernel base = 0xfffff80001000000 PsLoadedModuleList = 0xfffff800011d60c0
Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)
System Uptime: 1 days 16:13:16.334
Loading Kernel Symbols

Loading User Symbols

Loading unloaded module list

Loading Wow64 Symbols

*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}

Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )

Followup: MachineOwner

1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by
try-except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8006d73000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff97fff177fd4, If non-zero, the instruction address which
referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:

READ_ADDRESS: fffffa8006d73000 Paged pool

FAULTING_IP:
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h]

MM_INTERNAL_CODE: 0

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e

MODULE_NAME: win32k

FAULTING_MODULE: fffff97fff000000 win32k

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x50

PROCESS_NAME: wmplayer.exe

CURRENT_IRQL: 1

TRAP_FRAME: fffffadfbfdd1bb0 – (.trap fffffadfbfdd1bb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed.
rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0
rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0
r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000
r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32k!NtUserfnINDEVICECHANGE+0x1bb:
fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
ds:e30a:7385=???
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890

STACK_TEXT:
fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050 fffffa8006d73000 0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx
fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d 0000000078b9b308 fadfcb4449580400 fffff8000102de7c :
nt!MmAccessFault+0xa22
fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000 000000000365e8f0 0000000000000000 000000000000002c :
nt!KiPageFault+0x119
fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90 00000000000603ac 000000000000002c fffffa8006d72fd0 :
win32k!NtUserfnINDEVICECHANGE+0x1bb
fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8 0000000000000000 fffff6fb7dbed000 fffff6fd40005fa8 :
win32k!NtUserMessageCall+0x142
fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512 0074006e006f0043 0053006c006f0072 0043005c00740065 :
nt!KiSystemServiceCopyEnd+0x3
000000000365d6d8 0000000078bac512 : 0074006e006f0043 0053006c006f0072 0043005c00740065 0000000078b823a9 :
wow64win!NtUserMessageCall+0xa
000000000365d6e0 0000000078bbfddf : 0000000000000000 0000000078ba0b08 0000000078b9f460 0000000000000219 :
wow64win!whNT32NtUserMessageCallCB+0x32
000000000365d730 0000000078bac647 : 000000007efa6000 000000007efa4000 0000000000000000 000000007efa6000 :
wow64win!Wow64DoMessageThunk+0xaf
000000000365d790 0000000078be6866 : 000000000361f710 000000000361f74c 000000007efa6000 000000007efa4000 :
wow64win!whNtUserMessageCall+0x127
000000000365d820 0000000078b83c7d : 0000000000000000 0000000000000000 000000000365e8f0 000000007efa4800 :
wow64!Wow64SystemServiceEx+0xd6
000000000365e0e0 0000000078be6a5a : 000000000365e6d0 000000000000001c 000000000365e8b0 0000000000000038 :
wow64cpu!ServiceNoTurbo+0x28
000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c 535c53574f444e49 5c3436574f577379 6c642e6970617370 :
wow64!RunCpuSimulation+0xa
000000000365e1a0 0000000078ba61c5 : 0000000000000000 0000000000000000 0000000000000103 000000007efdf000 :
wow64!Wow64KiUserCallbackDispatcher+0x114
000000000365e4e0 0000000078ef39ff : 0000000000020019 fffffadffa794bf0 000000000361ff20 fffffadfbfdd2c70 :
wow64win!whcbfnINDEVICECHANGE+0x195
000000000365e6d0 0000000078bc5dca : 0000000078bac464 0000000000020019 0000000078bee47c 000000000365e808 :
ntdll!KiUserCallbackDispatcherContinue
000000000365e7c8 0000000078bac464 : 0000000000020019 0000000078bee47c 000000000365e808 000000000361fc30 :
wow64win!NtUserGetMessage+0xa
000000000365e7d0 0000000078be6866 : 000000000361f9ac 000000000361fb24 000000000361ff08 000000007efa4000 :
wow64win!whNtUserGetMessage+0x34
000000000365e830 0000000078b83c7d : 0000000000189744 000000000000000c 0000000000000000 000000000361ff44 :
wow64!Wow64SystemServiceEx+0xd6
000000000365f0f0 0000000000000000 : fffffa800576e010 fffff800010551fb fffffadfbfdd26e0 0000000000008006 :
wow64cpu!ServiceNoTurbo+0x28

STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!NtUserfnINDEVICECHANGE+1bb
fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h]

SYMBOL_STACK_INDEX: 3

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb

FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb

BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb

Followup: MachineOwner

1: kd> !pool fffffa8006d73000
Pool page fffffa8006d73000 region is Paged pool
fffffa8006d73000 is not a valid small pool allocation, checking large
pool…
fffffa8006d73000 is not a valid large pool allocation, checking large
session pool…
fffffa8006d73000 is freed (or corrupt) pool
Bad allocation size @fffffa8006d73000, too large

***
*** An error (or corruption) in the pool was detected;
*** Attempting to diagnose the problem.
***
*** Use !poolval fffffa8006d73000 for more details.
***

Pool page [fffffa8006d73000] is __inVALID.

Analyzing linked list…

Scanning for single bit errors…

None found

1: kd> !poolval fffffa8006d73000
Pool page fffffa8006d73000 region is Paged pool

Validating Pool headers for pool page: fffffa8006d73000

Pool page [fffffa8006d73000] is __inVALID.

Analyzing linked list…

Scanning for single bit errors…

None found

1: kd> !pte fffffa8006d73000
VA fffffa8006d73000
PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at
FFFFF6FB7EA001B0 PTE at FFFFF6FD40036B98
contains 0000000002256863 contains 000000007EF85863 contains
000000002818A863 contains 0029F99C00000000
pfn 2256 —DA–KWEV pfn 7ef85 —DA–KWEV pfn 2818a
—DA–KWEV
not valid
PageFile: 0
Offset:
29f99c
Protect: 0

I will be watching this thread carefully, so please post any questions
you have so that I may help out any way I can as soon as I can. I’ll
retain the crash dump as a seperate copy to work on (prevent overwrite
incase of another crash). Please let me know of any other commands you
would like me to run on the crash dump from WinDbg, and I’ll post the
feedback ASAP.

Once again, thank-you for any help at all, I’m at my wits end with this
BSoD, it’s been three months and still no luck solving it. Apologies for
the length of the post, I’m trying to be very comprehensive to give as
much information as I can.

Thanks in advance,

-SDL


Questions? First check the Kernel Driver FAQ at
http://www.osronline.com/article.cfm?id=256

To unsubscribe, visit the List Server section of OSR Online at
http://www.osronline.com/page.cfm?name=ListServer

That system is very similar to mine! Except I haven’t dared go to 64
bits yet.

Having used WinDbg to debug this kind of problem before (although mostly
when caused by my own applications), this looks like there’s some driver
which causes random kernel heap corruption. The fact that it often
happens with the sound driver running probably has more to do with the
fact that a sound driver can general a large number of interrupts and a
some memory churn even on an otherwise idle system (depending on
implementation, no doubt).

If at all possible, I would check if there’s some other machine (laptop,
spare, etc) I can use WinImage on, and try not to use that program at
all on the suspicious system. If the suspicious machine still BSODs
within two weeks, it’s not WinImage, else it likely is.

Cheers,

/ h+

xxxxx@gmail.com wrote:

Hello everyone,

Firstly, I’d like to apologise if I am doing anything wrong or breaking any rules by posting here; I am not a driver developer, or even a programmer, but just a power user/sysadmin experiencing a BSoD on a Windows Server 2003 box that I can not seem to resolve. I have been experiencing this crash for about 3 months now, so I’m posting here as something of a last resort (I wasn’t sure if I should post here, so tried many other resources first). Any help however would be greatly appreciated, as I am at a total loss. Just let me know if I shouldn’t be posting here, and I won’t bother you again.

Is it a random BSOD? or is it always the same?


Maxim Shatskih, Windows DDK MVP
StorageCraft Corporation
xxxxx@storagecraft.com
http://www.storagecraft.com

wrote in message news:xxxxx@ntdev…
> Hello everyone,
>
> Firstly, I’d like to apologise if I am doing anything wrong or breaking any
rules by posting here; I am not a driver developer, or even a programmer, but
just a power user/sysadmin experiencing a BSoD on a Windows Server 2003 box
that I can not seem to resolve. I have been experiencing this crash for about 3
months now, so I’m posting here as something of a last resort (I wasn’t sure if
I should post here, so tried many other resources first). Any help however
would be greatly appreciated, as I am at a total loss. Just let me know if I
shouldn’t be posting here, and I won’t bother you again.
>
> As for the crash, the system in question is a Windows Server 2003, Enterprise
x64 Edition, R2 box, with all of the latest updates from Microsoft installed.
The system has very new drivers installed for all components, if not the
latest.
>
> A rundown of the core hardware in the machine:
> ASUS A8N32-SLI Deluxe Motherboard
>
AMD Athlon 64 X2 Dual-Core 4200+
> Kingston DDR-400 2GB
>
NVIDIA GeForce 7800GT Graphics Card
> SoundBlaster Audigy 4 Sound Card
>
> The current system configuration relevant to the crash is as follows:
>
The system is set for Complete Memory Dumps in the event of a BSoD.
> The system is running Driver Verifier with the Default Options; this
amounts to all options enabled except for the following: Enhanced I/O
verification, Low resources simulation, Disk integrity checking
>
I have not noted any change in the actual BSoD messages since turning on
Driver Verifier a few months ago
>
> The circumstances in which the crash occurs is somewhat random:
> The crash almost certainly has something to do with media players, as I am
a devout Winamp user, and it is usually running when I am at the machine, and
the BSoD always listed winamp.exe as the responsible process. However, just a
few minutes ago, the system died, and it was as I was closing Windows Media
Player v.10. This leads me to the conclusion it is media player related.
>
I often need to use WinImage for the creation and modification of floppy
disk images, and have noted WinImage often seems to cause the crash, as the
system seems to BSoD when I am closing the WinImage program (once again,
random, I can run WinImage tens if not hundreds of time before it occurs),
however, Winamp is still listed as the causing process. Does this point to
WinImage being something of a catalyst?
>
> Things I have tried to narrow down the cause of the crash:
> Disable Audigy 4 soundcard in device manager, hence, disabling drivers (no
effect)
>With above, use onboard sound card (AC’97) and latest drivers (no effect)
> Disable nView (NVIDIA multi-display and virtual-display functionality) (no
effect)
> And others, which I can’t remember right now, regardless, they didn’t fix the
problem
>
> Also worth noting, is that the crash can be very random, a few days ago I
managed to get the system to stay up for 7days despite continual use of Winamp
and occassional use of WinImage without a crash. It eventually crashed as it
was approaching 8days uptime. This was during the time I had the Audigy4
disabled and was using the AC’97 audio. Usually, the system will crash within
2-3days of reboot.
>
> Below is the result output from loading the latest crash dump into WinDbg
(this crash is somewhat unique in that Windows Media Player caused it, Winamp
was not running at the time, but had been run in the same session previously).
I have performed an !analyze -v and a few other simple commands to provide what
I hope is a useful starting point. Please remember I am not a developer, and
all of this is sadly well out of my realm of expertise, so I can’t really
interpret this very well (many parts not at all), despite some reading up on
it.
>
> Microsoft (R) Windows Debugger Version 6.6.0007.5
> Copyright (c) Microsoft Corporation. All rights reserved.
>
>
> Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete Memory.dmp]
> Kernel Complete Dump File: Full address space is available
>
> Symbol search path is: SRV
C:\Program Files\Debugging Tools for Windows
64-bit\symbols
http://msdl.microsoft.com/download/symbols
>
> Executable search path is:
> Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs) Free
x64
> Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS
> Built by: 3790.srv03_sp1_gdr.060315-1609
> Kernel base = 0xfffff80001000000 PsLoadedModuleList = 0xfffff800011d60c0
> Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)
> System Uptime: 1 days 16:13:16.334
> Loading Kernel Symbols
>



> Loading User Symbols
> …
> Loading unloaded module list
> …
> Loading Wow64 Symbols
> …
>

>

> * Bugcheck Analysis

>

>

>
> Use !analyze -v to get detailed debugging information.
>
> BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}
>
> Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )
>
> Followup: MachineOwner
> ---------
>
> 1: kd> !analyze -v
>

>

> * Bugcheck Analysis

>

>
******
>
> PAGE_FAULT_IN_NONPAGED_AREA (50)
> Invalid system memory was referenced. This cannot be protected by
try-except,
> it must be protected by a Probe. Typically the address is just plain bad or
it
> is pointing at freed memory.
> Arguments:
> Arg1: fffffa8006d73000, memory referenced.
> Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
> Arg3: fffff97fff177fd4, If non-zero, the instruction address which referenced
the bad memory
> address.
> Arg4: 0000000000000000, (reserved)
>
> Debugging Details:
> ------------------
>
>
> READ_ADDRESS: fffffa8006d73000 Paged pool
>
> FAULTING_IP:
> win32k!NtUserfnINDEVICECHANGE+1bb
> fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]<br>&gt;<br>&gt; MM_INTERNAL_CODE: 0<br>&gt;<br>&gt; IMAGE_NAME: win32k.sys<br>&gt;<br>&gt; DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e<br>&gt;<br>&gt; MODULE_NAME: win32k<br>&gt;<br>&gt; FAULTING_MODULE: fffff97fff000000 win32k<br>&gt;<br>&gt; DEFAULT_BUCKET_ID: DRIVER_FAULT<br>&gt;<br>&gt; BUGCHECK_STR: 0x50<br>&gt;<br>&gt; PROCESS_NAME: wmplayer.exe<br>&gt;<br>&gt; CURRENT_IRQL: 1<br>&gt;<br>&gt; TRAP_FRAME: fffffadfbfdd1bb0 -- (.trap fffffadfbfdd1bb0)<br>&gt; NOTE: The trap frame does not contain all registers.<br>&gt; Some register values may be zeroed.<br>&gt; rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0<br>&gt; rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000<br>&gt; rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0<br>&gt; r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000<br>&gt; r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000<br>&gt; r14=0000000000000000 r15=0000000000000000<br>&gt; iopl=0 nv up ei pl zr na po nc<br>&gt; win32k!NtUserfnINDEVICECHANGE+0x1bb:<br>&gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
ds:e30a:7385=???
> Resetting default scope
>
> LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890
>
> STACK_TEXT:
> fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050 fffffa8006d73000
0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx
> fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d 0000000078b9b308
fadfcb4449580400 fffff8000102de7c : nt!MmAccessFault+0xa22
> fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000 000000000365e8f0
0000000000000000 000000000000002c : nt!KiPageFault+0x119
> fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90 00000000000603ac
000000000000002c fffffa8006d72fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
> fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8 0000000000000000
fffff6fb7dbed000 fffff6fd40005fa8 : win32k!NtUserMessageCall+0x142
> fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512 0074006e006f0043
0053006c006f0072 0043005c00740065 : nt!KiSystemServiceCopyEnd+0x3
> 000000000365d6d8 0000000078bac512 : 0074006e006f0043 0053006c006f0072
0043005c00740065 0000000078b823a9 : wow64win!NtUserMessageCall+0xa
> 000000000365d6e0 0000000078bbfddf : 0000000000000000 0000000078ba0b08
0000000078b9f460 0000000000000219 : wow64win!whNT32NtUserMessageCallCB+0x32
> 000000000365d730 0000000078bac647 : 000000007efa6000 000000007efa4000
0000000000000000 000000007efa6000 : wow64win!Wow64DoMessageThunk+0xaf
> 000000000365d790 0000000078be6866 : 000000000361f710 000000000361f74c
000000007efa6000 000000007efa4000 : wow64win!whNtUserMessageCall+0x127
> 000000000365d820 0000000078b83c7d : 0000000000000000 0000000000000000
000000000365e8f0 000000007efa4800 : wow64!Wow64SystemServiceEx+0xd6
> 000000000365e0e0 0000000078be6a5a : 000000000365e6d0 000000000000001c
000000000365e8b0 0000000000000038 : wow64cpu!ServiceNoTurbo+0x28
> 000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c 535c53574f444e49
5c3436574f577379 6c642e6970617370 : wow64!RunCpuSimulation+0xa
> 000000000365e1a0 0000000078ba61c5 : 0000000000000000 0000000000000000
0000000000000103 000000007efdf000 : wow64!Wow64KiUserCallbackDispatcher+0x114
> 000000000365e4e0 0000000078ef39ff : 0000000000020019 fffffadffa794bf0
000000000361ff20 fffffadfbfdd2c70 : wow64win!whcbfnINDEVICECHANGE+0x195
> 000000000365e6d0 0000000078bc5dca : 0000000078bac464 0000000000020019
0000000078bee47c 000000000365e808 : ntdll!KiUserCallbackDispatcherContinue
> 000000000365e7c8 0000000078bac464 : 0000000000020019 0000000078bee47c
000000000365e808 000000000361fc30 : wow64win!NtUserGetMessage+0xa
> 000000000365e7d0 0000000078be6866 : 000000000361f9ac 000000000361fb24
000000000361ff08 000000007efa4000 : wow64win!whNtUserGetMessage+0x34
> 000000000365e830 0000000078b83c7d : 0000000000189744 000000000000000c
0000000000000000 000000000361ff44 : wow64!Wow64SystemServiceEx+0xd6
> 000000000365f0f0 0000000000000000 : fffffa800576e010 fffff800010551fb
fffffadfbfdd26e0 0000000000008006 : wow64cpu!ServiceNoTurbo+0x28
>
>
> STACK_COMMAND: kb
>
> FOLLOWUP_IP:
> win32k!NtUserfnINDEVICECHANGE+1bb
> fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
>
> SYMBOL_STACK_INDEX: 3
>
> FOLLOWUP_NAME: MachineOwner
>
> SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb
>
> FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> Followup: MachineOwner
> ---------
>
> 1: kd> !pool fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
> fffffa8006d73000 is not a valid small pool allocation, checking large pool…
> fffffa8006d73000 is not a valid large pool allocation, checking large session
pool…
> fffffa8006d73000 is freed (or corrupt) pool
> Bad allocation size @fffffa8006d73000, too large
>
>

> An error (or corruption) in the pool was detected;
>
Attempting to diagnose the problem.
>
>
Use !poolval fffffa8006d73000 for more details.
> ***
>
> Pool page [fffffa8006d73000] is __inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !poolval fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
>
> Validating Pool headers for pool page: fffffa8006d73000
>
> Pool page [fffffa8006d73000] is__inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !pte fffffa8006d73000
> VA fffffa8006d73000
> PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at FFFFF6FB7EA001B0
PTE at FFFFF6FD40036B98
> contains 0000000002256863 contains 000000007EF85863 contains
000000002818A863 contains 0029F99C00000000
> pfn 2256 —DA–KWEV pfn 7ef85 —DA–KWEV pfn
2818a —DA–KWEV
not valid
> PageFile: 0
> Offset: 29f99c
> Protect: 0
>
>
> I will be watching this thread carefully, so please post any questions you
have so that I may help out any way I can as soon as I can. I’ll retain the
crash dump as a seperate copy to work on (prevent overwrite incase of another
crash). Please let me know of any other commands you would like me to run on
the crash dump from WinDbg, and I’ll post the feedback ASAP.
>
> Once again, thank-you for any help at all, I’m at my wits end with this BSoD,
it’s been three months and still no luck solving it. Apologies for the length
of the post, I’m trying to be very comprehensive to give as much information as
I can.
>
> Thanks in advance,
>
> -SDL
>

Hello everyone,

Firstly, thank-you for all your replies, I appreciate the help :slight_smile:

In other news, I believe I have nailed the problem! Shortly after my first
post, I thought “stuff it”, and enabled every option in Driver Verifier
except low resource simulation for every driver on the system. Shortly
after, I started getting Driver Verifier BSOD’s pointing to kernel memory
corruption. Analysis of this new BSOD in WinDbg appears to have revealed the
culprit: The Logitech Mouse Driver.

It appears that the Logitech mouse driver was creating a few bytes of memory
corruption randomly whenever a certain “clean-up” call was made. The
offending driver has since been removed, and everything is stable so far.
Hopefully that’s the end to three months of painful troubleshooting…

I suspect you will hear from me again in all likeliness if the problem
arises again in the coming days :slight_smile:

Thanks again,

-SDL

“Maxim S. Shatskih” wrote in message
news:…
> Is it a random BSOD? or is it always the same?
>
> –
> Maxim Shatskih, Windows DDK MVP
> StorageCraft Corporation
> xxxxx@storagecraft.com
> http://www.storagecraft.com
>
> wrote in message news:xxxxx@ntdev…
> > Hello everyone,
> >
> > Firstly, I’d like to apologise if I am doing anything wrong or breaking
> > any
> rules by posting here; I am not a driver developer, or even a programmer,
> but
> just a power user/sysadmin experiencing a BSoD on a Windows Server 2003
> box
> that I can not seem to resolve. I have been experiencing this crash for
> about 3
> months now, so I’m posting here as something of a last resort (I wasn’t
> sure if
> I should post here, so tried many other resources first). Any help however
> would be greatly appreciated, as I am at a total loss. Just let me know if
> I
> shouldn’t be posting here, and I won’t bother you again.
> >
> > As for the crash, the system in question is a Windows Server 2003,
> > Enterprise
> x64 Edition, R2 box, with all of the latest updates from Microsoft
> installed.
> The system has very new drivers installed for all components, if not the
> latest.
> >
> > A rundown of the core hardware in the machine:
> > ASUS A8N32-SLI Deluxe Motherboard
> >
AMD Athlon 64 X2 Dual-Core 4200+
> > Kingston DDR-400 2GB
> >
NVIDIA GeForce 7800GT Graphics Card
> > SoundBlaster Audigy 4 Sound Card
> >
> > The current system configuration relevant to the crash is as follows:
> >
The system is set for Complete Memory Dumps in the event of a BSoD.
> > The system is running Driver Verifier with the Default Options; this
> amounts to all options enabled except for the following: Enhanced I/O
> verification, Low resources simulation, Disk integrity checking
> >
I have not noted any change in the actual BSoD messages since turning
> > on
> Driver Verifier a few months ago
> >
> > The circumstances in which the crash occurs is somewhat random:
> > The crash almost certainly has something to do with media players, as
> > I am
> a devout Winamp user, and it is usually running when I am at the machine,
> and
> the BSoD always listed winamp.exe as the responsible process. However,
> just a
> few minutes ago, the system died, and it was as I was closing Windows
> Media
> Player v.10. This leads me to the conclusion it is media player related.
> >
I often need to use WinImage for the creation and modification of
> > floppy
> disk images, and have noted WinImage often seems to cause the crash, as
> the
> system seems to BSoD when I am closing the WinImage program (once again,
> random, I can run WinImage tens if not hundreds of time before it occurs),
> however, Winamp is still listed as the causing process. Does this point to
> WinImage being something of a catalyst?
> >
> > Things I have tried to narrow down the cause of the crash:
> > Disable Audigy 4 soundcard in device manager, hence, disabling
> > drivers (no
> effect)
> >With above, use onboard sound card (AC’97) and latest drivers (no
> > effect)
> > Disable nView (NVIDIA multi-display and virtual-display
> > functionality) (no
> effect)
> > And others, which I can’t remember right now, regardless, they didn’t
> > fix the
> problem
> >
> > Also worth noting, is that the crash can be very random, a few days ago
> > I
> managed to get the system to stay up for 7days despite continual use of
> Winamp
> and occassional use of WinImage without a crash. It eventually crashed as
> it
> was approaching 8days uptime. This was during the time I had the Audigy4
> disabled and was using the AC’97 audio. Usually, the system will crash
> within
> 2-3days of reboot.
> >
> > Below is the result output from loading the latest crash dump into
> > WinDbg
> (this crash is somewhat unique in that Windows Media Player caused it,
> Winamp
> was not running at the time, but had been run in the same session
> previously).
> I have performed an !analyze -v and a few other simple commands to provide
> what
> I hope is a useful starting point. Please remember I am not a developer,
> and
> all of this is sadly well out of my realm of expertise, so I can’t really
> interpret this very well (many parts not at all), despite some reading up
> on
> it.
> >
> > Microsoft (R) Windows Debugger Version 6.6.0007.5
> > Copyright (c) Microsoft Corporation. All rights reserved.
> >
> >
> > Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete Memory.dmp]
> > Kernel Complete Dump File: Full address space is available
> >
> > Symbol search path is: SRV
C:\Program Files\Debugging Tools for Windows
> 64-bit\symbols
http://msdl.microsoft.com/download/symbols
> >
> > Executable search path is:
> > Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs)
> > Free
> x64
> > Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS
> > Built by: 3790.srv03_sp1_gdr.060315-1609
> > Kernel base = 0xfffff80001000000 PsLoadedModuleList = <br>&gt; &gt; 0xfffff800011d60c0
> > Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)
> > System Uptime: 1 days 16:13:16.334
> > Loading Kernel Symbols
> >
> …
> …
> …
> > Loading User Symbols
> > …
> > Loading unloaded module list
> > …
> > Loading Wow64 Symbols
> > …
> >
>
************************************************************************
> > *
> *
> > * Bugcheck Analysis
> *
> > *
> *
> >
>
> >
> > Use !analyze -v to get detailed debugging information.
> >
> > BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}
> >
> > Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )
> >
> > Followup: MachineOwner
> > ---------
> >
> > 1: kd> !analyze -v
> >
>

> > *
> *
> > * Bugcheck Analysis
> *
> > *
> *
> >
> *******************************************************************************
> >
> > PAGE_FAULT_IN_NONPAGED_AREA (50)
> > Invalid system memory was referenced. This cannot be protected by
> try-except,
> > it must be protected by a Probe. Typically the address is just plain
> > bad or
> it
> > is pointing at freed memory.
> > Arguments:
> > Arg1: fffffa8006d73000, memory referenced.
> > Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
> > Arg3: fffff97fff177fd4, If non-zero, the instruction address which
> > referenced
> the bad memory
> > address.
> > Arg4: 0000000000000000, (reserved)
> >
> > Debugging Details:
> > ------------------
> >
> >
> > READ_ADDRESS: fffffa8006d73000 Paged pool
> >
> > FAULTING_IP:
> > win32k!NtUserfnINDEVICECHANGE+1bb
> > fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]<br>&gt; &gt;<br>&gt; &gt; MM_INTERNAL_CODE: 0<br>&gt; &gt;<br>&gt; &gt; IMAGE_NAME: win32k.sys<br>&gt; &gt;<br>&gt; &gt; DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e<br>&gt; &gt;<br>&gt; &gt; MODULE_NAME: win32k<br>&gt; &gt;<br>&gt; &gt; FAULTING_MODULE: fffff97fff000000 win32k<br>&gt; &gt;<br>&gt; &gt; DEFAULT_BUCKET_ID: DRIVER_FAULT<br>&gt; &gt;<br>&gt; &gt; BUGCHECK_STR: 0x50<br>&gt; &gt;<br>&gt; &gt; PROCESS_NAME: wmplayer.exe<br>&gt; &gt;<br>&gt; &gt; CURRENT_IRQL: 1<br>&gt; &gt;<br>&gt; &gt; TRAP_FRAME: fffffadfbfdd1bb0 -- (.trap fffffadfbfdd1bb0)<br>&gt; &gt; NOTE: The trap frame does not contain all registers.<br>&gt; &gt; Some register values may be zeroed.<br>&gt; &gt; rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0<br>&gt; &gt; rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000<br>&gt; &gt; rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0<br>&gt; &gt; r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000<br>&gt; &gt; r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000<br>&gt; &gt; r14=0000000000000000 r15=0000000000000000<br>&gt; &gt; iopl=0 nv up ei pl zr na po nc<br>&gt; &gt; win32k!NtUserfnINDEVICECHANGE+0x1bb:<br>&gt; &gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
> ds:e30a:7385=???
> > Resetting default scope
> >
> > LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890
> >
> > STACK_TEXT:
> > fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050 <br>&gt; &gt; fffffa8006d73000
> 0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx
> > fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d <br>&gt; &gt; 0000000078b9b308
> fadfcb4449580400 fffff8000102de7c : nt!MmAccessFault+0xa22
> > fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000 <br>&gt; &gt; 000000000365e8f0
> 0000000000000000 000000000000002c : nt!KiPageFault+0x119
> > fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90 <br>&gt; &gt; 00000000000603ac
> 000000000000002c fffffa8006d72fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
> > fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8 <br>&gt; &gt; 0000000000000000
> fffff6fb7dbed000 fffff6fd40005fa8 : win32k!NtUserMessageCall+0x142
> > fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512 <br>&gt; &gt; 0074006e006f0043
> 0053006c006f0072 0043005c00740065 : nt!KiSystemServiceCopyEnd+0x3
> > 000000000365d6d8 0000000078bac512 : 0074006e006f0043 <br>&gt; &gt; 0053006c006f0072
> 0043005c00740065 0000000078b823a9 : wow64win!NtUserMessageCall+0xa
> > 000000000365d6e0 0000000078bbfddf : 0000000000000000 <br>&gt; &gt; 0000000078ba0b08
> 0000000078b9f460 0000000000000219 :
> wow64win!whNT32NtUserMessageCallCB+0x32
> > 000000000365d730 0000000078bac647 : 000000007efa6000 <br>&gt; &gt; 000000007efa4000
> 0000000000000000 000000007efa6000 : wow64win!Wow64DoMessageThunk+0xaf
> > 000000000365d790 0000000078be6866 : 000000000361f710 <br>&gt; &gt; 000000000361f74c
> 000000007efa6000 000000007efa4000 : wow64win!whNtUserMessageCall+0x127
> > 000000000365d820 0000000078b83c7d : 0000000000000000 <br>&gt; &gt; 0000000000000000
> 000000000365e8f0 000000007efa4800 : wow64!Wow64SystemServiceEx+0xd6
> > 000000000365e0e0 0000000078be6a5a : 000000000365e6d0 <br>&gt; &gt; 000000000000001c
> 000000000365e8b0 0000000000000038 : wow64cpu!ServiceNoTurbo+0x28
> > 000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c <br>&gt; &gt; 535c53574f444e49
> 5c3436574f577379 6c642e6970617370 : wow64!RunCpuSimulation+0xa
> > 000000000365e1a0 0000000078ba61c5 : 0000000000000000 <br>&gt; &gt; 0000000000000000
> 0000000000000103 000000007efdf000 :
> wow64!Wow64KiUserCallbackDispatcher+0x114
> > 000000000365e4e0 0000000078ef39ff : 0000000000020019 <br>&gt; &gt; fffffadffa794bf0
> 000000000361ff20 fffffadfbfdd2c70 : wow64win!whcbfnINDEVICECHANGE+0x195
> > 000000000365e6d0 0000000078bc5dca : 0000000078bac464 <br>&gt; &gt; 0000000000020019
> 0000000078bee47c 000000000365e808 :
> ntdll!KiUserCallbackDispatcherContinue
> > 000000000365e7c8 0000000078bac464 : 0000000000020019 <br>&gt; &gt; 0000000078bee47c
> 000000000365e808 000000000361fc30 : wow64win!NtUserGetMessage+0xa
> > 000000000365e7d0 0000000078be6866 : 000000000361f9ac <br>&gt; &gt; 000000000361fb24
> 000000000361ff08 000000007efa4000 : wow64win!whNtUserGetMessage+0x34
> > 000000000365e830 0000000078b83c7d : 0000000000189744 <br>&gt; &gt; 000000000000000c
> 0000000000000000 000000000361ff44 : wow64!Wow64SystemServiceEx+0xd6
> > 000000000365f0f0 0000000000000000 : fffffa800576e010 <br>&gt; &gt; fffff800010551fb
> fffffadfbfdd26e0 0000000000008006 : wow64cpu!ServiceNoTurbo+0x28
> >
> >
> > STACK_COMMAND: kb
> >
> > FOLLOWUP_IP:
> > win32k!NtUserfnINDEVICECHANGE+1bb
> > fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]<br>&gt; &gt;<br>&gt; &gt; SYMBOL_STACK_INDEX: 3<br>&gt; &gt;<br>&gt; &gt; FOLLOWUP_NAME: MachineOwner<br>&gt; &gt;<br>&gt; &gt; SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; &gt;<br>&gt; &gt; FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; &gt;<br>&gt; &gt; BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; &gt;<br>&gt; &gt; Followup: MachineOwner<br>&gt; &gt; ---------<br>&gt; &gt;<br>&gt; &gt; 1: kd&gt; !pool fffffa8006d73000<br>&gt; &gt; Pool page fffffa8006d73000 region is Paged pool<br>&gt; &gt; fffffa8006d73000 is not a valid small pool allocation, checking large <br>&gt; &gt; pool...<br>&gt; &gt; fffffa8006d73000 is not a valid large pool allocation, checking large <br>&gt; &gt; session<br>&gt; pool...<br>&gt; &gt; fffffa8006d73000 is freed (or corrupt) pool<br>&gt; &gt; Bad allocation size @fffffa8006d73000, too large<br>&gt; &gt;<br>&gt; &gt;***<br>&gt; &gt; ***An error (or corruption) in the pool was detected;<br>&gt; &gt;*** Attempting to diagnose the problem.<br>&gt; &gt; ***<br>&gt; &gt;*** Use !poolval fffffa8006d73000 for more details.<br>&gt; &gt; ***<br>&gt; &gt;<br>&gt; &gt; Pool page [fffffa8006d73000] is __inVALID.<br>&gt; &gt;<br>&gt; &gt; Analyzing linked list...<br>&gt; &gt;<br>&gt; &gt;<br>&gt; &gt; Scanning for single bit errors...<br>&gt; &gt;<br>&gt; &gt; None found<br>&gt; &gt;<br>&gt; &gt; 1: kd&gt; !poolval fffffa8006d73000<br>&gt; &gt; Pool page fffffa8006d73000 region is Paged pool<br>&gt; &gt;<br>&gt; &gt; Validating Pool headers for pool page: fffffa8006d73000<br>&gt; &gt;<br>&gt; &gt; Pool page [fffffa8006d73000] is__inVALID.<br>&gt; &gt;<br>&gt; &gt; Analyzing linked list...<br>&gt; &gt;<br>&gt; &gt;<br>&gt; &gt; Scanning for single bit errors...<br>&gt; &gt;<br>&gt; &gt; None found<br>&gt; &gt;<br>&gt; &gt; 1: kd&gt; !pte fffffa8006d73000<br>&gt; &gt; VA fffffa8006d73000<br>&gt; &gt; PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at <br>&gt; &gt; FFFFF6FB7EA001B0<br>&gt; PTE at FFFFF6FD40036B98<br>&gt; &gt; contains 0000000002256863 contains 000000007EF85863 contains<br>&gt; 000000002818A863 contains 0029F99C00000000<br>&gt; &gt; pfn 2256 ---DA--KWEV pfn 7ef85 ---DA--KWEV pfn<br>&gt; 2818a ---DA--KWEV<br>&gt; not valid<br>&gt; &gt; PageFile: 0<br>&gt; &gt; Offset: 29f99c<br>&gt; &gt; Protect: 0<br>&gt; &gt;<br>&gt; &gt;<br>&gt; &gt; I will be watching this thread carefully, so please post any questions <br>&gt; &gt; you<br>&gt; have so that I may help out any way I can as soon as I can. I'll retain <br>&gt; the<br>&gt; crash dump as a seperate copy to work on (prevent overwrite incase of <br>&gt; another<br>&gt; crash). Please let me know of any other commands you would like me to run <br>&gt; on<br>&gt; the crash dump from WinDbg, and I'll post the feedback ASAP.<br>&gt; &gt;<br>&gt; &gt; Once again, thank-you for any help at all, I'm at my wits end with this <br>&gt; &gt; BSoD,<br>&gt; it's been three months and still no luck solving it. Apologies for the <br>&gt; length<br>&gt; of the post, I'm trying to be very comprehensive to give as much <br>&gt; information as<br>&gt; I can.<br>&gt; &gt;<br>&gt; &gt; Thanks in advance,<br>&gt; &gt;<br>&gt; &gt; -SDL<br>&gt; &gt;<br>&gt;<br>&gt;<br><xxxxx> wrote in message news:xxxxx@ntdev...<br>&gt; Hello everyone,<br>&gt;<br>&gt; Firstly, I'd like to apologise if I am doing anything wrong or breaking <br>&gt; any rules by posting here; I am not a driver developer, or even a <br>&gt; programmer, but just a power user/sysadmin experiencing a BSoD on a <br>&gt; Windows Server 2003 box that I can not seem to resolve. I have been <br>&gt; experiencing this crash for about 3 months now, so I'm posting here as <br>&gt; something of a last resort (I wasn't sure if I should post here, so tried <br>&gt; many other resources first). Any help however would be greatly <br>&gt; appreciated, as I am at a total loss. Just let me know if I shouldn't be <br>&gt; posting here, and I won't bother you again.<br>&gt;<br>&gt; As for the crash, the system in question is a Windows Server 2003, <br>&gt; Enterprise x64 Edition, R2 box, with all of the latest updates from <br>&gt; Microsoft installed. The system has very new drivers installed for all <br>&gt; components, if not the latest.<br>&gt;<br>&gt; A rundown of the core hardware in the machine:<br>&gt;***ASUS A8N32-SLI Deluxe Motherboard<br>&gt; ***AMD Athlon 64 X2 Dual-Core 4200+<br>&gt;*** Kingston DDR-400 2GB<br>&gt; ***NVIDIA GeForce 7800GT Graphics Card<br>&gt;*** SoundBlaster Audigy 4 Sound Card<br>&gt;<br>&gt; The current system configuration relevant to the crash is as follows:<br>&gt; ***The system is set for Complete Memory Dumps in the event of a BSoD.<br>&gt;*** The system is running Driver Verifier with the Default Options; this <br>&gt; amounts to all options enabled except for the following: Enhanced I/O <br>&gt; verification, Low resources simulation, Disk integrity checking<br>&gt; ***I have not noted any change in the actual BSoD messages since turning <br>&gt; on Driver Verifier a few months ago<br>&gt;<br>&gt; The circumstances in which the crash occurs is somewhat random:<br>&gt;*** The crash almost certainly has something to do with media players, as I <br>&gt; am a devout Winamp user, and it is usually running when I am at the <br>&gt; machine, and the BSoD _always_ listed winamp.exe as the responsible <br>&gt; process. However, just a few minutes ago, the system died, and it was as I <br>&gt; was closing Windows Media Player v.10. This leads me to the conclusion it <br>&gt; is media player related.<br>&gt; ***I often need to use WinImage for the creation and modification of <br>&gt; floppy disk images, and have noted WinImage often seems to cause the <br>&gt; crash, as the system seems to BSoD when I am closing the WinImage program <br>&gt; (once again, random, I can run WinImage tens if not hundreds of time <br>&gt; before it occurs), however, Winamp is still listed as the causing process. <br>&gt; Does this point to WinImage being something of a catalyst?<br>&gt;<br>&gt; Things I have tried to narrow down the cause of the crash:<br>&gt;***Disable Audigy 4 soundcard in device manager, hence, disabling drivers <br>&gt; (no effect)<br>&gt; ***With above, use onboard sound card (AC'97) and latest drivers (no <br>&gt; effect)<br>&gt;***Disable nView (NVIDIA multi-display and virtual-display functionality) <br>&gt; (no effect)<br>&gt; And others, which I can't remember right now, regardless, they didn't fix <br>&gt; the problem<br>&gt;<br>&gt; Also worth noting, is that the crash can be very random, a few days ago I <br>&gt; managed to get the system to stay up for 7days despite continual use of <br>&gt; Winamp and occassional use of WinImage without a crash. It eventually <br>&gt; crashed as it was approaching 8days uptime. This was during the time I had <br>&gt; the Audigy4 disabled and was using the AC'97 audio. Usually, the system <br>&gt; will crash within 2-3days of reboot.<br>&gt;<br>&gt; Below is the result output from loading the latest crash dump into WinDbg <br>&gt; (this crash is somewhat unique in that Windows Media Player caused it, <br>&gt; Winamp was not running at the time, but had been run in the same session <br>&gt; previously). I have performed an !analyze -v and a few other simple <br>&gt; commands to provide what I hope is a useful starting point. Please <br>&gt; remember I am not a developer, and all of this is sadly well out of my <br>&gt; realm of expertise, so I can't really interpret this very well (many parts <br>&gt; not at all), despite some reading up on it.<br>&gt;<br>&gt; Microsoft (R) Windows Debugger Version 6.6.0007.5<br>&gt; Copyright (c) Microsoft Corporation. All rights reserved.<br>&gt;<br>&gt;<br>&gt; Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete Memory.dmp]<br>&gt; Kernel Complete Dump File: Full address space is available<br>&gt;<br>&gt; Symbol search path is: SRV*C:\Program Files\Debugging Tools for Windows <br>&gt; 64-bit\symbols*http://msdl.microsoft.com/download/symbols<br>&gt;<br>&gt; Executable search path is:<br>&gt; Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs) Free <br>&gt; x64<br>&gt; Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS<br>&gt; Built by: 3790.srv03_sp1_gdr.060315-1609<br>&gt; Kernel base = 0xfffff80001000000 PsLoadedModuleList = 0xfffff800011d60c0<br>&gt; Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)<br>&gt; System Uptime: 1 days 16:13:16.334<br>&gt; Loading Kernel Symbols<br>&gt; .......................................................................................................................................................................<br>&gt; Loading User Symbols<br>&gt; .....<br>&gt; Loading unloaded module list<br>&gt; .................<br>&gt; Loading Wow64 Symbols<br>&gt; ......................................................<br>&gt; *******************************************************************************<br>&gt; * <br>&gt; *<br>&gt; * Bugcheck Analysis <br>&gt; *<br>&gt; * <br>&gt; *<br>&gt;******************************************************************************* <br>&gt;<br>&gt; Use !analyze -v to get detailed debugging information.<br>&gt;<br>&gt; BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}<br>&gt;<br>&gt; Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )<br>&gt;<br>&gt; Followup: MachineOwner<br>&gt; ---------<br>&gt;<br>&gt; 1: kd&gt; !analyze -v<br>&gt; *******************************************************************************<br>&gt; * <br>&gt; *<br>&gt; * Bugcheck Analysis <br>&gt; *<br>&gt; * <br>&gt; *<br>&gt;******************************************************************************* <br>&gt;<br>&gt; PAGE_FAULT_IN_NONPAGED_AREA (50)<br>&gt; Invalid system memory was referenced. This cannot be protected by <br>&gt; try-except,<br>&gt; it must be protected by a Probe. Typically the address is just plain bad <br>&gt; or it<br>&gt; is pointing at freed memory.<br>&gt; Arguments:<br>&gt; Arg1: fffffa8006d73000, memory referenced.<br>&gt; Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.<br>&gt; Arg3: fffff97fff177fd4, If non-zero, the instruction address which <br>&gt; referenced the bad memory<br>&gt; address.<br>&gt; Arg4: 0000000000000000, (reserved)<br>&gt;<br>&gt; Debugging Details:<br>&gt; ------------------<br>&gt;<br>&gt;<br>&gt; READ_ADDRESS: fffffa8006d73000 Paged pool<br>&gt;<br>&gt; FAULTING_IP:<br>&gt; win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
>
> MM_INTERNAL_CODE: 0
>
> IMAGE_NAME: win32k.sys
>
> DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e
>
> MODULE_NAME: win32k
>
> FAULTING_MODULE: fffff97fff000000 win32k
>
> DEFAULT_BUCKET_ID: DRIVER_FAULT
>
> BUGCHECK_STR: 0x50
>
> PROCESS_NAME: wmplayer.exe
>
> CURRENT_IRQL: 1
>
> TRAP_FRAME: fffffadfbfdd1bb0 – (.trap fffffadfbfdd1bb0)
> NOTE: The trap frame does not contain all registers.
> Some register values may be zeroed.
> rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0
> rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
> rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0
> r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000
> r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000
> r14=0000000000000000 r15=0000000000000000
> iopl=0 nv up ei pl zr na po nc
> win32k!NtUserfnINDEVICECHANGE+0x1bb:
> fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h] <br>&gt; ds:e30a:7385=????????<br>&gt; Resetting default scope<br>&gt;<br>&gt; LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890<br>&gt;<br>&gt; STACK_TEXT:<br>&gt; fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050 fffffa8006d73000 <br>&gt; 0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx<br>&gt; fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d 0000000078b9b308 <br>&gt; fadfcb4449580400 fffff8000102de7c : nt!MmAccessFault+0xa22<br>&gt; fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000 000000000365e8f0 <br>&gt; 0000000000000000 000000000000002c : nt!KiPageFault+0x119<br>&gt; fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90 00000000000603ac <br>&gt; 000000000000002c fffffa8006d72fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb<br>&gt; fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8 0000000000000000 <br>&gt; fffff6fb7dbed000 fffff6fd40005fa8 : win32k!NtUserMessageCall+0x142<br>&gt; fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512 0074006e006f0043 <br>&gt; 0053006c006f0072 0043005c00740065 : nt!KiSystemServiceCopyEnd+0x3<br>&gt; 000000000365d6d8 0000000078bac512 : 0074006e006f0043 0053006c006f0072 <br>&gt; 0043005c00740065 0000000078b823a9 : wow64win!NtUserMessageCall+0xa<br>&gt; 000000000365d6e0 0000000078bbfddf : 0000000000000000 0000000078ba0b08 <br>&gt; 0000000078b9f460 0000000000000219 : <br>&gt; wow64win!whNT32NtUserMessageCallCB+0x32<br>&gt; 000000000365d730 0000000078bac647 : 000000007efa6000 000000007efa4000 <br>&gt; 0000000000000000 000000007efa6000 : wow64win!Wow64DoMessageThunk+0xaf<br>&gt; 000000000365d790 0000000078be6866 : 000000000361f710 000000000361f74c <br>&gt; 000000007efa6000 000000007efa4000 : wow64win!whNtUserMessageCall+0x127<br>&gt; 000000000365d820 0000000078b83c7d : 0000000000000000 0000000000000000 <br>&gt; 000000000365e8f0 000000007efa4800 : wow64!Wow64SystemServiceEx+0xd6<br>&gt; 000000000365e0e0 0000000078be6a5a : 000000000365e6d0 000000000000001c <br>&gt; 000000000365e8b0 0000000000000038 : wow64cpu!ServiceNoTurbo+0x28<br>&gt; 000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c 535c53574f444e49 <br>&gt; 5c3436574f577379 6c642e6970617370 : wow64!RunCpuSimulation+0xa<br>&gt; 000000000365e1a0 0000000078ba61c5 : 0000000000000000 0000000000000000 <br>&gt; 0000000000000103 000000007efdf000 : <br>&gt; wow64!Wow64KiUserCallbackDispatcher+0x114<br>&gt; 000000000365e4e0 0000000078ef39ff : 0000000000020019 fffffadffa794bf0 <br>&gt; 000000000361ff20 fffffadfbfdd2c70 : wow64win!whcbfnINDEVICECHANGE+0x195<br>&gt; 000000000365e6d0 0000000078bc5dca : 0000000078bac464 0000000000020019 <br>&gt; 0000000078bee47c 000000000365e808 : <br>&gt; ntdll!KiUserCallbackDispatcherContinue<br>&gt; 000000000365e7c8 0000000078bac464 : 0000000000020019 0000000078bee47c <br>&gt; 000000000365e808 000000000361fc30 : wow64win!NtUserGetMessage+0xa<br>&gt; 000000000365e7d0 0000000078be6866 : 000000000361f9ac 000000000361fb24 <br>&gt; 000000000361ff08 000000007efa4000 : wow64win!whNtUserGetMessage+0x34<br>&gt; 000000000365e830 0000000078b83c7d : 0000000000189744 000000000000000c <br>&gt; 0000000000000000 000000000361ff44 : wow64!Wow64SystemServiceEx+0xd6<br>&gt; 000000000365f0f0 0000000000000000 : fffffa800576e010 fffff800010551fb <br>&gt; fffffadfbfdd26e0 0000000000008006 : wow64cpu!ServiceNoTurbo+0x28<br>&gt;<br>&gt;<br>&gt; STACK_COMMAND: kb<br>&gt;<br>&gt; FOLLOWUP_IP:<br>&gt; win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
>
> SYMBOL_STACK_INDEX: 3
>
> FOLLOWUP_NAME: MachineOwner
>
> SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb
>
> FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> Followup: MachineOwner
> ---------
>
> 1: kd> !pool fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
> fffffa8006d73000 is not a valid small pool allocation, checking large
> pool…
> fffffa8006d73000 is not a valid large pool allocation, checking large
> session pool…
> fffffa8006d73000 is freed (or corrupt) pool
> Bad allocation size @fffffa8006d73000, too large
>
>
>
An error (or corruption) in the pool was detected;
> Attempting to diagnose the problem.
>

> Use !poolval fffffa8006d73000 for more details.
>

>
> Pool page [fffffa8006d73000] is __inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !poolval fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
>
> Validating Pool headers for pool page: fffffa8006d73000
>
> Pool page [fffffa8006d73000] is__inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !pte fffffa8006d73000
> VA fffffa8006d73000
> PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at
> FFFFF6FB7EA001B0 PTE at FFFFF6FD40036B98
> contains 0000000002256863 contains 000000007EF85863 contains
> 000000002818A863 contains 0029F99C00000000
> pfn 2256 —DA–KWEV pfn 7ef85 —DA–KWEV pfn
> 2818a —DA–KWEV
> not valid
> PageFile: 0
> Offset: 29f99c
> Protect: 0
>
>
> I will be watching this thread carefully, so please post any questions you
> have so that I may help out any way I can as soon as I can. I’ll retain
> the crash dump as a seperate copy to work on (prevent overwrite incase of
> another crash). Please let me know of any other commands you would like me
> to run on the crash dump from WinDbg, and I’ll post the feedback ASAP.
>
> Once again, thank-you for any help at all, I’m at my wits end with this
> BSoD, it’s been three months and still no luck solving it. Apologies for
> the length of the post, I’m trying to be very comprehensive to give as
> much information as I can.
>
> Thanks in advance,
>
> -SDL
>

Ouch. Three months. Got any hair left?

-----Original Message-----
From: xxxxx@lists.osr.com
[mailto:xxxxx@lists.osr.com] On Behalf Of Samuel Leslie
Sent: Friday, January 05, 2007 11:43 AM
To: Windows System Software Devs Interest List
Subject: Re:[ntdev] BSoD -> 0x50

Hello everyone,

Firstly, thank-you for all your replies, I appreciate the help :slight_smile:

In other news, I believe I have nailed the problem! Shortly after my
first
post, I thought “stuff it”, and enabled every option in Driver Verifier
except low resource simulation for every driver on the system. Shortly
after, I started getting Driver Verifier BSOD’s pointing to kernel
memory
corruption. Analysis of this new BSOD in WinDbg appears to have revealed
the
culprit: The Logitech Mouse Driver.

It appears that the Logitech mouse driver was creating a few bytes of
memory
corruption randomly whenever a certain “clean-up” call was made. The
offending driver has since been removed, and everything is stable so
far.
Hopefully that’s the end to three months of painful troubleshooting…

I suspect you will hear from me again in all likeliness if the problem
arises again in the coming days :slight_smile:

Thanks again,

-SDL

“Maxim S. Shatskih” wrote in message
news:…
> Is it a random BSOD? or is it always the same?
>
> –
> Maxim Shatskih, Windows DDK MVP
> StorageCraft Corporation
> xxxxx@storagecraft.com
> http://www.storagecraft.com
>
> wrote in message news:xxxxx@ntdev…
> > Hello everyone,
> >
> > Firstly, I’d like to apologise if I am doing anything wrong or
breaking
> > any
> rules by posting here; I am not a driver developer, or even a
programmer,
> but
> just a power user/sysadmin experiencing a BSoD on a Windows Server
2003
> box
> that I can not seem to resolve. I have been experiencing this crash
for
> about 3
> months now, so I’m posting here as something of a last resort (I
wasn’t
> sure if
> I should post here, so tried many other resources first). Any help
however
> would be greatly appreciated, as I am at a total loss. Just let me
know if
> I
> shouldn’t be posting here, and I won’t bother you again.
> >
> > As for the crash, the system in question is a Windows Server 2003,
> > Enterprise
> x64 Edition, R2 box, with all of the latest updates from Microsoft
> installed.
> The system has very new drivers installed for all components, if not
the
> latest.
> >
> > A rundown of the core hardware in the machine:
> > ASUS A8N32-SLI Deluxe Motherboard
> >
AMD Athlon 64 X2 Dual-Core 4200+
> > Kingston DDR-400 2GB
> >
NVIDIA GeForce 7800GT Graphics Card
> > SoundBlaster Audigy 4 Sound Card
> >
> > The current system configuration relevant to the crash is as
follows:
> >
The system is set for Complete Memory Dumps in the event of a
BSoD.
> > The system is running Driver Verifier with the Default Options;
this
> amounts to all options enabled except for the following: Enhanced I/O
> verification, Low resources simulation, Disk integrity checking
> >
I have not noted any change in the actual BSoD messages since
turning
> > on
> Driver Verifier a few months ago
> >
> > The circumstances in which the crash occurs is somewhat random:
> > The crash almost certainly has something to do with media
players, as
> > I am
> a devout Winamp user, and it is usually running when I am at the
machine,
> and
> the BSoD always listed winamp.exe as the responsible process.
However,
> just a
> few minutes ago, the system died, and it was as I was closing Windows
> Media
> Player v.10. This leads me to the conclusion it is media player
related.
> >
I often need to use WinImage for the creation and modification of

> > floppy
> disk images, and have noted WinImage often seems to cause the crash,
as
> the
> system seems to BSoD when I am closing the WinImage program (once
again,
> random, I can run WinImage tens if not hundreds of time before it
occurs),
> however, Winamp is still listed as the causing process. Does this
point to
> WinImage being something of a catalyst?
> >
> > Things I have tried to narrow down the cause of the crash:
> > Disable Audigy 4 soundcard in device manager, hence, disabling
> > drivers (no
> effect)
> >With above, use onboard sound card (AC’97) and latest drivers (no

> > effect)
> > Disable nView (NVIDIA multi-display and virtual-display
> > functionality) (no
> effect)
> > And others, which I can’t remember right now, regardless, they
didn’t
> > fix the
> problem
> >
> > Also worth noting, is that the crash can be very random, a few days
ago
> > I
> managed to get the system to stay up for 7days despite continual use
of
> Winamp
> and occassional use of WinImage without a crash. It eventually crashed
as
> it
> was approaching 8days uptime. This was during the time I had the
Audigy4
> disabled and was using the AC’97 audio. Usually, the system will crash

> within
> 2-3days of reboot.
> >
> > Below is the result output from loading the latest crash dump into
> > WinDbg
> (this crash is somewhat unique in that Windows Media Player caused it,

> Winamp
> was not running at the time, but had been run in the same session
> previously).
> I have performed an !analyze -v and a few other simple commands to
provide
> what
> I hope is a useful starting point. Please remember I am not a
developer,
> and
> all of this is sadly well out of my realm of expertise, so I can’t
really
> interpret this very well (many parts not at all), despite some reading
up
> on
> it.
> >
> > Microsoft (R) Windows Debugger Version 6.6.0007.5
> > Copyright (c) Microsoft Corporation. All rights reserved.
> >
> >
> > Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete
Memory.dmp]
> > Kernel Complete Dump File: Full address space is available
> >
> > Symbol search path is: SRV
C:\Program Files\Debugging Tools for
Windows
> 64-bit\symbols
http://msdl.microsoft.com/download/symbols
> >
> > Executable search path is:
> > Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2
procs)
> > Free
> x64
> > Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS
> > Built by: 3790.srv03_sp1_gdr.060315-1609
> > Kernel base = 0xfffff80001000000 PsLoadedModuleList = <br>&gt; &gt; 0xfffff800011d60c0
> > Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)
> > System Uptime: 1 days 16:13:16.334
> > Loading Kernel Symbols
> >
>


>


> …
> > Loading User Symbols
> > …
> > Loading unloaded module list
> > …
> > Loading Wow64 Symbols
> > …
> >
>


> >
>
> > * Bugcheck Analysis
>
> >
>
> >
>


> >
> > Use !analyze -v to get detailed debugging information.
> >
> > BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}
> >
> > Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb
)
> >
> > Followup: MachineOwner
> > ---------
> >
> > 1: kd> !analyze -v
> >
>
***

> >
>
> > * Bugcheck Analysis
>
> >
>
> >
>


> >
> > PAGE_FAULT_IN_NONPAGED_AREA (50)
> > Invalid system memory was referenced. This cannot be protected by
> try-except,
> > it must be protected by a Probe. Typically the address is just
plain
> > bad or
> it
> > is pointing at freed memory.
> > Arguments:
> > Arg1: fffffa8006d73000, memory referenced.
> > Arg2: 0000000000000000, value 0 = read operation, 1 = write
operation.
> > Arg3: fffff97fff177fd4, If non-zero, the instruction address which
> > referenced
> the bad memory
> > address.
> > Arg4: 0000000000000000, (reserved)
> >
> > Debugging Details:
> > ------------------
> >
> >
> > READ_ADDRESS: fffffa8006d73000 Paged pool
> >
> > FAULTING_IP:
> > win32k!NtUserfnINDEVICECHANGE+1bb
> > fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]<br>&gt; &gt;<br>&gt; &gt; MM_INTERNAL_CODE: 0<br>&gt; &gt;<br>&gt; &gt; IMAGE_NAME: win32k.sys<br>&gt; &gt;<br>&gt; &gt; DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e<br>&gt; &gt;<br>&gt; &gt; MODULE_NAME: win32k<br>&gt; &gt;<br>&gt; &gt; FAULTING_MODULE: fffff97fff000000 win32k<br>&gt; &gt;<br>&gt; &gt; DEFAULT_BUCKET_ID: DRIVER_FAULT<br>&gt; &gt;<br>&gt; &gt; BUGCHECK_STR: 0x50<br>&gt; &gt;<br>&gt; &gt; PROCESS_NAME: wmplayer.exe<br>&gt; &gt;<br>&gt; &gt; CURRENT_IRQL: 1<br>&gt; &gt;<br>&gt; &gt; TRAP_FRAME: fffffadfbfdd1bb0 -- (.trap fffffadfbfdd1bb0)<br>&gt; &gt; NOTE: The trap frame does not contain all registers.<br>&gt; &gt; Some register values may be zeroed.<br>&gt; &gt; rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0<br>&gt; &gt; rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000<br>&gt; &gt; rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0<br>&gt; &gt; r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000<br>&gt; &gt; r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000<br>&gt; &gt; r14=0000000000000000 r15=0000000000000000<br>&gt; &gt; iopl=0 nv up ei pl zr na po nc<br>&gt; &gt; win32k!NtUserfnINDEVICECHANGE+0x1bb:<br>&gt; &gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
> ds:e30a:7385=???
> > Resetting default scope
> >
> > LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890
> >
> > STACK_TEXT:
> > fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050 <br>&gt; &gt; fffffa8006d73000
> 0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx
> > fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d <br>&gt; &gt; 0000000078b9b308
> fadfcb4449580400 fffff8000102de7c : nt!MmAccessFault+0xa22
> > fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000 <br>&gt; &gt; 000000000365e8f0
> 0000000000000000 000000000000002c : nt!KiPageFault+0x119
> > fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90 <br>&gt; &gt; 00000000000603ac
> 000000000000002c fffffa8006d72fd0 :
win32k!NtUserfnINDEVICECHANGE+0x1bb
> > fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8 <br>&gt; &gt; 0000000000000000
> fffff6fb7dbed000 fffff6fd40005fa8 : win32k!NtUserMessageCall+0x142
> > fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512 <br>&gt; &gt; 0074006e006f0043
> 0053006c006f0072 0043005c00740065 : nt!KiSystemServiceCopyEnd+0x3
> > 000000000365d6d8 0000000078bac512 : 0074006e006f0043 <br>&gt; &gt; 0053006c006f0072
> 0043005c00740065 0000000078b823a9 : wow64win!NtUserMessageCall+0xa
> > 000000000365d6e0 0000000078bbfddf : 0000000000000000 <br>&gt; &gt; 0000000078ba0b08
> 0000000078b9f460 0000000000000219 :
> wow64win!whNT32NtUserMessageCallCB+0x32
> > 000000000365d730 0000000078bac647 : 000000007efa6000 <br>&gt; &gt; 000000007efa4000
> 0000000000000000 000000007efa6000 :
wow64win!Wow64DoMessageThunk+0xaf
> > 000000000365d790 0000000078be6866 : 000000000361f710 <br>&gt; &gt; 000000000361f74c
> 000000007efa6000 000000007efa4000 :
wow64win!whNtUserMessageCall+0x127
> > 000000000365d820 0000000078b83c7d : 0000000000000000 <br>&gt; &gt; 0000000000000000
> 000000000365e8f0 000000007efa4800 : wow64!Wow64SystemServiceEx+0xd6
> > 000000000365e0e0 0000000078be6a5a : 000000000365e6d0 <br>&gt; &gt; 000000000000001c
> 000000000365e8b0 0000000000000038 : wow64cpu!ServiceNoTurbo+0x28
> > 000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c <br>&gt; &gt; 535c53574f444e49
> 5c3436574f577379 6c642e6970617370 : wow64!RunCpuSimulation+0xa
> > 000000000365e1a0 0000000078ba61c5 : 0000000000000000 <br>&gt; &gt; 0000000000000000
> 0000000000000103 000000007efdf000 :
> wow64!Wow64KiUserCallbackDispatcher+0x114
> > 000000000365e4e0 0000000078ef39ff : 0000000000020019 <br>&gt; &gt; fffffadffa794bf0
> 000000000361ff20 fffffadfbfdd2c70 :
wow64win!whcbfnINDEVICECHANGE+0x195
> > 000000000365e6d0 0000000078bc5dca : 0000000078bac464 <br>&gt; &gt; 0000000000020019
> 0000000078bee47c 000000000365e808 :
> ntdll!KiUserCallbackDispatcherContinue
> > 000000000365e7c8 0000000078bac464 : 0000000000020019 <br>&gt; &gt; 0000000078bee47c
> 000000000365e808 000000000361fc30 : wow64win!NtUserGetMessage+0xa
> > 000000000365e7d0 0000000078be6866 : 000000000361f9ac <br>&gt; &gt; 000000000361fb24
> 000000000361ff08 000000007efa4000 : wow64win!whNtUserGetMessage+0x34
> > 000000000365e830 0000000078b83c7d : 0000000000189744 <br>&gt; &gt; 000000000000000c
> 0000000000000000 000000000361ff44 : wow64!Wow64SystemServiceEx+0xd6
> > 000000000365f0f0 0000000000000000 : fffffa800576e010 <br>&gt; &gt; fffff800010551fb
> fffffadfbfdd26e0 0000000000008006 : wow64cpu!ServiceNoTurbo+0x28
> >
> >
> > STACK_COMMAND: kb
> >
> > FOLLOWUP_IP:
> > win32k!NtUserfnINDEVICECHANGE+1bb
> > fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]<br>&gt; &gt;<br>&gt; &gt; SYMBOL_STACK_INDEX: 3<br>&gt; &gt;<br>&gt; &gt; FOLLOWUP_NAME: MachineOwner<br>&gt; &gt;<br>&gt; &gt; SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; &gt;<br>&gt; &gt; FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; &gt;<br>&gt; &gt; BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; &gt;<br>&gt; &gt; Followup: MachineOwner<br>&gt; &gt; ---------<br>&gt; &gt;<br>&gt; &gt; 1: kd&gt; !pool fffffa8006d73000<br>&gt; &gt; Pool page fffffa8006d73000 region is Paged pool<br>&gt; &gt; fffffa8006d73000 is not a valid small pool allocation, checking<br>large <br>&gt; &gt; pool...<br>&gt; &gt; fffffa8006d73000 is not a valid large pool allocation, checking<br>large <br>&gt; &gt; session<br>&gt; pool...<br>&gt; &gt; fffffa8006d73000 is freed (or corrupt) pool<br>&gt; &gt; Bad allocation size @fffffa8006d73000, too large<br>&gt; &gt;<br>&gt; &gt;***<br>&gt; &gt; ***An error (or corruption) in the pool was detected;<br>&gt; &gt;*** Attempting to diagnose the problem.<br>&gt; &gt; ***<br>&gt; &gt;*** Use !poolval fffffa8006d73000 for more details.<br>&gt; &gt; ***<br>&gt; &gt;<br>&gt; &gt; Pool page [fffffa8006d73000] is __inVALID.<br>&gt; &gt;<br>&gt; &gt; Analyzing linked list...<br>&gt; &gt;<br>&gt; &gt;<br>&gt; &gt; Scanning for single bit errors...<br>&gt; &gt;<br>&gt; &gt; None found<br>&gt; &gt;<br>&gt; &gt; 1: kd&gt; !poolval fffffa8006d73000<br>&gt; &gt; Pool page fffffa8006d73000 region is Paged pool<br>&gt; &gt;<br>&gt; &gt; Validating Pool headers for pool page: fffffa8006d73000<br>&gt; &gt;<br>&gt; &gt; Pool page [fffffa8006d73000] is__inVALID.<br>&gt; &gt;<br>&gt; &gt; Analyzing linked list...<br>&gt; &gt;<br>&gt; &gt;<br>&gt; &gt; Scanning for single bit errors...<br>&gt; &gt;<br>&gt; &gt; None found<br>&gt; &gt;<br>&gt; &gt; 1: kd&gt; !pte fffffa8006d73000<br>&gt; &gt; VA fffffa8006d73000<br>&gt; &gt; PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at <br>&gt; &gt; FFFFF6FB7EA001B0<br>&gt; PTE at FFFFF6FD40036B98<br>&gt; &gt; contains 0000000002256863 contains 000000007EF85863 contains<br>&gt; 000000002818A863 contains 0029F99C00000000<br>&gt; &gt; pfn 2256 ---DA--KWEV pfn 7ef85 ---DA--KWEV pfn<br>&gt; 2818a ---DA--KWEV<br>&gt; not valid<br>&gt; &gt; PageFile:<br>0<br>&gt; &gt; Offset:<br>29f99c<br>&gt; &gt; Protect: 0<br>&gt; &gt;<br>&gt; &gt;<br>&gt; &gt; I will be watching this thread carefully, so please post any<br>questions <br>&gt; &gt; you<br>&gt; have so that I may help out any way I can as soon as I can. I'll<br>retain <br>&gt; the<br>&gt; crash dump as a seperate copy to work on (prevent overwrite incase of <br>&gt; another<br>&gt; crash). Please let me know of any other commands you would like me to<br>run <br>&gt; on<br>&gt; the crash dump from WinDbg, and I'll post the feedback ASAP.<br>&gt; &gt;<br>&gt; &gt; Once again, thank-you for any help at all, I'm at my wits end with<br>this <br>&gt; &gt; BSoD,<br>&gt; it's been three months and still no luck solving it. Apologies for the<br><br>&gt; length<br>&gt; of the post, I'm trying to be very comprehensive to give as much <br>&gt; information as<br>&gt; I can.<br>&gt; &gt;<br>&gt; &gt; Thanks in advance,<br>&gt; &gt;<br>&gt; &gt; -SDL<br>&gt; &gt;<br>&gt;<br>&gt;<br><xxxxx> wrote in message news:xxxxx@ntdev...<br>&gt; Hello everyone,<br>&gt;<br>&gt; Firstly, I'd like to apologise if I am doing anything wrong or<br>breaking <br>&gt; any rules by posting here; I am not a driver developer, or even a <br>&gt; programmer, but just a power user/sysadmin experiencing a BSoD on a <br>&gt; Windows Server 2003 box that I can not seem to resolve. I have been <br>&gt; experiencing this crash for about 3 months now, so I'm posting here as<br><br>&gt; something of a last resort (I wasn't sure if I should post here, so<br>tried <br>&gt; many other resources first). Any help however would be greatly <br>&gt; appreciated, as I am at a total loss. Just let me know if I shouldn't<br>be <br>&gt; posting here, and I won't bother you again.<br>&gt;<br>&gt; As for the crash, the system in question is a Windows Server 2003, <br>&gt; Enterprise x64 Edition, R2 box, with all of the latest updates from <br>&gt; Microsoft installed. The system has very new drivers installed for all<br><br>&gt; components, if not the latest.<br>&gt;<br>&gt; A rundown of the core hardware in the machine:<br>&gt;***ASUS A8N32-SLI Deluxe Motherboard<br>&gt; ***AMD Athlon 64 X2 Dual-Core 4200+<br>&gt;*** Kingston DDR-400 2GB<br>&gt; ***NVIDIA GeForce 7800GT Graphics Card<br>&gt;*** SoundBlaster Audigy 4 Sound Card<br>&gt;<br>&gt; The current system configuration relevant to the crash is as follows:<br>&gt; ***The system is set for Complete Memory Dumps in the event of a BSoD.<br>&gt;*** The system is running Driver Verifier with the Default Options;<br>this <br>&gt; amounts to all options enabled except for the following: Enhanced I/O <br>&gt; verification, Low resources simulation, Disk integrity checking<br>&gt; ***I have not noted any change in the actual BSoD messages since<br>turning <br>&gt; on Driver Verifier a few months ago<br>&gt;<br>&gt; The circumstances in which the crash occurs is somewhat random:<br>&gt;*** The crash almost certainly has something to do with media players,<br>as I <br>&gt; am a devout Winamp user, and it is usually running when I am at the <br>&gt; machine, and the BSoD _always_ listed winamp.exe as the responsible <br>&gt; process. However, just a few minutes ago, the system died, and it was<br>as I <br>&gt; was closing Windows Media Player v.10. This leads me to the conclusion<br>it <br>&gt; is media player related.<br>&gt; ***I often need to use WinImage for the creation and modification of <br>&gt; floppy disk images, and have noted WinImage often seems to cause the <br>&gt; crash, as the system seems to BSoD when I am closing the WinImage<br>program <br>&gt; (once again, random, I can run WinImage tens if not hundreds of time <br>&gt; before it occurs), however, Winamp is still listed as the causing<br>process. <br>&gt; Does this point to WinImage being something of a catalyst?<br>&gt;<br>&gt; Things I have tried to narrow down the cause of the crash:<br>&gt;***Disable Audigy 4 soundcard in device manager, hence, disabling<br>drivers <br>&gt; (no effect)<br>&gt; ***With above, use onboard sound card (AC'97) and latest drivers (no <br>&gt; effect)<br>&gt;***Disable nView (NVIDIA multi-display and virtual-display<br>functionality) <br>&gt; (no effect)<br>&gt; And others, which I can't remember right now, regardless, they didn't<br>fix <br>&gt; the problem<br>&gt;<br>&gt; Also worth noting, is that the crash can be very random, a few days<br>ago I <br>&gt; managed to get the system to stay up for 7days despite continual use<br>of <br>&gt; Winamp and occassional use of WinImage without a crash. It eventually <br>&gt; crashed as it was approaching 8days uptime. This was during the time I<br>had <br>&gt; the Audigy4 disabled and was using the AC'97 audio. Usually, the<br>system <br>&gt; will crash within 2-3days of reboot.<br>&gt;<br>&gt; Below is the result output from loading the latest crash dump into<br>WinDbg <br>&gt; (this crash is somewhat unique in that Windows Media Player caused it,<br><br>&gt; Winamp was not running at the time, but had been run in the same<br>session <br>&gt; previously). I have performed an !analyze -v and a few other simple <br>&gt; commands to provide what I hope is a useful starting point. Please <br>&gt; remember I am not a developer, and all of this is sadly well out of my<br><br>&gt; realm of expertise, so I can't really interpret this very well (many<br>parts <br>&gt; not at all), despite some reading up on it.<br>&gt;<br>&gt; Microsoft (R) Windows Debugger Version 6.6.0007.5<br>&gt; Copyright (c) Microsoft Corporation. All rights reserved.<br>&gt;<br>&gt;<br>&gt; Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete<br>Memory.dmp]<br>&gt; Kernel Complete Dump File: Full address space is available<br>&gt;<br>&gt; Symbol search path is: SRV*C:\Program Files\Debugging Tools for<br>Windows <br>&gt; 64-bit\symbols*http://msdl.microsoft.com/download/symbols<br>&gt;<br>&gt; Executable search path is:<br>&gt; Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs)<br>Free <br>&gt; x64<br>&gt; Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS<br>&gt; Built by: 3790.srv03_sp1_gdr.060315-1609<br>&gt; Kernel base = 0xfffff80001000000 PsLoadedModuleList =
0xfffff800011d60c0<br>&gt; Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)<br>&gt; System Uptime: 1 days 16:13:16.334<br>&gt; Loading Kernel Symbols<br>&gt;<br>........................................................................<br>........................................................................<br>.......................<br>&gt; Loading User Symbols<br>&gt; .....<br>&gt; Loading unloaded module list<br>&gt; .................<br>&gt; Loading Wow64 Symbols<br>&gt; ......................................................<br>&gt;<br> ************************************************************************<br>******* <br>&gt; * <br>&gt; *<br>&gt; * Bugcheck Analysis <br>&gt; *<br>&gt; * <br>&gt; *<br>&gt;<br> ************************************************************************<br>******* <br>&gt;<br>&gt; Use !analyze -v to get detailed debugging information.<br>&gt;<br>&gt; BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}<br>&gt;<br>&gt; Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )<br>&gt;<br>&gt; Followup: MachineOwner<br>&gt; ---------<br>&gt;<br>&gt; 1: kd&gt; !analyze -v<br>&gt;<br> ************************************************************************<br>******* <br>&gt; * <br>&gt; *<br>&gt; * Bugcheck Analysis <br>&gt; *<br>&gt; * <br>&gt; *<br>&gt;<br> ************************************************************************<br>******* <br>&gt;<br>&gt; PAGE_FAULT_IN_NONPAGED_AREA (50)<br>&gt; Invalid system memory was referenced. This cannot be protected by <br>&gt; try-except,<br>&gt; it must be protected by a Probe. Typically the address is just plain<br>bad <br>&gt; or it<br>&gt; is pointing at freed memory.<br>&gt; Arguments:<br>&gt; Arg1: fffffa8006d73000, memory referenced.<br>&gt; Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.<br>&gt; Arg3: fffff97fff177fd4, If non-zero, the instruction address which <br>&gt; referenced the bad memory<br>&gt; address.<br>&gt; Arg4: 0000000000000000, (reserved)<br>&gt;<br>&gt; Debugging Details:<br>&gt; ------------------<br>&gt;<br>&gt;<br>&gt; READ_ADDRESS: fffffa8006d73000 Paged pool<br>&gt;<br>&gt; FAULTING_IP:<br>&gt; win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
>
> MM_INTERNAL_CODE: 0
>
> IMAGE_NAME: win32k.sys
>
> DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e
>
> MODULE_NAME: win32k
>
> FAULTING_MODULE: fffff97fff000000 win32k
>
> DEFAULT_BUCKET_ID: DRIVER_FAULT
>
> BUGCHECK_STR: 0x50
>
> PROCESS_NAME: wmplayer.exe
>
> CURRENT_IRQL: 1
>
> TRAP_FRAME: fffffadfbfdd1bb0 – (.trap fffffadfbfdd1bb0)
> NOTE: The trap frame does not contain all registers.
> Some register values may be zeroed.
> rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0
> rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000
> rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0
> r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000
> r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000
> r14=0000000000000000 r15=0000000000000000
> iopl=0 nv up ei pl zr na po nc
> win32k!NtUserfnINDEVICECHANGE+0x1bb:
> fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h] <br>&gt; ds:e30a:7385=????????<br>&gt; Resetting default scope<br>&gt;<br>&gt; LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890<br>&gt;<br>&gt; STACK_TEXT:<br>&gt; fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050
fffffa8006d73000 <br>&gt; 0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx<br>&gt; fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d
0000000078b9b308 <br>&gt; fadfcb4449580400 fffff8000102de7c : nt!MmAccessFault+0xa22<br>&gt; fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000
000000000365e8f0 <br>&gt; 0000000000000000 000000000000002c : nt!KiPageFault+0x119<br>&gt; fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90
00000000000603ac <br>&gt; 000000000000002c fffffa8006d72fd0 :<br>win32k!NtUserfnINDEVICECHANGE+0x1bb<br>&gt; fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8
0000000000000000 <br>&gt; fffff6fb7dbed000 fffff6fd40005fa8 : win32k!NtUserMessageCall+0x142<br>&gt; fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512
0074006e006f0043 <br>&gt; 0053006c006f0072 0043005c00740065 : nt!KiSystemServiceCopyEnd+0x3<br>&gt; 000000000365d6d8 0000000078bac512 : 0074006e006f0043
0053006c006f0072 <br>&gt; 0043005c00740065 0000000078b823a9 : wow64win!NtUserMessageCall+0xa<br>&gt; 000000000365d6e0 0000000078bbfddf : 0000000000000000
0000000078ba0b08 <br>&gt; 0000000078b9f460 0000000000000219 : <br>&gt; wow64win!whNT32NtUserMessageCallCB+0x32<br>&gt; 000000000365d730 0000000078bac647 : 000000007efa6000
000000007efa4000 <br>&gt; 0000000000000000 000000007efa6000 :<br>wow64win!Wow64DoMessageThunk+0xaf<br>&gt; 000000000365d790 0000000078be6866 : 000000000361f710
000000000361f74c <br>&gt; 000000007efa6000 000000007efa4000 :<br>wow64win!whNtUserMessageCall+0x127<br>&gt; 000000000365d820 0000000078b83c7d : 0000000000000000
0000000000000000 <br>&gt; 000000000365e8f0 000000007efa4800 : wow64!Wow64SystemServiceEx+0xd6<br>&gt; 000000000365e0e0 0000000078be6a5a : 000000000365e6d0
000000000000001c <br>&gt; 000000000365e8b0 0000000000000038 : wow64cpu!ServiceNoTurbo+0x28<br>&gt; 000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c
535c53574f444e49 <br>&gt; 5c3436574f577379 6c642e6970617370 : wow64!RunCpuSimulation+0xa<br>&gt; 000000000365e1a0 0000000078ba61c5 : 0000000000000000
0000000000000000 <br>&gt; 0000000000000103 000000007efdf000 : <br>&gt; wow64!Wow64KiUserCallbackDispatcher+0x114<br>&gt; 000000000365e4e0 0000000078ef39ff : 0000000000020019
fffffadffa794bf0 <br>&gt; 000000000361ff20 fffffadfbfdd2c70 :<br>wow64win!whcbfnINDEVICECHANGE+0x195<br>&gt; 000000000365e6d0 0000000078bc5dca : 0000000078bac464
0000000000020019 <br>&gt; 0000000078bee47c 000000000365e808 : <br>&gt; ntdll!KiUserCallbackDispatcherContinue<br>&gt; 000000000365e7c8 0000000078bac464 : 0000000000020019
0000000078bee47c <br>&gt; 000000000365e808 000000000361fc30 : wow64win!NtUserGetMessage+0xa<br>&gt; 000000000365e7d0 0000000078be6866 : 000000000361f9ac
000000000361fb24 <br>&gt; 000000000361ff08 000000007efa4000 : wow64win!whNtUserGetMessage+0x34<br>&gt; 000000000365e830 0000000078b83c7d : 0000000000189744
000000000000000c <br>&gt; 0000000000000000 000000000361ff44 : wow64!Wow64SystemServiceEx+0xd6<br>&gt; 000000000365f0f0 0000000000000000 : fffffa800576e010
fffff800010551fb <br>&gt; fffffadfbfdd26e0 0000000000008006 : wow64cpu!ServiceNoTurbo+0x28<br>&gt;<br>&gt;<br>&gt; STACK_COMMAND: kb<br>&gt;<br>&gt; FOLLOWUP_IP:<br>&gt; win32k!NtUserfnINDEVICECHANGE+1bb<br>&gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
>
> SYMBOL_STACK_INDEX: 3
>
> FOLLOWUP_NAME: MachineOwner
>
> SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb
>
> FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> Followup: MachineOwner
> ---------
>
> 1: kd> !pool fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
> fffffa8006d73000 is not a valid small pool allocation, checking large
> pool…
> fffffa8006d73000 is not a valid large pool allocation, checking large
> session pool…
> fffffa8006d73000 is freed (or corrupt) pool
> Bad allocation size @fffffa8006d73000, too large
>
>
>
An error (or corruption) in the pool was detected;
> Attempting to diagnose the problem.
>

> Use !poolval fffffa8006d73000 for more details.
>

>
> Pool page [fffffa8006d73000] is __inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !poolval fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
>
> Validating Pool headers for pool page: fffffa8006d73000
>
> Pool page [fffffa8006d73000] is__inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !pte fffffa8006d73000
> VA fffffa8006d73000
> PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at
> FFFFF6FB7EA001B0 PTE at FFFFF6FD40036B98
> contains 0000000002256863 contains 000000007EF85863 contains
> 000000002818A863 contains 0029F99C00000000
> pfn 2256 —DA–KWEV pfn 7ef85 —DA–KWEV pfn
> 2818a —DA–KWEV
> not valid
> PageFile: 0
> Offset:
29f99c
> Protect: 0
>
>
> I will be watching this thread carefully, so please post any questions
you
> have so that I may help out any way I can as soon as I can. I’ll
retain
> the crash dump as a seperate copy to work on (prevent overwrite incase
of
> another crash). Please let me know of any other commands you would
like me
> to run on the crash dump from WinDbg, and I’ll post the feedback ASAP.
>
> Once again, thank-you for any help at all, I’m at my wits end with
this
> BSoD, it’s been three months and still no luck solving it. Apologies
for
> the length of the post, I’m trying to be very comprehensive to give as

> much information as I can.
>
> Thanks in advance,
>
> -SDL
>


Questions? First check the Kernel Driver FAQ at
http://www.osronline.com/article.cfm?id=256

To unsubscribe, visit the List Server section of OSR Online at
http://www.osronline.com/page.cfm?name=ListServer

Let’s just say I’ve developed a bald spot :wink:

wrote in message news:xxxxx@ntdev…
> Hello everyone,
>
> Firstly, I’d like to apologise if I am doing anything wrong or breaking
> any rules by posting here; I am not a driver developer, or even a
> programmer, but just a power user/sysadmin experiencing a BSoD on a
> Windows Server 2003 box that I can not seem to resolve. I have been
> experiencing this crash for about 3 months now, so I’m posting here as
> something of a last resort (I wasn’t sure if I should post here, so tried
> many other resources first). Any help however would be greatly
> appreciated, as I am at a total loss. Just let me know if I shouldn’t be
> posting here, and I won’t bother you again.
>
> As for the crash, the system in question is a Windows Server 2003,
> Enterprise x64 Edition, R2 box, with all of the latest updates from
> Microsoft installed. The system has very new drivers installed for all
> components, if not the latest.
>
> A rundown of the core hardware in the machine:
> ASUS A8N32-SLI Deluxe Motherboard
>
AMD Athlon 64 X2 Dual-Core 4200+
> Kingston DDR-400 2GB
>
NVIDIA GeForce 7800GT Graphics Card
> SoundBlaster Audigy 4 Sound Card
>
> The current system configuration relevant to the crash is as follows:
>
The system is set for Complete Memory Dumps in the event of a BSoD.
> The system is running Driver Verifier with the Default Options; this
> amounts to all options enabled except for the following: Enhanced I/O
> verification, Low resources simulation, Disk integrity checking
>
I have not noted any change in the actual BSoD messages since turning
> on Driver Verifier a few months ago
>
> The circumstances in which the crash occurs is somewhat random:
> The crash almost certainly has something to do with media players, as I
> am a devout Winamp user, and it is usually running when I am at the
> machine, and the BSoD always listed winamp.exe as the responsible
> process. However, just a few minutes ago, the system died, and it was as I
> was closing Windows Media Player v.10. This leads me to the conclusion it
> is media player related.
>
I often need to use WinImage for the creation and modification of
> floppy disk images, and have noted WinImage often seems to cause the
> crash, as the system seems to BSoD when I am closing the WinImage program
> (once again, random, I can run WinImage tens if not hundreds of time
> before it occurs), however, Winamp is still listed as the causing process.
> Does this point to WinImage being something of a catalyst?
>
> Things I have tried to narrow down the cause of the crash:
> Disable Audigy 4 soundcard in device manager, hence, disabling drivers
> (no effect)
>With above, use onboard sound card (AC’97) and latest drivers (no
> effect)
> Disable nView (NVIDIA multi-display and virtual-display functionality)
> (no effect)
> And others, which I can’t remember right now, regardless, they didn’t fix
> the problem
>
> Also worth noting, is that the crash can be very random, a few days ago I
> managed to get the system to stay up for 7days despite continual use of
> Winamp and occassional use of WinImage without a crash. It eventually
> crashed as it was approaching 8days uptime. This was during the time I had
> the Audigy4 disabled and was using the AC’97 audio. Usually, the system
> will crash within 2-3days of reboot.
>
> Below is the result output from loading the latest crash dump into WinDbg
> (this crash is somewhat unique in that Windows Media Player caused it,
> Winamp was not running at the time, but had been run in the same session
> previously). I have performed an !analyze -v and a few other simple
> commands to provide what I hope is a useful starting point. Please
> remember I am not a developer, and all of this is sadly well out of my
> realm of expertise, so I can’t really interpret this very well (many parts
> not at all), despite some reading up on it.
>
> Microsoft (R) Windows Debugger Version 6.6.0007.5
> Copyright (c) Microsoft Corporation. All rights reserved.
>
>
> Loading Dump File [V:\My Stuff\Windows Memory Dumps\Complete Memory.dmp]
> Kernel Complete Dump File: Full address space is available
>
> Symbol search path is: SRV
C:\Program Files\Debugging Tools for Windows
> 64-bit\symbols
http://msdl.microsoft.com/download/symbols
>
> Executable search path is:
> Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs) Free
> x64
> Product: LanManNt, suite: Enterprise TerminalServer SingleUserTS
> Built by: 3790.srv03_sp1_gdr.060315-1609
> Kernel base = 0xfffff80001000000 PsLoadedModuleList = 0xfffff800011d60c0
> Debug session time: Wed Jan 3 12:32:49.481 2007 (GMT+11)
> System Uptime: 1 days 16:13:16.334
> Loading Kernel Symbols
> …
> Loading User Symbols
> …
> Loading unloaded module list
> …
> Loading Wow64 Symbols
> …
>
************************************************************************
> *
> *
> * Bugcheck Analysis
> *
> *
> *
>
>
> Use !analyze -v to get detailed debugging information.
>
> BugCheck 50, {fffffa8006d73000, 0, fffff97fff177fd4, 0}
>
> Probably caused by : win32k.sys ( win32k!NtUserfnINDEVICECHANGE+1bb )
>
> Followup: MachineOwner
> ---------
>
> 1: kd> !analyze -v
>

> *
> *
> * Bugcheck Analysis
> *
> *
> *
> ****************************************************************************
>
> PAGE_FAULT_IN_NONPAGED_AREA (50)
> Invalid system memory was referenced. This cannot be protected by
> try-except,
> it must be protected by a Probe. Typically the address is just plain bad
> or it
> is pointing at freed memory.
> Arguments:
> Arg1: fffffa8006d73000, memory referenced.
> Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
> Arg3: fffff97fff177fd4, If non-zero, the instruction address which
> referenced the bad memory
> address.
> Arg4: 0000000000000000, (reserved)
>
> Debugging Details:
> ------------------
>
>
> READ_ADDRESS: fffffa8006d73000 Paged pool
>
> FAULTING_IP:
> win32k!NtUserfnINDEVICECHANGE+1bb
> fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]<br>&gt;<br>&gt; MM_INTERNAL_CODE: 0<br>&gt;<br>&gt; IMAGE_NAME: win32k.sys<br>&gt;<br>&gt; DEBUG_FLR_IMAGE_TIMESTAMP: 43446f9e<br>&gt;<br>&gt; MODULE_NAME: win32k<br>&gt;<br>&gt; FAULTING_MODULE: fffff97fff000000 win32k<br>&gt;<br>&gt; DEFAULT_BUCKET_ID: DRIVER_FAULT<br>&gt;<br>&gt; BUGCHECK_STR: 0x50<br>&gt;<br>&gt; PROCESS_NAME: wmplayer.exe<br>&gt;<br>&gt; CURRENT_IRQL: 1<br>&gt;<br>&gt; TRAP_FRAME: fffffadfbfdd1bb0 -- (.trap fffffadfbfdd1bb0)<br>&gt; NOTE: The trap frame does not contain all registers.<br>&gt; Some register values may be zeroed.<br>&gt; rax=0000000000000000 rbx=0000000000008006 rcx=fffffa8006d72fd0<br>&gt; rdx=0000000000000016 rsi=0000000076647355 rdi=fffff97fff000000<br>&gt; rip=fffff97fff177fd4 rsp=fffffadfbfdd1d40 rbp=000000000365e8f0<br>&gt; r8=0000000000000000 r9=fffffa8006d72fd0 r10=000002cc00000000<br>&gt; r11=fffffa8006d72fd0 r12=0000000000000000 r13=0000000000000000<br>&gt; r14=0000000000000000 r15=0000000000000000<br>&gt; iopl=0 nv up ei pl zr na po nc<br>&gt; win32k!NtUserfnINDEVICECHANGE+0x1bb:<br>&gt; fffff97fff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
> ds:e30a:7385=???
> Resetting default scope
>
> LAST_CONTROL_TRANSFER: from fffff800010b25d8 to fffff8000104e890
>
> STACK_TEXT:
> fffffadfbfdd1ad8 fffff800010b25d8 : 0000000000000050 fffffa8006d73000
> 0000000000000000 fffffadfbfdd1bb0 : nt!KeBugCheckEx
> fffffadfbfdd1ae0 fffff8000104d499 : 00000000002ba29d 0000000078b9b308
> fadfcb4449580400 fffff8000102de7c : nt!MmAccessFault+0xa22
> fffffadfbfdd1bb0 fffff97fff177fd4 : 0000000000000000 000000000365e8f0
> 0000000000000000 000000000000002c : nt!KiPageFault+0x119
> fffffadfbfdd1d40 fffff97fff0a6701 : fffff97ff7c95a90 00000000000603ac
> 000000000000002c fffffa8006d72fd0 : win32k!NtUserfnINDEVICECHANGE+0x1bb
> fffffadfbfdd1de0 fffff8000104e37d : fffffa8000be7dc8 0000000000000000
> fffff6fb7dbed000 fffff6fd40005fa8 : win32k!NtUserMessageCall+0x142
> fffffadfbfdd1e80 0000000078bc5dda : 0000000078bac512 0074006e006f0043
> 0053006c006f0072 0043005c00740065 : nt!KiSystemServiceCopyEnd+0x3
> 000000000365d6d8 0000000078bac512 : 0074006e006f0043 0053006c006f0072
> 0043005c00740065 0000000078b823a9 : wow64win!NtUserMessageCall+0xa
> 000000000365d6e0 0000000078bbfddf : 0000000000000000 0000000078ba0b08
> 0000000078b9f460 0000000000000219 :
> wow64win!whNT32NtUserMessageCallCB+0x32
> 000000000365d730 0000000078bac647 : 000000007efa6000 000000007efa4000
> 0000000000000000 000000007efa6000 : wow64win!Wow64DoMessageThunk+0xaf
> 000000000365d790 0000000078be6866 : 000000000361f710 000000000361f74c
> 000000007efa6000 000000007efa4000 : wow64win!whNtUserMessageCall+0x127
> 000000000365d820 0000000078b83c7d : 0000000000000000 0000000000000000
> 000000000365e8f0 000000007efa4800 : wow64!Wow64SystemServiceEx+0xd6
> 000000000365e0e0 0000000078be6a5a : 000000000365e6d0 000000000000001c
> 000000000365e8b0 0000000000000038 : wow64cpu!ServiceNoTurbo+0x28
> 000000000365e170 0000000078be97f4 : 575c3a435c3f3f5c 535c53574f444e49
> 5c3436574f577379 6c642e6970617370 : wow64!RunCpuSimulation+0xa
> 000000000365e1a0 0000000078ba61c5 : 0000000000000000 0000000000000000
> 0000000000000103 000000007efdf000 :
> wow64!Wow64KiUserCallbackDispatcher+0x114
> 000000000365e4e0 0000000078ef39ff : 0000000000020019 fffffadffa794bf0
> 000000000361ff20 fffffadfbfdd2c70 : wow64win!whcbfnINDEVICECHANGE+0x195
> 000000000365e6d0 0000000078bc5dca : 0000000078bac464 0000000000020019
> 0000000078bee47c 000000000365e808 :
> ntdll!KiUserCallbackDispatcherContinue
> 000000000365e7c8 0000000078bac464 : 0000000000020019 0000000078bee47c
> 000000000365e808 000000000361fc30 : wow64win!NtUserGetMessage+0xa
> 000000000365e7d0 0000000078be6866 : 000000000361f9ac 000000000361fb24
> 000000000361ff08 000000007efa4000 : wow64win!whNtUserGetMessage+0x34
> 000000000365e830 0000000078b83c7d : 0000000000189744 000000000000000c
> 0000000000000000 000000000361ff44 : wow64!Wow64SystemServiceEx+0xd6
> 000000000365f0f0 0000000000000000 : fffffa800576e010 fffff800010551fb
> fffffadfbfdd26e0 0000000000008006 : wow64cpu!ServiceNoTurbo+0x28
>
>
> STACK_COMMAND: kb
>
> FOLLOWUP_IP:
> win32k!NtUserfnINDEVICECHANGE+1bb
> fffff97f`ff177fd4 8b4630 mov eax,dword ptr [rsi+30h]
>
> SYMBOL_STACK_INDEX: 3
>
> FOLLOWUP_NAME: MachineOwner
>
> SYMBOL_NAME: win32k!NtUserfnINDEVICECHANGE+1bb
>
> FAILURE_BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> BUCKET_ID: X64_0x50_VRF_win32k!NtUserfnINDEVICECHANGE+1bb
>
> Followup: MachineOwner
> ---------
>
> 1: kd> !pool fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
> fffffa8006d73000 is not a valid small pool allocation, checking large
> pool…
> fffffa8006d73000 is not a valid large pool allocation, checking large
> session pool…
> fffffa8006d73000 is freed (or corrupt) pool
> Bad allocation size @fffffa8006d73000, too large
>
>

> An error (or corruption) in the pool was detected;
>
Attempting to diagnose the problem.
>
>
Use !poolval fffffa8006d73000 for more details.
> ***
>
> Pool page [fffffa8006d73000] is __inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !poolval fffffa8006d73000
> Pool page fffffa8006d73000 region is Paged pool
>
> Validating Pool headers for pool page: fffffa8006d73000
>
> Pool page [fffffa8006d73000] is__inVALID.
>
> Analyzing linked list…
>
>
> Scanning for single bit errors…
>
> None found
>
> 1: kd> !pte fffffa8006d73000
> VA fffffa8006d73000
> PXE @ FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at
> FFFFF6FB7EA001B0 PTE at FFFFF6FD40036B98
> contains 0000000002256863 contains 000000007EF85863 contains
> 000000002818A863 contains 0029F99C00000000
> pfn 2256 —DA–KWEV pfn 7ef85 —DA–KWEV pfn
> 2818a —DA–KWEV
> not valid
> PageFile: 0
> Offset: 29f99c
> Protect: 0
>
>
> I will be watching this thread carefully, so please post any questions you
> have so that I may help out any way I can as soon as I can. I’ll retain
> the crash dump as a seperate copy to work on (prevent overwrite incase of
> another crash). Please let me know of any other commands you would like me
> to run on the crash dump from WinDbg, and I’ll post the feedback ASAP.
>
> Once again, thank-you for any help at all, I’m at my wits end with this
> BSoD, it’s been three months and still no luck solving it. Apologies for
> the length of the post, I’m trying to be very comprehensive to give as
> much information as I can.
>
> Thanks in advance,
>
> -SDL
>