TechSpot

Bluescreen on windows 7 x64 Bccode 3b

By lobster1979
Jul 9, 2010
Topic Status:
Not open for further replies.
  1. Been having BSOD everytime I use RST. Can someone please tell me what this dump file is saying is causing the problem? And if possible a solution.

    ASUS p6x58d premium
    6gb corsaid pc16000
    ati radeon hd 4670
    WD hard drives installed:
    1.5tb
    1 tb
    500GB
    * 250gb re1
    * 250gb re3
    * = raid 1
    creative labs x-fi xtremegamer sound card
    windows 7 ultimate os

    Here is my latest dump file. Never had BSOD till I RMA'd my motherboard.

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\070910-25038-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*C:\Program Files\Debugging Tools for Windows (x64)\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
    Debug session time: Fri Jul 9 12:19:53.842 2010 (UTC - 4:00)
    System Uptime: 0 days 11:00:51.873
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 3B, {c0000005, fffff80002bc10bf, fffff88007c9cac0, 0}

    Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+233 )

    Followup: Pool_corruption
    ---------

    5: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002bc10bf, Address of the instruction which caused the bugcheck
    Arg3: fffff88007c9cac0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    FAULTING_IP:
    nt!ExDeferredFreePool+233
    fffff800`02bc10bf 4c395008 cmp qword ptr [rax+8],r10

    CONTEXT: fffff88007c9cac0 -- (.cxr 0xfffff88007c9cac0)
    rax=8e7c00bcd08ec033 rbx=0000000000000000 rcx=fffff80002c1c9e0
    rdx=fffffa8008be1000 rsi=0000000000000000 rdi=fffffa8008fbcb80
    rip=fffff80002bc10bf rsp=fffff88007c9d490 rbp=0000000000000000
    r8=fffffa8008ac7010 r9=fffffa8008be18f0 r10=fffffa8008be1900
    r11=0000000000000001 r12=fffff80002c1c880 r13=0000000000000000
    r14=0000000000000017 r15=0000000000000001
    iopl=0 nv up ei pl nz na pe nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
    nt!ExDeferredFreePool+0x233:
    fffff800`02bc10bf 4c395008 cmp qword ptr [rax+8],r10 ds:002b:8e7c00bc`d08ec03b=????????????????
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0x3B

    PROCESS_NAME: firefox.exe

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002bc10bf

    STACK_TEXT:
    fffff880`07c9d490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x233


    FOLLOWUP_IP:
    nt!ExDeferredFreePool+233
    fffff800`02bc10bf 4c395008 cmp qword ptr [rax+8],r10

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!ExDeferredFreePool+233

    FOLLOWUP_NAME: Pool_corruption

    IMAGE_NAME: Pool_Corruption

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    MODULE_NAME: Pool_Corruption

    STACK_COMMAND: .cxr 0xfffff88007c9cac0 ; kb

    FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+233

    BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+233

    Followup: Pool_corruption
    ---------
  2. lobster1979

    lobster1979 Newcomer, in training Topic Starter

    Here is another one from 12 hours ago...

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\070910-29109-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*C:\Program Files\Debugging Tools for Windows (x64)\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a15000 PsLoadedModuleList = 0xfffff800`02c52e50
    Debug session time: Fri Jul 9 00:20:49.620 2010 (UTC - 4:00)
    System Uptime: 0 days 0:35:46.650
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 3B, {c0000005, fffff80002bb990d, fffff8800b6dae70, 0}

    Probably caused by : ntkrnlmp.exe ( nt!ExAllocatePoolWithTag+53d )

    Followup: MachineOwner
    ---------

    6: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80002bb990d, Address of the instruction which caused the bugcheck
    Arg3: fffff8800b6dae70, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    FAULTING_IP:
    nt!ExAllocatePoolWithTag+53d
    fffff800`02bb990d 48895808 mov qword ptr [rax+8],rbx

    CONTEXT: fffff8800b6dae70 -- (.cxr 0xfffff8800b6dae70)
    rax=8e7c00bcd08ec033 rbx=fffff80002c14bc0 rcx=fffffa800c618640
    rdx=0000000000000000 rsi=0000000000001000 rdi=0000000000000000
    rip=fffff80002bb990d rsp=fffff8800b6db840 rbp=fffff80002c14880
    r8=0000000000000000 r9=fffff80002c14bc0 r10=fffff80002c14888
    r11=fffff8800b6db960 r12=0000000000000021 r13=0000000000000000
    r14=0000000000000000 r15=00000000c3504c41
    iopl=0 nv up ei pl zr na po nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
    nt!ExAllocatePoolWithTag+0x53d:
    fffff800`02bb990d 48895808 mov qword ptr [rax+8],rbx ds:002b:8e7c00bc`d08ec03b=????????????????
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0x3B

    PROCESS_NAME: explorer.exe

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002bb990d

    STACK_TEXT:
    fffff880`0b6db840 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x53d


    FOLLOWUP_IP:
    nt!ExAllocatePoolWithTag+53d
    fffff800`02bb990d 48895808 mov qword ptr [rax+8],rbx

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!ExAllocatePoolWithTag+53d

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb

    STACK_COMMAND: .cxr 0xfffff8800b6dae70 ; kb

    FAILURE_BUCKET_ID: X64_0x3B_nt!ExAllocatePoolWithTag+53d

    BUCKET_ID: X64_0x3B_nt!ExAllocatePoolWithTag+53d

    Followup: MachineOwner
    ---------
Topic Status:
Not open for further replies.


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.