J
JoelRajan
Hi,
I am running into BSOD even after windows reset, below are the details from the debugger.
Microsoft (R) Windows Debugger Version 10.0.19041.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\083020-11812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\websymbols*Symbol information
Symbol search path is: SRV*c:\websymbols*Symbol information
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7b000000 PsLoadedModuleList = 0xfffff805`7bc2a2f0
Debug session time: Sun Aug 30 20:37:43.491 2020 (UTC + 5:30)
System Uptime: 1 days 23:54:56.136
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
12: kd>
12: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff9c834be02100, Address of the heap that reported the corruption
Arg3: ffff9c835574f000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 8
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on LAPTOP-PA3K0ACO
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 14
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffff9c834be02100
BUGCHECK_P3: ffff9c835574f000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff8057bcfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057bc0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8057bc0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9c835574f000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd186`edfdf428 fffff805`7b59c2c8 : 00000000`0000013a 00000000`00000012 ffff9c83`4be02100 ffff9c83`5574f000 : nt!KeBugCheckEx
ffffd186`edfdf430 fffff805`7b59c328 : 00000000`00000012 ffffd186`edfdf540 ffff9c83`4be02100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
ffffd186`edfdf470 fffff805`7b59bf55 : ffff9c83`5574f000 ffff9c83`4be02280 ffff9c83`4be02280 fffff805`7b23c6b7 : nt!RtlpHpHeapHandleError+0x58
ffffd186`edfdf4a0 fffff805`7b41866c : ffff9c83`557f3710 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffd186`edfdf4d0 fffff805`7b240c04 : ffff9093`00000000 ffff9c83`541e6770 00000000`00000004 00000000`00000000 : nt!RtlpHpVsContextFree+0x1d657c
ffffd186`edfdf570 fffff805`7b9c2019 : 00000000`00006b40 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffd186`edfdf650 fffff805`7f5b5676 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
ffffd186`edfdf680 fffff805`7f5b2a5b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Wdf01000!FxPoolFree+0x3e [minkernel\wdf\framework\shared\object\wdfpool.cpp @ 456]
ffffd186`edfdf6c0 fffff805`7f5c66a8 : 00000000`00000000 ffff9c83`557f4558 ffffd186`edfdf7f8 fffff805`aff80500 : Wdf01000!FxObject::Release+0x11b [minkernel\wdf\framework\shared\inc\private\common\fxobject.hpp @ 881]
ffffd186`edfdf710 fffff805`aff28312 : ffff9c83`557f4210 00000000`0000000f ffffd186`edfdf7b8 ffff9c83`557f4558 : Wdf01000!imp_WdfObjectDereferenceActual+0x48 [minkernel\wdf\framework\shared\object\fxobjectapi.cpp @ 118]
ffffd186`edfdf750 fffff805`aff27f6b : 00000000`0000000f 00000000`00000000 00000000`0000001f fffff805`aff269c8 : USBXHCI!ESM_RunStateMachine+0x372
ffffd186`edfdf7b0 fffff805`aff5592d : ffff9c83`541b73e0 00000000`00000000 ffff9c83`557cd830 00000000`00000004 : USBXHCI!ESM_AddEvent+0xfb
ffffd186`edfdf7f0 fffff805`aff51c1c : ffff9c83`53f7bce0 00000000`00000000 00000000`00000000 fffff805`affc762f : USBXHCI!DeviceSlot_ControllerResetPreReset+0x61
ffffd186`edfdf820 fffff805`aff537d8 : ffff9c83`53cf10d0 fffff805`aff72901 00000000`ebe40011 0000637c`ac30efd8 : USBXHCI!Controller_InternalReset+0x124
ffffd186`edfdf880 fffff805`affdd5d1 : 00000000`00000000 00000000`00000000 00000000`00000050 00000000`000005fa : USBXHCI!Controller_UcxEvtReset+0x58
ffffd186`edfdf8e0 fffff805`affc757a : 00000000`ebe40011 00000000`00000000 00000000`00000004 00000000`00000000 : ucx01000!ControllerResetStateEntryFunc_CallHCDToReset1+0x11
ffffd186`edfdf910 fffff805`affdc777 : 00000000`00000002 fffff805`aff72998 fffff805`aff80460 ffff9c83`53ef6d60 : ucx01000!StateMachineEngine_EventAdd+0x26a
ffffd186`edfdf970 fffff805`aff5190c : 00000000`00000002 fffff805`aff72998 fffff805`aff80460 00000000`00000000 : ucx01000!UcxControllerNeedsReset+0x37
ffffd186`edfdf9a0 fffff805`aff52fa7 : ffff9c83`53ef6d60 ffffd186`edfdfa80 ffff9c83`53ef6d60 ffffd186`edfdfa80 : USBXHCI!Controller_InitiateRecovery+0x16c
ffffd186`edfdfa40 fffff805`7f5bc6a7 : ffff9c83`53ef6c60 ffff9c83`00000006 00000000`00000006 00000000`00000000 : USBXHCI!Controller_TelemetryReportWorker+0x317
ffffd186`edfdfac0 fffff805`7b2d9d75 : ffff9c83`53f91100 00000000`00000000 ffff9c83`5400d6d0 fffff805`7f5bc5c0 : Wdf01000!FxWorkItem::WorkItemThunk+0xe7 [minkernel\wdf\framework\shared\core\fxworkitem.cpp @ 431]
ffffd186`edfdfb00 fffff805`7b233f45 : ffff9c83`6f09e040 ffff9c83`6f09e040 fffff805`7b2d9c40 00000000`00000000 : nt!IopProcessWorkItem+0x135
ffffd186`edfdfb70 fffff805`7b346745 : ffff9c83`6f09e040 00000000`00000080 ffff9c83`4c527100 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffd186`edfdfc10 fffff805`7b3e5598 : ffff8c01`14ce2180 ffff9c83`6f09e040 fffff805`7b3466f0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffd186`edfdfc60 00000000`00000000 : ffffd186`edfe0000 ffffd186`edfda000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.450
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}
Followup: Pool_corruption
---------
12: kd>
Implicit thread is now ffff9c83`6f09e040
Continue reading...
I am running into BSOD even after windows reset, below are the details from the debugger.
Microsoft (R) Windows Debugger Version 10.0.19041.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\083020-11812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\websymbols*Symbol information
Symbol search path is: SRV*c:\websymbols*Symbol information
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7b000000 PsLoadedModuleList = 0xfffff805`7bc2a2f0
Debug session time: Sun Aug 30 20:37:43.491 2020 (UTC + 5:30)
System Uptime: 1 days 23:54:56.136
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
12: kd>
12: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff9c834be02100, Address of the heap that reported the corruption
Arg3: ffff9c835574f000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 8
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on LAPTOP-PA3K0ACO
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 14
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffff9c834be02100
BUGCHECK_P3: ffff9c835574f000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff8057bcfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057bc0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8057bc0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9c835574f000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd186`edfdf428 fffff805`7b59c2c8 : 00000000`0000013a 00000000`00000012 ffff9c83`4be02100 ffff9c83`5574f000 : nt!KeBugCheckEx
ffffd186`edfdf430 fffff805`7b59c328 : 00000000`00000012 ffffd186`edfdf540 ffff9c83`4be02100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
ffffd186`edfdf470 fffff805`7b59bf55 : ffff9c83`5574f000 ffff9c83`4be02280 ffff9c83`4be02280 fffff805`7b23c6b7 : nt!RtlpHpHeapHandleError+0x58
ffffd186`edfdf4a0 fffff805`7b41866c : ffff9c83`557f3710 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffd186`edfdf4d0 fffff805`7b240c04 : ffff9093`00000000 ffff9c83`541e6770 00000000`00000004 00000000`00000000 : nt!RtlpHpVsContextFree+0x1d657c
ffffd186`edfdf570 fffff805`7b9c2019 : 00000000`00006b40 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffd186`edfdf650 fffff805`7f5b5676 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
ffffd186`edfdf680 fffff805`7f5b2a5b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Wdf01000!FxPoolFree+0x3e [minkernel\wdf\framework\shared\object\wdfpool.cpp @ 456]
ffffd186`edfdf6c0 fffff805`7f5c66a8 : 00000000`00000000 ffff9c83`557f4558 ffffd186`edfdf7f8 fffff805`aff80500 : Wdf01000!FxObject::Release+0x11b [minkernel\wdf\framework\shared\inc\private\common\fxobject.hpp @ 881]
ffffd186`edfdf710 fffff805`aff28312 : ffff9c83`557f4210 00000000`0000000f ffffd186`edfdf7b8 ffff9c83`557f4558 : Wdf01000!imp_WdfObjectDereferenceActual+0x48 [minkernel\wdf\framework\shared\object\fxobjectapi.cpp @ 118]
ffffd186`edfdf750 fffff805`aff27f6b : 00000000`0000000f 00000000`00000000 00000000`0000001f fffff805`aff269c8 : USBXHCI!ESM_RunStateMachine+0x372
ffffd186`edfdf7b0 fffff805`aff5592d : ffff9c83`541b73e0 00000000`00000000 ffff9c83`557cd830 00000000`00000004 : USBXHCI!ESM_AddEvent+0xfb
ffffd186`edfdf7f0 fffff805`aff51c1c : ffff9c83`53f7bce0 00000000`00000000 00000000`00000000 fffff805`affc762f : USBXHCI!DeviceSlot_ControllerResetPreReset+0x61
ffffd186`edfdf820 fffff805`aff537d8 : ffff9c83`53cf10d0 fffff805`aff72901 00000000`ebe40011 0000637c`ac30efd8 : USBXHCI!Controller_InternalReset+0x124
ffffd186`edfdf880 fffff805`affdd5d1 : 00000000`00000000 00000000`00000000 00000000`00000050 00000000`000005fa : USBXHCI!Controller_UcxEvtReset+0x58
ffffd186`edfdf8e0 fffff805`affc757a : 00000000`ebe40011 00000000`00000000 00000000`00000004 00000000`00000000 : ucx01000!ControllerResetStateEntryFunc_CallHCDToReset1+0x11
ffffd186`edfdf910 fffff805`affdc777 : 00000000`00000002 fffff805`aff72998 fffff805`aff80460 ffff9c83`53ef6d60 : ucx01000!StateMachineEngine_EventAdd+0x26a
ffffd186`edfdf970 fffff805`aff5190c : 00000000`00000002 fffff805`aff72998 fffff805`aff80460 00000000`00000000 : ucx01000!UcxControllerNeedsReset+0x37
ffffd186`edfdf9a0 fffff805`aff52fa7 : ffff9c83`53ef6d60 ffffd186`edfdfa80 ffff9c83`53ef6d60 ffffd186`edfdfa80 : USBXHCI!Controller_InitiateRecovery+0x16c
ffffd186`edfdfa40 fffff805`7f5bc6a7 : ffff9c83`53ef6c60 ffff9c83`00000006 00000000`00000006 00000000`00000000 : USBXHCI!Controller_TelemetryReportWorker+0x317
ffffd186`edfdfac0 fffff805`7b2d9d75 : ffff9c83`53f91100 00000000`00000000 ffff9c83`5400d6d0 fffff805`7f5bc5c0 : Wdf01000!FxWorkItem::WorkItemThunk+0xe7 [minkernel\wdf\framework\shared\core\fxworkitem.cpp @ 431]
ffffd186`edfdfb00 fffff805`7b233f45 : ffff9c83`6f09e040 ffff9c83`6f09e040 fffff805`7b2d9c40 00000000`00000000 : nt!IopProcessWorkItem+0x135
ffffd186`edfdfb70 fffff805`7b346745 : ffff9c83`6f09e040 00000000`00000080 ffff9c83`4c527100 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffd186`edfdfc10 fffff805`7b3e5598 : ffff8c01`14ce2180 ffff9c83`6f09e040 fffff805`7b3466f0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffd186`edfdfc60 00000000`00000000 : ffffd186`edfe0000 ffffd186`edfda000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.450
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x13a_12_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0e8bc89c-9b1f-e697-ed6c-83210db041e2}
Followup: Pool_corruption
---------
12: kd>
Implicit thread is now ffff9c83`6f09e040
Continue reading...