Comment #29 on issue 89252 by
ionut.am...@gmail.com: BSOD when chrome closes
http://code.google.com/p/chromium/issues/detail?id=89252
I've had two bsod on chrome exit recently, so I'll just paste the dumps.
first:
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at
an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 8292582c, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'USBSTOR' and 'USBSTOR.SYS' overlap
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+215
8292582c 895f04 mov dword ptr [edi+4],ebx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
TRAP_FRAME: 8cb5b574 -- (.trap 0xffffffff8cb5b574)
ErrCode = 00000002
eax=82939adc ebx=82939408 ecx=000001ff edx=0000004d esi=829393fc
edi=00000000
eip=8292582c esp=8cb5b5e8 ebp=8cb5b620 iopl=0 nv up ei ng nz ac pe
cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010297
nt!ExDeferredFreePool+0x215:
8292582c 895f04 mov dword ptr [edi+4],ebx
ds:0023:00000004=????????
Resetting default scope
LOCK_ADDRESS: 8296b600 -- (!locks 8296b600)
Resource @ nt!PiEngineLock (0x8296b600) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be
corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be
corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0x8296b600
Thread Count : 0
Thread address: 0x00000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from 8292582c to 82884fd9
STACK_TEXT:
8cb5b574 8292582c badb0d00 0000004d 00000000 nt!KiTrap0E+0x2e1
8cb5b620 82924858 829396e0 00000001 0000003e nt!ExDeferredFreePool+0x215
8cb5b68c 9148c67f 89378340 00000000 1dfc1877 nt!ExFreePoolWithTag+0x852
WARNING: Stack unwind information not available. Following frames may be
wrong.
8cb5b6d8 9148ceec 89378340 8a280000 8804d810 aswSP+0x1267f
8cb5b6f8 829a2a8a 8804d810 87ef9000 8cb5ba80 aswSP+0x12eec
8cb5b8dc 8299ad0e 00000000 8cb5b900 8cb5b90c nt!IopLoadDriver+0x805
8cb5b920 82a0a4a4 c28c61b8 00000001 c28c61a4
nt!PipCallDriverAddDeviceQueryRoutine+0x309
8cb5b95c 82a0a8d1 8cb5ba80 8cb5b9b0 a1435000
nt!RtlpCallQueryRegistryRoutine+0x25b
8cb5b9f4 82999516 40000000 80005610 8cb5ba28 nt!RtlQueryRegistryValues+0x418
8cb5bad8 82998a49 00000000 8cb5bd00 88818140 nt!PipCallDriverAddDevice+0x2ff
8cb5bcd4 829a0f53 8702d340 88818140 8cb5bd00 nt!PipProcessDevNodeTree+0x15c
8cb5bd08 828436d2 8293913c 85310828 82969520 nt!PiProcessReenumeration+0x5d
8cb5bd44 828dce4a 00000000 00000000 85310828 nt!PnpDeviceActionWorker+0x1e7
8cb5bd7c 82a0d016 00000000 9129f93e 00000000 nt!ExpWorkerThread+0xfd
8cb5bdc0 82875efe 828dcd4d 00000001 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+215
8292582c 895f04 mov dword ptr [edi+4],ebx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+215
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+215
BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+215
Followup: Pool_corruption
---------
and second:
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 9da3de57, The address that the exception occurred at
Arg3: c814eb50, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx
referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!PFFOBJ::pPvtDataMatch+8
9da3de57 f6460804 test byte ptr [esi+8],4
TRAP_FRAME: c814eb50 -- (.trap 0xffffffffc814eb50)
ErrCode = 00000000
eax=fddfc008 ebx=00000000 ecx=c814ebd8 edx=00000000 esi=00000001
edi=c814ec14
eip=9da3de57 esp=c814ebc4 ebp=c814ebf0 iopl=0 nv up ei pl nz na po
nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010202
win32k!PFFOBJ::pPvtDataMatch+0x8:
9da3de57 f6460804 test byte ptr [esi+8],4
ds:0023:00000009=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 9d98aae8 to 9da3de57
STACK_TEXT:
c814ebc4 9d98aae8 ff31419c fddfc008 fcf9a640
win32k!PFFOBJ::pPvtDataMatch+0x8
c814ebf0 9d93fb4f fddfc008 ff31419c 881df018
win32k!PFTOBJ::bUnloadWorkhorse+0x37
c814ec1c 9d93f749 fcccb7d8 00000000 00000000
win32k!vCleanupPrivateFonts+0x4d
c814ec34 9d93bf0d fcccb7d8 00000000 00000000 win32k!NtGdiCloseProcess+0x13d
c814ec54 9d93ba4c fcccb7d8 00000000 87caeb90 win32k!GdiProcessCallout+0x145
c814ec70 82a32a58 86376788 00000000 952bc5e6 win32k!W32pProcessCallout+0x5d
c814ecdc 82a0f487 00000000 85f363a0 85f36301 nt!PspExitThread+0x4a0
c814ecf4 828cdfba 88e96a50 c814ed20 c814ed2c nt!PsExitSpecialApc+0x22
c814ed4c 82864d26 00000001 00000000 c814ed64 nt!KiDeliverApc+0x1dc
c814ed4c 778d5cd4 00000001 00000000 c814ed64 nt!KiServiceExit+0x56
WARNING: Frame IP not in any known module. Following frames may be wrong.
01e7fc6c 00000000 00000000 00000000 00000000 0x778d5cd4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!PFFOBJ::pPvtDataMatch+8
9da3de57 f6460804 test byte ptr [esi+8],4
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!PFFOBJ::pPvtDataMatch+8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51354d1b
FAILURE_BUCKET_ID: 0x8E_win32k!PFFOBJ::pPvtDataMatch+8
BUCKET_ID: 0x8E_win32k!PFFOBJ::pPvtDataMatch+8
Followup: MachineOwner
---------
I hope they'll be of some help.