Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\042711-27409-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03055000 PsLoadedModuleList = 0xfffff800`03292e50
Debug session time: Thu Apr 28 00:49:35.108 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:11.606
Loading Kernel Symbols
...............................................................
................................................
Loading User Symbols
Loading unloaded module list
..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C9, {23e, fffff88002c2d308, fffff98002484ee0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\dtsoftbus01.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dtsoftbus01.sys
*** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
Probably caused by : dtsoftbus01.sys ( dtsoftbus01+1308 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 000000000000023e, A driver has marked an IRP pending but didn't return STATUS_PENDING.
Arg2: fffff88002c2d308, The address in the driver's code where the error was detected.
Arg3: fffff98002484ee0, IRP address.
Arg4: 0000000000000000, Status code.
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'ks' and 'WUDFRd.sys' overlap
BUGCHECK_STR: 0xc9_23e
DRIVER_VERIFIER_IO_VIOLATION_TYPE: 23e
FAULTING_IP:
dtsoftbus01+1308
fffff880`02c2d308 4053 push rbx
FOLLOWUP_IP:
dtsoftbus01+1308
fffff880`02c2d308 4053 push rbx
IRP_ADDRESS: fffff98002484ee0
DEVICE_OBJECT: fffffa8005fc1c40
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 2
LOCK_ADDRESS: fffff800032c9400 -- (!locks fffff800032c9400)
Resource @ nt!PiEngineLock (0xfffff800032c9400) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff800032c9400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff800035503dc to fffff800030c5740
STACK_TEXT:
fffff880`031c39a8 fffff800`035503dc : 00000000`000000c9 00000000`0000023e fffff880`02c2d308 fffff980`02484ee0 : nt!KeBugCheckEx
fffff880`031c39b0 fffff800`0355a47a : fffff800`0354e9f0 fffff880`02c2d308 fffff980`02484ee0 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`031c39f0 fffff800`0355b34e : 00000000`0000023e 00000000`00000000 fffff980`02484ee0 00000000`ffffffff : nt!ViErrorFinishReport+0xda
fffff880`031c3a40 fffff800`0356671f : fffffa80`063cd130 fffffa80`062e81e0 fffffa80`062e8298 fffff880`02c30dbc : nt!VfErrorReport6+0x6e
fffff880`031c3b10 fffff800`03566b63 : fffffa80`062e81e0 00000000`00000002 fffffa80`05fc1c40 fffff880`02c2d3d8 : nt!IovpCallDriver2+0x13f
fffff880`031c3b70 fffff800`0356cc2e : fffff980`02484ee0 fffff980`02484ee0 00000000`00000002 fffffa80`05fc1c40 : nt!VfAfterCallDriver+0x353
fffff880`031c3bc0 fffff880`00ef70c2 : fffff880`00f707c0 fffffa80`063b0b80 00000000`00000025 fffffa80`062e81e0 : nt!IovCallDriver+0x57e
fffff880`031c3c20 fffff880`00f0c59f : fffffa80`063cf020 00000000`00000000 fffff880`00000000 fffff880`019b15d5 : Wdf01000!FxIoTarget::SubmitSync+0x24a
fffff880`031c3cd0 fffff880`019c5e95 : fffffa80`00000020 fffffa80`063cf020 fffffa80`063b0b80 00000000`00000001 : Wdf01000!imp_WdfRequestSend+0x24b
fffff880`031c3d20 fffff880`019c62f4 : 00000000`00000000 00000000`00000024 00000000`00000001 fffff880`031c3ee0 : cdrom!DeviceSendRequestSynchronously+0xc9
fffff880`031c3d80 fffff880`019c4f04 : 0000057f`f9c51fd8 fffff880`031c3ee0 fffffa80`063f8680 00000000`00000024 : cdrom!DeviceSendSrbSynchronously+0x3ec
fffff880`031c3eb0 fffff880`019c3825 : fffffa80`00000002 fffffa80`063ae390 fffff880`019bb3b8 0000057f`f9c51fd8 : cdrom!DeviceCacheDeviceInquiryData+0xbc
fffff880`031c3f80 fffff880`00f619d4 : 00000000`00000000 fffff880`00000010 00000000`0000000c fffff880`00f6a620 : cdrom!DeviceEvtSelfManagedIoInit+0x105
fffff880`031c3fc0 fffff880`00f6194e : fffffa80`06398930 00000000`0000000c fffff880`00f6a620 fffff880`00f6a600 : Wdf01000!FxSelfManagedIoMachine::Init+0x34
fffff880`031c3ff0 fffff880`00f55b9b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`00f6a620 : Wdf01000!FxSelfManagedIoMachine::ProcessEvent+0x14a
fffff880`031c4060 fffff880`00f556eb : 00000000`00000312 00000000`00000000 fffff880`00f6a600 fffff800`0327ca40 : Wdf01000!FxPkgPnp::PowerD0StartingStartSelfManagedIo+0x2f
fffff880`031c4090 fffff880`00f5538e : fffffa80`063aeb60 00000000`00000040 fffff880`00f6a3e0 00000000`00000040 : Wdf01000!FxPkgPnp::PowerEnterNewState+0x1db
fffff880`031c41c0 fffff880`00f5506c : 00000000`00000000 00000000`00000040 00000000`00000501 fffffa80`063aeb60 : Wdf01000!FxPkgPnp::PowerProcessEventInner+0x13e
fffff880`031c4230 fffff880`00f62b5e : 00000000`00000000 00000000`00000501 00000000`00000000 00000000`00000501 : Wdf01000!FxPkgPnp::PowerProcessEvent+0x1d4
fffff880`031c42c0 fffff880`00f62abb : 00000000`00000501 00000000`00000000 00000000`00000500 fffff800`0356b5ec : Wdf01000!FxPkgPnp::NotPowerPolOwnerStarting+0xe
fffff880`031c42f0 fffff880`00f5e950 : fffffa80`063aeb60 00000000`00000001 00000000`00000000 fffff880`00f66ff0 : Wdf01000!FxPkgPnp::NotPowerPolicyOwnerEnterNewState+0x1c7
fffff880`031c4370 fffff880`00f5e372 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`063b0060 : Wdf01000!FxPkgPnp::PowerPolicyProcessEventInner+0x3f8
fffff880`031c43e0 fffff880`00f5aa45 : 00000000`00000000 fffffa80`063b0060 00000000`00000108 00000000`00000000 : Wdf01000!FxPkgPnp::PowerPolicyProcessEvent+0x1e2
fffff880`031c4470 fffff880`00f5a841 : 00000000`00000101 00000000`00000108 00000000`00000108 fffff800`0000000e : Wdf01000!FxPkgPnp::PnpEventHardwareAvailable+0x111
fffff880`031c44b0 fffff880`00f5a4fe : fffffa80`063aeb60 fffff880`031c45e0 00000000`00000004 fffff880`00f69390 : Wdf01000!FxPkgPnp::PnpEnterNewState+0x1a5
fffff880`031c4520 fffff880`00f5a201 : 00000000`00000000 00000000`00000002 00000000`00000000 fffffa80`063aeb60 : Wdf01000!FxPkgPnp::PnpProcessEventInner+0x122
fffff880`031c4590 fffff880`00f51d9c : 00000000`00000000 fffffa80`063aeb60 00000000`00000002 00000000`00000000 : Wdf01000!FxPkgPnp::PnpProcessEvent+0x1b1
fffff880`031c4620 fffff880`00f50dd6 : fffffa80`053809d0 00000000`00000002 00000000`00000000 fffffa80`063aeb60 : Wdf01000!FxPkgPnp::_PnpStartDevice+0x20
fffff880`031c4650 fffff880`00f20245 : fffff980`0668ae50 fffff980`0668ae50 fffffa80`063b0060 00000000`00000000 : Wdf01000!FxPkgPnp::Dispatch+0x1b2
fffff880`031c46c0 fffff880`00f2014b : fffff880`031c47a8 fffff980`0668ae50 00000000`00000002 fffffa80`063b0060 : Wdf01000!FxDevice::Dispatch+0xa9
fffff880`031c46f0 fffff800`0356cc16 : fffff980`0668ae50 00000000`00000002 fffffa80`063b0060 fffffa80`063b0060 : Wdf01000!FxDevice::DispatchWithLock+0x93
fffff880`031c4730 fffff800`034848fe : fffff980`0668ae50 fffffa80`063f8ae0 fffffa80`063b0060 fffffa80`05191f40 : nt!IovCallDriver+0x566
fffff880`031c4790 fffff800`031bf0ed : fffffa80`05fc1c40 fffffa80`063f8ae0 fffff800`031c4d50 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`031c47d0 fffff800`0348f6e6 : fffff800`032c91c0 fffffa80`063a3010 fffffa80`063f8ae0 fffffa80`063a31b8 : nt!PnpStartDevice+0x11d
fffff880`031c4890 fffff800`0348f984 : fffffa80`063a3010 fffffa80`0359002a fffffa80`0359c350 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`031c4920 fffff800`034b2c76 : fffffa80`063a3010 fffffa80`0359c350 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`031c4950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x296
STACK_COMMAND: .bugcheck ; kb
SYMBOL_NAME: dtsoftbus01+1308
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dtsoftbus01
IMAGE_NAME: dtsoftbus01.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d2eb485
FAILURE_BUCKET_ID: X64_0xc9_23e_VRF_dtsoftbus01+1308
BUCKET_ID: X64_0xc9_23e_VRF_dtsoftbus01+1308
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\042711-25849-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032a2e50
Debug session time: Wed Apr 27 18:51:30.165 2011 (UTC - 4:00)
System Uptime: 0 days 0:38:21.289
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffffa800712c290, fffffa800713c290, fffffa800712c290}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+1175 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa800712c290, the pool entry being checked.
Arg3: fffffa800713c290, the read back flink freelist value (should be the same as 2).
Arg4: fffffa800712c290, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80003208598 to fffff800030d5740
STACK_TEXT:
fffff880`09962798 fffff800`03208598 : 00000000`00000019 00000000`00000003 fffffa80`0712c290 fffffa80`0713c290 : nt!KeBugCheckEx
fffff880`099627a0 fffff880`03eef17e : fffffa80`05e061c0 fffffa80`0619ac80 00000000`42646641 fffffa80`42646641 : nt!ExDeferredFreePool+0x1175
fffff880`09962850 fffff880`03ef28b3 : 00000000`00000000 fffffa80`05ecb4d0 fffffa80`03acece0 fffffa80`05a59010 : afd!AfdReturnBuffer+0x16e
fffff880`09962890 fffff880`01677194 : 00000000`00003488 fffffa80`03acee00 00000000`00000000 00000000`00000000 : afd!AfdTLBufferedSendComplete+0xc3
fffff880`09962930 fffff880`0167b86a : fffffa80`043e7840 fffffa80`0619b200 fffffa80`043bd201 00000000`00000000 : tcpip!TcpTcbReceive+0x4f4
fffff880`09962ae0 fffff880`0167b3b7 : fffff880`076ba9e2 00000000`00000000 00000000`00000000 fffff880`0165e700 : tcpip!TcpMatchReceive+0x1fa
fffff880`09962c30 fffff880`0165d6c7 : fffffa80`04514000 fffffa80`043e6820 fffffa80`043ecacc 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`09962ce0 fffff880`0165d799 : fffff880`09962e60 fffff880`0176b9a0 fffff880`09962e70 fffffa80`043998f0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`09962da0 fffff880`0165dc90 : fffffa80`04514000 00000000`00000000 00000000`00000000 fffff880`09962e60 : tcpip!IppProcessDeliverList+0x59
fffff880`09962e10 fffff880`0165cb21 : 00000000`0100000a fffffa80`04514000 fffff880`0176b9a0 00000000`054da001 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`09962ef0 fffff880`0165b592 : fffffa80`05320bc0 00000000`00000000 fffffa80`054da001 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`099630f0 fffff880`01674e5a : fffffa80`054da010 fffff880`09963220 fffffa80`054da010 fffff880`09960000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`099631d0 fffff800`030e4e5a : fffffa80`056c8610 fffff880`0995e000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`09963220 fffff880`01674882 : fffff880`01674d80 fffff880`09963330 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`09963300 fffff880`014cc0eb : fffffa80`054db010 00000000`00000000 fffffa80`051281a0 fffff880`014cc120 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`09963370 fffff880`01495fc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`099633e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+1175
fffff800`03208598 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+1175
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+1175
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+1175
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\042711-20155-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03246e50
Debug session time: Wed Apr 27 16:29:39.335 2011 (UTC - 4:00)
System Uptime: 0 days 3:23:13.833
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffff80003209730, fffff80003209730, fffff80003009730}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffff80003209730, the pool entry being checked.
Arg3: fffff80003209730, the read back flink freelist value (should be the same as 2).
Arg4: fffff80003009730, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Launcher.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800031acd6f to fffff80003079740
STACK_TEXT:
fffff880`07c7c748 fffff800`031acd6f : 00000000`00000019 00000000`00000003 fffff800`03209730 fffff800`03209730 : nt!KeBugCheckEx
fffff880`07c7c750 fffff800`0309a536 : fffffa80`00000000 00000000`00000018 fffffa80`03a01fd0 00000000`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`07c7c840 fffff880`01849371 : fffffa80`06c1d9d0 fffffa80`06c1db78 fffff880`07c7c900 00002000`03a01a40 : nt!ExAllocatePoolWithQuotaTag+0x56
fffff880`07c7c890 fffff880`018626ae : 00000000`00000000 fffff880`07c7c900 00000000`00000000 00000000`00000000 : afd!AfdPollGetInfo+0x21
fffff880`07c7c8d0 fffff880`01852cf5 : fffffa80`04e57c00 00000000`00000000 00000000`00000001 00000000`00000490 : afd!AfdPoll32+0xee
fffff880`07c7c9e0 fffff800`03392547 : fffffa80`061ed7f0 fffff880`07c7cca0 fffffa80`06c1dbc0 fffffa80`06c1d9d0 : afd! ?? ::GFJBLGFE::`string'+0x1e95
fffff880`07c7ca10 fffff800`03392da6 : 00000000`00000000 00000000`0000080c 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`07c7cb40 fffff800`03078993 : fffff880`07c7cca0 fffffa80`05a185f0 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
fffff880`07c7cbb0 00000000`73772dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0022f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73772dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+a56
fffff800`031acd6f cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+a56
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\042711-17394-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03016000 PsLoadedModuleList = 0xfffff800`03253e50
Debug session time: Wed Apr 27 21:10:52.614 2011 (UTC - 4:00)
System Uptime: 0 days 2:11:41.738
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 109, {a3a039d898e4a91e, 0, a6a1753f12f0089d, 101}
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d898e4a91e, Reserved
Arg2: 0000000000000000, Reserved
Arg3: a6a1753f12f0089d, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
Debugging Details:
------------------
BUGCHECK_STR: 0x109
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80003086740
STACK_TEXT:
fffff880`031cb5d8 00000000`00000000 : 00000000`00000109 a3a039d8`98e4a91e 00000000`00000000 a6a1753f`12f0089d : nt!KeBugCheckEx
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: BAD_STACK
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\042711-16957-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*e:\windbgsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0301e000 PsLoadedModuleList = 0xfffff800`0325be50
Debug session time: Wed Apr 27 13:05:43.829 2011 (UTC - 4:00)
System Uptime: 0 days 7:19:33.953
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {0, 2, 0, fffff800031c10f7}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+c67 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800031c10f7, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+c67
fffff800`031c10f7 488b00 mov rax,qword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
TRAP_FRAME: fffff88008afc590 -- (.trap 0xfffff88008afc590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8000321dfb0
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031c10f7 rsp=fffff88008afc720 rbp=0000000000000002
r8=fffffa80071ccc10 r9=fffffa80071cca40 r10=fffffa80071ccc10
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ExDeferredFreePool+0xc67:
fffff800`031c10f7 488b00 mov rax,qword ptr [rax] ds:66c0:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000308dca9 to fffff8000308e740
STACK_TEXT:
fffff880`08afc448 fffff800`0308dca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08afc450 fffff800`0308c920 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`08afc590 fffff800`031c10f7 : fffffa80`05b64000 fffff880`105e912b fffff880`105e382c fffffa80`05f23700 : nt!KiPageFault+0x260
fffff880`08afc720 fffff800`031c34c1 : fffffa80`0612d1e0 fffffa80`06f57410 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0xc67
fffff880`08afc7b0 fffff880`1001036d : 00000000`00000001 00000000`00000000 fffffa80`4d52564e 00000000`00000001 : nt!ExFreePoolWithTag+0x411
fffff880`08afc860 00000000`00000001 : 00000000`00000000 fffffa80`4d52564e 00000000`00000001 fffffa80`06f57420 : nvlddmkm+0x1df36d
fffff880`08afc868 00000000`00000000 : fffffa80`4d52564e 00000000`00000001 fffffa80`06f57420 fffff880`10038f62 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+c67
fffff800`031c10f7 488b00 mov rax,qword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+c67
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+c67
BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+c67
Followup: Pool_corruption
---------