........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {fffff98029b44c10, fffff98029b44c0b, c703e8, 32}
Probably caused by : win32k.sys ( win32k!xxxMsgWaitForMultipleObjects+108 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_[U][B][COLOR=#ff0000]MEMORY_CORRUPTION[/COLOR][/B][/U] (c1)
Special pool has detected [COLOR=#ff0000][U][B]memory corruption[/B][/U][/COLOR]. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff98029b44c10, address trying to free
Arg2: fffff98029b44c0b, address where one bit is corrupted
Arg3: 0000000000c703e8, (reserved)
Arg4: 0000000000000032, caller is freeing an address where nearby bytes within the same page have a single bit error
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_32
SPECIAL_POOL_CORRUPTION_TYPE: 32
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: [COLOR=#ff0000][U][B]VERIFIER_ENABLED_VISTA_MINIDUMP[/B][/U][/COLOR]
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 1
LAST_CONTROL_TRANSFER: from fffff80002d5dfe3 to fffff80002cd4c40
STACK_TEXT:
fffff880`03f20448 fffff800`02d5dfe3 : 00000000`000000c1 fffff980`29b44c10 fffff980`29b44c0b 00000000`00c703e8 : nt!KeBugCheckEx
fffff880`03f20450 fffff800`02dd69b3 : 00000000`000000f0 00000000`00000000 fffff880`03f20c20 fffffa80`09e0bb30 : nt!MiCheckSpecialPoolSlop+0x83
fffff880`03f20490 fffff800`02e0293b : fffff800`02c58000 00000000`2b707249 00000000`00b55268 00000000`00000001 : nt!MmFreeSpecialPool+0x1d3
fffff880`03f205d0 fffff800`03179026 : fffffa80`07de0d02 fffffa80`07de0d60 00000000`00000000 fffff980`29b44c10 : nt!ExDeferredFreePool+0xf33
fffff880`03f20680 fffff800`031795ec : fffff800`02cc8296 fffff980`29b44c10 00000000`00000000 fffffa80`09d6e0b0 : nt!VfIoFreeIrp+0xe6
fffff880`03f206b0 fffff800`02cc8296 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IovFreeIrpPrivate+0x5c
fffff880`03f206f0 fffff800`02cda13d : fffffa80`09d6e060 00000000`00000000 fffff960`00118f70 00000000`00000000 : nt!KiDeliverApc+0x166
fffff880`03f20770 fffff800`02cd944a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiCommitThreadWait+0x3dd
fffff880`03f20800 fffff960`000b9968 : fffff900`00000002 fffffa80`098953c0 fffff900`00000001 fffff880`0000000d : nt!KeWaitForMultipleObjects+0x272
fffff880`03f20ac0 fffff960`000ba934 : 00000000`00000000 fffff900`c01c46d0 fffff960`00304560 fffff900`c01c4560 : win32k!xxxMsgWaitForMultipleObjects+0x108
fffff880`03f20b40 fffff960`00075128 : fffffa80`00000001 fffffa80`0000000c fffffa80`09d6e060 fffff6fc`4001f660 : win32k!xxxDesktopThread+0x254
fffff880`03f20bc0 fffff960`000f539a : fffffa80`00000001 fffff960`00304560 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x64
fffff880`03f20bf0 fffff800`02cd3ed3 : fffffa80`09d6e060 00000000`00000004 000007ff`fffac000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`03f20c20 000007fe`fdb51eea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01f5fb08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdb51eea
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!xxxMsgWaitForMultipleObjects+108
fffff960`000b9968 8bf0 mov esi,eax
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: win32k!xxxMsgWaitForMultipleObjects+108
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ecdcd5a
FAILURE_BUCKET_ID: X64_0xC1_32_VRF_win32k!xxxMsgWaitForMultipleObjects+108
BUCKET_ID: X64_0xC1_32_VRF_win32k!xxxMsgWaitForMultipleObjects+108
Followup: MachineOwner