....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {fffff9802c22cec0, fffff9802c22c019, 37c140, 23}
Probably caused by : memory_corruption ( nt!MiCheckSpecialPoolSlop+9a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff9802c22cec0, address trying to free
Arg2: fffff9802c22c019, address where bits are corrupted
Arg3: 000000000037c140, (reserved)
Arg4: 0000000000000023, caller is freeing an address where nearby bytes within the same page have been corrupted
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_23
SPECIAL_POOL_CORRUPTION_TYPE: 23
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002d1bffa to fffff80002c95d00
STACK_TEXT:
fffff880`06f90dc8 fffff800`02d1bffa : 00000000`000000c1 fffff980`2c22cec0 fffff980`2c22c019 00000000`0037c140 : nt!KeBugCheckEx
fffff880`06f90dd0 fffff800`02d94a03 : 00000000`000001f3 fffff980`286babc0 fffff880`00000002 00000000`00000003 : nt!MiCheckSpecialPoolSlop+0x9a
fffff880`06f90e10 fffff800`02dc0975 : fffff800`02c16000 00000000`4566744e 00000000`00005280 00000000`c0000034 : nt!MmFreeSpecialPool+0x1d3
fffff880`06f90f50 fffff800`0313692b : fffff880`06f913e0 fffff880`012ef872 00000000`00000010 00000000`c0000034 : nt!ExDeferredFreePool+0xf6d
fffff880`06f91000 fffff880`012efb0b : fffff980`20af0e40 fffff880`06f913e0 fffff880`06f913e0 fffff980`20af0e40 : nt!VerifierExFreePool+0x1b
fffff880`06f91030 fffff880`01256a3d : fffff980`20af0e40 fffff980`1ac06a60 00000000`00000060 00000000`00000100 : Ntfs!NtfsCommonCreate+0x25d4
fffff880`06f91210 fffff800`02ca2668 : fffff880`06f91350 fffff800`0312b09a fffff880`06f89000 fffff880`06f92000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`06f91240 fffff880`012571bf : fffff880`01256a20 fffff880`01256020 fffffa80`0872a900 fffff880`012f7f00 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`06f91320 fffff880`012f099c : 00000000`00000000 00000000`00000000 00000000`00000002 fffff980`1ac06a60 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`06f91380 fffff800`03138c16 : fffffa80`07bdf030 fffff980`1ac06a60 fffff300`06385e00 00000000`00000000 : Ntfs!NtfsFsdCreate+0x1ac
fffff880`06f91530 fffff880`010dcbcf : fffff980`1ac06fb0 fffff880`06f915e0 fffff980`2ad94c30 fffffa80`0872a960 : nt!IovCallDriver+0x566
fffff880`06f91590 fffff880`010fc2b9 : fffff980`1ac06a60 fffff980`02a68800 fffff980`1ac06a00 fffffa80`08741d10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`06f91620 fffff800`03138c16 : fffff980`1ac06a60 00000000`00000002 00000000`00000040 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`06f916d0 fffff800`02f93625 : 00000000`00000005 fffffa80`0adf3c68 fffffa80`0ac50190 fffffa80`0ad6edd0 : nt!IovCallDriver+0x566
fffff880`06f91730 fffff800`02f8fec8 : fffffa80`08836290 fffff800`00000000 fffffa80`0adf3ab0 00000000`00000001 : nt!IopParseDevice+0x5a5
fffff880`06f918c0 fffff800`02f910e6 : 00000000`00000000 fffffa80`0adf3ab0 fffff880`06f91a00 fffffa80`0764b360 : nt!ObpLookupObjectName+0x588
fffff880`06f919b0 fffff800`02f929ec : fffff880`037e6d00 00000000`00000000 00000000`00000001 fffffa80`08a00748 : nt!ObOpenObjectByName+0x306
fffff880`06f91a80 fffff800`02f9d608 : 00000000`0008e2e8 63336139`80100080 00000000`0008ebb0 00000000`0008e300 : nt!IopCreateFile+0x2bc
fffff880`06f91b20 fffff800`02c94f93 : 00000000`00000000 fffff880`01633ed4 fffffa80`08a00748 fffff8a0`03249000 : nt!NtCreateFile+0x78
fffff880`06f91bb0 00000000`77c2186a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c2186a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiCheckSpecialPoolSlop+9a
fffff800`02d1bffa cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiCheckSpecialPoolSlop+9a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a
BUCKET_ID: X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a
Followup: MachineOwner
---------