BugCheck C5, {8, 2, 0, fffff800033afa9b}
Unable to load image [B][U][COLOR=#ff0000]yk62x64.sys[/COLOR][/U][/B], Win32 error 0n2
*** WARNING: Unable to verify timestamp for [COLOR=#ff0000][U][B]yk62x64.sys[/B][/U][/COLOR]
*** ERROR: Module load completed but symbols could not be loaded for yk62x64.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+1df )
Followup: Pool_corruption
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800033afa9b, address which referenced memory
Debugging Details:
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+1df
fffff800`033afa9b 4c395808 cmp qword ptr [rax+8],r11
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
TRAP_FRAME: fffff88009005600 -- (.trap 0xfffff88009005600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8000340a4b0
rdx=fffffa8007151a30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033afa9b rsp=fffff88009005790 rbp=0000000000000000
r8=fffffa8007d37a90 r9=fffffa8007151000 r10=0000000000000001
r11=fffffa8007151010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!ExDeferredFreePool+0x1df:
fffff800`033afa9b 4c395808 cmp qword ptr [rax+8],r11 ds:0020:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000327f1e9 to fffff8000327fc40
STACK_TEXT:
fffff880`090054b8 fffff800`0327f1e9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`090054c0 fffff800`0327de60 : fffffa80`069bfb10 fffff880`01b1dc51 00000014`c0d135fe 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`09005600 fffff800`033afa9b : 00000000`00880214 fffff880`01b3086d fffffa80`09340017 00000000`00000000 : nt!KiPageFault+0x260
fffff880`09005790 fffff800`033af1a1 : fffffa80`07b400a0 fffffa80`088022e0 00000000`00000000 00000000`000007ff : nt!ExDeferredFreePool+0x1df
fffff880`09005820 fffff880`0592ed5d : 00000000`00000200 00000014`07200006 00000000`74437852 fffff880`0f74a5c7 : nt!ExFreePoolWithTag+0x411
fffff880`090058d0 fffff800`03283021 : fffffa80`069217d3 00000000`0000000c 00000000`00000000 fffff880`01b14f72 : mrxsmb!SmbWskSendComplete+0xad
fffff880`09005910 fffff880`078c2d62 : fffffa80`077fefaa ffff0000`08c3a902 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`09005a00 fffff880`01b2ebb4 : ffff0000`00000000 fffffa80`095b9080 fffffa80`095b9ce0 00000000`00000000 : afd!WskProTLSendOrDisconnectComplete+0x72
fffff880`09005a60 fffff880`01b2d67a : fffffa80`05c7bf00 fffff880`01b25b00 fffffa80`05c56001 00000000`00000000 : tcpip!TcpTcbReceive+0x4f4
fffff880`09005c10 fffff880`01b2f2ab : fffffa80`06e91fb6 00000000`00000000 00000000`00000000 fffff880`09005f00 : tcpip!TcpMatchReceive+0x1fa
fffff880`09005d60 fffff880`01b261c7 : fffffa80`05c7bf00 fffffa80`05c9bd01 fffffa80`000093cf 00000000`000093cf : tcpip!TcpPreValidatedReceive+0x36b
fffff880`09005e30 fffff880`01b25d3a : 00000000`00000000 fffff880`01c40800 fffff880`09005ff0 fffffa80`05db9000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`09005ef0 fffff880`01b25339 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`09005fe0 : tcpip!IppProcessDeliverList+0x5a
fffff880`09005f90 fffff880`01b230af : 00000000`00000000 00000000`06729001 fffff880`01c40800 fffff880`01c40800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`09006070 fffff880`01b226a2 : fffffa80`06f604f0 00000000`00000000 fffffa80`06729001 00000000`00000004 : tcpip!IpFlcReceivePackets+0x64f
fffff880`09006270 fffff880`01b21b3a : fffffa80`06729010 fffff880`090063a0 fffffa80`06729010 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`09006350 fffff800`0328c618 : fffffa80`06dd49a0 00000000`00004800 fffffa80`058c1330 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`090063a0 fffff880`01b22202 : fffff880`01b21a60 00000000`00000000 fffff880`09006602 fffff880`07d9ff00 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`09006480 fffff880`016bf0eb : fffffa80`06f5e8d0 00000000`00000000 fffffa80`068581a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`090064f0 fffff880`01688ad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`09006560 fffff880`01601cc1 : fffffa80`068581a0 00000000`00000002 00000000`00000004 fffff880`016028ea : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`090069e0 fffff880`10164cbe : fffffa80`06de3000 fffffa80`06eeb310 fffffa80`06dd49a0 fffffa80`06de3e40 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`09006a30 fffffa80`06de3000 : fffffa80`06eeb310 fffffa80`06dd49a0 fffffa80`06de3e40 00000000`00000001 : [COLOR=#ff0000][U][B]yk62x64[/B][/U][/COLOR]+0x18cbe
fffff880`09006a38 fffffa80`06eeb310 : fffffa80`06dd49a0 fffffa80`06de3e40 00000000`00000001 fffff880`00000400 : 0xfffffa80`06de3000
fffff880`09006a40 fffffa80`06dd49a0 : fffffa80`06de3e40 00000000`00000001 fffff880`00000400 00000000`00000000 : 0xfffffa80`06eeb310
fffff880`09006a48 fffffa80`06de3e40 : 00000000`00000001 fffff880`00000400 00000000`00000000 00000000`0000000a : 0xfffffa80`06dd49a0
fffff880`09006a50 00000000`00000001 : fffff880`00000400 00000000`00000000 00000000`0000000a fffffa80`06de4680 : 0xfffffa80`06de3e40
fffff880`09006a58 fffff880`00000400 : 00000000`00000000 00000000`0000000a fffffa80`06de4680 fffff880`10164acf : 0x1
fffff880`09006a60 00000000`00000000 : 00000000`0000000a fffffa80`06de4680 fffff880`10164acf 00000000`00000000 : 0xfffff880`00000400
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+1df
fffff800`033afa9b 4c395808 cmp qword ptr [rax+8],r11
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+1df
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+1df
BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+1df
Followup: Pool_corruption