Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-25272-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
Debug session time: Sat Mar 19 14:10:13.873 2011 (UTC - 4:00)
System Uptime: 0 days 0:49:50.481
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {fffff980236e8fe0, fffff980236e8ff4, d10014, 24}
Unable to load image UCOREW64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UCOREW64.SYS
*** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff980236e8fe0, address trying to free
Arg2: fffff980236e8ff4, address where bits are corrupted
Arg3: 0000000000d10014, (reserved)
Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_24
SPECIAL_POOL_CORRUPTION_TYPE: 24
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AFUWIN.EXE
CURRENT_IRQL: 1
IRP_ADDRESS: fffff9802377ef3b
LAST_CONTROL_TRANSFER: from fffff80002f9ae14 to fffff80002e9c640
STACK_TEXT:
fffff880`0bad24b8 fffff800`02f9ae14 : 00000000`000000c1 fffff980`236e8fe0 fffff980`236e8ff4 00000000`00d10014 : nt!KeBugCheckEx
fffff880`0bad24c0 fffff800`02fc693b : fffff800`02e1c000 00000000`20206f49 00000000`0009ca09 fffffa80`08f30e00 : nt!MmFreeSpecialPool+0x374
fffff880`0bad2600 fffff800`02eb1afe : 00000000`00000000 fffff980`2377efb0 fffff980`0327ee50 fffff980`2597efb0 : nt!ExDeferredFreePool+0xf33
fffff880`0bad26b0 fffff800`02e9fdbf : fffff980`2377efb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
fffff880`0bad2780 fffff800`0333919f : fffff980`2377eee0 fffffa80`08436d00 fffff980`2377ef00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`0bad2860 fffff880`0979052b : fffff880`0978f8f0 fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 : nt!IovCompleteRequest+0x19f
fffff880`0bad2930 fffff880`0978f8f0 : fffff980`2377eee0 fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 : UCOREW64+0x152b
fffff880`0bad2938 fffff980`2377eee0 : fffff980`2377eee0 fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 : UCOREW64+0x8f0
fffff880`0bad2940 fffff980`2377eee0 : fffff980`2377efb0 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 : 0xfffff980`2377eee0
fffff880`0bad2948 fffff980`2377efb0 : 00000000`00000014 fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 : 0xfffff980`2377eee0
fffff880`0bad2950 00000000`00000014 : fffff880`0bad2970 fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 : 0xfffff980`2377efb0
fffff880`0bad2958 fffff880`0bad2970 : fffffa80`08436d10 fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 : 0x14
fffff880`0bad2960 fffffa80`08436d10 : fffff800`031b6f97 fffff880`00000018 fffff800`0332c2a7 00000000`00000001 : 0xfffff880`0bad2970
fffff880`0bad2968 fffff800`031b6f97 : fffff880`00000018 fffff800`0332c2a7 00000000`00000001 fffffa80`08df6560 : 0xfffffa80`08436d10
fffff880`0bad2970 fffffa80`08f30e50 : 00000000`00000000 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 : nt!IopXxxControlFile+0x607
fffff880`0bad2aa0 00000000`00000000 : 0012019f`00000000 fffffa80`08f30eb0 fffff980`236e8fe0 00000000`00000000 : 0xfffffa80`08f30e50
STACK_COMMAND: kb
FOLLOWUP_IP:
UCOREW64+152b
fffff880`0979052b ?? ???
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: UCOREW64+152b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: UCOREW64
IMAGE_NAME: UCOREW64.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 480dc59e
FAILURE_BUCKET_ID: X64_0xC1_24_UCOREW64+152b
BUCKET_ID: X64_0xC1_24_UCOREW64+152b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-26083-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`03045e90
Debug session time: Sat Mar 19 11:25:22.285 2011 (UTC - 4:00)
System Uptime: 0 days 21:43:46.892
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c000001d, fffff80002e87c7d, fffff88008d15210, 0}
Probably caused by : hardware ( nt!KiSearchForNewThread+6d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80002e87c7d, Address of the instruction which caused the bugcheck
Arg3: fffff88008d15210, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!KiSearchForNewThread+6d
fffff800`02e87c7d 58 pop rax
CONTEXT: fffff88008d15210 -- (.cxr 0xfffff88008d15210)
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000004180
rdx=0000000000000004 rsi=fffff80002e00000 rdi=fffff88002f64180
rip=fffff80002e87c7d rsp=fffff88008d15bf0 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff88002f64180 r12=0000000000000000 r13=00012ad616ff09c0
r14=0000000000000000 r15=fffffa80091d2168
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KiSearchForNewThread+0x6d:
fffff800`02e87c7d 58 pop rax
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
MISALIGNED_IP:
nt!KiSearchForNewThread+6d
fffff800`02e87c7d 58 pop rax
TRAP_FRAME: fffff88008d15a60 -- (.trap 0xfffff88008d15a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000004180
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e87c7d rsp=fffff88008d15bf0 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff88002f64180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSearchForNewThread+0x6d:
fffff800`02e87c7d 58 pop rax
Resetting default scope
EXCEPTION_RECORD: fffff88008d159b8 -- (.exr 0xfffff88008d159b8)
ExceptionAddress: fffff80002e87c7d (nt!KiSearchForNewThread+0x000000000000006d)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
LAST_CONTROL_TRANSFER: from fffff80002e8593c to fffff80002e87c7d
STACK_TEXT:
fffff880`08d15bf0 fffff800`02e8593c : 00000000`00000000 fffffa80`091d2060 80000001`728a4963 fffff6fc`50010008 : nt!KiSearchForNewThread+0x6d
fffff880`08d15c60 fffff800`02e881af : fffff6fc`50010008 fffff800`02e9e25f 00000000`00000000 86c00001`728a4882 : nt!KiCommitThreadWait+0x17c
fffff880`08d15cf0 fffff800`02e72443 : fffffa80`091d2000 fffff880`0000001c 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x19f
fffff880`08d15d90 fffff800`02e8f08a : 00000202`0018002b fffff880`00000000 89b00001`7e857882 00000000`00000002 : nt!ExfAcquirePushLockExclusive+0x188
fffff880`08d15e10 fffff800`02e7e76e : 00000000`00000000 fffff8a0`0a7fa18e 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1a6a
fffff880`08d15f70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
FOLLOWUP_IP:
nt!KiSearchForNewThread+6d
fffff800`02e87c7d 58 pop rax
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiSearchForNewThread+6d
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff88008d15210 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-25942-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030ade90
Debug session time: Sat Mar 19 13:14:34.487 2011 (UTC - 4:00)
System Uptime: 0 days 1:17:45.704
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff80003202f97, 0, 0, fffff80002f12a52}
Probably caused by : NETIO.SYS ( NETIO!NsiGetAllParametersEx+258 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80003202f97, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f12a52, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031190e8
fffff80003202f97
CURRENT_IRQL: 0
FAULTING_IP:
nt!RtlDispatchException+122
fffff800`02f12a52 410fb60c24 movzx ecx,byte ptr [r12]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800a08fca0 -- (.trap 0xfffff8800a08fca0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000058000000000 rbx=0000000000000000 rcx=007ffffc00018e90
rdx=fffff6fc00018e90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002fe68f4 rsp=fffff8800a08fe30 rbp=0000000000000001
r8=00008a8000095760 r9=0000000000000001 r10=000000000a0c8a40
r11=fffff8800a08ff40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiEmptyWorkingSet+0x1e4:
fffff800`02fe68f4 6645394818 cmp word ptr [r8+18h],r9w ds:bd00:00008a80`00095778=????
Resetting default scope
EXCEPTION_RECORD: fffff8800a08fbf8 -- (.exr 0xfffff8800a08fbf8)
ExceptionAddress: fffff80002fe68f4 (nt!MiEmptyWorkingSet+0x00000000000001e4)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
LAST_CONTROL_TRANSFER: from fffff80002ee7be9 to fffff80002ee8640
STACK_TEXT:
fffff880`0a08ea68 fffff800`02ee7be9 : 00000000`0000000a fffff800`03202f97 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a08ea70 fffff800`02ee6860 : 00000000`00000000 fffff800`03202f97 e5e5e5e5`e5e5e500 00000000`00000607 : nt!KiBugCheckDispatch+0x69
fffff880`0a08ebb0 fffff800`02f12a52 : fffff800`03202f97 fffff880`0a08ed88 fffff880`0a08fbf8 fffff800`02e68000 : nt!KiPageFault+0x260
fffff880`0a08ed40 fffff800`02f23dc1 : fffff880`0a08fbf8 fffff880`0a08f450 fffff880`00000000 00000000`00000007 : nt!RtlDispatchException+0x122
fffff880`0a08f420 fffff800`02ee7cc2 : fffff880`0a08fbf8 ffffffff`ffffffff fffff880`0a08fca0 fffff800`0306cec0 : nt!KiDispatchException+0x135
fffff880`0a08fac0 fffff800`02ee65ca : fffff8a0`0140f000 fffff8a0`00f50000 fffff8a0`01a8f000 fffff8a0`1c4fa000 : nt!KiExceptionDispatch+0xc2
fffff880`0a08fca0 fffff800`02fe68f4 : 00000003`00000000 ffffffff`ffffffff 00000000`00000000 fffff800`0306cec0 : nt!KiGeneralProtectionFault+0x10a
fffff880`0a08fe30 fffff800`02fe7f57 : fffffa80`0a0c8a40 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!MiEmptyWorkingSet+0x1e4
fffff880`0a08fee0 fffff800`03386261 : 00000000`00000000 fffffa80`07554202 00000000`00000000 fffff880`0a090210 : nt!MiTrimAllSystemPagableMemory+0x218
fffff880`0a08ff40 fffff800`033863bf : fffffa80`07554202 fffffa80`0699b298 fffffa80`0699b298 00000000`00000000 : nt!MmVerifierTrimMemory+0xf1
fffff880`0a08ff70 fffff800`03386b14 : fffffa80`07554200 fffffa80`075541a0 00000000`00000000 00000000`00000000 : nt!ViKeRaiseIrqlSanityChecks+0xcf
fffff880`0a08ffb0 fffff880`0145525e : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!VerifierKeAcquireSpinLockRaiseToDpc+0x54
fffff880`0a090010 fffff880`014587f3 : fffffa80`07554100 fffff880`0a090210 fffff980`05d10c90 fffffa80`08e4ccd0 : ndis!ndisQueueRequestOnTop+0x7e
fffff880`0a0900b0 fffff880`01458a63 : fffff980`062ac800 fffffa80`075541a0 fffff980`05d10c90 fffff980`062ac8c8 : ndis!ndisQuerySetMiniportEx+0x143
fffff880`0a090120 fffff880`01457409 : 00000000`00000005 00001f80`00f102a0 00000000`00001f80 fffff880`0a090598 : ndis!ndisIfGetMiniportStatistics+0x163
fffff880`0a090350 fffff880`01457807 : 00000000`00000000 fffff800`02fa1ac3 fffffa80`0699afd0 fffff880`00000008 : ndis!ndisIfQueryObject+0x389
fffff880`0a0904e0 fffff880`01456cad : fffff980`01394870 fffff980`05790870 fffff880`0a0905c0 00060000`00000000 : ndis!ndisNsiGetInterfaceRodInformation+0x207
fffff880`0a090580 fffff880`0154bc18 : 00000000`00000000 fffff880`01593301 00000000`00000001 fffff980`062ac800 : ndis!ndisNsiGetAllInterfaceInformation+0x42e
fffff880`0a090640 fffff880`040749d6 : 00000000`01b6eba0 fffffa80`081e29c0 fffff980`062ac800 00000000`01b6eba0 : NETIO!NsiGetAllParametersEx+0x258
fffff880`0a090750 fffff880`04076902 : fffff980`0635efb0 fffff980`0635efb0 fffff980`00000001 fffff980`0635ef18 : nsiproxy!NsippGetAllParameters+0x2b2
fffff880`0a090940 fffff880`040769db : 00000000`00000000 00000000`00000001 fffff980`0635eff8 fffffa80`0791a6e0 : nsiproxy!NsippDispatchDeviceControl+0x8a
fffff880`0a090980 fffff800`0338bc16 : fffff980`0635eee0 fffffa80`08b52060 fffffa80`09bcf8d0 fffffa80`06ae5f98 : nsiproxy!NsippDispatch+0x4b
fffff880`0a0909b0 fffff800`03202f97 : fffffa80`09bcf8d0 fffff880`0a090ca0 fffffa80`09bcf8d0 fffffa80`0791a6e0 : nt!IovCallDriver+0x566
fffff880`0a090a10 fffff800`032037f6 : 00000000`01b6ea20 00000000`00000838 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`0a090b40 fffff800`02ee78d3 : fffffa80`0a0c8a40 00000000`01b6ea08 fffff880`0a090bc8 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
fffff880`0a090bb0 00000000`777f138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01b6ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777f138a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NsiGetAllParametersEx+258
fffff880`0154bc18 8bf8 mov edi,eax
SYMBOL_STACK_INDEX: 12
SYMBOL_NAME: NETIO!NsiGetAllParametersEx+258
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xA_NETIO!NsiGetAllParametersEx+258
BUCKET_ID: X64_0xA_NETIO!NsiGetAllParametersEx+258
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-24788-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`0305ae90
Debug session time: Sat Mar 19 13:19:15.455 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:10.062
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {fffff9801a224fe0, fffff9801a224ff4, 9d0014, 24}
Unable to load image UCOREW64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UCOREW64.SYS
*** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff9801a224fe0, address trying to free
Arg2: fffff9801a224ff4, address where bits are corrupted
Arg3: 00000000009d0014, (reserved)
Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_24
SPECIAL_POOL_CORRUPTION_TYPE: 24
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AFUWIN.EXE
CURRENT_IRQL: 1
IRP_ADDRESS: fffff9801715cf3b
LAST_CONTROL_TRANSFER: from fffff80002f93e14 to fffff80002e95640
STACK_TEXT:
fffff880`0b4aa4b8 fffff800`02f93e14 : 00000000`000000c1 fffff980`1a224fe0 fffff980`1a224ff4 00000000`009d0014 : nt!KeBugCheckEx
fffff880`0b4aa4c0 fffff800`02fbf93b : fffff800`02e15000 00000000`20206f49 00000000`0001d483 fffffa80`0a26e690 : nt!MmFreeSpecialPool+0x374
fffff880`0b4aa600 fffff800`02eaaafe : 00000000`00000000 fffff980`1715cfb0 fffff980`02e5cce0 fffff980`1a35ce50 : nt!ExDeferredFreePool+0xf33
fffff880`0b4aa6b0 fffff800`02e98dbf : fffff980`1715cfb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
fffff880`0b4aa780 fffff800`0333219f : fffff980`1715cee0 fffffa80`09c13900 fffff980`1715cf00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`0b4aa860 fffff880`0d4f352b : fffff880`0d4f28f0 fffff980`1715cee0 fffff980`1715cee0 fffff980`1715cfb0 : nt!IovCompleteRequest+0x19f
fffff880`0b4aa930 fffff880`0d4f28f0 : fffff980`1715cee0 fffff980`1715cee0 fffff980`1715cfb0 00000000`00000014 : UCOREW64+0x152b
fffff880`0b4aa938 fffff980`1715cee0 : fffff980`1715cee0 fffff980`1715cfb0 00000000`00000014 fffff880`0b4aa970 : UCOREW64+0x8f0
fffff880`0b4aa940 fffff980`1715cee0 : fffff980`1715cfb0 00000000`00000014 fffff880`0b4aa970 fffffa80`09c13990 : 0xfffff980`1715cee0
fffff880`0b4aa948 fffff980`1715cfb0 : 00000000`00000014 fffff880`0b4aa970 fffffa80`09c13990 fffff800`031aff97 : 0xfffff980`1715cee0
fffff880`0b4aa950 00000000`00000014 : fffff880`0b4aa970 fffffa80`09c13990 fffff800`031aff97 fffff880`00000018 : 0xfffff980`1715cfb0
fffff880`0b4aa958 fffff880`0b4aa970 : fffffa80`09c13990 fffff800`031aff97 fffff880`00000018 fffff800`033252a7 : 0x14
fffff880`0b4aa960 fffffa80`09c13990 : fffff800`031aff97 fffff880`00000018 fffff800`033252a7 00000000`00000001 : 0xfffff880`0b4aa970
fffff880`0b4aa968 fffff800`031aff97 : fffff880`00000018 fffff800`033252a7 00000000`00000001 fffffa80`09960bb0 : 0xfffffa80`09c13990
fffff880`0b4aa970 fffffa80`0a26e6e0 : 00000000`00000000 0012019f`00000000 fffffa80`0a26e740 fffff980`1a224fe0 : nt!IopXxxControlFile+0x607
fffff880`0b4aaaa0 00000000`00000000 : 0012019f`00000000 fffffa80`0a26e740 fffff980`1a224fe0 00000000`00000000 : 0xfffffa80`0a26e6e0
STACK_COMMAND: kb
FOLLOWUP_IP:
UCOREW64+152b
fffff880`0d4f352b ?? ???
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: UCOREW64+152b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: UCOREW64
IMAGE_NAME: UCOREW64.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 480dc59e
FAILURE_BUCKET_ID: X64_0xC1_24_UCOREW64+152b
BUCKET_ID: X64_0xC1_24_UCOREW64+152b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-23743-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
Debug session time: Sat Mar 19 11:44:50.165 2011 (UTC - 4:00)
System Uptime: 0 days 0:03:12.773
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c000001d, fffff80002e9eafd, fffff8800a054130, 0}
Probably caused by : win32k.sys ( win32k!NtUserDispatchMessage+72 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80002e9eafd, Address of the instruction which caused the bugcheck
Arg3: fffff8800a054130, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!ExpReleaseResourceForThreadLite+17d
fffff800`02e9eafd 85c0 test eax,eax
CONTEXT: fffff8800a054130 -- (.cxr 0xfffff8800a054130)
rax=00000000000a0000 rbx=fffffa800982c520 rcx=0000000000000000
rdx=fffffa800a2d66b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e9eafd rsp=fffff8800a054b10 rbp=fffffa800a2d66b0
r8=0000000000000000 r9=0000000000000000 r10=fffff8800a054880
r11=fffff8800a054b80 r12=fffff88002fd5180 r13=fffffa800a2d66b0
r14=00000000001ce700 r15=00000000739a2450
iopl=0 nv up di pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010046
nt!ExpReleaseResourceForThreadLite+0x17d:
fffff800`02e9eafd 85c0 test eax,eax
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: msnmsgr.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ea635a to fffff80002e9eafd
STACK_TEXT:
fffff880`0a054b10 fffff800`02ea635a : 00000000`00000020 00000000`739a2450 00000000`00000000 00000000`001cfd20 : nt!ExpReleaseResourceForThreadLite+0x17d
fffff880`0a054b70 fffff960`00139922 : 00000000`001cde80 fffff880`0a054ca0 00000000`00000000 fffff800`02ea635a : nt!ExReleaseResourceAndLeavePriorityRegion+0x12
fffff880`0a054ba0 fffff800`02e9b8d3 : fffffa80`0a2d66b0 fffff880`0a054ca0 00000000`00000000 fffffa80`08224be0 : win32k!NtUserDispatchMessage+0x72
fffff880`0a054c20 00000000`739eff2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001cde08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x739eff2a
FOLLOWUP_IP:
win32k!NtUserDispatchMessage+72
fffff960`00139922 488bc3 mov rax,rbx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!NtUserDispatchMessage+72
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d2415ea
STACK_COMMAND: .cxr 0xfffff8800a054130 ; kb
FAILURE_BUCKET_ID: X64_0x3B_VRF_win32k!NtUserDispatchMessage+72
BUCKET_ID: X64_0x3B_VRF_win32k!NtUserDispatchMessage+72
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-22963-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`03050e90
Debug session time: Sat Mar 19 16:56:47.643 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:05.297
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {fffff98021834fe0, fffff98021834ff4, 970014, 24}
Unable to load image UCOREW64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UCOREW64.SYS
*** ERROR: Module load completed but symbols could not be loaded for UCOREW64.SYS
Probably caused by : UCOREW64.SYS ( UCOREW64+152b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff98021834fe0, address trying to free
Arg2: fffff98021834ff4, address where bits are corrupted
Arg3: 0000000000970014, (reserved)
Arg4: 0000000000000024, caller is freeing an address where bytes after the end of the allocation have been overwritten
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_24
SPECIAL_POOL_CORRUPTION_TYPE: 24
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AFUWINx64.exe
CURRENT_IRQL: 1
IRP_ADDRESS: fffff98021050f3b
LAST_CONTROL_TRANSFER: from fffff80002f89e14 to fffff80002e8b640
STACK_TEXT:
fffff880`08c254b8 fffff800`02f89e14 : 00000000`000000c1 fffff980`21834fe0 fffff980`21834ff4 00000000`00970014 : nt!KeBugCheckEx
fffff880`08c254c0 fffff800`02fb593b : fffff800`02e0b000 00000000`20206f49 00000000`0002d07a fffffa80`0889d300 : nt!MmFreeSpecialPool+0x374
fffff880`08c25600 fffff800`02ea0afe : 00000000`00000000 fffff980`21050fb0 fffff980`02a50ce0 fffff980`22150ee0 : nt!ExDeferredFreePool+0xf33
fffff880`08c256b0 fffff800`02e8edbf : fffff980`21050fb3 fffff800`00000001 00000000`00000001 fffff880`00000005 : nt!IopCompleteRequest+0x5ce
fffff880`08c25780 fffff800`0332819f : fffff980`21050ee0 fffffa80`08857300 fffff980`21050f00 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`08c25860 fffff880`0944952b : fffff880`094488f0 fffff980`21050ee0 fffff980`21050ee0 fffff980`21050fb0 : nt!IovCompleteRequest+0x19f
fffff880`08c25930 fffff880`094488f0 : fffff980`21050ee0 fffff980`21050ee0 fffff980`21050fb0 00000000`00000014 : UCOREW64+0x152b
fffff880`08c25938 fffff980`21050ee0 : fffff980`21050ee0 fffff980`21050fb0 00000000`00000014 fffff880`08c25970 : UCOREW64+0x8f0
fffff880`08c25940 fffff980`21050ee0 : fffff980`21050fb0 00000000`00000014 fffff880`08c25970 fffffa80`08857320 : 0xfffff980`21050ee0
fffff880`08c25948 fffff980`21050fb0 : 00000000`00000014 fffff880`08c25970 fffffa80`08857320 fffff800`031a5f97 : 0xfffff980`21050ee0
fffff880`08c25950 00000000`00000014 : fffff880`08c25970 fffffa80`08857320 fffff800`031a5f97 fffff880`00000018 : 0xfffff980`21050fb0
fffff880`08c25958 fffff880`08c25970 : fffffa80`08857320 fffff800`031a5f97 fffff880`00000018 fffff800`0331b2a7 : 0x14
fffff880`08c25960 fffffa80`08857320 : fffff800`031a5f97 fffff880`00000018 fffff800`0331b2a7 00000000`00000001 : 0xfffff880`08c25970
fffff880`08c25968 fffff800`031a5f97 : fffff880`00000018 fffff800`0331b2a7 00000000`00000001 fffffa80`099cb5c0 : 0xfffffa80`08857320
fffff880`08c25970 fffffa80`0889d350 : 00000000`00000000 0012019f`00000000 fffffa80`0889d3b0 fffff980`21834fe0 : nt!IopXxxControlFile+0x607
fffff880`08c25aa0 00000000`00000000 : 0012019f`00000000 fffffa80`0889d3b0 fffff980`21834fe0 00000000`00000000 : 0xfffffa80`0889d350
STACK_COMMAND: kb
FOLLOWUP_IP:
UCOREW64+152b
fffff880`0944952b ?? ???
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: UCOREW64+152b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: UCOREW64
IMAGE_NAME: UCOREW64.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 480dc59e
FAILURE_BUCKET_ID: X64_0xC1_24_UCOREW64+152b
BUCKET_ID: X64_0xC1_24_UCOREW64+152b
Followup: MachineOwner
---------