Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012011-16640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0b000 PsLoadedModuleList = 0xfffff800`02e48e50
Debug session time: Thu Jan 20 04:24:16.853 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:26.369
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {fffffb800a16f9c0, 2, 0, fffff80002daf0cd}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+241 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: fffffb800a16f9c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002daf0cd, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+241
fffff800`02daf0cd 4c3910 cmp qword ptr [rax],r10
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
IRP_ADDRESS: fffffa800a102f88
TRAP_FRAME: fffff88007d7f290 -- (.trap 0xfffff88007d7f290)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffb800a16f9c0 rbx=0000000000000000 rcx=fffff80002e0abf0
rdx=fffffa80084dd000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002daf0cd rsp=fffff88007d7f420 rbp=0000000000000000
r8=fffffa8009f25510 r9=fffffa80084dd360 r10=fffffa80084dd370
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExDeferredFreePool+0x241:
fffff800`02daf0cd 4c3910 cmp qword ptr [rax],r10 ds:0003:fffffb80`0a16f9c0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c7aca9 to fffff80002c7b740
STACK_TEXT:
fffff880`07d7f148 fffff800`02c7aca9 : 00000000`0000000a fffffb80`0a16f9c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07d7f150 fffff800`02c79920 : 00000000`00000000 00000000`00000000 4cf00001`7e01c921 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`07d7f290 fffff800`02daf0cd : fffffa80`00000000 ffffffff`ffffffff 00006200`00006c7a 0000558e`00006c7a : nt!KiPageFault+0x260
fffff880`07d7f420 fffff800`02db04c1 : fffffa80`0a19d000 fffffa80`0a19d000 00000000`00000000 fffff8a0`02943c70 : nt!ExDeferredFreePool+0x241
fffff880`07d7f4b0 fffff800`02c9ad1c : 00000000`00000001 fffffa80`0a19d010 00000000`20707249 00000000`00000001 : nt!ExFreePoolWithTag+0x411
fffff880`07d7f560 fffff800`02c7e0dd : fffffa80`0a103000 00000000`00040000 fffffa80`090d5301 fffff980`00000000 : nt!IopCompleteRequest+0x54c
fffff880`07d7f630 fffff880`01228953 : fffffa80`096fd940 00000000`00000001 fffff880`07d7f8e0 00000000`00000000 : nt!IopfCompleteRequest+0x75d
fffff880`07d7f710 fffff880`01229f78 : fffffa80`096fd940 fffffa80`0a19d010 fffff880`07d7f800 fffffa80`0a200800 : Ntfs!NtfsCommonRead+0x1bc7
fffff880`07d7f8b0 fffff880`0106c23f : fffffa80`0a19d3b0 fffffa80`0a19d010 fffffa80`0a200830 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`07d7f960 fffff880`0106a6df : fffffa80`079a1ce0 00000000`00000000 fffffa80`079a1c00 fffffa80`0a19d010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`07d7f9f0 fffff800`02f91ca9 : 00000000`00000000 fffffa80`073322e0 00000000`00000000 fffffa80`0a19d010 : fltmgr!FltpDispatch+0xcf
fffff880`07d7fa50 fffff800`02f994a3 : fffffa80`073322e0 fffffa80`073322e0 fffffa80`073322e0 fffff680`00001b01 : nt!IopSynchronousServiceTail+0xf9
fffff880`07d7fac0 fffff800`02c7a993 : 00000000`00001179 00000000`000004ec 00000000`00000000 00000000`01ebd618 : nt!NtReadFile+0x631
fffff880`07d7fbb0 00000000`7723fdba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0270e0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7723fdba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+241
fffff800`02daf0cd 4c3910 cmp qword ptr [rax],r10
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+241
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+241
BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+241
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012011-18781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0f000 PsLoadedModuleList = 0xfffff800`02e4ce50
Debug session time: Thu Jan 20 04:41:29.170 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:00.686
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffd8a008b7a030, 1, fffff80002c8b6e0, 7}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+40e0b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffd8a008b7a030, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002c8b6e0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb70e0
ffffd8a008b7a030
FAULTING_IP:
nt!ObfReferenceObject+20
fffff800`02c8b6e0 f0480fc11f lock xadd qword ptr [rdi],rbx
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880090338c0 -- (.trap 0xfffff880090338c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0013238c2 rbx=0000000000000000 rcx=ffffd8a008b7a060
rdx=fffff8a0013238c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c8b6e0 rsp=fffff88009033a50 rbp=0000000000000000
r8=fffff8a0013238c3 r9=fffffa80098b7838 r10=fffffa8006a51820
r11=fffff88009033ba8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfReferenceObject+0x20:
fffff800`02c8b6e0 f0480fc11f lock xadd qword ptr [rdi],rbx ds:0001:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cfe849 to fffff80002c7f740
STACK_TEXT:
fffff880`09033758 fffff800`02cfe849 : 00000000`00000050 ffffd8a0`08b7a030 00000000`00000001 fffff880`090338c0 : nt!KeBugCheckEx
fffff880`09033760 fffff800`02c7d82e : 00000000`00000001 00000000`00000001 00000000`00000000 000007fe`f9d7e034 : nt! ?? ::FNODOBFM::`string'+0x40e0b
fffff880`090338c0 fffff800`02c8b6e0 : fffff8a0`00000000 fffff8a0`08ae27e0 00000000`00000008 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`09033a50 fffff800`02f537b1 : fffff8a0`013238c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfReferenceObject+0x20
fffff880`09033a80 fffff800`02f55f2e : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsImpersonateClient+0xb1
fffff880`09033b10 fffff800`02f5627b : fffff880`09033ca0 000007fe`00000001 00000000`00000000 fffffa80`07555070 : nt!AlpcpImpersonateMessage+0xfe
fffff880`09033bb0 fffff800`02c7e993 : fffffa80`06ca8b60 00000000`00000000 00000000`00008001 fffffa80`07555070 : nt!NtAlpcImpersonateClientOfPort+0x159
fffff880`09033c20 00000000`77c4054a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0740cbd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c4054a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+40e0b
fffff800`02cfe849 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+40e0b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+40e0b
BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+40e0b
Followup: MachineOwner
---------