Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020411-23727-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e05000 PsLoadedModuleList = 0xfffff800`03042e50
Debug session time: Fri Feb 4 08:45:43.535 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:53.002
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {fffff9802c8eaf80, fffff9802c8ea2b0, f5c080, 23}
Probably caused by : memory_corruption ( nt!MiCheckSpecialPoolSlop+9a )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: fffff9802c8eaf80, address trying to free
Arg2: fffff9802c8ea2b0, address where bits are corrupted
Arg3: 0000000000f5c080, (reserved)
Arg4: 0000000000000023, caller is freeing an address where nearby bytes within the same page have been corrupted
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_23
SPECIAL_POOL_CORRUPTION_TYPE: 23
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002f0560a to fffff80002e75740
STACK_TEXT:
fffff880`03185418 fffff800`02f0560a : 00000000`000000c1 fffff980`2c8eaf80 fffff980`2c8ea2b0 00000000`00f5c080 : nt!KeBugCheckEx
fffff880`03185420 fffff800`02f7c693 : fffffa80`00000003 fffff980`1cb38ed8 00000000`00000293 fffff800`03308dfe : nt!MiCheckSpecialPoolSlop+0x9a
fffff880`03185460 fffff800`02fa8390 : fffff800`02e05000 00000000`6366744e 00000000`00005b80 fffff880`03185798 : nt!MmFreeSpecialPool+0x1d3
fffff880`03185590 fffff800`0331992b : fffff980`32fcee40 00000000`00000002 fffff980`1cb38b40 00000000`00010246 : nt!ExDeferredFreePool+0xf4d
fffff880`03185640 fffff880`012f99e8 : fffff980`32fcee40 fffff980`1cb38b40 fffff980`1cb38b40 fffff880`03185798 : nt!VerifierExFreePool+0x1b
fffff880`03185670 fffff880`01301adc : fffff980`32fcee40 fffff980`1cb38c70 fffff980`1cb38b40 fffffa80`082d1180 : Ntfs!NtfsCommonClose+0x528
fffff880`03185740 fffff800`0331bc16 : fffffa80`07e58001 fffffa80`07e58010 00000000`00000000 00000000`00000002 : Ntfs!NtfsFsdClose+0x2dc
fffff880`03185840 fffff880`010c123f : fffffa80`07e58368 fffff880`031858e0 fffff980`228e8c30 fffffa80`0a26eda0 : nt!IovCallDriver+0x566
fffff880`031858a0 fffff880`010bf6df : fffffa80`0804bbc0 fffffa80`0804bbc0 fffff980`016acf00 fffffa80`07e58010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`03185930 fffff800`0331bc16 : fffffa80`07e58010 00000000`00000002 00000000`00000000 fffffa80`0804b8c0 : fltmgr!FltpDispatch+0xcf
fffff880`03185990 fffff800`0318b78e : fffffa80`0937bda0 00000000`00000001 fffffa80`07e58010 fffffa80`07a74970 : nt!IovCallDriver+0x566
fffff880`031859f0 fffff800`02e7a8b4 : 00000000`00000011 fffffa80`0937bda0 fffffa80`06764600 fffffa80`0676a570 : nt!IopDeleteFile+0x11e
fffff880`03185a80 fffff800`02e65431 : fffffa80`0937bda0 00000000`00000002 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`03185ae0 fffff800`02e68d1c : 00000000`00000000 00000000`00000000 fffffa80`09c67230 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x2fd
fffff880`03185b50 fffff800`02e69520 : fffff880`03185c00 fffff880`03185c58 00000000`00000000 fffff800`00000000 : nt!CcWriteBehind+0x5bc
fffff880`03185c00 fffff800`02e82961 : fffffa80`06749030 fffff880`012d3230 fffff800`0307c140 fffffa80`00000003 : nt!CcWorkerThread+0x1c8
fffff880`03185cb0 fffff800`03119c06 : 02020102`02000302 fffffa80`067611f0 00000000`00000080 fffffa80`066c2b30 : nt!ExpWorkerThread+0x111
fffff880`03185d40 fffff800`02e53c26 : fffff880`02f64180 fffffa80`067611f0 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03185d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiCheckSpecialPoolSlop+9a
fffff800`02f0560a cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiCheckSpecialPoolSlop+9a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a
BUCKET_ID: X64_0xC1_23_VRF_nt!MiCheckSpecialPoolSlop+9a
Followup: MachineOwner
---------