New
#1
Regular Crashes. Please help
I am seeing regular crashes lately . I tried installing ezonics WebCAM II USB webcam and since Win 7 does not have its drivers, I tried intalling Virtual XP Mode and install the wEb cam in Virtual XP mode. The installation was not complete.
Now I get regular crashes.
Minidump
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\010110-31137-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*C:\SymCache*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02812000 PsLoadedModuleList = 0xfffff800`02a4fe50
Debug session time: Fri Jan 1 15:30:47.677 2010 (GMT-8)
System Uptime: 7 days 4:59:07.651
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a10fe35828, 0, fffff800029b60bf, 5}
Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+233 )
Followup: Pool_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a10fe35828, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800029b60bf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aba0e0
fffff8a10fe35828
FAULTING_IP:
nt!ExDeferredFreePool+233
fffff800`029b60bf 4c395008 cmp qword ptr [rax+8],r10
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003124840 -- (.trap 0xfffff88003124840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a10fe35820 rbx=0000000000000000 rcx=fffff8a00fe34820
rdx=fffff8a00fe34000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800029b60bf rsp=fffff880031249d0 rbp=000000000000000d
r8=fffff8a0149f40a0 r9=fffff8a00fe34810 r10=fffff8a00fe34820
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExDeferredFreePool+0x233:
fffff800`029b60bf 4c395008 cmp qword ptr [rax+8],r10 ds:fffff8a1`0fe35828=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002901b91 to fffff80002883f00
STACK_TEXT:
fffff880`031246d8 fffff800`02901b91 : 00000000`00000050 fffff8a1`0fe35828 00000000`00000000 fffff880`03124840 : nt!KeBugCheckEx
fffff880`031246e0 fffff800`02881fee : 00000000`00000000 00000000`00000000 fffffa80`0371a600 00000000`00000103 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`03124840 fffff800`029b60bf : fffff800`029fce80 fffff880`03124d00 00000000`00000005 fffff800`02a3dbc0 : nt!KiPageFault+0x16e
fffff880`031249d0 fffff800`029b74c1 : 00000000`00000000 fffff8a0`08f8d000 00000000`000007ff 00000000`00000060 : nt!ExDeferredFreePool+0x233
fffff880`03124a60 fffff800`0286e250 : fffffa80`071f85d0 00000000`00000000 00000000`74536d4d 00000000`00000000 : nt!ExFreePoolWithTag+0x411
fffff880`03124b10 fffff800`02b71f13 : fffffa80`071f85d0 00000000`00000011 00000000`0008c089 fffffa80`0008c089 : nt!MiDeleteSegmentPages+0x35c
fffff880`03124bc0 fffff800`029a9f6b : fffffa80`071f85d8 00000000`00000001 00000000`00000000 00000000`00000631 : nt!MiSegmentDelete+0x7b
fffff880`03124c00 fffff800`029aa5dd : 00000000`00000000 00000000`00000080 fffffa80`03702890 00000000`00000012 : nt!MiProcessDereferenceList+0x23b
fffff880`03124cc0 fffff800`02b27166 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDereferenceSegmentThread+0x10d
fffff880`03124d40 fffff800`02862486 : fffff800`029fce80 fffffa80`03720b60 fffff800`02a0ac40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03124d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+233
fffff800`029b60bf 4c395008 cmp qword ptr [rax+8],r10
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+233
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x50_nt!ExDeferredFreePool+233
BUCKET_ID: X64_0x50_nt!ExDeferredFreePool+233
Followup: Pool_corruption
---------