Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122310-27939-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a53000 PsLoadedModuleList = 0xfffff800`02c90e50
Debug session time: Wed Dec 22 15:09:21.042 2010 (UTC - 5:00)
System Uptime: 0 days 7:51:12.509
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\RTL85n64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTL85n64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTL85n64.sys
Probably caused by : nwifi.sys ( nwifi!EtwEx_tidActivityInfoTransfer+1ac )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - .
FAULTING_IP:
+6436323963333630
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: RtWLan.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff80000ba2a08 -- (.exr 0xfffff80000ba2a08)
ExceptionAddress: fffff8800158945c (ndis!ndisMSendCompleteNetBufferListsInternal+0x00000000000000fc)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: ffffffffffffffff
Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000
TRAP_FRAME: fffff80000ba2ab0 -- (.trap 0xfffff80000ba2ab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800158945c rsp=fffff80000ba2c40 rbp=fffef9800f3c88d0
r8=0000000000000000 r9=fffef9800f3c88d0 r10=0000000000000000
r11=0000000001a290b5 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ndis!ndisMSendCompleteNetBufferListsInternal+0xfc:
fffff880`0158945c 488b8d90050000 mov rcx,qword ptr [rbp+590h] ss:0018:fffef980`0f3c8e60=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002abb46e to fffff80002ac3710
STACK_TEXT:
fffff800`00ba1af8 fffff800`02abb46e : fffffa80`0397a9f0 fffff800`02f57f6d fffff800`00ba2270 fffff800`02af0668 : nt!KeBugCheck
fffff800`00ba1b00 fffff800`02ae940d : fffff800`02cd1b7c fffff800`02c0be84 fffff800`02a53000 fffff800`00ba2a08 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00ba1b30 fffff800`02af0a90 : fffff800`02c12a40 fffff800`00ba1ba8 fffff800`00ba2a08 fffff800`02a53000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00ba1b60 fffff800`02afd9ef : fffff800`00ba2a08 fffff800`00ba2270 fffff800`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff800`00ba2240 fffff800`02ac2d82 : fffff800`00ba2a08 00000000`00000000 fffff800`00ba2ab0 fffffa80`058af1a0 : nt!KiDispatchException+0x16f
fffff800`00ba28d0 fffff800`02ac1552 : fffff6fc`c0328690 fffff800`02f56dfe fffff800`00ba2ac0 fffff800`00b9d000 : nt!KiExceptionDispatch+0xc2
fffff800`00ba2ab0 fffff880`0158945c : fffff980`650d2e90 fffff800`02f678ef fffff880`03b50ea0 00000000`00000300 : nt!KiStackFault+0x112
fffff800`00ba2c40 fffff880`038fbeb0 : fffffa80`00000000 fffff980`20904d30 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0xfc
fffff800`00ba2ce0 fffff880`038f7f58 : 00000000`00000000 fffffa80`050244f0 00000000`00000000 fffff880`03b4fe8c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
fffff800`00ba2d30 fffff880`038fb860 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`03b84dac : nwifi!Dot11SendCompletion+0x44
fffff800`00ba2d60 fffff880`015895ad : fffffa80`058af1a0 00000000`00000000 fffff980`51a04fe0 fffff980`1f93ef50 : nwifi!Pt6SendComplete+0x28
fffff800`00ba2d90 fffff880`03b4c1af : fffff980`0bbf0ca0 00000000`00000000 fffffa80`058af1a0 fffffa80`058af1a0 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff800`00ba2dd0 fffff980`0bbf0ca0 : 00000000`00000000 fffffa80`058af1a0 fffffa80`058af1a0 fffffa80`05cc54c0 : RTL85n64+0xcf1af
fffff800`00ba2dd8 00000000`00000000 : fffffa80`058af1a0 fffffa80`058af1a0 fffffa80`05cc54c0 fffff880`0155a759 : 0xfffff980`0bbf0ca0
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!EtwEx_tidActivityInfoTransfer+1ac
fffff880`038fbeb0 f0838348130000ff lock add dword ptr [rbx+1348h],0FFFFFFFFh
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: nwifi!EtwEx_tidActivityInfoTransfer+1ac
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
BUCKET_ID: X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122110-41589-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0e000 PsLoadedModuleList = 0xfffff800`02c4be50
Debug session time: Tue Dec 21 10:59:16.733 2010 (UTC - 5:00)
System Uptime: 0 days 2:38:46.201
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\RTL85n64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTL85n64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTL85n64.sys
Probably caused by : nwifi.sys ( nwifi!EtwEx_tidActivityInfoTransfer+1ac )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - .
FAULTING_IP:
+6366393030376137
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f1b798 -- (.exr 0xfffff88002f1b798)
ExceptionAddress: fffff8800157345c (ndis!ndisMSendCompleteNetBufferListsInternal+0x00000000000000fc)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: ffffffffffffffff
Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000
TRAP_FRAME: fffff88002f1b840 -- (.trap 0xfffff88002f1b840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800157345c rsp=fffff88002f1b9d0 rbp=fffef9800eaaa8d0
r8=0000000000000000 r9=fffef9800eaaa8d0 r10=0000000000000000
r11=00000000002500e2 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ndis!ndisMSendCompleteNetBufferListsInternal+0xfc:
fffff880`0157345c 488b8d90050000 mov rcx,qword ptr [rbp+590h] ss:0018:fffef980`0eaaae60=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a7646e to fffff80002a7e710
STACK_TEXT:
fffff880`02f1a888 fffff800`02a7646e : fffffa80`039784f0 fffff800`02f12f6d fffff880`02f1b000 fffff800`02aab668 : nt!KeBugCheck
fffff880`02f1a890 fffff800`02aa440d : fffff800`02c8cb7c fffff800`02bc6e84 fffff800`02a0e000 fffff880`02f1b798 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1a8c0 fffff800`02aaba90 : fffff800`02bcdb14 fffff880`02f1a938 fffff880`02f1b798 fffff800`02a0e000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1a8f0 fffff800`02ab89ef : fffff880`02f1b798 fffff880`02f1b000 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff880`02f1afd0 fffff800`02a7dd82 : fffff880`02f1b798 00000000`00000000 fffff880`02f1b840 fffffa80`0584c1a0 : nt!KiDispatchException+0x16f
fffff880`02f1b660 fffff800`02a7c552 : fffff6fc`c00c5c80 fffff800`02f11dfe fffff880`02f1b850 fffff880`02f16000 : nt!KiExceptionDispatch+0xc2
fffff880`02f1b840 fffff880`0157345c : fffff980`18b90e90 fffff800`02f228ef fffff880`0413fea0 00000000`00000000 : nt!KiStackFault+0x112
fffff880`02f1b9d0 fffff880`03ab5eb0 : fffffa80`00000000 fffff980`10df2d30 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0xfc
fffff880`02f1ba70 fffff880`03ab1f58 : 00000000`00000000 fffffa80`06184050 00000000`00000000 fffff880`0413ee8c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
fffff880`02f1bac0 fffff880`03ab5860 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`04173dac : nwifi!Dot11SendCompletion+0x44
fffff880`02f1baf0 fffff880`015735ad : fffffa80`0584c1a0 00000000`00000000 fffff980`1bbf4fe0 fffff980`0c840f50 : nwifi!Pt6SendComplete+0x28
fffff880`02f1bb20 fffff880`0413b1af : fffff980`0b9f0ca0 00000000`00000000 fffffa80`0584c1a0 fffffa80`0584c1a0 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff880`02f1bb60 fffff980`0b9f0ca0 : 00000000`00000000 fffffa80`0584c1a0 fffffa80`0584c1a0 fffffa80`05bdd580 : RTL85n64+0xcf1af
fffff880`02f1bb68 00000000`00000000 : fffffa80`0584c1a0 fffffa80`0584c1a0 fffffa80`05bdd580 00000000`00000000 : 0xfffff980`0b9f0ca0
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!EtwEx_tidActivityInfoTransfer+1ac
fffff880`03ab5eb0 f0838348130000ff lock add dword ptr [rbx+1348h],0FFFFFFFFh
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: nwifi!EtwEx_tidActivityInfoTransfer+1ac
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
BUCKET_ID: X64_0x1E_0_VRF_nwifi!EtwEx_tidActivityInfoTransfer+1ac
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122210-31605-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time: Wed Dec 22 07:17:25.562 2010 (UTC - 5:00)
System Uptime: 0 days 0:16:19.404
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff80002d25c06, 0, 0, fffff80002aae7a2}
Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80002d25c06, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002aae7a2, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb90e0
fffff80002d25c06
CURRENT_IRQL: 0
FAULTING_IP:
nt!RtlDispatchException+122
fffff800`02aae7a2 410fb60c24 movzx ecx,byte ptr [r12]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: wuauclt.exe
TRAP_FRAME: fffff880033627c0 -- (.trap 0xfffff880033627c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80002ca11ec rbx=0000000000000000 rcx=fffff80002d25c44
rdx=fffff80002d25bac rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aae7a2 rsp=fffff88003362950 rbp=fffff880033637f8
r8=0000000000002029 r9=0000000000002029 r10=fffff88003363d00
r11=fffff88003362998 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDispatchException+0x122:
fffff800`02aae7a2 410fb60c24 movzx ecx,byte ptr [r12] ds:00000000`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`03362678 fffff800`02a80ca9 : 00000000`0000000a fffff800`02d25c06 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`03362680 fffff800`02a7f920 : 00000000`00000000 00000000`0000005a 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`033627c0 fffff800`02aae7a2 : fffff800`02d25c06 fffff880`03362998 fffff880`033637f8 fffff800`02a11000 : nt!KiPageFault+0x260
fffff880`03362950 fffff800`02abb9ef : fffff880`033637f8 fffff880`03363060 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`03363030 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16f
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlDispatchException+122
fffff800`02aae7a2 410fb60c24 movzx ecx,byte ptr [r12]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlDispatchException+122
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!RtlDispatchException+122
BUCKET_ID: X64_0xA_VRF_nt!RtlDispatchException+122
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122310-28470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a05000 PsLoadedModuleList = 0xfffff800`02c42e50
Debug session time: Wed Dec 22 15:13:44.092 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:41.559
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002ba88c7, fffff880031a1878, fffff880031a10e0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+14d3 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ba88c7, The address that the exception occurred at
Arg3: fffff880031a1878, Exception Record Address
Arg4: fffff880031a10e0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExDeferredFreePool+14d3
fffff800`02ba88c7 4c3910 cmp qword ptr [rax],r10
EXCEPTION_RECORD: fffff880031a1878 -- (.exr 0xfffff880031a1878)
ExceptionAddress: fffff80002ba88c7 (nt!ExDeferredFreePool+0x00000000000014d3)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880031a10e0 -- (.cxr 0xfffff880031a10e0)
rax=fffef8a00284ec40 rbx=fffff8a0028bc150 rcx=0000000000000541
rdx=fffff8a0028bc190 rsi=fffffa80039fcb60 rdi=fffffa800397d148
rip=fffff80002ba88c7 rsp=fffff880031a1ab0 rbp=0000000000000000
r8=0000000000000001 r9=fffff8a0028bc1a0 r10=fffff8a0028bc1a0
r11=000000000000010d r12=0000000000000001 r13=fffff8a0028bc160
r14=0000000000000000 r15=fffffa800397d140
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExDeferredFreePool+0x14d3:
fffff800`02ba88c7 4c3910 cmp qword ptr [rax],r10 ds:002b:fffef8a0`0284ec40=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cad0e0
ffffffffffffffff
FOLLOWUP_IP:
nt!ExDeferredFreePool+14d3
fffff800`02ba88c7 4c3910 cmp qword ptr [rax],r10
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002d69bfe to fffff80002ba88c7
STACK_TEXT:
fffff880`031a1ab0 fffff800`02d69bfe : 00000000`936c134e 00000000`00000200 fffff8a0`624e4d43 00000000`00000000 : nt!ExDeferredFreePool+0x14d3
fffff880`031a1b60 fffff800`02d69ac8 : fffff8a0`00c856f8 00000000`00000001 fffff8a0`00022010 ffffffff`ffffffff : nt!CmpDereferenceNameControlBlockWithLock+0xd6
fffff880`031a1b90 fffff800`02d68400 : 00000000`00000000 fffff800`02d6855d 00000000`624e4d43 00000000`00010216 : nt!CmpCleanUpKcbCacheWithLock+0x34
fffff880`031a1bc0 fffff800`02d6860b : 00000000`00000000 00000000`00000001 fffff8a0`00022010 00000000`00000001 : nt!CmpDereferenceKeyControlBlockWithLock+0x150
fffff880`031a1bf0 fffff800`02d689c4 : 00000000`00000000 00000000`00000001 fffff8a0`00022010 fffffa80`039fcb60 : nt!CmpDereferenceKeyControlBlock+0x11f
fffff880`031a1c40 fffff800`02a82961 : fffff800`02d688dc fffff800`02c1a5f8 fffffa80`039fcb60 00000000`00000000 : nt!CmpDelayDerefKCBWorker+0xe8
fffff880`031a1c70 fffff800`02d19c06 : 00000000`00000bec fffffa80`039fcb60 00000000`00000080 fffffa80`039e3040 : nt!ExpWorkerThread+0x111
fffff880`031a1d00 fffff800`02a53c26 : fffff880`02f64180 fffffa80`039fcb60 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031a1d40 00000000`00000000 : fffff880`031a2000 fffff880`0319c000 fffff880`031a15a0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+14d3
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff880031a10e0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_VRF_nt!ExDeferredFreePool+14d3
BUCKET_ID: X64_0x7E_VRF_nt!ExDeferredFreePool+14d3
Followup: Pool_corruption
---------