Advertisement
Guest User

Untitled

a guest
Mar 11th, 2011
228
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.51 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Summary Dump File: Only kernel address space is available
  8.  
  9. Symbol search path is: http://msdl.microsoft.com/download/symbols
  10. Executable search path is:
  11. Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
  14. Machine Name:
  15. Kernel base = 0xfffff800`01c01000 PsLoadedModuleList = 0xfffff800`01e46e90
  16. Debug session time: Wed Mar 9 18:40:55.315 2011 (UTC + 1:00)
  17. System Uptime: 0 days 0:00:34.986
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. .......................................
  22. Loading User Symbols
  23. PEB is paged out (Peb.Ldr = 000007ff`fffd4018). Type ".hh dbgerr001" for details
  24. Loading unloaded module list
  25. ....
  26. The context is partially valid. Only x86 user-mode context is available.
  27. The wow64exts extension must be loaded to access 32-bit state.
  28. .load wow64exts will do this if you haven't loaded it already.
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. Use !analyze -v to get detailed debugging information.
  36.  
  37. BugCheck C5, {8, 2, 0, fffff80001dada9b}
  38.  
  39. Probably caused by : Unknown_Image ( nt!ExDeferredFreePool+1df )
  40.  
  41. Followup: MachineOwner
  42. ---------
  43.  
  44. 16.6: kd:x86> !analyze -v
  45. *******************************************************************************
  46. * *
  47. * Bugcheck Analysis *
  48. * *
  49. *******************************************************************************
  50.  
  51. DRIVER_CORRUPTED_EXPOOL (c5)
  52. An attempt was made to access a pageable (or completely invalid) address at an
  53. interrupt request level (IRQL) that is too high. This is
  54. caused by drivers that have corrupted the system pool. Run the driver
  55. verifier against any new (or suspect) drivers, and if that doesn't turn up
  56. the culprit, then use gflags to enable special pool.
  57. Arguments:
  58. Arg1: 0000000000000008, memory referenced
  59. Arg2: 0000000000000002, IRQL
  60. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  61. Arg4: fffff80001dada9b, address which referenced memory
  62.  
  63. Debugging Details:
  64. ------------------
  65.  
  66.  
  67. BUGCHECK_STR: 0xC5_2
  68.  
  69. CURRENT_IRQL: 0
  70.  
  71. FAULTING_IP:
  72. nt!ExDeferredFreePool+1df
  73. fffff800`01dada9b 4c dec esp
  74.  
  75. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  76.  
  77. LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000000000000
  78.  
  79. STACK_TEXT:
  80. 00000000 00000000 00000000 00000000 00000000 0x0
  81.  
  82.  
  83. STACK_COMMAND: .bugcheck ; kb
  84.  
  85. FOLLOWUP_IP:
  86. nt!ExDeferredFreePool+1df
  87. fffff800`01dada9b 4c dec esp
  88.  
  89. SYMBOL_NAME: nt!ExDeferredFreePool+1df
  90.  
  91. FOLLOWUP_NAME: MachineOwner
  92.  
  93. IMAGE_NAME: Unknown_Image
  94.  
  95. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  96.  
  97. MODULE_NAME: Unknown_Module
  98.  
  99. BUCKET_ID: INVALID_KERNEL_CONTEXT
  100.  
  101. Followup: MachineOwner
  102. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement