Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [c:\windows\minidump\Mini060708-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\windows\symbols
Executable search path is: c:\windows\i386
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Sat Jun 7 13:54:31.921 2008 (GMT+3)
System Uptime: 0 days 2:14:23.521
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................................................................................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, cd4, 760045, e23bb728}
GetUlongFromAddress: unable to read from 805637f0
GetUlongFromAddress: unable to read from 805637f0
Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegments+3db )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 00000007, Attempt to free pool which was already freed
Arg2: 00000cd4, (reserved)
Arg3: 00760045, Memory contents of the pool block
Arg4: e23bb728, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from 805637f0
GetUlongFromAddress: unable to read from 805637f0
POOL_ADDRESS: e23bb728
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: csrss.exe
LAST_CONTROL_TRANSFER: from 80551fc5 to 80537672
STACK_TEXT:
b9eeda54 80551fc5 000000c2 00000007 00000cd4 nt!MiRemoveUnusedSegments+0x3db
b9eedaa4 8056ec09 e23bb728 00000000 e1547958 nt!KiProfileLock+0x1
b9eedb00 8056d03b e1547970 00000000 87b893a0 nt!NtQueryInformationToken+0x89b
b9eedb78 80570402 00000000 b9eedbb8 00000040 nt!NtQueryVolumeInformationFile+0x30
b9eedbcc 80585018 00000000 00000000 00000001 nt!CmpConstructName+0xb3
b9eedd54 804dd98f 006aea44 006aea0c 006aea70 nt!MiCreateImageFileMap+0x9ba
b9eedd60 006aea70 7c90e4f4 badb0d00 006ae9f8 nt!ZwSetSystemInformation+0x13
WARNING: Frame IP not in any known module. Following frames may be wrong.
b9eedd64 7c90e4f4 badb0d00 006ae9f8 00000000 0x6aea70
b9eedd68 badb0d00 006ae9f8 00000000 32210020 0x7c90e4f4
b9eedd6c 006ae9f8 00000000 32210020 00000000 0xbadb0d00
b9eedd70 00000000 32210020 00000000 00000000 0x6ae9f8
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRemoveUnusedSegments+3db
80537672 5d pop ebp
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiRemoveUnusedSegments+3db
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 48025de7
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xc2_7_nt!MiRemoveUnusedSegments+3db
BUCKET_ID: 0xc2_7_nt!MiRemoveUnusedSegments+3db
Followup: MachineOwner
---------
Friday, June 20, 2008
Probably caused by : memory_corruption ( nt!MiRemoveUnusedSegments+3db )
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment