Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-24616-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03059e50
Debug session time: Sat Mar 26 19:45:32.904 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:28.231
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff888031b6233, 0, fffff88000c4ef8f, 5}
Unable to load image \SystemRoot\system32\drivers\peauth.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for peauth.sys
*** ERROR: Module load completed but symbols could not be loaded for peauth.sys
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff888031b6233, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88000c4ef8f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c40e0
fffff888031b6233
FAULTING_IP:
CI!MFKeyIsTrustedRootKey+369d3
fffff880`00c4ef8f 420fb66cc103 movzx ebp,byte ptr [rcx+r8*8+3]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880031b6180 -- (.trap 0xfffff880031b6180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000df rbx=0000000000000000 rcx=fffff880031b64b0
rdx=00000000008d356a rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000c4ef8f rsp=fffff880031b6318 rbp=fffff880031b64a0
r8=00000000ffffffb0 r9=000000008dea08ca r10=0000000008974fed
r11=00000000d7ac3d2c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
CI!MFKeyIsTrustedRootKey+0x369d3:
fffff880`00c4ef8f 420fb66cc103 movzx ebp,byte ptr [rcx+r8*8+3] ds:4542:fffff888`031b6233=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f0b8c1 to fffff80002e8c740
STACK_TEXT:
fffff880`031b6018 fffff800`02f0b8c1 : 00000000`00000050 fffff888`031b6233 00000000`00000000 fffff880`031b6180 : nt!KeBugCheckEx
fffff880`031b6020 fffff800`02e8a82e : 00000000`00000000 00000000`20c515b5 00000000`00000000 fffff880`031b6350 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`031b6180 fffff880`00c4ef8f : fffff8a0`00009eb0 fffff8a0`02bb1034 fffff880`00c56418 fffff880`031b6350 : nt!KiPageFault+0x16e
fffff880`031b6318 fffff880`00c56418 : fffff880`031b6350 fffff880`031b64a0 00000000`00000711 3c43bab7`089713aa : CI!MFKeyIsTrustedRootKey+0x369d3
fffff880`031b6330 fffff880`00c5663c : 00000000`00000711 fffff8a0`02bb1000 fffff8a0`02bb1034 00000000`000015f7 : CI!MFKeyIsTrustedRootKey+0x3de5c
fffff880`031b66a0 fffff880`00c03616 : 83a89215`4132ef92 00000000`00000711 00000000`00000001 fffff8a0`02bb1000 : CI!peauthvbn_SetDebugCredentialsData+0x40
fffff880`031b66f0 fffff880`00c15d0a : 00000000`00000000 00000000`00000000 fffff880`0688b000 00000000`000007ff : CI!PEAuthSetDebugCredentialsData+0x52
fffff880`031b6720 fffff880`00c0ab08 : ffffffff`80000d98 00000000`00000000 00000000`000015f7 fffff880`06890250 : CI!PEPerformInitializationChecks+0xca
fffff880`031b67a0 fffff880`0689c391 : fffff880`06890500 fffff8a0`02bb1000 00000000`00000000 00000000`00000002 : CI!CiGetPEInformation+0xc0
fffff880`031b67e0 fffff880`06890500 : fffff8a0`02bb1000 00000000`00000000 00000000`00000002 fffffa80`0a1e9a70 : peauth+0x19391
fffff880`031b67e8 fffff8a0`02bb1000 : 00000000`00000000 00000000`00000002 fffffa80`0a1e9a70 fffff880`06923119 : peauth+0xd500
fffff880`031b67f0 00000000`00000000 : 00000000`00000002 fffffa80`0a1e9a70 fffff880`06923119 fffff8a0`02bb1000 : 0xfffff8a0`02bb1000
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !CI
fffff88000c4ef50 - CI!MFKeyIsTrustedRootKey+36994
[ 20:30 ]
1 error : !CI (fffff88000c4ef50)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-28563-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50
Debug session time: Sat Mar 26 20:05:40.924 2011 (UTC - 4:00)
System Uptime: 0 days 0:09:07.625
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffff8a00cd267d0, fffff8a00cd26810, 5040201}
GetPointerFromAddress: unable to read from fffff800030f10e0
Probably caused by : ntkrnlmp.exe ( nt!RtlDeleteElementGenericTableAvl+4e )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a00cd267d0, The pool entry we were looking for within the page.
Arg3: fffff8a00cd26810, The next pool entry.
Arg4: 0000000005040201, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: fffff8a00cd267d0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002fec6d3 to fffff80002eb9740
STACK_TEXT:
fffff880`0318c878 fffff800`02fec6d3 : 00000000`00000019 00000000`00000020 fffff8a0`0cd267d0 fffff8a0`0cd26810 : nt!KeBugCheckEx
fffff880`0318c880 fffff800`02e8a9ee : fffff8a0`0cd50b40 fffff800`0305e5a0 fffffa80`7346744e fffffa80`07b52180 : nt!ExDeferredFreePool+0x12c4
fffff880`0318c930 fffff880`012cbf69 : fffff880`0318c9f0 00000000`00000745 fffff8a0`0cd267e0 fffffa80`0701ec20 : nt!RtlDeleteElementGenericTableAvl+0x4e
fffff880`0318c960 fffff880`0123ef6a : fffff800`0305e5a0 fffff880`0318cb01 fffff880`0318c9e1 fffff8a0`0cd50b40 : Ntfs!NtfsDeleteFcb+0x179
fffff880`0318c9c0 fffff880`012c92cc : fffffa80`0701ec20 fffffa80`07b52180 fffff8a0`0cd50b40 fffff8a0`0cd50ed8 : Ntfs!NtfsTeardownFromLcb+0x1ea
fffff880`0318ca50 fffff880`01247882 : fffffa80`0701ec20 fffffa80`0701ec20 fffff8a0`0cd50b40 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xcc
fffff880`0318cad0 fffff880`012e0813 : fffffa80`0701ec20 fffff800`0305e5a0 fffff8a0`0cd50b40 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2
fffff880`0318cb10 fffff880`012ba38f : fffffa80`0701ec20 fffff8a0`0cd50c70 fffff8a0`0cd50b40 fffffa80`07b52180 : Ntfs!NtfsCommonClose+0x353
fffff880`0318cbe0 fffff800`02ec6961 : 00000000`00000000 fffff880`01239200 fffffa80`06a3f101 00000500`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`0318ccb0 fffff800`0315c7c6 : 00000500`00000000 fffffa80`06a3f1a0 00000000`00000080 fffffa80`06a27040 : nt!ExpWorkerThread+0x111
fffff880`0318cd40 fffff800`02e97c26 : fffff880`02f64180 fffffa80`06a3f1a0 fffff880`02f6efc0 00000500`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0318cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlDeleteElementGenericTableAvl+4e
fffff800`02e8a9ee b001 mov al,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!RtlDeleteElementGenericTableAvl+4e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x19_20_nt!RtlDeleteElementGenericTableAvl+4e
BUCKET_ID: X64_0x19_20_nt!RtlDeleteElementGenericTableAvl+4e
Followup: MachineOwner
---------