*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 109b, 908, fffff880071608a8}
Unable to load image \SystemRoot\system32\DRIVERS\NETw5s64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for NETw5s64.sys
*** ERROR: Module load completed but symbols could not be loaded for NETw5s64.sys
GetPointerFromAddress: unable to read from fffff800032b0100
GetUlongFromAddress: unable to read from fffff8000321ea18
Probably caused by : NETw5s64.sys ( NETw5s64+e157 )
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000109b, (reserved)
Arg3: 0000000000000908, Memory contents of the pool block
Arg4: fffff880071608a8, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from fffff8000321ea18
POOL_ADDRESS: fffff880071608a8
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800031abbe9 to fffff80003080d00
STACK_TEXT:
fffff880`0ac9d5e8 fffff800`031abbe9 : 00000000`000000c2 00000000`00000007 00000000`0000109b 00000000`00000908 : nt!KeBugCheckEx
fffff880`0ac9d5f0 fffff880`01610195 : fffffa80`03e0d28f fffffa80`07efcc30 00000000`00000000 fffffa80`03e0d28f : nt!ExDeferredFreePool+0x1201
fffff880`0ac9d6a0 fffff880`05872157 : fffffa80`0419de20 fffffa80`03e0d218 fffffa80`03f9d180 fffff880`0587070d : ndis!NdisFreeMemory+0x15
fffff880`0ac9d6d0 fffffa80`0419de20 : fffffa80`03e0d218 fffffa80`03f9d180 fffff880`0587070d fffff880`0ac9d740 : NETw5s64+0xe157
fffff880`0ac9d6d8 fffffa80`03e0d218 : fffffa80`03f9d180 fffff880`0587070d fffff880`0ac9d740 fffff880`00000000 : 0xfffffa80`0419de20
fffff880`0ac9d6e0 fffffa80`03f9d180 : fffff880`0587070d fffff880`0ac9d740 fffff880`00000000 fffffa80`00000001 : 0xfffffa80`03e0d218
fffff880`0ac9d6e8 fffff880`0587070d : fffff880`0ac9d740 fffff880`00000000 fffffa80`00000001 fffff880`071608a8 : 0xfffffa80`03f9d180
fffff880`0ac9d6f0 fffff880`0ac9d740 : fffff880`00000000 fffffa80`00000001 fffff880`071608a8 fffffa80`07334a40 : NETw5s64+0xc70d
fffff880`0ac9d6f8 fffff880`00000000 : fffffa80`00000001 fffff880`071608a8 fffffa80`07334a40 fffff880`00000010 : 0xfffff880`0ac9d740
fffff880`0ac9d700 fffffa80`00000001 : fffff880`071608a8 fffffa80`07334a40 fffff880`00000010 00000000`00000000 : 0xfffff880`00000000
fffff880`0ac9d708 fffff880`071608a8 : fffffa80`07334a40 fffff880`00000010 00000000`00000000 fffffa80`03e0d28f : 0xfffffa80`00000001
fffff880`0ac9d710 fffffa80`07334a40 : fffff880`00000010 00000000`00000000 fffffa80`03e0d28f fffffa80`07f2ac20 : 0xfffff880`071608a8
fffff880`0ac9d718 fffff880`00000010 : 00000000`00000000 fffffa80`03e0d28f fffffa80`07f2ac20 fffff880`05a570d2 : 0xfffffa80`07334a40
fffff880`0ac9d720 00000000`00000000 : fffffa80`03e0d28f fffffa80`07f2ac20 fffff880`05a570d2 fffffa80`00000048 : 0xfffff880`00000010
STACK_COMMAND: kb
FOLLOWUP_IP:
NETw5s64+e157
fffff880`05872157 ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETw5s64+e157
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETw5s64
IMAGE_NAME: NETw5s64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ba1b871
FAILURE_BUCKET_ID: X64_0xc2_7_NETw5s64+e157
BUCKET_ID: X64_0xc2_7_NETw5s64+e157
Followup: MachineOwner
---------