Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Software Troubleshooting
Constant Blue Screens (Netio.sys)
Message
<blockquote data-quote="Smith83" data-source="post: 516630"><p><span style="font-size: 15px"><strong>Analysis</strong></span> and posting your dumps... Give me a bit to go over the information.</p><p></p><p>[code]</p><p>*******************************************************************************</p><p>* *</p><p>* Bugcheck Analysis *</p><p>* *</p><p>*******************************************************************************</p><p></p><p>BAD_POOL_CALLER (c2)</p><p>The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.</p><p>Arguments:</p><p>Arg1: 0000000000000099, Attempt to free pool with invalid address (or corruption in pool header)</p><p>Arg2: ffffe000ef35e9e8, Address being freed</p><p>Arg3: 0000000000000000, 0</p><p>Arg4: 0000000000000000, 0</p><p></p><p>Debugging Details:</p><p>------------------</p><p></p><p>TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2</p><p></p><p>FAULTING_IP:</p><p>NETIO! ?? ::FNODOBFM::`string'+9bb0</p><p>fffff801`5ab54a20 90 nop</p><p></p><p>BUGCHECK_STR: 0xc2_99</p><p></p><p>CUSTOMER_CRASH_COUNT: 1</p><p></p><p>DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT</p><p></p><p>PROCESS_NAME: System</p><p></p><p>CURRENT_IRQL: 2</p><p></p><p>BAD_PAGES_DETECTED: b975</p><p></p><p>LAST_CONTROL_TRANSFER: from fffff802e83392c8 to fffff802e7dbc780</p><p></p><p>STACK_TEXT:</p><p>ffffd001`80fefdf8 fffff802`e83392c8 : 00000000`000000c2 00000000`00000099 ffffe000`ef35e9e8 00000000`00000000 : nt!KeBugCheckEx</p><p>ffffd001`80fefe00 fffff802`e7e522c1 : 00000000`00000000 fffff801`5b0b0230 ffffe000`e651b860 fffff801`5b0ac000 : nt!VerifierBugCheckIfAppropriate+0x3c</p><p>ffffd001`80fefe40 fffff802`e7eabd7d : ffffe000`ef35e9d8 00000000`00000550 00000000`00000000 fffff801`5af701c7 : nt!VerifierFreeTrackedPool+0x41</p><p>ffffd001`80fefe80 fffff801`5ab54a20 : fffff801`5b0bc250 fffff801`5b0ac002 00000000`00000000 fffff801`5b0b0230 : nt!ExDeferredFreePool+0x5cd</p><p>ffffd001`80feff60 fffff801`5aff5c32 : ffffd001`80ff0100 ffffe000`e98aa1a0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0</p><p>ffffd001`80feffb0 fffff801`5ab2128a : 00000000`00000000 00000000`00000002 fffff801`5af6b9c0 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0x8a272</p><p>ffffd001`80ff0000 fffff801`5af3c560 : 00000000`00000002 00000000`00000000 ffffe000`e98aa030 ffffd001`80ff0169 : NETIO!NetioDereferenceNetBufferListChain+0xea</p><p>ffffd001`80ff00d0 fffff801`5af3d818 : fffff801`5b0ac000 ffffe000`e6598940 00000000`00000002 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x4b0</p><p>ffffd001`80ff01d0 fffff801`5af7e1ff : ffffe000`ec5ffaf0 ffffe000`e98aa030 ffffd001`80ff0301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338</p><p>ffffd001`80ff02f0 fffff801`5af7d85e : 00000000`00000002 ffffd001`00000002 fffff801`5af6b9c0 fffff802`e98aa001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f</p><p>ffffd001`80ff03d0 fffff802`e7d20e95 : 00000000`00000002 ffffe000`e63fa040 fffff801`5af7d790 ffffd001`80ff0580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce</p><p>ffffd001`80ff0500 fffff801`5af6bb46 : ffffe000`e6541f00 00000000`00000000 ffffe000`e6541ea0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85</p><p>ffffd001`80ff0550 fffff801`5a5f2d97 : ffffe000`ec5ec2b0 ffffd001`80ff0640 ffffe000`00000002 00000000`00000002 : tcpip!FlReceiveNetBufferListChain+0xb6</p><p>ffffd001`80ff05d0 fffff801`5a5f2558 : ffffe000`ec5ec2b0 ffffe000`e98aa030 ffffe000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7</p><p>ffffd001`80ff0680 fffff801`5a5feef5 : ffffe000`e986b1a0 ffffd001`00000001 ffffe000`e986b1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318</p><p>ffffd001`80ff0780 fffff801`5a5f3d73 : 00000000`002cd2be ffffd001`80ff08d0 00000000`00000000 ffffe000`e9ce7a00 : ndis!ndisCallReceiveHandler+0x85</p><p>ffffd001`80ff07d0 fffff801`5d2a959c : ffffe000`e9915100 ffffe000`0000001f 00000000`00000002 ffffd001`80ff0a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3</p><p>ffffd001`80ff0950 ffffe000`e9915100 : ffffe000`0000001f 00000000`00000002 ffffd001`80ff0a40 ffffe000`00000001 : L1C63x64+0x959c</p><p>ffffd001`80ff0958 ffffe000`0000001f : 00000000`00000002 ffffd001`80ff0a40 ffffe000`00000001 00000000`5d2ad120 : 0xffffe000`e9915100</p><p>ffffd001`80ff0960 00000000`00000002 : ffffd001`80ff0a40 ffffe000`00000001 00000000`5d2ad120 00000000`00000002 : 0xffffe000`0000001f</p><p>ffffd001`80ff0968 ffffd001`80ff0a40 : ffffe000`00000001 00000000`5d2ad120 00000000`00000002 00000000`00000000 : 0x2</p><p>ffffd001`80ff0970 ffffe000`00000001 : 00000000`5d2ad120 00000000`00000002 00000000`00000000 ffffe000`e986b1a0 : 0xffffd001`80ff0a40</p><p>ffffd001`80ff0978 00000000`5d2ad120 : 00000000`00000002 00000000`00000000 ffffe000`e986b1a0 00000000`00010000 : 0xffffe000`00000001</p><p>ffffd001`80ff0980 00000000`00000002 : 00000000`00000000 ffffe000`e986b1a0 00000000`00010000 00000000`00000000 : 0x5d2ad120</p><p>ffffd001`80ff0988 00000000`00000000 : ffffe000`e986b1a0 00000000`00010000 00000000`00000000 ffffd001`80ff0a40 : 0x2</p><p></p><p></p><p>STACK_COMMAND: kb</p><p></p><p>SYMBOL_NAME: PAGE_NOT_ZERO</p><p></p><p>FOLLOWUP_NAME: MachineOwner</p><p></p><p>MODULE_NAME: Unknown_Module</p><p></p><p>IMAGE_NAME: Unknown_Image</p><p></p><p>DEBUG_FLR_IMAGE_TIMESTAMP: 0</p><p></p><p>BUCKET_ID: PAGE_NOT_ZERO</p><p></p><p>Followup: MachineOwner</p><p>---------</p><p></p><p>*** Memory manager detected 47477 instance(s) of page corruption, target is likely to have memory corruption.</p><p></p><p>[/code]</p><p></p><p>[code]</p><p>*******************************************************************************</p><p>* *</p><p>* Bugcheck Analysis *</p><p>* *</p><p>*******************************************************************************</p><p></p><p>BAD_POOL_CALLER (c2)</p><p>The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.</p><p>Arguments:</p><p>Arg1: 0000000000000007, Attempt to free pool which was already freed</p><p>Arg2: 000000000000126c, (reserved)</p><p>Arg3: 00000000cc8531d0, Memory contents of the pool block</p><p>Arg4: ffffe001c5a83228, Address of the block of pool being deallocated</p><p></p><p>Debugging Details:</p><p>------------------</p><p></p><p>GetUlongFromAddress: unable to read from fffff801498efb78</p><p>TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2</p><p></p><p>POOL_ADDRESS: ffffe001c5a83228</p><p></p><p>BUGCHECK_STR: 0xc2_7</p><p></p><p>CUSTOMER_CRASH_COUNT: 1</p><p></p><p>DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT</p><p></p><p>PROCESS_NAME: System</p><p></p><p>CURRENT_IRQL: 2</p><p></p><p>BAD_PAGES_DETECTED: ce44</p><p></p><p>LAST_CONTROL_TRANSFER: from fffff8014984ccf7 to fffff8014975d780</p><p></p><p>STACK_TEXT:</p><p>ffffd001`fbd07698 fffff801`4984ccf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`cc8531d0 : nt!KeBugCheckEx</p><p>ffffd001`fbd076a0 fffff801`46d64a20 : 00000000`00000000 0000bb01`46df0002 00000000`00000006 ffffd001`fd8b6a22 : nt!ExDeferredFreePool+0x547</p><p>ffffd001`fbd07780 fffff801`464d5c32 : ffffe001`c358bd80 ffffe001`c6ac6c30 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0</p><p>ffffd001`fbd077d0 fffff801`46d31781 : ffffe001`c6ac6ac0 00000000`00000001 ffffe001`c4958000 ffffe001`cc077c81 : tcpip!FlpReturnNetBufferListChain+0x8a272</p><p>ffffd001`fbd07820 fffff801`464223d3 : 00000001`00000bc4 ffffe001`c4958000 00000000`00000000 ffffe001`cc077c01 : NETIO!NetioDereferenceNetBufferList+0x161</p><p>ffffd001`fbd078a0 fffff801`463eb959 : ffffe001`c35a0f00 ffffe001`c6ac0002 00000000`00000000 ffffd001`fd8b221a : tcpip!InetInspectReceiveTcpDatagram+0x593</p><p>ffffd001`fbd079b0 fffff801`4641edc7 : ffffe001`c3198cca ffffd001`fbd07d00 00000000`00000002 00000000`ec821ff5 : tcpip!TcpListenerReceive+0x1e9</p><p>ffffd001`fbd07c00 fffff801`4641e475 : 00000000`00000000 00000000`0019464a ffffd001`fd8b2222 00000043`47d7a706 : tcpip!TcpMatchReceive+0x597</p><p>ffffd001`fbd07eb0 fffff801`4641d213 : ffffe001`c358bd80 ffffd001`fbd0e7c2 ffffd001`fbd007ba 00000000`00000002 : tcpip!TcpPreValidatedReceive+0x385</p><p>ffffd001`fbd07fa0 fffff801`4641cd80 : ffffd001`fbd08078 fffff801`49938180 fffff443`877df253 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73</p><p>ffffd001`fbd08060 fffff801`4641c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 ffffd001`fbd08169 : tcpip!IppProcessDeliverList+0x60</p><p>ffffd001`fbd080d0 fffff801`4641d818 : fffff801`4658c000 ffffe001`c35cb940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388</p><p>ffffd001`fbd081d0 fffff801`4645e1ff : ffffe001`c75dd230 ffffe001`c6ac6ac0 ffffd001`fbd08301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338</p><p>ffffd001`fbd082f0 fffff801`4645d85e : ffffe001`c69c0002 ffffd001`00000001 fffff801`4644b9c0 ffffd001`c6ac6a01 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f</p><p>ffffd001`fbd083d0 fffff801`496c1e95 : 00000000`00000002 ffffe001`c351b800 fffff801`4645d790 ffffd001`fbd08580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce</p><p>ffffd001`fbd08500 fffff801`4644bb46 : ffffe001`c35da8c0 00000000`00000000 ffffe001`c35da860 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85</p><p>ffffd001`fbd08550 fffff801`46c12d97 : ffffe001`c75dbc10 ffffd001`fbd08640 ffffe001`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6</p><p>ffffd001`fbd085d0 fffff801`46c12558 : ffffe001`c75dbc10 ffffe001`c6ac6ac0 ffffe001`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7</p><p>ffffd001`fbd08680 fffff801`46c1eef5 : ffffe001`c65d91a0 ffffd001`00000001 ffffe001`c65d91a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318</p><p>ffffd001`fbd08780 fffff801`46c13d73 : 00000000`001c3833 ffffd001`fbd088d0 00000000`00000000 00000000`00000100 : ndis!ndisCallReceiveHandler+0x85</p><p>ffffd001`fbd087d0 fffff801`4cb1959c : 00000002`00000000 00000004`000001bb 00000000`00000000 ffffd001`fbd08a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3</p><p>ffffd001`fbd08950 00000002`00000000 : 00000004`000001bb 00000000`00000000 ffffd001`fbd08a40 00000000`00000001 : L1C63x64+0x959c</p><p>ffffd001`fbd08958 00000004`000001bb : 00000000`00000000 ffffd001`fbd08a40 00000000`00000001 00000000`00000000 : 0x2`00000000</p><p>ffffd001`fbd08960 00000000`00000000 : ffffd001`fbd08a40 00000000`00000001 00000000`00000000 00000000`00000002 : 0x4`000001bb</p><p></p><p></p><p>STACK_COMMAND: kb</p><p></p><p>SYMBOL_NAME: PAGE_NOT_ZERO</p><p></p><p>FOLLOWUP_NAME: MachineOwner</p><p></p><p>MODULE_NAME: Unknown_Module</p><p></p><p>IMAGE_NAME: Unknown_Image</p><p></p><p>DEBUG_FLR_IMAGE_TIMESTAMP: 0</p><p></p><p>BUCKET_ID: PAGE_NOT_ZERO</p><p></p><p>Followup: MachineOwner</p><p>---------</p><p></p><p>*** Memory manager detected 52804 instance(s) of page corruption, target is likely to have memory corruption.</p><p>[/code]</p><p></p><p>[code]</p><p>*******************************************************************************</p><p>* *</p><p>* Bugcheck Analysis *</p><p>* *</p><p>*******************************************************************************</p><p></p><p>BAD_POOL_CALLER (c2)</p><p>The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.</p><p>Arguments:</p><p>Arg1: 0000000000000007, Attempt to free pool which was already freed</p><p>Arg2: 000000000000126c, (reserved)</p><p>Arg3: 0000000000000000, Memory contents of the pool block</p><p>Arg4: ffffe001dcf76178, Address of the block of pool being deallocated</p><p></p><p>Debugging Details:</p><p>------------------</p><p></p><p>GetUlongFromAddress: unable to read from fffff802404e5b78</p><p>TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2</p><p></p><p>POOL_ADDRESS: ffffe001dcf76178</p><p></p><p>BUGCHECK_STR: 0xc2_7</p><p></p><p>CUSTOMER_CRASH_COUNT: 1</p><p></p><p>DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT</p><p></p><p>PROCESS_NAME: System</p><p></p><p>CURRENT_IRQL: 2</p><p></p><p>BAD_PAGES_DETECTED: e554</p><p></p><p>LAST_CONTROL_TRANSFER: from fffff80240442cf7 to fffff80240353780</p><p></p><p>STACK_TEXT:</p><p>fffff802`4230e418 fffff802`40442cf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00000000 : nt!KeBugCheckEx</p><p>fffff802`4230e420 fffff801`ae954a20 : 00000000`00000000 0000bb01`9fd00002 00000000`00000006 00000000`00000000 : nt!ExDeferredFreePool+0x547</p><p>fffff802`4230e500 fffff801`aeac5c32 : ffffe001`d73e4000 ffffe001`d732aac0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0</p><p>fffff802`4230e550 fffff801`ae921781 : ffffe001`d732a950 00000000`00000001 ffffe001`d5179000 ffffe001`e0eead91 : tcpip!FlpReturnNetBufferListChain+0x8a272</p><p>fffff802`4230e5a0 fffff801`aea123d3 : 00000001`00001220 ffffe001`d5179000 00000000`00000000 ffffe001`e0eeae01 : NETIO!NetioDereferenceNetBufferList+0x161</p><p>fffff802`4230e620 fffff801`ae9db959 : ffffe001`d24ccf00 ffffe001`d7320002 00000000`00000000 ffffd001`667c861a : tcpip!InetInspectReceiveTcpDatagram+0x593</p><p>fffff802`4230e730 fffff801`aea0edc7 : ffffe001`da64b4ea fffff802`4230ea80 00000000`00000002 00000000`a326708e : tcpip!TcpListenerReceive+0x1e9</p><p>fffff802`4230e980 fffff801`aea0e475 : 00000000`00000000 00000000`0019464b ffffd001`667c8622 00000021`d79dcfab : tcpip!TcpMatchReceive+0x597</p><p>fffff802`4230ec30 fffff801`aea0d213 : ffffe001`d3dbcab0 fffff802`4230e7c2 fffff802`4230c1bf 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x385</p><p>fffff802`4230ed20 fffff801`aea0cd80 : fffff802`4230edf8 fffff802`4052e180 ffff7bf4`20897f2e fffff802`402eaa70 : tcpip!IppDeliverListToProtocol+0x73</p><p>fffff802`4230ede0 fffff801`aea0c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 fffff802`4230eee9 : tcpip!IppProcessDeliverList+0x60</p><p>fffff802`4230ee50 fffff801`aea0d818 : fffff801`aeb7c000 ffffe001`d50d8940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388</p><p>fffff802`4230ef50 fffff801`aea4e1ff : ffffe001`daa0a8d0 ffffe001`d732a950 fffff802`4230f101 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338</p><p>fffff802`4230f070 fffff801`aea4d85e : ffffe001`daac0002 fffff802`00000001 fffff801`aea3b9c0 fffff802`d732a901 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f</p><p>fffff802`4230f150 fffff802`402b7e95 : 00000000`00000002 fffff802`405a4740 fffff801`aea4d790 fffff802`4230f300 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce</p><p>fffff802`4230f280 fffff801`aea3bb46 : ffffe001`d3dfd820 00000000`00000000 ffffe001`d3dfcfb0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85</p><p>fffff802`4230f2d0 fffff801`ae802d97 : ffffe001`d95ef010 fffff802`4230f3c0 ffffe001`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6</p><p>fffff802`4230f350 fffff801`ae802558 : ffffe001`d95ef010 ffffe001`d732a950 ffffe001`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7</p><p>fffff802`4230f400 fffff801`ae80eef5 : ffffe001`d6a5e1a0 fffff802`00000001 ffffe001`d6a5e1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318</p><p>fffff802`4230f500 fffff801`ae803d73 : 00000000`000e31c8 fffff802`4230f650 00000000`00000000 ffffd001`6a66c180 : ndis!ndisCallReceiveHandler+0x85</p><p>fffff802`4230f550 fffff801`b0d9959c : ffffbecf`85d64f00 fffff802`00000190 ffffe001`d6a62190 fffff802`4230f7b8 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3</p><p>fffff802`4230f6d0 ffffbecf`85d64f00 : fffff802`00000190 ffffe001`d6a62190 fffff802`4230f7b8 ffffe001`00000001 : L1C63x64+0x959c</p><p>fffff802`4230f6d8 fffff802`00000190 : ffffe001`d6a62190 fffff802`4230f7b8 ffffe001`00000001 00000000`00000000 : 0xffffbecf`85d64f00</p><p>fffff802`4230f6e0 ffffe001`d6a62190 : fffff802`4230f7b8 ffffe001`00000001 00000000`00000000 00000000`00000000 : 0xfffff802`00000190</p><p>fffff802`4230f6e8 fffff802`4230f7b8 : ffffe001`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`d6a62190</p><p>fffff802`4230f6f0 ffffe001`00000001 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff802`4230f7b8</p><p>fffff802`4230f6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00010000 : 0xffffe001`00000001</p><p></p><p></p><p>STACK_COMMAND: kb</p><p></p><p>SYMBOL_NAME: PAGE_NOT_ZERO</p><p></p><p>FOLLOWUP_NAME: MachineOwner</p><p></p><p>MODULE_NAME: Unknown_Module</p><p></p><p>IMAGE_NAME: Unknown_Image</p><p></p><p>DEBUG_FLR_IMAGE_TIMESTAMP: 0</p><p></p><p>BUCKET_ID: PAGE_NOT_ZERO</p><p></p><p>Followup: MachineOwner</p><p>---------</p><p></p><p>*** Memory manager detected 58708 instance(s) of page corruption, target is likely to have memory corruption.</p><p>[/code]</p><p></p><p>[code]</p><p>*******************************************************************************</p><p>* *</p><p>* Bugcheck Analysis *</p><p>* *</p><p>*******************************************************************************</p><p></p><p>BAD_POOL_CALLER (c2)</p><p>The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.</p><p>Arguments:</p><p>Arg1: 0000000000000007, Attempt to free pool which was already freed</p><p>Arg2: 000000000000126c, (reserved)</p><p>Arg3: 0000000000001000, Memory contents of the pool block</p><p>Arg4: ffffe00056fce088, Address of the block of pool being deallocated</p><p></p><p>Debugging Details:</p><p>------------------</p><p></p><p>GetUlongFromAddress: unable to read from fffff802fa747b78</p><p>TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2</p><p></p><p>POOL_ADDRESS: ffffe00056fce088</p><p></p><p>BUGCHECK_STR: 0xc2_7</p><p></p><p>CUSTOMER_CRASH_COUNT: 1</p><p></p><p>DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT</p><p></p><p>PROCESS_NAME: System</p><p></p><p>CURRENT_IRQL: 2</p><p></p><p>BAD_PAGES_DETECTED: b75c</p><p></p><p>LAST_CONTROL_TRANSFER: from fffff802fa6a4cf7 to fffff802fa5b5780</p><p></p><p>STACK_TEXT:</p><p>ffffd000`ab931698 fffff802`fa6a4cf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00001000 : nt!KeBugCheckEx</p><p>ffffd000`ab9316a0 fffff801`fb994a20 : ffffe000`52c10d00 ffffe000`56ad9300 ffffe000`584fa580 00000000`00000000 : nt!ExDeferredFreePool+0x547</p><p>ffffd000`ab931780 fffff801`fb525c32 : ffffe000`584fa580 ffffe000`52c094d0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0</p><p>ffffd000`ab9317d0 fffff801`fb961781 : ffffe000`52c09360 00000000`00000001 ffffe000`50958000 ffffe000`577c2611 : tcpip!FlpReturnNetBufferListChain+0x8a272</p><p>ffffd000`ab931820 fffff801`fb4723d3 : 00000001`00002b44 ffffe000`50958000 00000000`00000000 ffffe000`58655a01 : NETIO!NetioDereferenceNetBufferList+0x161</p><p>ffffd000`ab9318a0 fffff801`fb43b959 : ffffe000`4dccaf00 ffffe000`52c10002 00000000`00000000 ffffd000`ac6b0a1a : tcpip!InetInspectReceiveTcpDatagram+0x593</p><p>ffffd000`ab9319b0 fffff801`fb46edc7 : ffffe000`59a85bca ffffd000`ab931d00 00000000`00000002 00000000`b22ef88b : tcpip!TcpListenerReceive+0x1e9</p><p>ffffd000`ab931c00 fffff801`fb46e475 : 00000000`00000000 00000000`0019464d ffffd000`ac6b0a22 000000e6`b331d6c0 : tcpip!TcpMatchReceive+0x597</p><p>ffffd000`ab931eb0 fffff801`fb46d213 : ffffe000`508d1200 ffffd000`ab93e7c2 ffffd000`ab93a9bc 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x385</p><p>ffffd000`ab931fa0 fffff801`fb46cd80 : ffffd000`ab932078 fffff802`fa790180 ffff587a`9272e124 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73</p><p>ffffd000`ab932060 fffff801`fb46c438 : 00000000`e0000001 00000000`00000000 00000000`00000000 ffffd000`ab932169 : tcpip!IppProcessDeliverList+0x60</p><p>ffffd000`ab9320d0 fffff801`fb46d818 : fffff801`fb5dc000 ffffe000`508ad940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388</p><p>ffffd000`ab9321d0 fffff801`fb4ae1ff : ffffe000`52bbeb60 ffffe000`52c09360 ffffd000`ab932301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338</p><p>ffffd000`ab9322f0 fffff801`fb4ad85e : ffffe000`4f520002 ffffd000`00000001 fffff801`fb49b9c0 fffff801`52c09301 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f</p><p>ffffd000`ab9323d0 fffff802`fa519e95 : 00000000`00000002 ffffe000`4f527040 fffff801`fb4ad790 ffffd000`ab932580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce</p><p>ffffd000`ab932500 fffff801`fb49bb46 : ffffe000`4f5e2f00 00000000`00000000 ffffe000`4f5e2ea0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85</p><p>ffffd000`ab932550 fffff801`fb842d97 : ffffe000`52bbe6d0 ffffd000`ab932640 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6</p><p>ffffd000`ab9325d0 fffff801`fb842558 : ffffe000`52bbe6d0 ffffe000`52c09360 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7</p><p>ffffd000`ab932680 fffff801`fb84eef5 : ffffe000`509af1a0 ffffd000`00000001 ffffe000`509af1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318</p><p>ffffd000`ab932780 fffff801`fb843d73 : 00000000`0060c338 ffffd000`ab9328d0 00000000`00000000 ffffe000`52bb9300 : ndis!ndisCallReceiveHandler+0x85</p><p>ffffd000`ab9327d0 fffff801`fd43959c : ffffe000`52d5c500 ffffe000`00000106 00000000`00000002 ffffd000`ab932a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3</p><p>ffffd000`ab932950 ffffe000`52d5c500 : ffffe000`00000106 00000000`00000002 ffffd000`ab932a40 ffffe000`00000001 : L1C63x64+0x959c</p><p>ffffd000`ab932958 ffffe000`00000106 : 00000000`00000002 ffffd000`ab932a40 ffffe000`00000001 00000000`fd43d120 : 0xffffe000`52d5c500</p><p>ffffd000`ab932960 00000000`00000002 : ffffd000`ab932a40 ffffe000`00000001 00000000`fd43d120 00000000`00000002 : 0xffffe000`00000106</p><p>ffffd000`ab932968 ffffd000`ab932a40 : ffffe000`00000001 00000000`fd43d120 00000000`00000002 00000000`00000000 : 0x2</p><p>ffffd000`ab932970 ffffe000`00000001 : 00000000`fd43d120 00000000`00000002 00000000`00000000 ffffe000`509af1a0 : 0xffffd000`ab932a40</p><p>ffffd000`ab932978 00000000`fd43d120 : 00000000`00000002 00000000`00000000 ffffe000`509af1a0 00000000`00010000 : 0xffffe000`00000001</p><p>ffffd000`ab932980 00000000`00000002 : 00000000`00000000 ffffe000`509af1a0 00000000`00010000 00000000`00000000 : 0xfd43d120</p><p>ffffd000`ab932988 00000000`00000000 : ffffe000`509af1a0 00000000`00010000 00000000`00000000 ffffd000`ab932a40 : 0x2</p><p></p><p></p><p>STACK_COMMAND: kb</p><p></p><p>SYMBOL_NAME: PAGE_NOT_ZERO</p><p></p><p>FOLLOWUP_NAME: MachineOwner</p><p></p><p>MODULE_NAME: Unknown_Module</p><p></p><p>IMAGE_NAME: Unknown_Image</p><p></p><p>DEBUG_FLR_IMAGE_TIMESTAMP: 0</p><p></p><p>BUCKET_ID: PAGE_NOT_ZERO</p><p></p><p>Followup: MachineOwner</p><p>---------</p><p></p><p>*** Memory manager detected 46940 instance(s) of page corruption, target is likely to have memory corruption.</p><p>[/code]</p><p></p><p>[code]</p><p>*******************************************************************************</p><p>* *</p><p>* Bugcheck Analysis *</p><p>* *</p><p>*******************************************************************************</p><p></p><p>BAD_POOL_CALLER (c2)</p><p>The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.</p><p>Arguments:</p><p>Arg1: 0000000000000007, Attempt to free pool which was already freed</p><p>Arg2: 000000000000126c, (reserved)</p><p>Arg3: 000000002d8f13b0, Memory contents of the pool block</p><p>Arg4: ffffe0002cd93828, Address of the block of pool being deallocated</p><p></p><p>Debugging Details:</p><p>------------------</p><p></p><p>GetUlongFromAddress: unable to read from fffff801a3eefb78</p><p>TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2</p><p></p><p>POOL_ADDRESS: ffffe0002cd93828</p><p></p><p>BUGCHECK_STR: 0xc2_7</p><p></p><p>CUSTOMER_CRASH_COUNT: 1</p><p></p><p>DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT</p><p></p><p>PROCESS_NAME: java.exe</p><p></p><p>CURRENT_IRQL: 2</p><p></p><p>BAD_PAGES_DETECTED: b73a</p><p></p><p>LAST_CONTROL_TRANSFER: from fffff801a3e4ccf7 to fffff801a3d5d780</p><p></p><p>STACK_TEXT:</p><p>fffff801`a5d4c6c8 fffff801`a3e4ccf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`2d8f13b0 : nt!KeBugCheckEx</p><p>fffff801`a5d4c6d0 fffff800`5bd84a20 : 0000007f`0000007f 00000000`00000001 ffffffff`00000001 00000000`ffffffff : nt!ExDeferredFreePool+0x547</p><p>fffff801`a5d4c7b0 fffff800`5cb35c32 : 00000000`00000000 ffffe000`28a6f1a0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0</p><p>fffff801`a5d4c800 fffff800`5bd51781 : ffffe000`28a6f030 00000000`00000001 ffffe000`26915000 ffffe000`24d55911 : tcpip!FlpReturnNetBufferListChain+0x8a272</p><p>fffff801`a5d4c850 fffff800`5ca823d3 : 00000000`00000002 ffffe000`26915000 00000000`00000400 ffffe000`2dab2401 : NETIO!NetioDereferenceNetBufferList+0x161</p><p>fffff801`a5d4c8d0 fffff800`5ca4b959 : ffffe000`23cd2f00 fffff800`5d9e0002 00000000`00000000 ffffd001`64c47a1a : tcpip!InetInspectReceiveTcpDatagram+0x593</p><p>fffff801`a5d4c9e0 fffff800`5ca7edc7 : ffffe000`2479eada fffff801`a5d4cd30 00000000`00000002 00000000`a2c77592 : tcpip!TcpListenerReceive+0x1e9</p><p>fffff801`a5d4cc30 fffff800`5ca7e475 : 00000000`00000000 00000000`0019464a ffffd001`64c47a22 00000092`fa2c19f2 : tcpip!TcpMatchReceive+0x597</p><p>fffff801`a5d4cee0 fffff800`5ca7d213 : ffffe000`2555aaa0 fffff801`a5d4e7c2 fffff801`a5d4bfe7 ffffe000`293aa000 : tcpip!TcpPreValidatedReceive+0x385</p><p>fffff801`a5d4cfd0 fffff800`5ca7cd80 : 00000000`00000000 00000000`00000000 ffff2346`57c8ce3d 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x73</p><p>fffff801`a5d4d090 fffff800`5ca7c438 : 00000000`e0000001 00000000`00000000 00000000`00000000 fffff801`a5d4d199 : tcpip!IppProcessDeliverList+0x60</p><p>fffff801`a5d4d100 fffff800`5ca7d818 : fffff800`5cbec000 ffffe000`255ec940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388</p><p>fffff801`a5d4d200 fffff800`5cabe1ff : ffffe000`23cc8700 ffffe000`28a6f030 fffff801`a5d4d401 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338</p><p>fffff801`a5d4d320 fffff800`5cabd85e : 00000000`00000002 fffff801`00000001 fffff800`5caab9c0 00000000`28a6f001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f</p><p>fffff801`a5d4d400 fffff801`a3cc1e95 : 00000000`00000002 ffffe000`2e30a800 fffff800`5cabd790 fffff801`a5d4d5b0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce</p><p>fffff801`a5d4d530 fffff800`5caabb46 : ffffe000`2553f860 00000000`00000000 ffffe000`2553ee30 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85</p><p>fffff801`a5d4d580 fffff800`5bc32d97 : ffffe000`2b5b9580 fffff801`a5d4d670 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6</p><p>fffff801`a5d4d600 fffff800`5bc32558 : ffffe000`2b5b9580 ffffe000`28a6f030 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7</p><p>fffff801`a5d4d6b0 fffff800`5bc3eef5 : ffffe000`248ba1a0 fffff801`00000001 ffffe000`248ba1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318</p><p>fffff801`a5d4d7b0 fffff800`5bc33d73 : 00000000`003da58f fffff801`a5d4d900 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x85</p><p>fffff801`a5d4d800 fffff800`5bf3959c : 00000000`00000000 00000000`000001e1 003f0022`00650000 fffff801`a5d4da70 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3</p><p>fffff801`a5d4d980 00000000`00000000 : 00000000`000001e1 003f0022`00650000 fffff801`a5d4da70 ffffe000`00000001 : L1C63x64+0x959c</p><p></p><p></p><p>STACK_COMMAND: kb</p><p></p><p>SYMBOL_NAME: PAGE_NOT_ZERO</p><p></p><p>FOLLOWUP_NAME: MachineOwner</p><p></p><p>MODULE_NAME: Unknown_Module</p><p></p><p>IMAGE_NAME: Unknown_Image</p><p></p><p>DEBUG_FLR_IMAGE_TIMESTAMP: 0</p><p></p><p>BUCKET_ID: PAGE_NOT_ZERO</p><p></p><p>Followup: MachineOwner</p><p>---------</p><p></p><p>*** Memory manager detected 46906 instance(s) of page corruption, target is likely to have memory corruption.</p><p></p><p>[/code]</p><p></p><p>[code]</p><p>*******************************************************************************</p><p>* *</p><p>* Bugcheck Analysis *</p><p>* *</p><p>*******************************************************************************</p><p></p><p>BAD_POOL_CALLER (c2)</p><p>The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.</p><p>Arguments:</p><p>Arg1: 0000000000000007, Attempt to free pool which was already freed</p><p>Arg2: 000000000000126c, (reserved)</p><p>Arg3: 0000000000000000, Memory contents of the pool block</p><p>Arg4: ffffe000b0eeac08, Address of the block of pool being deallocated</p><p></p><p>Debugging Details:</p><p>------------------</p><p></p><p>GetUlongFromAddress: unable to read from fffff8024d0deb78</p><p>TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2</p><p></p><p>OVERLAPPED_MODULE: Address regions for 'dxgmms2' and 'dump_storpor' overlap</p><p></p><p>POOL_ADDRESS: ffffe000b0eeac08</p><p></p><p>BUGCHECK_STR: 0xc2_7</p><p></p><p>CUSTOMER_CRASH_COUNT: 1</p><p></p><p>DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT</p><p></p><p>PROCESS_NAME: System</p><p></p><p>CURRENT_IRQL: 2</p><p></p><p>BAD_PAGES_DETECTED: b439</p><p></p><p>LAST_CONTROL_TRANSFER: from fffff8024d03bcf7 to fffff8024cf4c780</p><p></p><p>STACK_TEXT: </p><p>ffffd000`6c923698 fffff802`4d03bcf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00000000 : nt!KeBugCheckEx</p><p>ffffd000`6c9236a0 fffff801`de784a20 : 00000000`00000000 0000bb01`13ce0002 00000000`00000006 00000000`00000000 : nt!ExDeferredFreePool+0x547</p><p>ffffd000`6c923780 fffff801`de8f5c32 : ffffe000`b0f79c00 ffffe000`adaccf50 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0</p><p>ffffd000`6c9237d0 fffff801`de751781 : ffffe000`adaccde0 00000000`00000001 ffffe000`ab915000 ffffe000`a9f2ad91 : tcpip!FlpReturnNetBufferListChain+0x8a272</p><p>ffffd000`6c923820 fffff801`de8423d3 : 00000001`00001348 ffffe000`ab915000 00000000`00000000 ffffe000`a9f2ae01 : NETIO!NetioDereferenceNetBufferList+0x161</p><p>ffffd000`6c9238a0 fffff801`de80b959 : ffffe000`a8cccf00 ffffe000`adac0002 00000000`00000000 ffffd000`6cfc921a : tcpip!InetInspectReceiveTcpDatagram+0x593</p><p>ffffd000`6c9239b0 fffff801`de83edc7 : ffffe000`a927897a ffffd000`6c923d00 00000000`00000002 00000000`a23d0233 : tcpip!TcpListenerReceive+0x1e9</p><p>ffffd000`6c923c00 fffff801`de83e475 : 00000000`00000000 00000000`00194649 ffffd000`6cfc9222 0000000c`e362f6e6 : tcpip!TcpMatchReceive+0x597</p><p>ffffd000`6c923eb0 fffff801`de83d213 : ffffe000`aa7d6670 ffffd000`6c92e7c2 ffffd000`6c92fadd 00000000`00000003 : tcpip!TcpPreValidatedReceive+0x385</p><p>ffffd000`6c923fa0 fffff801`de83cd80 : ffffd000`6c924078 fffff802`4d127180 ffff2240`6950e5de 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73</p><p>ffffd000`6c924060 fffff801`de83c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 ffffd000`6c924169 : tcpip!IppProcessDeliverList+0x60</p><p>ffffd000`6c9240d0 fffff801`de83d818 : fffff801`de9ac000 ffffe000`aa592940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388</p><p>ffffd000`6c9241d0 fffff801`de87e1ff : ffffe000`b0e1ccd0 ffffe000`adaccde0 ffffd000`6c924301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338</p><p>ffffd000`6c9242f0 fffff801`de87d85e : ffffe000`b0560002 ffffd000`00000001 fffff801`de86b9c0 ffffd000`adaccd01 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f</p><p>ffffd000`6c9243d0 fffff802`4ceb0e95 : 00000000`00000002 ffffe000`aa3f4040 fffff801`de87d790 ffffd000`6c924580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce</p><p>ffffd000`6c924500 fffff801`de86bb46 : ffffe000`aa53dc00 00000000`00000000 ffffe000`aa53dba0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85</p><p>ffffd000`6c924550 fffff801`de632d97 : ffffe000`b0fb5c10 ffffd000`6c924640 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6</p><p>ffffd000`6c9245d0 fffff801`de632558 : ffffe000`b0fb5c10 ffffe000`adaccde0 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7</p><p>ffffd000`6c924680 fffff801`de63eef5 : ffffe000`ad0de1a0 ffffd000`00000001 ffffe000`ad0de1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318</p><p>ffffd000`6c924780 fffff801`de633d73 : 00000000`000567dc ffffd000`6c9248d0 00000000`00000000 00000000`00000100 : ndis!ndisCallReceiveHandler+0x85</p><p>ffffd000`6c9247d0 fffff801`e07a959c : 00000000`00000000 fffff801`000000c4 00000000`00000002 ffffd000`6c924a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3</p><p>ffffd000`6c924950 00000000`00000000 : fffff801`000000c4 00000000`00000002 ffffd000`6c924a40 ffffe000`00000001 : L1C63x64+0x959c</p><p></p><p></p><p>STACK_COMMAND: kb</p><p></p><p>SYMBOL_NAME: PAGE_NOT_ZERO</p><p></p><p>FOLLOWUP_NAME: MachineOwner</p><p></p><p>MODULE_NAME: Unknown_Module</p><p></p><p>IMAGE_NAME: Unknown_Image</p><p></p><p>DEBUG_FLR_IMAGE_TIMESTAMP: 0</p><p></p><p>BUCKET_ID: PAGE_NOT_ZERO</p><p></p><p>Followup: MachineOwner</p><p>---------</p><p></p><p>*** Memory manager detected 46137 instance(s) of page corruption, target is likely to have memory corruption.</p><p></p><p>[/code]</p></blockquote><p></p>
[QUOTE="Smith83, post: 516630"] [SIZE=4][B]Analysis[/B][/SIZE] and posting your dumps... Give me a bit to go over the information. [code] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000099, Attempt to free pool with invalid address (or corruption in pool header) Arg2: ffffe000ef35e9e8, Address being freed Arg3: 0000000000000000, 0 Arg4: 0000000000000000, 0 Debugging Details: ------------------ TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 FAULTING_IP: NETIO! ?? ::FNODOBFM::`string'+9bb0 fffff801`5ab54a20 90 nop BUGCHECK_STR: 0xc2_99 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 BAD_PAGES_DETECTED: b975 LAST_CONTROL_TRANSFER: from fffff802e83392c8 to fffff802e7dbc780 STACK_TEXT: ffffd001`80fefdf8 fffff802`e83392c8 : 00000000`000000c2 00000000`00000099 ffffe000`ef35e9e8 00000000`00000000 : nt!KeBugCheckEx ffffd001`80fefe00 fffff802`e7e522c1 : 00000000`00000000 fffff801`5b0b0230 ffffe000`e651b860 fffff801`5b0ac000 : nt!VerifierBugCheckIfAppropriate+0x3c ffffd001`80fefe40 fffff802`e7eabd7d : ffffe000`ef35e9d8 00000000`00000550 00000000`00000000 fffff801`5af701c7 : nt!VerifierFreeTrackedPool+0x41 ffffd001`80fefe80 fffff801`5ab54a20 : fffff801`5b0bc250 fffff801`5b0ac002 00000000`00000000 fffff801`5b0b0230 : nt!ExDeferredFreePool+0x5cd ffffd001`80feff60 fffff801`5aff5c32 : ffffd001`80ff0100 ffffe000`e98aa1a0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0 ffffd001`80feffb0 fffff801`5ab2128a : 00000000`00000000 00000000`00000002 fffff801`5af6b9c0 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0x8a272 ffffd001`80ff0000 fffff801`5af3c560 : 00000000`00000002 00000000`00000000 ffffe000`e98aa030 ffffd001`80ff0169 : NETIO!NetioDereferenceNetBufferListChain+0xea ffffd001`80ff00d0 fffff801`5af3d818 : fffff801`5b0ac000 ffffe000`e6598940 00000000`00000002 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x4b0 ffffd001`80ff01d0 fffff801`5af7e1ff : ffffe000`ec5ffaf0 ffffe000`e98aa030 ffffd001`80ff0301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 ffffd001`80ff02f0 fffff801`5af7d85e : 00000000`00000002 ffffd001`00000002 fffff801`5af6b9c0 fffff802`e98aa001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f ffffd001`80ff03d0 fffff802`e7d20e95 : 00000000`00000002 ffffe000`e63fa040 fffff801`5af7d790 ffffd001`80ff0580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce ffffd001`80ff0500 fffff801`5af6bb46 : ffffe000`e6541f00 00000000`00000000 ffffe000`e6541ea0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 ffffd001`80ff0550 fffff801`5a5f2d97 : ffffe000`ec5ec2b0 ffffd001`80ff0640 ffffe000`00000002 00000000`00000002 : tcpip!FlReceiveNetBufferListChain+0xb6 ffffd001`80ff05d0 fffff801`5a5f2558 : ffffe000`ec5ec2b0 ffffe000`e98aa030 ffffe000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 ffffd001`80ff0680 fffff801`5a5feef5 : ffffe000`e986b1a0 ffffd001`00000001 ffffe000`e986b1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318 ffffd001`80ff0780 fffff801`5a5f3d73 : 00000000`002cd2be ffffd001`80ff08d0 00000000`00000000 ffffe000`e9ce7a00 : ndis!ndisCallReceiveHandler+0x85 ffffd001`80ff07d0 fffff801`5d2a959c : ffffe000`e9915100 ffffe000`0000001f 00000000`00000002 ffffd001`80ff0a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 ffffd001`80ff0950 ffffe000`e9915100 : ffffe000`0000001f 00000000`00000002 ffffd001`80ff0a40 ffffe000`00000001 : L1C63x64+0x959c ffffd001`80ff0958 ffffe000`0000001f : 00000000`00000002 ffffd001`80ff0a40 ffffe000`00000001 00000000`5d2ad120 : 0xffffe000`e9915100 ffffd001`80ff0960 00000000`00000002 : ffffd001`80ff0a40 ffffe000`00000001 00000000`5d2ad120 00000000`00000002 : 0xffffe000`0000001f ffffd001`80ff0968 ffffd001`80ff0a40 : ffffe000`00000001 00000000`5d2ad120 00000000`00000002 00000000`00000000 : 0x2 ffffd001`80ff0970 ffffe000`00000001 : 00000000`5d2ad120 00000000`00000002 00000000`00000000 ffffe000`e986b1a0 : 0xffffd001`80ff0a40 ffffd001`80ff0978 00000000`5d2ad120 : 00000000`00000002 00000000`00000000 ffffe000`e986b1a0 00000000`00010000 : 0xffffe000`00000001 ffffd001`80ff0980 00000000`00000002 : 00000000`00000000 ffffe000`e986b1a0 00000000`00010000 00000000`00000000 : 0x5d2ad120 ffffd001`80ff0988 00000000`00000000 : ffffe000`e986b1a0 00000000`00010000 00000000`00000000 ffffd001`80ff0a40 : 0x2 STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 47477 instance(s) of page corruption, target is likely to have memory corruption. [/code] [code] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000007, Attempt to free pool which was already freed Arg2: 000000000000126c, (reserved) Arg3: 00000000cc8531d0, Memory contents of the pool block Arg4: ffffe001c5a83228, Address of the block of pool being deallocated Debugging Details: ------------------ GetUlongFromAddress: unable to read from fffff801498efb78 TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 POOL_ADDRESS: ffffe001c5a83228 BUGCHECK_STR: 0xc2_7 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 BAD_PAGES_DETECTED: ce44 LAST_CONTROL_TRANSFER: from fffff8014984ccf7 to fffff8014975d780 STACK_TEXT: ffffd001`fbd07698 fffff801`4984ccf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`cc8531d0 : nt!KeBugCheckEx ffffd001`fbd076a0 fffff801`46d64a20 : 00000000`00000000 0000bb01`46df0002 00000000`00000006 ffffd001`fd8b6a22 : nt!ExDeferredFreePool+0x547 ffffd001`fbd07780 fffff801`464d5c32 : ffffe001`c358bd80 ffffe001`c6ac6c30 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0 ffffd001`fbd077d0 fffff801`46d31781 : ffffe001`c6ac6ac0 00000000`00000001 ffffe001`c4958000 ffffe001`cc077c81 : tcpip!FlpReturnNetBufferListChain+0x8a272 ffffd001`fbd07820 fffff801`464223d3 : 00000001`00000bc4 ffffe001`c4958000 00000000`00000000 ffffe001`cc077c01 : NETIO!NetioDereferenceNetBufferList+0x161 ffffd001`fbd078a0 fffff801`463eb959 : ffffe001`c35a0f00 ffffe001`c6ac0002 00000000`00000000 ffffd001`fd8b221a : tcpip!InetInspectReceiveTcpDatagram+0x593 ffffd001`fbd079b0 fffff801`4641edc7 : ffffe001`c3198cca ffffd001`fbd07d00 00000000`00000002 00000000`ec821ff5 : tcpip!TcpListenerReceive+0x1e9 ffffd001`fbd07c00 fffff801`4641e475 : 00000000`00000000 00000000`0019464a ffffd001`fd8b2222 00000043`47d7a706 : tcpip!TcpMatchReceive+0x597 ffffd001`fbd07eb0 fffff801`4641d213 : ffffe001`c358bd80 ffffd001`fbd0e7c2 ffffd001`fbd007ba 00000000`00000002 : tcpip!TcpPreValidatedReceive+0x385 ffffd001`fbd07fa0 fffff801`4641cd80 : ffffd001`fbd08078 fffff801`49938180 fffff443`877df253 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73 ffffd001`fbd08060 fffff801`4641c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 ffffd001`fbd08169 : tcpip!IppProcessDeliverList+0x60 ffffd001`fbd080d0 fffff801`4641d818 : fffff801`4658c000 ffffe001`c35cb940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388 ffffd001`fbd081d0 fffff801`4645e1ff : ffffe001`c75dd230 ffffe001`c6ac6ac0 ffffd001`fbd08301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 ffffd001`fbd082f0 fffff801`4645d85e : ffffe001`c69c0002 ffffd001`00000001 fffff801`4644b9c0 ffffd001`c6ac6a01 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f ffffd001`fbd083d0 fffff801`496c1e95 : 00000000`00000002 ffffe001`c351b800 fffff801`4645d790 ffffd001`fbd08580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce ffffd001`fbd08500 fffff801`4644bb46 : ffffe001`c35da8c0 00000000`00000000 ffffe001`c35da860 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 ffffd001`fbd08550 fffff801`46c12d97 : ffffe001`c75dbc10 ffffd001`fbd08640 ffffe001`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6 ffffd001`fbd085d0 fffff801`46c12558 : ffffe001`c75dbc10 ffffe001`c6ac6ac0 ffffe001`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 ffffd001`fbd08680 fffff801`46c1eef5 : ffffe001`c65d91a0 ffffd001`00000001 ffffe001`c65d91a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318 ffffd001`fbd08780 fffff801`46c13d73 : 00000000`001c3833 ffffd001`fbd088d0 00000000`00000000 00000000`00000100 : ndis!ndisCallReceiveHandler+0x85 ffffd001`fbd087d0 fffff801`4cb1959c : 00000002`00000000 00000004`000001bb 00000000`00000000 ffffd001`fbd08a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 ffffd001`fbd08950 00000002`00000000 : 00000004`000001bb 00000000`00000000 ffffd001`fbd08a40 00000000`00000001 : L1C63x64+0x959c ffffd001`fbd08958 00000004`000001bb : 00000000`00000000 ffffd001`fbd08a40 00000000`00000001 00000000`00000000 : 0x2`00000000 ffffd001`fbd08960 00000000`00000000 : ffffd001`fbd08a40 00000000`00000001 00000000`00000000 00000000`00000002 : 0x4`000001bb STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 52804 instance(s) of page corruption, target is likely to have memory corruption. [/code] [code] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000007, Attempt to free pool which was already freed Arg2: 000000000000126c, (reserved) Arg3: 0000000000000000, Memory contents of the pool block Arg4: ffffe001dcf76178, Address of the block of pool being deallocated Debugging Details: ------------------ GetUlongFromAddress: unable to read from fffff802404e5b78 TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 POOL_ADDRESS: ffffe001dcf76178 BUGCHECK_STR: 0xc2_7 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 BAD_PAGES_DETECTED: e554 LAST_CONTROL_TRANSFER: from fffff80240442cf7 to fffff80240353780 STACK_TEXT: fffff802`4230e418 fffff802`40442cf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00000000 : nt!KeBugCheckEx fffff802`4230e420 fffff801`ae954a20 : 00000000`00000000 0000bb01`9fd00002 00000000`00000006 00000000`00000000 : nt!ExDeferredFreePool+0x547 fffff802`4230e500 fffff801`aeac5c32 : ffffe001`d73e4000 ffffe001`d732aac0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0 fffff802`4230e550 fffff801`ae921781 : ffffe001`d732a950 00000000`00000001 ffffe001`d5179000 ffffe001`e0eead91 : tcpip!FlpReturnNetBufferListChain+0x8a272 fffff802`4230e5a0 fffff801`aea123d3 : 00000001`00001220 ffffe001`d5179000 00000000`00000000 ffffe001`e0eeae01 : NETIO!NetioDereferenceNetBufferList+0x161 fffff802`4230e620 fffff801`ae9db959 : ffffe001`d24ccf00 ffffe001`d7320002 00000000`00000000 ffffd001`667c861a : tcpip!InetInspectReceiveTcpDatagram+0x593 fffff802`4230e730 fffff801`aea0edc7 : ffffe001`da64b4ea fffff802`4230ea80 00000000`00000002 00000000`a326708e : tcpip!TcpListenerReceive+0x1e9 fffff802`4230e980 fffff801`aea0e475 : 00000000`00000000 00000000`0019464b ffffd001`667c8622 00000021`d79dcfab : tcpip!TcpMatchReceive+0x597 fffff802`4230ec30 fffff801`aea0d213 : ffffe001`d3dbcab0 fffff802`4230e7c2 fffff802`4230c1bf 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x385 fffff802`4230ed20 fffff801`aea0cd80 : fffff802`4230edf8 fffff802`4052e180 ffff7bf4`20897f2e fffff802`402eaa70 : tcpip!IppDeliverListToProtocol+0x73 fffff802`4230ede0 fffff801`aea0c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 fffff802`4230eee9 : tcpip!IppProcessDeliverList+0x60 fffff802`4230ee50 fffff801`aea0d818 : fffff801`aeb7c000 ffffe001`d50d8940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388 fffff802`4230ef50 fffff801`aea4e1ff : ffffe001`daa0a8d0 ffffe001`d732a950 fffff802`4230f101 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 fffff802`4230f070 fffff801`aea4d85e : ffffe001`daac0002 fffff802`00000001 fffff801`aea3b9c0 fffff802`d732a901 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f fffff802`4230f150 fffff802`402b7e95 : 00000000`00000002 fffff802`405a4740 fffff801`aea4d790 fffff802`4230f300 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce fffff802`4230f280 fffff801`aea3bb46 : ffffe001`d3dfd820 00000000`00000000 ffffe001`d3dfcfb0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 fffff802`4230f2d0 fffff801`ae802d97 : ffffe001`d95ef010 fffff802`4230f3c0 ffffe001`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6 fffff802`4230f350 fffff801`ae802558 : ffffe001`d95ef010 ffffe001`d732a950 ffffe001`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 fffff802`4230f400 fffff801`ae80eef5 : ffffe001`d6a5e1a0 fffff802`00000001 ffffe001`d6a5e1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318 fffff802`4230f500 fffff801`ae803d73 : 00000000`000e31c8 fffff802`4230f650 00000000`00000000 ffffd001`6a66c180 : ndis!ndisCallReceiveHandler+0x85 fffff802`4230f550 fffff801`b0d9959c : ffffbecf`85d64f00 fffff802`00000190 ffffe001`d6a62190 fffff802`4230f7b8 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 fffff802`4230f6d0 ffffbecf`85d64f00 : fffff802`00000190 ffffe001`d6a62190 fffff802`4230f7b8 ffffe001`00000001 : L1C63x64+0x959c fffff802`4230f6d8 fffff802`00000190 : ffffe001`d6a62190 fffff802`4230f7b8 ffffe001`00000001 00000000`00000000 : 0xffffbecf`85d64f00 fffff802`4230f6e0 ffffe001`d6a62190 : fffff802`4230f7b8 ffffe001`00000001 00000000`00000000 00000000`00000000 : 0xfffff802`00000190 fffff802`4230f6e8 fffff802`4230f7b8 : ffffe001`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`d6a62190 fffff802`4230f6f0 ffffe001`00000001 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff802`4230f7b8 fffff802`4230f6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00010000 : 0xffffe001`00000001 STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 58708 instance(s) of page corruption, target is likely to have memory corruption. [/code] [code] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000007, Attempt to free pool which was already freed Arg2: 000000000000126c, (reserved) Arg3: 0000000000001000, Memory contents of the pool block Arg4: ffffe00056fce088, Address of the block of pool being deallocated Debugging Details: ------------------ GetUlongFromAddress: unable to read from fffff802fa747b78 TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 POOL_ADDRESS: ffffe00056fce088 BUGCHECK_STR: 0xc2_7 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 BAD_PAGES_DETECTED: b75c LAST_CONTROL_TRANSFER: from fffff802fa6a4cf7 to fffff802fa5b5780 STACK_TEXT: ffffd000`ab931698 fffff802`fa6a4cf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00001000 : nt!KeBugCheckEx ffffd000`ab9316a0 fffff801`fb994a20 : ffffe000`52c10d00 ffffe000`56ad9300 ffffe000`584fa580 00000000`00000000 : nt!ExDeferredFreePool+0x547 ffffd000`ab931780 fffff801`fb525c32 : ffffe000`584fa580 ffffe000`52c094d0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0 ffffd000`ab9317d0 fffff801`fb961781 : ffffe000`52c09360 00000000`00000001 ffffe000`50958000 ffffe000`577c2611 : tcpip!FlpReturnNetBufferListChain+0x8a272 ffffd000`ab931820 fffff801`fb4723d3 : 00000001`00002b44 ffffe000`50958000 00000000`00000000 ffffe000`58655a01 : NETIO!NetioDereferenceNetBufferList+0x161 ffffd000`ab9318a0 fffff801`fb43b959 : ffffe000`4dccaf00 ffffe000`52c10002 00000000`00000000 ffffd000`ac6b0a1a : tcpip!InetInspectReceiveTcpDatagram+0x593 ffffd000`ab9319b0 fffff801`fb46edc7 : ffffe000`59a85bca ffffd000`ab931d00 00000000`00000002 00000000`b22ef88b : tcpip!TcpListenerReceive+0x1e9 ffffd000`ab931c00 fffff801`fb46e475 : 00000000`00000000 00000000`0019464d ffffd000`ac6b0a22 000000e6`b331d6c0 : tcpip!TcpMatchReceive+0x597 ffffd000`ab931eb0 fffff801`fb46d213 : ffffe000`508d1200 ffffd000`ab93e7c2 ffffd000`ab93a9bc 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x385 ffffd000`ab931fa0 fffff801`fb46cd80 : ffffd000`ab932078 fffff802`fa790180 ffff587a`9272e124 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73 ffffd000`ab932060 fffff801`fb46c438 : 00000000`e0000001 00000000`00000000 00000000`00000000 ffffd000`ab932169 : tcpip!IppProcessDeliverList+0x60 ffffd000`ab9320d0 fffff801`fb46d818 : fffff801`fb5dc000 ffffe000`508ad940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388 ffffd000`ab9321d0 fffff801`fb4ae1ff : ffffe000`52bbeb60 ffffe000`52c09360 ffffd000`ab932301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 ffffd000`ab9322f0 fffff801`fb4ad85e : ffffe000`4f520002 ffffd000`00000001 fffff801`fb49b9c0 fffff801`52c09301 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f ffffd000`ab9323d0 fffff802`fa519e95 : 00000000`00000002 ffffe000`4f527040 fffff801`fb4ad790 ffffd000`ab932580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce ffffd000`ab932500 fffff801`fb49bb46 : ffffe000`4f5e2f00 00000000`00000000 ffffe000`4f5e2ea0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 ffffd000`ab932550 fffff801`fb842d97 : ffffe000`52bbe6d0 ffffd000`ab932640 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6 ffffd000`ab9325d0 fffff801`fb842558 : ffffe000`52bbe6d0 ffffe000`52c09360 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 ffffd000`ab932680 fffff801`fb84eef5 : ffffe000`509af1a0 ffffd000`00000001 ffffe000`509af1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318 ffffd000`ab932780 fffff801`fb843d73 : 00000000`0060c338 ffffd000`ab9328d0 00000000`00000000 ffffe000`52bb9300 : ndis!ndisCallReceiveHandler+0x85 ffffd000`ab9327d0 fffff801`fd43959c : ffffe000`52d5c500 ffffe000`00000106 00000000`00000002 ffffd000`ab932a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 ffffd000`ab932950 ffffe000`52d5c500 : ffffe000`00000106 00000000`00000002 ffffd000`ab932a40 ffffe000`00000001 : L1C63x64+0x959c ffffd000`ab932958 ffffe000`00000106 : 00000000`00000002 ffffd000`ab932a40 ffffe000`00000001 00000000`fd43d120 : 0xffffe000`52d5c500 ffffd000`ab932960 00000000`00000002 : ffffd000`ab932a40 ffffe000`00000001 00000000`fd43d120 00000000`00000002 : 0xffffe000`00000106 ffffd000`ab932968 ffffd000`ab932a40 : ffffe000`00000001 00000000`fd43d120 00000000`00000002 00000000`00000000 : 0x2 ffffd000`ab932970 ffffe000`00000001 : 00000000`fd43d120 00000000`00000002 00000000`00000000 ffffe000`509af1a0 : 0xffffd000`ab932a40 ffffd000`ab932978 00000000`fd43d120 : 00000000`00000002 00000000`00000000 ffffe000`509af1a0 00000000`00010000 : 0xffffe000`00000001 ffffd000`ab932980 00000000`00000002 : 00000000`00000000 ffffe000`509af1a0 00000000`00010000 00000000`00000000 : 0xfd43d120 ffffd000`ab932988 00000000`00000000 : ffffe000`509af1a0 00000000`00010000 00000000`00000000 ffffd000`ab932a40 : 0x2 STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 46940 instance(s) of page corruption, target is likely to have memory corruption. [/code] [code] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000007, Attempt to free pool which was already freed Arg2: 000000000000126c, (reserved) Arg3: 000000002d8f13b0, Memory contents of the pool block Arg4: ffffe0002cd93828, Address of the block of pool being deallocated Debugging Details: ------------------ GetUlongFromAddress: unable to read from fffff801a3eefb78 TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 POOL_ADDRESS: ffffe0002cd93828 BUGCHECK_STR: 0xc2_7 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: java.exe CURRENT_IRQL: 2 BAD_PAGES_DETECTED: b73a LAST_CONTROL_TRANSFER: from fffff801a3e4ccf7 to fffff801a3d5d780 STACK_TEXT: fffff801`a5d4c6c8 fffff801`a3e4ccf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`2d8f13b0 : nt!KeBugCheckEx fffff801`a5d4c6d0 fffff800`5bd84a20 : 0000007f`0000007f 00000000`00000001 ffffffff`00000001 00000000`ffffffff : nt!ExDeferredFreePool+0x547 fffff801`a5d4c7b0 fffff800`5cb35c32 : 00000000`00000000 ffffe000`28a6f1a0 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0 fffff801`a5d4c800 fffff800`5bd51781 : ffffe000`28a6f030 00000000`00000001 ffffe000`26915000 ffffe000`24d55911 : tcpip!FlpReturnNetBufferListChain+0x8a272 fffff801`a5d4c850 fffff800`5ca823d3 : 00000000`00000002 ffffe000`26915000 00000000`00000400 ffffe000`2dab2401 : NETIO!NetioDereferenceNetBufferList+0x161 fffff801`a5d4c8d0 fffff800`5ca4b959 : ffffe000`23cd2f00 fffff800`5d9e0002 00000000`00000000 ffffd001`64c47a1a : tcpip!InetInspectReceiveTcpDatagram+0x593 fffff801`a5d4c9e0 fffff800`5ca7edc7 : ffffe000`2479eada fffff801`a5d4cd30 00000000`00000002 00000000`a2c77592 : tcpip!TcpListenerReceive+0x1e9 fffff801`a5d4cc30 fffff800`5ca7e475 : 00000000`00000000 00000000`0019464a ffffd001`64c47a22 00000092`fa2c19f2 : tcpip!TcpMatchReceive+0x597 fffff801`a5d4cee0 fffff800`5ca7d213 : ffffe000`2555aaa0 fffff801`a5d4e7c2 fffff801`a5d4bfe7 ffffe000`293aa000 : tcpip!TcpPreValidatedReceive+0x385 fffff801`a5d4cfd0 fffff800`5ca7cd80 : 00000000`00000000 00000000`00000000 ffff2346`57c8ce3d 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x73 fffff801`a5d4d090 fffff800`5ca7c438 : 00000000`e0000001 00000000`00000000 00000000`00000000 fffff801`a5d4d199 : tcpip!IppProcessDeliverList+0x60 fffff801`a5d4d100 fffff800`5ca7d818 : fffff800`5cbec000 ffffe000`255ec940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388 fffff801`a5d4d200 fffff800`5cabe1ff : ffffe000`23cc8700 ffffe000`28a6f030 fffff801`a5d4d401 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 fffff801`a5d4d320 fffff800`5cabd85e : 00000000`00000002 fffff801`00000001 fffff800`5caab9c0 00000000`28a6f001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f fffff801`a5d4d400 fffff801`a3cc1e95 : 00000000`00000002 ffffe000`2e30a800 fffff800`5cabd790 fffff801`a5d4d5b0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce fffff801`a5d4d530 fffff800`5caabb46 : ffffe000`2553f860 00000000`00000000 ffffe000`2553ee30 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 fffff801`a5d4d580 fffff800`5bc32d97 : ffffe000`2b5b9580 fffff801`a5d4d670 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6 fffff801`a5d4d600 fffff800`5bc32558 : ffffe000`2b5b9580 ffffe000`28a6f030 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 fffff801`a5d4d6b0 fffff800`5bc3eef5 : ffffe000`248ba1a0 fffff801`00000001 ffffe000`248ba1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318 fffff801`a5d4d7b0 fffff800`5bc33d73 : 00000000`003da58f fffff801`a5d4d900 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x85 fffff801`a5d4d800 fffff800`5bf3959c : 00000000`00000000 00000000`000001e1 003f0022`00650000 fffff801`a5d4da70 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 fffff801`a5d4d980 00000000`00000000 : 00000000`000001e1 003f0022`00650000 fffff801`a5d4da70 ffffe000`00000001 : L1C63x64+0x959c STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 46906 instance(s) of page corruption, target is likely to have memory corruption. [/code] [code] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000007, Attempt to free pool which was already freed Arg2: 000000000000126c, (reserved) Arg3: 0000000000000000, Memory contents of the pool block Arg4: ffffe000b0eeac08, Address of the block of pool being deallocated Debugging Details: ------------------ GetUlongFromAddress: unable to read from fffff8024d0deb78 TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 OVERLAPPED_MODULE: Address regions for 'dxgmms2' and 'dump_storpor' overlap POOL_ADDRESS: ffffe000b0eeac08 BUGCHECK_STR: 0xc2_7 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 BAD_PAGES_DETECTED: b439 LAST_CONTROL_TRANSFER: from fffff8024d03bcf7 to fffff8024cf4c780 STACK_TEXT: ffffd000`6c923698 fffff802`4d03bcf7 : 00000000`000000c2 00000000`00000007 00000000`0000126c 00000000`00000000 : nt!KeBugCheckEx ffffd000`6c9236a0 fffff801`de784a20 : 00000000`00000000 0000bb01`13ce0002 00000000`00000006 00000000`00000000 : nt!ExDeferredFreePool+0x547 ffffd000`6c923780 fffff801`de8f5c32 : ffffe000`b0f79c00 ffffe000`adaccf50 00000000`00000000 00000000`00000000 : NETIO! ?? ::FNODOBFM::`string'+0x9bb0 ffffd000`6c9237d0 fffff801`de751781 : ffffe000`adaccde0 00000000`00000001 ffffe000`ab915000 ffffe000`a9f2ad91 : tcpip!FlpReturnNetBufferListChain+0x8a272 ffffd000`6c923820 fffff801`de8423d3 : 00000001`00001348 ffffe000`ab915000 00000000`00000000 ffffe000`a9f2ae01 : NETIO!NetioDereferenceNetBufferList+0x161 ffffd000`6c9238a0 fffff801`de80b959 : ffffe000`a8cccf00 ffffe000`adac0002 00000000`00000000 ffffd000`6cfc921a : tcpip!InetInspectReceiveTcpDatagram+0x593 ffffd000`6c9239b0 fffff801`de83edc7 : ffffe000`a927897a ffffd000`6c923d00 00000000`00000002 00000000`a23d0233 : tcpip!TcpListenerReceive+0x1e9 ffffd000`6c923c00 fffff801`de83e475 : 00000000`00000000 00000000`00194649 ffffd000`6cfc9222 0000000c`e362f6e6 : tcpip!TcpMatchReceive+0x597 ffffd000`6c923eb0 fffff801`de83d213 : ffffe000`aa7d6670 ffffd000`6c92e7c2 ffffd000`6c92fadd 00000000`00000003 : tcpip!TcpPreValidatedReceive+0x385 ffffd000`6c923fa0 fffff801`de83cd80 : ffffd000`6c924078 fffff802`4d127180 ffff2240`6950e5de 00000001`ffffffff : tcpip!IppDeliverListToProtocol+0x73 ffffd000`6c924060 fffff801`de83c438 : 00000000`e0000001 00000000`000000dd 00000000`00000000 ffffd000`6c924169 : tcpip!IppProcessDeliverList+0x60 ffffd000`6c9240d0 fffff801`de83d818 : fffff801`de9ac000 ffffe000`aa592940 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388 ffffd000`6c9241d0 fffff801`de87e1ff : ffffe000`b0e1ccd0 ffffe000`adaccde0 ffffd000`6c924301 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 ffffd000`6c9242f0 fffff801`de87d85e : ffffe000`b0560002 ffffd000`00000001 fffff801`de86b9c0 ffffd000`adaccd01 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f ffffd000`6c9243d0 fffff802`4ceb0e95 : 00000000`00000002 ffffe000`aa3f4040 fffff801`de87d790 ffffd000`6c924580 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce ffffd000`6c924500 fffff801`de86bb46 : ffffe000`aa53dc00 00000000`00000000 ffffe000`aa53dba0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 ffffd000`6c924550 fffff801`de632d97 : ffffe000`b0fb5c10 ffffd000`6c924640 ffffe000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb6 ffffd000`6c9245d0 fffff801`de632558 : ffffe000`b0fb5c10 ffffe000`adaccde0 ffffe000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 ffffd000`6c924680 fffff801`de63eef5 : ffffe000`ad0de1a0 ffffd000`00000001 ffffe000`ad0de1a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x318 ffffd000`6c924780 fffff801`de633d73 : 00000000`000567dc ffffd000`6c9248d0 00000000`00000000 00000000`00000100 : ndis!ndisCallReceiveHandler+0x85 ffffd000`6c9247d0 fffff801`e07a959c : 00000000`00000000 fffff801`000000c4 00000000`00000002 ffffd000`6c924a40 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 ffffd000`6c924950 00000000`00000000 : fffff801`000000c4 00000000`00000002 ffffd000`6c924a40 ffffe000`00000001 : L1C63x64+0x959c STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 46137 instance(s) of page corruption, target is likely to have memory corruption. [/code] [/QUOTE]
Insert quotes…
Verification
Post reply
Top