че то не пойму, че дебаггер пишет-
бэд пул хедер вроде ошибки в файлвой системе
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\090512-19468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
Symbol search path is: srv*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02e01000 PsLoadedModuleList = 0xfffff800`03045670
Debug session time: Wed Sep 5 19:34:31.814 2012 (GMT+4)
System Uptime: 0 days 1:45:56.985
Loading Kernel Symbols
....................................................
Loading User Symbols
Loading unloaded module list
..Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
...Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.....Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffff8a0101e8000, fffff8a0101e8810, 5810100}
GetPointerFromAddress: unable to read from fffff800030af100
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+12da )
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a0101e8000, The pool entry we were looking for within the page.
Arg3: fffff8a0101e8810, The next pool entry.
Arg4: 0000000005810100, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: fffff8a0101e8000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002faacae to fffff80002e801c0
STACK_TEXT:
fffff880`06ff8288 fffff800`02faacae : 00000000`00000019 00000000`00000020 fffff8a0`101e8000 fffff8a0`101e8810 : nt!KeBugCheckEx
fffff880`06ff8290 fffff880`01c7889d : fffff8a0`0dfd6f40 fffff8a0`101e8010 fffff880`6c6c4c4b 00000000`000007ff : nt!ExDeferredFreePool+0x12da
fffff880`06ff8340 fffff8a0`0dfd6f40 : fffff8a0`101e8010 fffff880`6c6c4c4b 00000000`000007ff fffff880`06ff83c0 : 0xfffff880`01c7889d
fffff880`06ff8348 fffff8a0`101e8010 : fffff880`6c6c4c4b 00000000`000007ff fffff880`06ff83c0 fffff8a0`0dfd6f40 : 0xfffff8a0`0dfd6f40
fffff880`06ff8350 fffff880`6c6c4c4b : 00000000`000007ff fffff880`06ff83c0 fffff8a0`0dfd6f40 fffff8a0`001c001c : 0xfffff8a0`101e8010
fffff880`06ff8358 00000000`000007ff : fffff880`06ff83c0 fffff8a0`0dfd6f40 fffff8a0`001c001c fffff8a0`0dfd6f40 : 0xfffff880`6c6c4c4b
fffff880`06ff8360 fffff880`06ff83c0 : fffff8a0`0dfd6f40 fffff8a0`001c001c fffff8a0`0dfd6f40 00000000`00000000 : 0x7ff
fffff880`06ff8368 fffff8a0`0dfd6f40 : fffff8a0`001c001c fffff8a0`0dfd6f40 00000000`00000000 00000000`00000000 : 0xfffff880`06ff83c0
fffff880`06ff8370 fffff8a0`001c001c : fffff8a0`0dfd6f40 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff8a0`0dfd6f40
fffff880`06ff8378 fffff8a0`0dfd6f40 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : 0xfffff8a0`001c001c
fffff880`06ff8380 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00672b10 : 0xfffff8a0`0dfd6f40
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+12da
fffff800`02faacae cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+12da
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_20_nt!ExDeferredFreePool+12da
BUCKET_ID: X64_0x19_20_nt!ExDeferredFreePool+12da
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a0101e8000, The pool entry we were looking for within the page.
Arg3: fffff8a0101e8810, The next pool entry.
Arg4: 0000000005810100, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: fffff8a0101e8000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002faacae to fffff80002e801c0
STACK_TEXT:
fffff880`06ff8288 fffff800`02faacae : 00000000`00000019 00000000`00000020 fffff8a0`101e8000 fffff8a0`101e8810 : nt!KeBugCheckEx
fffff880`06ff8290 fffff880`01c7889d : fffff8a0`0dfd6f40 fffff8a0`101e8010 fffff880`6c6c4c4b 00000000`000007ff : nt!ExDeferredFreePool+0x12da
fffff880`06ff8340 fffff8a0`0dfd6f40 : fffff8a0`101e8010 fffff880`6c6c4c4b 00000000`000007ff fffff880`06ff83c0 : 0xfffff880`01c7889d
fffff880`06ff8348 fffff8a0`101e8010 : fffff880`6c6c4c4b 00000000`000007ff fffff880`06ff83c0 fffff8a0`0dfd6f40 : 0xfffff8a0`0dfd6f40
fffff880`06ff8350 fffff880`6c6c4c4b : 00000000`000007ff fffff880`06ff83c0 fffff8a0`0dfd6f40 fffff8a0`001c001c : 0xfffff8a0`101e8010
fffff880`06ff8358 00000000`000007ff : fffff880`06ff83c0 fffff8a0`0dfd6f40 fffff8a0`001c001c fffff8a0`0dfd6f40 : 0xfffff880`6c6c4c4b
fffff880`06ff8360 fffff880`06ff83c0 : fffff8a0`0dfd6f40 fffff8a0`001c001c fffff8a0`0dfd6f40 00000000`00000000 : 0x7ff
fffff880`06ff8368 fffff8a0`0dfd6f40 : fffff8a0`001c001c fffff8a0`0dfd6f40 00000000`00000000 00000000`00000000 : 0xfffff880`06ff83c0
fffff880`06ff8370 fffff8a0`001c001c : fffff8a0`0dfd6f40 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff8a0`0dfd6f40
fffff880`06ff8378 fffff8a0`0dfd6f40 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : 0xfffff8a0`001c001c
fffff880`06ff8380 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00672b10 : 0xfffff8a0`0dfd6f40
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+12da
fffff800`02faacae cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+12da
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_20_nt!ExDeferredFreePool+12da
BUCKET_ID: X64_0x19_20_nt!ExDeferredFreePool+12da
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffff8a0101e8000, The pool entry we were looking for within the page.
Arg3: fffff8a0101e8810, The next pool entry.
Arg4: 0000000005810100, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: fffff8a0101e8000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002faacae to fffff80002e801c0
STACK_TEXT:
fffff880`06ff8288 fffff800`02faacae : 00000000`00000019 00000000`00000020 fffff8a0`101e8000 fffff8a0`101e8810 : nt!KeBugCheckEx
fffff880`06ff8290 fffff880`01c7889d : fffff8a0`0dfd6f40 fffff8a0`101e8010 fffff880`6c6c4c4b 00000000`000007ff : nt!ExDeferredFreePool+0x12da
fffff880`06ff8340 fffff8a0`0dfd6f40 : fffff8a0`101e8010 fffff880`6c6c4c4b 00000000`000007ff fffff880`06ff83c0 : 0xfffff880`01c7889d
fffff880`06ff8348 fffff8a0`101e8010 : fffff880`6c6c4c4b 00000000`000007ff fffff880`06ff83c0 fffff8a0`0dfd6f40 : 0xfffff8a0`0dfd6f40
fffff880`06ff8350 fffff880`6c6c4c4b : 00000000`000007ff fffff880`06ff83c0 fffff8a0`0dfd6f40 fffff8a0`001c001c : 0xfffff8a0`101e8010
fffff880`06ff8358 00000000`000007ff : fffff880`06ff83c0 fffff8a0`0dfd6f40 fffff8a0`001c001c fffff8a0`0dfd6f40 : 0xfffff880`6c6c4c4b
fffff880`06ff8360 fffff880`06ff83c0 : fffff8a0`0dfd6f40 fffff8a0`001c001c fffff8a0`0dfd6f40 00000000`00000000 : 0x7ff
fffff880`06ff8368 fffff8a0`0dfd6f40 : fffff8a0`001c001c fffff8a0`0dfd6f40 00000000`00000000 00000000`00000000 : 0xfffff880`06ff83c0
fffff880`06ff8370 fffff8a0`001c001c : fffff8a0`0dfd6f40 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff8a0`0dfd6f40
fffff880`06ff8378 fffff8a0`0dfd6f40 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : 0xfffff8a0`001c001c
fffff880`06ff8380 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00672b10 : 0xfffff8a0`0dfd6f40
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+12da
fffff800`02faacae cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+12da
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_20_nt!ExDeferredFreePool+12da
BUCKET_ID: X64_0x19_20_nt!ExDeferredFreePool+12da
Followup: Pool_corruption
---------