Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_6-6-10[1].zip\Mini060610-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18209.x86fre.vistasp2_gdr.100218-0019
Machine Name:
Kernel base = 0x82245000 PsLoadedModuleList = 0x8235cc70
Debug session time: Sun Jun 6 10:28:13.704 2010 (GMT-4)
System Uptime: 0 days 1:34:27.731
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {b3304f48, 0, b8, 22}
Probably caused by : CLASSPNP.SYS ( CLASSPNP!DestroyTransferPacket+53 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: b3304f48, address trying to free
Arg2: 00000000, bytes requested
Arg3: 000000b8, bytes calculated
Arg4: 00000022, caller is trying to free a bad address
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_22
SPECIAL_POOL_CORRUPTION_TYPE: 22
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 822cfd07 to 82312b8d
STACK_TEXT:
803f0c04 822cfd07 000000c1 b3304f48 00000000 nt!KeBugCheckEx+0x1e
803f0cfc 823320f0 b3304f48 00000000 b3304f48 nt!MmFreeSpecialPool+0x6c
803f0d60 822f7666 b3304f48 00000000 803f0d9c nt!ExFreePoolWithTag+0xeb
803f0d7c 825271cd b3304f48 a9ed0140 8d0feb58 nt!IopFreeIrp+0x56
803f0d94 853a43f8 00000000 893e086c 893e07b8 nt!IovFreeIrpPrivate+0x58
803f0dac 853a0c5a 8d0feb58 00000000 8d0feb58 CLASSPNP!DestroyTransferPacket+0x53
803f0dcc 853a051a 892dd700 020feb58 b3304f48 CLASSPNP!EnqueueFreeTransferPacket+0x1db
803f0df4 82527d4d 00000000 b3304f48 000feb58 CLASSPNP!TransferPktComplete+0x3e2
803f0e2c 822ec1fb 00000000 b3304f48 803f0e9c nt!IovpLocalCompletionRoutine+0x16e
803f0e64 82527b95 00000000 b3304f48 b3304f48 nt!IopfCompleteRequest+0x11d
803f0ed4 84cb435b 8d0fec04 a830c2d0 803f0f04 nt!IovCompleteRequest+0x11c
803f0ee4 84cb4d4a 87f470e8 b3304f48 8d0fec04 ataport!IdeCompleteScsiIrp+0x31
803f0f04 84cb2020 87f470e8 00000000 803f0f34 ataport!IdeCommonCrbCompletion+0x44
803f0f14 84cb6ef3 87f420e0 a830c2d0 a830c2d0 ataport!IdeTranslateCompletedRequest+0x26
803f0f34 84cb712d 87f420e0 a830c2d0 803d1120 ataport!IdeProcessCompletedRequests+0x121
803f0f88 822ef6c2 87f4209c 87f42028 00000000 ataport!IdePortCompletionDpc+0xab
803f0ff4 822ed2f5 89074880 00000000 00000000 nt!KiRetireDpcList+0x147
803f0ff8 89074880 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x45
WARNING: Frame IP not in any known module. Following frames may be wrong.
822ed2f5 00000000 0000001b 00c7850f bb830000 0x89074880
STACK_COMMAND: kb
FOLLOWUP_IP:
CLASSPNP!DestroyTransferPacket+53
853a43f8 8b1dc4c13a85 mov ebx,dword ptr [CLASSPNP!_imp__ExFreePoolWithTag (853ac1c4)]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: CLASSPNP!DestroyTransferPacket+53
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CLASSPNP
IMAGE_NAME: CLASSPNP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 49e01ee9
FAILURE_BUCKET_ID: 0xC1_22_CLASSPNP!DestroyTransferPacket+53
BUCKET_ID: 0xC1_22_CLASSPNP!DestroyTransferPacket+53
Followup: MachineOwner
---------