Jason
the first five dumps are identical and I suspect the rest will be the same. They all reflect memory corruption. Are you overclocking? Have you run a memory test like memtest?
How much memeory do you have? are they all the same speed, latency, etc?
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Mini100509-05.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*
Symbol information
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`02053000 PsLoadedModuleList = 0xfffff800`02218db0
Debug session time: Mon Oct 5 18:53:55.018 2009 (GMT-4)
System Uptime: 0 days 6:52:43.226
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 110b, 0, fffff900c21a59c8}
GetPointerFromAddress: unable to read from fffff8000227c080
GetUlongFromAddress: unable to read from fffff800021e7250
Probably caused by : Unknown_Image ( PAGE_NOT_ZERO )
Followup: MachineOwner
---------
*** Memory manager detected 52 instance(s) of page corruption, target is likely to have memory corruption.
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000110b, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: fffff900c21a59c8, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from fffff800021e7250
POOL_ADDRESS: fffff900c21a59c8
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 5
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME:
firefox.exe
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 34
LAST_CONTROL_TRANSFER: from fffff80002187f98 to fffff800020a7650
STACK_TEXT:
fffffa60`0973c728 fffff800`02187f98 : 00000000`000000c2 00000000`00000007 00000000`0000110b 00000000`00000000 : nt!KeBugCheckEx
fffffa60`0973c730 fffff960`002b1403 : 00000000`00000000 fffffa80`0a2e63f0 00000000`00000001 fffffa60`0973cad0 : nt!ExDeferredFreePool+0x902
fffffa60`0973c7e0 fffff960`0011e22f : fffff900`c0166970 fffff900`c0096010 fffff900`c000a010 fffff900`c0096010 : win32k!RFONTOBJ::vDeleteRFONT+0x23f
fffffa60`0973c840 fffff960`0011dc63 : fffff900`c069da10 fffffa60`0973c8f0 00000000`00000000 00000000`00000000 : win32k!RFONTOBJ::bMakeInactiveHelper+0x423
fffffa60`0973c8d0 fffff960`0011b238 : fffffa80`0a2fc5d0 fffff900`c0001000 fffffa60`0973cad0 fffffa60`0973cb20 : win32k!RFONTOBJ::vMakeInactive+0xa3
fffffa60`0973c970 fffff960`000fbe71 : 00000000`00000000 fffff960`00166b92 00000000`00000000 00000000`00000002 : win32k!RFONTOBJ::bInit+0x1e8
fffffa60`0973ca80 fffff960`000fbdff : fffff900`c0001000 fffffa60`0973cca0 00000000`70616d63 00000000`0b0a044e : win32k!ulGetFontData2+0x31
fffffa60`0973caf0 fffff960`000fbd09 : 00000000`ffffffff 00000000`ffffffff fffff900`c00dc630 fffff900`c0001000 : win32k!ulGetFontData+0x7f
fffffa60`0973cb40 fffff800`020a70f3 : 00000000`14010cb8 fffffa80`0b569060 00000000`0016df78 00000000`00000000 : win32k!NtGdiGetFontData+0x8d
fffffa60`0973cbb0 00000000`74eaad3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0016df58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74eaad3a
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 52 instance(s) of page corruption, target is likely to have memory corruption.
ken