1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000003105, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800027fbdd3, address which referenced memory
Debugging Details:
------------------
Unable to load image \SystemRoot\system32\DRIVERS\VBoxNetFlt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for VBoxNetFlt.sys
*** ERROR: Module load completed but symbols could not be loaded for VBoxNetFlt.sys
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`027fbdd3 418b45f0 mov eax,dword ptr [r13-10h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
TRAP_FRAME: fffff880009fc720 -- (.trap 0xfffff880009fc720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000003115
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800027fbdd3 rsp=fffff880009fc8b0 rbp=fffffa800d7ded10
r8=0000000000000000 r9=0000000000000000 r10=fffffa800dec8020
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreePoolWithTag+0x43:
fffff800`027fbdd3 418b45f0 mov eax,dword ptr [r13-10h] ds:ffffffff`fffffff0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800026cc1e9 to fffff800026ccc40
STACK_TEXT:
fffff880`009fc5d8 fffff800`026cc1e9 : 00000000`0000000a 00000000`00003105 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009fc5e0 fffff800`026cae60 : 00000000`00000002 00000000`00000000 00000000`00000002 fffffa80`0d7dc020 : nt!KiBugCheckDispatch+0x69
fffff880`009fc720 fffff800`027fbdd3 : 00000000`00000000 fffff880`033583bc fffffa80`0c391b60 00000000`00000002 : nt!KiPageFault+0x260
fffff880`009fc8b0 fffff880`01677195 : fffffa80`0dec8810 fffff880`009fc9e0 00000000`00000000 00000000`00003115 : nt!ExFreePoolWithTag+0x43
fffff880`009fc960 fffff880`03392aca : fffffa80`0d7ded10 fffffa80`0d7ded10 fffffa80`0dec8810 fffffa80`0d2a41a0 : ndis!NdisFreeMemory+0x15
fffff880`009fc990 fffffa80`0d7ded10 : fffffa80`0d7ded10 fffffa80`0dec8810 fffffa80`0d2a41a0 fffffa80`0d8a6190 : VBoxNetFlt+0x3aca
fffff880`009fc998 fffffa80`0d7ded10 : fffffa80`0dec8810 fffffa80`0d2a41a0 fffffa80`0d8a6190 fffffa80`0d2a41a0 : 0xfffffa80`0d7ded10
fffff880`009fc9a0 fffffa80`0dec8810 : fffffa80`0d2a41a0 fffffa80`0d8a6190 fffffa80`0d2a41a0 00000000`00000000 : 0xfffffa80`0d7ded10
fffff880`009fc9a8 fffffa80`0d2a41a0 : fffffa80`0d8a6190 fffffa80`0d2a41a0 00000000`00000000 fffff880`0173264e : 0xfffffa80`0dec8810
fffff880`009fc9b0 fffffa80`0d8a6190 : fffffa80`0d2a41a0 00000000`00000000 fffff880`0173264e fffffa80`0d8a6100 : 0xfffffa80`0d2a41a0
fffff880`009fc9b8 fffffa80`0d2a41a0 : 00000000`00000000 fffff880`0173264e fffffa80`0d8a6100 fffffa80`0d7ded10 : 0xfffffa80`0d8a6190
fffff880`009fc9c0 00000000`00000000 : fffff880`0173264e fffffa80`0d8a6100 fffffa80`0d7ded10 fffffa80`0d7dc8d0 : 0xfffffa80`0d2a41a0
STACK_COMMAND: kb
FOLLOWUP_IP:
VBoxNetFlt+3aca
fffff880`03392aca ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: VBoxNetFlt+3aca
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: VBoxNetFlt
IMAGE_NAME: VBoxNetFlt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e4911c5
FAILURE_BUCKET_ID: X64_0xC5_2_VBoxNetFlt+3aca
BUCKET_ID: X64_0xC5_2_VBoxNetFlt+3aca
Followup: MachineOwner
---------
Bookmarks