Hi all ,
I was trying to delete windows folder from my software’s explorer view
and encountered a crash I am sending the crash dump which reported a
pool corruption can anyone suggest something regarding the problem
************************************************************************
*******
*
*
* Bugcheck Analysis
*
*
*
************************************************************************
*******
Use !analyze -v to get detailed debugging information.
BugCheck 100000C5, {32002e00, 2, 0, 8055096d}
Unable to load image ino_fltr.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for ino_fltr.sys
*** ERROR: Module load completed but symbols could not be loaded for
ino_fltr.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+b4 )
Followup: Pool_corruption
1: kd> !analyze -v
************************************************************************
*******
*
*
* Bugcheck Analysis
*
*
*
************************************************************************
*******
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address
at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn’t turn
up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 32002e00, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8055096d, address which referenced memory
Debugging Details:
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+b4
8055096d 8b10 mov edx,dword ptr [eax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: InoRT.exe
IRP_ADDRESS: 854d13e8
LAST_CONTROL_TRANSFER: from 80550ac7 to 8055096d
STACK_TEXT:
aa73da48 80550ac7 00000000 85ef4028 85372008 nt!ExDeferredFreePool+0xb4
aa73da88 804f2c1f 85372008 862a9980 854d1428 nt!ExFreePoolWithTag+0x47f
aa73dae0 804f2db5 854d1428 aa73db2c aa73db20 nt!IopCompleteRequest+0xf4
aa73db30 806ffef2 00000000 00000000 aa73db48 nt!KiDeliverApc+0xb3
aa73db30 806ffae4 00000000 00000000 aa73db48 hal!HalpApcInterrupt+0xc6
aa73dbb8 804e5d2c 854d1428 854d13e8 00000000
hal!KeReleaseQueuedSpinLock+0x3c
aa73dbd8 804f2dcf 854d1428 85ef4028 00000000 nt!KeInsertQueueApc+0x6d
aa73dc0c aab7acbb 85f1b6b8 85f28760 854d13e8
nt!IopfCompleteRequest+0x1d8
WARNING: Stack unwind information not available. Following frames may be
wrong.
aa73dc40 804e13d9 000000e0 854d13e8 806ff410 ino_fltr+0x15cbb
aa73dc50 8056f50b 854d1458 85ef4028 854d13e8 nt!IopfCallDriver+0x31
aa73dc64 80580fc1 85d863a8 854d13e8 85ef4028
nt!IopSynchronousServiceTail+0x60
aa73dd00 80586eee 00000138 00000000 00000000 nt!IopXxxControlFile+0x5ef
aa73dd34 804dd99f 00000138 00000000 00000000
nt!NtDeviceIoControlFile+0x2a
aa73dd34 7c90eb94 00000138 00000000 00000000 nt!KiFastCallEntry+0xfc
02c4f174 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+b4
8055096d 8b10 mov edx,dword ptr [eax]
SYMBOL_STACK_INDEX: 0
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
SYMBOL_NAME: nt!ExDeferredFreePool+b4
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+b4
BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+b4
Followup: Pool_corruption
–
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.