Loading User Symbols
Loading unloaded module list
.........
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {6, 2, 1, 80538f42}
Probably caused by : ntkrnlmp.exe ( nt!ExAllocatePoolWithTag+668 )
Followup: MachineOwner
---------
0: kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 00000006, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 80538f42, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExAllocatePoolWithTag+668
80538f42 894804 mov dword ptr [eax+4],ecx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: HPBPRO.EXE
TRAP_FRAME: effd7bc4 -- (.trap ffffffffeffd7bc4)
ErrCode = 00000002
eax=00000002 ebx=8054d5a0 ecx=8054d618 edx=00000006 esi=863a2008 edi=000001ff
eip=80538f42 esp=effd7c38 ebp=effd7c8c iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!ExAllocatePoolWithTag+0x668:
80538f42 894804 mov dword ptr [eax+4],ecx ds:0023:00000006=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 805331a1 to 804f52af
STACK_TEXT:
effd7ba8 805331a1 0000000a 00000006 00000002 nt!KeBugCheckEx+0x19
effd7ba8 80538f42 0000000a 00000006 00000002 nt!KiTrap0E+0x2b5
effd7c8c 805a228c 00000000 00000001 ee657645 nt!ExAllocatePoolWithTag+0x668
effd7cb0 805a296a 85de06a0 77185901 00000000 nt!ObpAllocateObject+0xc6
effd7ce4 805ea2a8 77185901 867c9bf8 00000000 nt!ObCreateObject+0x128
effd7d48 805303c4 0012fc5c 001f0003 00000000 nt!NtCreateEvent+0x90
effd7d48 7ffe0304 0012fc5c 001f0003 00000000 nt!KiSystemService+0xc9
0012fc60 00000000 00000000 00000000 00000000 SharedUserData!SystemCallStub+0x4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+668
80538f42 894804 mov dword ptr [eax+4],ecx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!ExAllocatePoolWithTag+668
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3d6dd59c
FAILURE_BUCKET_ID: 0xC5_2_nt!ExAllocatePoolWithTag+668
BUCKET_ID: 0xC5_2_nt!ExAllocatePoolWithTag+668
Followup: MachineOwner
---------