My notebook acer aspire 1620
The message debugger is this
Microsoft (R) Windows Debugger Version 6.5.0003.7
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\Guillermo\Configuración local\Temp\WER5a8a.dir00\Mini123005-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRVc:\websimbolshttp://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_gdr.050301-1519
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a420
Debug session time: Fri Dec 30 18:43:47.000 2005 (GMT+1)
System Uptime: 0 days 1:53:46.562
Loading Kernel Symbols
…
Loading unloaded module list
…
Loading User Symbols
-
*
-
Bugcheck Analysis *
-
*
Use !analyze -v to get detailed debugging information.
BugCheck 100000C5, {0, 2, 1, 8054b339}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+fd )
Followup: Pool_corruption
kd> !analyze -v
-
*
-
Bugcheck Analysis *
-
*
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn’t turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 8054b339, address which referenced memory
Debugging Details:
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+fd
8054b339 8913 mov [ebx],edx
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: DRIVER_FAULT
LAST_CONTROL_TRANSFER: from 8054b31e to 8054b339
STACK_TEXT:
f897dcc4 8054b31e 825d0b18 00000000 825d08a0 nt!ExDeferredFreePool+0xfd
f897dd04 80563885 825d08a0 e5726854 82fc9950 nt!ExFreePoolWithTag+0x489
f897dd28 805638ff 825d08a0 00000000 00000000 nt!ObpFreeObject+0x18d
f897dd40 804e36d5 825d08b8 00000000 806ee298 nt!ObpRemoveObjectRoutine+0xe7
f897dd64 804f9cd5 82fc6b30 80560510 805614b8 nt!ObfDereferenceObject+0x5f
f897dd74 804e426b 00000000 00000000 82fc6b30 nt!PspReaper+0x4a
f897ddac 8057be15 00000000 00000000 00000000 nt!ExpWorkerThread+0x100
f897dddc 804fa4da 804e4196 00000002 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+fd
8054b339 8913 mov [ebx],edx
SYMBOL_STACK_INDEX: 0
FOLLOWUP_NAME: Pool_corruption
SYMBOL_NAME: nt!ExDeferredFreePool+fd
MODULE_NAME: Pool_Corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+fd
BUCKET_ID: 0xC5_2_nt!ExDeferredFreePool+fd
Followup: Pool_corruption