Uploaded image for project: 'Core ReactOS'
  1. Core ReactOS
  2. CORE-8629

TCPIP address file receive queue corrupted after running mshtml:htmllocation

    XMLWordPrintable

Details

    • Bug
    • Resolution: Cannot Reproduce
    • Major
    • None
    • Drivers: Other
    • None

    Description

      This probably doesn't reproduce...

      htmllocation: 141 tests executed (0 marked as todo, 1 failure), 0 skipped.
      TCP operation failed: 0xc0000128 (-12)
      TCP operation failed: 0xc0000128 (-12)
       
      *** Fatal System Error: 0x0000000a
                             (0x00000034,0xFFFFFFFF,0x00000000,0x80405508)
       
      Break instruction exception - code 80000003 (first chance)
       
      A fatal system error has occurred.
      Debugger entered on first try; Bugcheck callbacks have not been invoked.
       
      A fatal system error has occurred.
       
      Connected to Windows Server 2003 3790 x86 compatible target at (Mon Oct 13 14:17:04.136 2014 (UTC + 2:00)), ptr64 FALSE
      Loading Kernel Symbols
      ...................................................
      Loading User Symbols
      ................................................................
      .
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
       
      Use !analyze -v to get detailed debugging information.
       
      BugCheck A, {34, ffffffff, 0, 80405508}
       
      Probably caused by : tcpip.sys ( tcpip!AddrFileFree+e9 )
       
      Followup: MachineOwner
      ---------
       
      nt!RtlpBreakWithStatusInstruction:
      80525638 cc              int     3
      kd> !analyze -v
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
       
      IRQL_NOT_LESS_OR_EQUAL (a)
      An attempt was made to access a pageable (or completely invalid) address at an
      interrupt request level (IRQL) that is too high.  This is usually
      caused by drivers using improper addresses.
      If a kernel debugger is available get the stack backtrace.
      Arguments:
      Arg1: 00000034, memory referenced
      Arg2: ffffffff, IRQL
      Arg3: 00000000, bitfield :
      	bit 0 : value 0 = read operation, 1 = write operation
      	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
      Arg4: 80405508, address which referenced memory
       
      Debugging Details:
      ------------------
       
       
      READ_ADDRESS:  00000034 
       
      CURRENT_IRQL:  0
       
      FAULTING_IP: 
      nt!RtlpCheckListEntry+8 [c:\ros\reactos-clean\reactos\include\ddk\wdm.h @ 9685]
      80405508 8b5104          mov     edx,dword ptr [ecx+4]
       
      DEFAULT_BUCKET_ID:  DRIVER_FAULT
       
      BUGCHECK_STR:  0xA
       
      PROCESS_NAME:  mshtml_winetest
       
      TRAP_FRAME:  00000018 -- (.trap 0x18)
      Unable to read trap frame at 00000018
       
      LAST_CONTROL_TRANSFER:  from 804856b6 to 80525638
       
      STACK_TEXT:  
      f817c530 804856b6 00000003 f817c850 ffdff408 nt!RtlpBreakWithStatusInstruction
      f817c560 80485f32 00000003 01dbdb40 01dbdae8 nt!KiBugCheckDebugBreak+0x36 [c:\ros\reactos-clean\reactos\ntoskrnl\ke\bug.c @ 536]
      f817c8fc 8050d0e6 0000000a 00000034 ffffffff nt!KeBugCheckWithTf+0x4f2 [c:\ros\reactos-clean\reactos\ntoskrnl\ke\bug.c @ 1084]
      f817c938 804036df f817c9b4 80405508 8040b83a nt!KiTrap0EHandler+0xc6 [c:\ros\reactos-clean\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1234]
      f817c938 80405508 f817c9b4 80405508 8040b83a nt!KiTrap0E+0x8f
      f817c9b4 8040818f b0fac604 b0fac5b0 01fac604 nt!RtlpCheckListEntry+0x8 [c:\ros\reactos-clean\reactos\include\ddk\wdm.h @ 9685]
      f817c9c8 804345d0 b0fac604 b0fac5b0 b0fac604 nt!RemoveHeadList+0xf [c:\ros\reactos-clean\reactos\include\ddk\wdm.h @ 9722]
      f817c9e4 f87cf7b9 00000000 00000001 ffdff000 nt!ExfInterlockedRemoveHeadList+0x40 [c:\ros\reactos-clean\reactos\ntoskrnl\ex\interlocked.c @ 391]
      f817ca08 f87d005a b0fac5a0 00000001 00000001 tcpip!AddrFileFree+0xe9 [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\fileobjs.c @ 329]
      f817ca2c f87d1ac6 f817ca48 00000001 b0f064a0 tcpip!FileCloseAddress+0x1ba [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\fileobjs.c @ 588]
      f817ca58 f87d1b6d b1233408 b0fa9cf8 8046f302 tcpip!TiCloseFileObject+0x96 [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\main.c @ 304]
      f817ca74 8046fd59 b1233408 b0fa9cf8 00000001 tcpip!TiDispatchOpenClose+0x4d [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\main.c @ 356]
      f817ca98 8046359e 00000001 b1313ac0 b1233408 nt!IofCallDriver+0xa9 [c:\ros\reactos-clean\reactos\ntoskrnl\io\iomgr\irp.c @ 1205]
      f817cad0 804dcafd b0f06788 00000000 00000000 nt!IopDeleteFile+0x1ce [c:\ros\reactos-clean\reactos\ntoskrnl\io\iomgr\file.c @ 1035]
      f817caf8 804e0c5c b0f06788 00000000 00000001 nt!ObpDeleteObject+0x19d [c:\ros\reactos-clean\reactos\ntoskrnl\ob\oblife.c @ 212]
      f817cb18 804d8e6e b1313ac0 b0f06788 c0502400 nt!ObfDereferenceObject+0xbc [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obref.c @ 239]
      f817cb34 804da187 e1ad6eb8 e1afa2b8 0000015c nt!ObpCloseHandleTableEntry+0x1ae [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obhandle.c @ 759]
      f817cb54 8042f661 e1afa2b8 0000015c f817cba0 nt!ObpCloseHandleCallback+0x27 [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obhandle.c @ 1906]
      f817cb70 804da4aa e1ad6eb8 804da160 f817cba0 nt!ExSweepHandleTable+0x81 [c:\ros\reactos-clean\reactos\ntoskrnl\ex\handle.c @ 1217]
      f817cbb0 804e8ec9 b0fbcd88 01dbdb40 01dbdae8 nt!ObKillProcess+0x12a [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obhandle.c @ 2103]
      f817cc7c 804e91d0 00000000 00000000 f817cce0 nt!PspExitThread+0x999 [c:\ros\reactos-clean\reactos\ntoskrnl\ps\kill.c @ 839]
      f817cc8c 804843fd b0fe2c78 f817ccdc f817ccb8 nt!PsExitSpecialApc+0x80 [c:\ros\reactos-clean\reactos\ntoskrnl\ps\kill.c @ 941]
      f817cce0 8050ddc5 00000001 00000000 f817cd64 nt!KiDeliverApc+0x34d [c:\ros\reactos-clean\reactos\ntoskrnl\ke\apc.c @ 481]
      f817ccfc 8050d9dd f817cd64 f817cd28 8050bd6d nt!KiCheckForApcDelivery+0x65 [c:\ros\reactos-clean\reactos\ntoskrnl\include\internal\i386\ke.h @ 762]
      f817cd08 8050bd6d f817cd64 00000000 00000001 nt!KiCommonExit+0xd [c:\ros\reactos-clean\reactos\ntoskrnl\ke\i386\traphdlr.c @ 97]
      f817cd28 8050d954 ffdff6b8 01dbdac0 f817cd64 nt!KiServiceExit+0x8d [c:\ros\reactos-clean\reactos\ntoskrnl\ke\i386\traphdlr.c @ 155]
      f817cd5c 80403e03 01dbdb40 7c92d01e badb0d00 nt!KiSystemServiceHandler+0x264 [c:\ros\reactos-clean\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1721]
      f817cd5c 7c92d01e 01dbdb40 7c92d01e badb0d00 nt!KiFastCallEntry+0x8c
      01dbdab4 7c9515a7 72cb3f92 00000138 00000154 ntdll!KiFastSystemCallRet
      01dbdab8 72cb3f92 00000138 00000154 00000000 ntdll!NtDeviceIoControlFile+0xc
      01dbdb40 778d3409 00000138 0197d3f8 00000010 msafd!WSPConnect+0x382 [c:\ros\reactos-clean\reactos\dll\win32\msafd\misc\dllmain.c @ 1594]
      01dbdb88 778d336c 00000138 0197d3f8 00000010 ws2_32!WSAConnect+0x89 [c:\ros\reactos-clean\reactos\dll\win32\ws2_32\misc\dllmain.c @ 732]
      01dbdbac 75fa9d09 00000138 0197d3f8 00000010 ws2_32!connect+0x1c [c:\ros\reactos-clean\reactos\dll\win32\ws2_32\misc\dllmain.c @ 692]
      01dbdd14 75fa9bfd 0197d3e8 01808f90 0000ea60 wininet!create_netconn_socket+0xb9 [c:\ros\reactos-clean\reactos\dll\win32\wininet\netconnection.c @ 266]
      01dbdd30 75f9bd6c 00000000 0197d3e8 00000000 wininet!create_netconn+0x8d [c:\ros\reactos-clean\reactos\dll\win32\wininet\netconnection.c @ 333]
      01dbdd6c 75f98d85 0192f7b8 01dbfe28 00000000 wininet!open_http_connection+0x30c [c:\ros\reactos-clean\reactos\dll\win32\wininet\http.c @ 4757]
      01dbfed0 75f9c7be 0192f7b8 0197d670 0000001e wininet!HTTP_HttpSendRequestW+0x425 [c:\ros\reactos-clean\reactos\dll\win32\wininet\http.c @ 4882]
      01dbfefc 75fa79e3 0197d648 00000000 0197d648 wininet!AsyncHttpSendRequestProc+0x9e [c:\ros\reactos-clean\reactos\dll\win32\wininet\http.c @ 5149]
      01dbff10 7c962c45 0197d648 00000000 00000000 wininet!INTERNET_WorkerThreadFunc+0x63 [c:\ros\reactos-clean\reactos\dll\win32\wininet\internet.c @ 3799]
      01dbff5c 7c9635ae 00000000 00000000 01997180 ntdll!RtlpExecuteWorkItem+0xb5 [c:\ros\reactos-clean\reactos\lib\rtl\workitem.c @ 227]
      01dbffb8 77d99c24 0012e378 00000000 00000000 ntdll!RtlpWorkerThreadProc+0xbe [c:\ros\reactos-clean\reactos\lib\rtl\workitem.c @ 724]
      01dbffec 00000000 7c9634f0 0012e378 00000000 kernel32!BaseThreadStartup+0x54 [c:\ros\reactos-clean\reactos\dll\win32\kernel32\client\thread.c @ 69]
       
       
      STACK_COMMAND:  kb
       
      FOLLOWUP_IP: 
      tcpip!AddrFileFree+e9 [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\fileobjs.c @ 329]
      f87cf7b9 8945ec          mov     dword ptr [ebp-14h],eax
       
      SYMBOL_STACK_INDEX:  8
       
      SYMBOL_NAME:  tcpip!AddrFileFree+e9
       
      FOLLOWUP_NAME:  MachineOwner
       
      MODULE_NAME: tcpip
       
      IMAGE_NAME:  tcpip.sys
       
      DEBUG_FLR_IMAGE_TIMESTAMP:  543b9073
       
      FAILURE_BUCKET_ID:  0xA_tcpip!AddrFileFree+e9
       
      BUCKET_ID:  0xA_tcpip!AddrFileFree+e9
       
      Followup: MachineOwner
      ---------
       
      kd> .trap 0xf817c940 
      ErrCode = 00000000
      eax=b0fac604 ebx=0012e378 ecx=00000030 edx=00000000 esi=01dbdae8 edi=01dbdb40
      eip=80405508 esp=f817c9b4 ebp=f817c9b4 iopl=0         nv up di ng nz na pe nc
      cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010086
      nt!RtlpCheckListEntry+0x8:
      80405508 8b5104          mov     edx,dword ptr [ecx+4] ds:0023:00000034=????????
      kd> kp
        *** Stack trace for last set context - .thread/.cxr resets it
      ChildEBP RetAddr  
      f817c9b4 8040818f nt!RtlpCheckListEntry(struct _LIST_ENTRY * Entry = 0xb0fac604 [ 0x30 - 0xb0fac604 ])+0x8 [c:\ros\reactos-clean\reactos\include\ddk\wdm.h @ 9685]
      f817c9c8 804345d0 nt!RemoveHeadList(struct _LIST_ENTRY * ListHead = 0xb0fac604 [ 0x30 - 0xb0fac604 ])+0xf [c:\ros\reactos-clean\reactos\include\ddk\wdm.h @ 9722]
      f817c9e4 f87cf7b9 nt!ExfInterlockedRemoveHeadList(struct _LIST_ENTRY * ListHead = 0xb0fac604 [ 0x30 - 0xb0fac604 ], unsigned long * Lock = 0xb0fac5b0)+0x40 [c:\ros\reactos-clean\reactos\ntoskrnl\ex\interlocked.c @ 391]
      f817ca08 f87d005a tcpip!AddrFileFree(void * Object = 0xb0fac5a0)+0xe9 [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\fileobjs.c @ 329]
      f817ca2c f87d1ac6 tcpip!FileCloseAddress(struct _TDI_REQUEST * Request = 0xf817ca48)+0x1ba [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\fileobjs.c @ 588]
      f817ca58 f87d1b6d tcpip!TiCloseFileObject(struct _DEVICE_OBJECT * DeviceObject = 0xb1233408, struct _IRP * Irp = 0xb0fa9cf8)+0x96 [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\main.c @ 304]
      f817ca74 8046fd59 tcpip!TiDispatchOpenClose(struct _DEVICE_OBJECT * DeviceObject = 0xb1233408, struct _IRP * Irp = 0xb0fa9cf8)+0x4d [c:\ros\reactos-clean\reactos\drivers\network\tcpip\tcpip\main.c @ 356]
      f817ca98 8046359e nt!IofCallDriver(struct _DEVICE_OBJECT * DeviceObject = 0xb1233408, struct _IRP * Irp = 0xb0fa9cf8)+0xa9 [c:\ros\reactos-clean\reactos\ntoskrnl\io\iomgr\irp.c @ 1205]
      f817cad0 804dcafd nt!IopDeleteFile(void * ObjectBody = 0xb0f06788)+0x1ce [c:\ros\reactos-clean\reactos\ntoskrnl\io\iomgr\file.c @ 1035]
      f817caf8 804e0c5c nt!ObpDeleteObject(void * Object = 0xb0f06788, unsigned char CalledFromWorkerThread = 0x00 '')+0x19d [c:\ros\reactos-clean\reactos\ntoskrnl\ob\oblife.c @ 212]
      f817cb18 804d8e6e nt!ObfDereferenceObject(void * Object = 0xb0f06788)+0xbc [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obref.c @ 239]
      f817cb34 804da187 nt!ObpCloseHandleTableEntry(struct _HANDLE_TABLE * HandleTable = 0xe1ad6eb8, struct _HANDLE_TABLE_ENTRY * HandleEntry = 0xe1afa2b8, void * Handle = 0x0000015c, char AccessMode = 0n0 '', unsigned char IgnoreHandleProtection = 0x01 '')+0x1ae [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obhandle.c @ 759]
      f817cb54 8042f661 nt!ObpCloseHandleCallback(struct _HANDLE_TABLE_ENTRY * HandleTableEntry = 0xe1afa2b8, void * Handle = 0x0000015c, void * Context = 0xf817cba0)+0x27 [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obhandle.c @ 1906]
      f817cb70 804da4aa nt!ExSweepHandleTable(struct _HANDLE_TABLE * HandleTable = 0xe1ad6eb8, <function> * EnumHandleProcedure = 0x804da160, void * Context = 0xf817cba0)+0x81 [c:\ros\reactos-clean\reactos\ntoskrnl\ex\handle.c @ 1217]
      f817cbb0 804e8ec9 nt!ObKillProcess(struct _EPROCESS * Process = 0xb0fbcd88)+0x12a [c:\ros\reactos-clean\reactos\ntoskrnl\ob\obhandle.c @ 2103]
      f817cc7c 804e91d0 nt!PspExitThread(long ExitStatus = 0)+0x999 [c:\ros\reactos-clean\reactos\ntoskrnl\ps\kill.c @ 839]
      f817cc8c 804843fd nt!PsExitSpecialApc(struct _KAPC * Apc = 0xb0fe2c78, <function> ** NormalRoutine = 0xf817ccdc, void ** NormalContext = 0xf817ccb8, void ** SystemArgument1 = 0xf817ccd4, void ** SystemArgument2 = 0xf817ccd8)+0x80 [c:\ros\reactos-clean\reactos\ntoskrnl\ps\kill.c @ 941]
      f817cce0 8050ddc5 nt!KiDeliverApc(char DeliveryMode = 0n1 '', struct _KEXCEPTION_FRAME * ExceptionFrame = 0x00000000, struct _KTRAP_FRAME * TrapFrame = 0xf817cd64)+0x34d [c:\ros\reactos-clean\reactos\ntoskrnl\ke\apc.c @ 481]
      f817ccfc 8050d9dd nt!KiCheckForApcDelivery(struct _KTRAP_FRAME * TrapFrame = 0xf817cd64)+0x65 [c:\ros\reactos-clean\reactos\ntoskrnl\include\internal\i386\ke.h @ 762]
      f817cd08 8050bd6d nt!KiCommonExit(struct _KTRAP_FRAME * TrapFrame = 0xf817cd64, unsigned char SkipPreviousMode = 0x00 '')+0xd [c:\ros\reactos-clean\reactos\ntoskrnl\ke\i386\traphdlr.c @ 97]
      f817cd28 8050d954 nt!KiServiceExit(struct _KTRAP_FRAME * TrapFrame = 0xf817cd64, long Status = 0x103)+0x8d [c:\ros\reactos-clean\reactos\ntoskrnl\ke\i386\traphdlr.c @ 155]
      f817cd5c 80403e03 nt!KiSystemServiceHandler(struct _KTRAP_FRAME * TrapFrame = 0xf817cd64, void * Arguments = 0x01dbdac0)+0x264 [c:\ros\reactos-clean\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1721]
      f817cd5c 7c92d01e nt!KiFastCallEntry+0x8c
      01dbdab4 7c9515a7 ntdll!KiFastSystemCallRet
      01dbdab8 72cb3f92 ntdll!NtDeviceIoControlFile+0xc
      01dbdb40 778d3409 msafd!WSPConnect(unsigned int Handle = 0x138, struct sockaddr * SocketAddress = 0x0197d3f8, int SocketAddressLength = 0x10, struct _WSABUF * lpCallerData = 0x00000000, struct _WSABUF * lpCalleeData = 0x00000000, struct _QualityOfService * lpSQOS = 0x00000000, struct _QualityOfService * lpGQOS = 0x00000000, int * lpErrno = 0x01dbdb70)+0x382 [c:\ros\reactos-clean\reactos\dll\win32\msafd\misc\dllmain.c @ 1594]
      01dbdb88 778d336c ws2_32!WSAConnect(unsigned int s = 0x138, struct sockaddr * name = 0x0197d3f8, int namelen = 0x10, struct _WSABUF * lpCallerData = 0x00000000, struct _WSABUF * lpCalleeData = 0x00000000, struct _QualityOfService * lpSQOS = 0x00000000, struct _QualityOfService * lpGQOS = 0x00000000)+0x89 [c:\ros\reactos-clean\reactos\dll\win32\ws2_32\misc\dllmain.c @ 732]
      01dbdbac 75fa9d09 ws2_32!connect(unsigned int s = 0x138, struct sockaddr * name = 0x0197d3f8, int namelen = 0x10)+0x1c [c:\ros\reactos-clean\reactos\dll\win32\ws2_32\misc\dllmain.c @ 692]
      01dbdd14 75fa9bfd wininet!create_netconn_socket(struct server_t * server = 0x0197d3e8, struct netconn_t * netconn = 0x01808f90, unsigned int timeout = 0xea60)+0xb9 [c:\ros\reactos-clean\reactos\dll\win32\wininet\netconnection.c @ 266]
      01dbdd30 75f9bd6c wininet!create_netconn(int useSSL = 0, struct server_t * server = 0x0197d3e8, unsigned int security_flags = 0, int mask_errors = 1, unsigned int timeout = 0xea60, struct netconn_t ** ret = 0x01dbdd60)+0x8d [c:\ros\reactos-clean\reactos\dll\win32\wininet\netconnection.c @ 333]
      01dbdd6c 75f98d85 wininet!open_http_connection(struct http_request_t * request = 0x0192f7b8, int * reusing = 0x01dbfe28)+0x30c [c:\ros\reactos-clean\reactos\dll\win32\wininet\http.c @ 4757]
      01dbfed0 75f9c7be wininet!HTTP_HttpSendRequestW(struct http_request_t * request = 0x0192f7b8, wchar_t * lpszHeaders = 0x0197d670 "Accept-Encoding: gzip, deflate灰獳???", unsigned int dwHeaderLength = 0x1e, void * lpOptional = 0x00000000, unsigned int dwOptionalLength = 0, unsigned int dwContentLength = 0, int bEndRequest = 1)+0x425 [c:\ros\reactos-clean\reactos\dll\win32\wininet\http.c @ 4882]
      01dbfefc 75fa79e3 wininet!AsyncHttpSendRequestProc(struct task_header_t * hdr = 0x0197d648)+0x9e [c:\ros\reactos-clean\reactos\dll\win32\wininet\http.c @ 5149]
      01dbff10 7c962c45 wininet!INTERNET_WorkerThreadFunc(void * lpvParam = 0x0197d648)+0x63 [c:\ros\reactos-clean\reactos\dll\win32\wininet\internet.c @ 3799]
      01dbff5c 7c9635ae ntdll!RtlpExecuteWorkItem(void * NormalContext = 0x00000000, void * SystemArgument1 = 0x00000000, void * SystemArgument2 = 0x01997180)+0xb5 [c:\ros\reactos-clean\reactos\lib\rtl\workitem.c @ 227]
      01dbffb8 77d99c24 ntdll!RtlpWorkerThreadProc(void * Parameter = 0x0012e378)+0xbe [c:\ros\reactos-clean\reactos\lib\rtl\workitem.c @ 724]
      01dbffec 00000000 kernel32!BaseThreadStartup(<function> * lpStartAddress = 0x7c9634f0, void * lpParameter = 0x0012e378)+0x54 [c:\ros\reactos-clean\reactos\dll\win32\kernel32\client\thread.c @ 69]
      kd> ?? ListHead
      struct _LIST_ENTRY * 0xb0fac604
       [ 0x30 - 0xb0fac604 ]
         +0x000 Flink            : 0x00000030 _LIST_ENTRY
         +0x004 Blink            : 0xb0fac604 _LIST_ENTRY [ 0x30 - 0xb0fac604 ]
      kd> !pool 0xb0fac604 2
      Pool page b0fac604 region is Unknown
      *b0fac598 size:  108 previous size:   20  (Free ) *AdrF
      		Owning component : Unknown (update pooltag.txt)
      kd> !poolval 0xb0fac604
      Pool page b0fac604 region is Unknown
       
      Validating Pool headers for pool page: b0fac604
       
      Pool page [ b0fac000 ] is VALID.

      Attachments

        Activity

          People

            bug zilla Bug Zilla
            ThFabba ThFabba
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: