Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\011711-35069-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c52000 PsLoadedModuleList = 0xfffff800`02e8fe50
Debug session time: Mon Jan 17 13:08:17.802 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:30.564
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1, {773500ba, 1, 0, fffff880075f5ca0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+245 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them. A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: 00000000773500ba, address of system function (system call)
Arg2: 0000000000000001, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 0000000000000000, Thread->KernelApcDisable
Arg4: fffff880075f5ca0, Previous KernelApcDisable
Debugging Details:
------------------
FAULTING_IP:
+3962613839663865
00000000`773500ba ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002cc1ca9 to fffff80002cc2740
STACK_TEXT:
fffff880`075f5ad8 fffff800`02cc1ca9 : 00000000`00000001 00000000`773500ba 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
fffff880`075f5ae0 fffff800`02cc1be0 : 00000000`031f8810 fffff880`075f5ca0 00000000`03235810 00000000`018ac5f8 : nt!KiBugCheckDispatch+0x69
fffff880`075f5c20 00000000`773500ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x245
00000000`018aba88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773500ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+245
fffff800`02cc1be0 4883ec50 sub rsp,50h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceExit+245
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1_SysCallNum_0_nt!KiSystemServiceExit+245
BUCKET_ID: X64_0x1_SysCallNum_0_nt!KiSystemServiceExit+245
Followup: MachineOwner
---------
Loading Dump File [F:\a\Minidump\D M P\DMP\011711-35646-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c0a000 PsLoadedModuleList = 0xfffff800`02e47e50
Debug session time: Mon Jan 17 13:06:16.160 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:36.922
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {7, 226867, 800000000, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+35195 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 0000000000226867, page frame number
Arg3: 0000000800000000, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cef668 to fffff80002c7a740
STACK_TEXT:
fffff880`02f6f988 fffff800`02cef668 : 00000000`0000004e 00000000`00000007 00000000`00226867 00000008`00000000 : nt!KeBugCheckEx
fffff880`02f6f990 fffff800`02c21dd4 : fffffa80`0790e8d0 00000000`00000000 00000000`00000000 fffffa80`06d371a0 : nt! ?? ::FNODOBFM::`string'+0x35195
fffff880`02f6fa70 fffff800`02c21b7a : 00000000`00000000 00000000`00000000 fffff800`02e1f5a0 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x54
fffff880`02f6faa0 fffff800`02c2cab5 : fffffa80`06d371a0 00000000`00958000 00000000`00958000 fffff800`02e1f5a0 : nt!MmWaitForCacheManagerPrefetch+0x1e
fffff880`02f6fad0 fffff800`02c6e576 : fffffa80`0a322bd0 00000000`00000000 fffff800`00000005 fffff800`02f63600 : nt!CcPerformReadAhead+0x341
fffff880`02f6fc00 fffff800`02c87961 : fffffa80`06d2cd60 fffff800`02c6e358 fffff800`02e81150 00000000`00000002 : nt!CcWorkerThread+0x21e
fffff880`02f6fcb0 fffff800`02f1ec06 : 00000000`00000000 fffffa80`06d371a0 00000000`00000080 fffffa80`06cad9e0 : nt!ExpWorkerThread+0x111
fffff880`02f6fd40 fffff800`02c58c26 : fffff880`02ea4180 fffffa80`06d371a0 fffff880`02eaf040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02f6fd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+35195
fffff800`02cef668 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+35195
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+35195
BUCKET_ID: X64_0x4E_7_nt!_??_::FNODOBFM::_string_+35195
Followup: MachineOwner
---------