Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-32515-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03002000 PsLoadedModuleList = 0xfffff800`0323fe50
Debug session time: Tue Apr 19 00:00:23.275 2011 (UTC - 4:00)
System Uptime: 0 days 0:18:24.416
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 6efa, 2, 8779}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000006efa, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000008779, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Installer.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000310238c to fffff80003072740
STACK_TEXT:
fffff880`091ad218 fffff800`0310238c : 00000000`0000004e 00000000`00000099 00000000`00006efa 00000000`00000002 : nt!KeBugCheckEx
fffff880`091ad220 fffff800`030cf4d2 : 00000000`00000002 00000000`00000000 fffffa80`005ee8d0 00000000`00000080 : nt!MiBadShareCount+0x4c
fffff880`091ad260 fffff800`031332ad : fffffa80`005ee8d0 fffff880`091ad3c0 00000000`00000080 00000000`0018522c : nt! ?? ::FNODOBFM::`string'+0x11aa2
fffff880`091ad2c0 fffff800`0301f3a4 : fffff680`000cf038 fffff880`091ad3c0 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
fffff880`091ad340 fffff800`0307082e : 00000000`00000001 00000000`00000000 00000000`04735001 00000000`19c9509c : nt! ?? ::FNODOBFM::`string'+0x43485
fffff880`091ad4a0 00000000`00507d2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0018f9ac 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x507d2a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0310238c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-32093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0301f000 PsLoadedModuleList = 0xfffff800`0325ce50
Debug session time: Tue Apr 19 00:06:10.373 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:04.513
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 130634, 0, 1305b4}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000130634, page frame number
Arg3: 0000000000000000, current page state
Arg4: 00000000001305b4, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000311f38c to fffff8000308f740
STACK_TEXT:
fffff880`03546298 fffff800`0311f38c : 00000000`0000004e 00000000`00000099 00000000`00130634 00000000`00000000 : nt!KeBugCheckEx
fffff880`035462a0 fffff800`030343d7 : 00000000`00130634 00000000`0001ff83 fffffa80`005fe890 00000580`00000000 : nt!MiBadShareCount+0x4c
fffff880`035462e0 fffff800`03074b82 : 00000000`00000000 fffffa80`0a809a00 00000000`00000702 fffff8a0`02f5e800 : nt! ?? ::FNODOBFM::`string'+0x2d244
fffff880`035463d0 fffff880`014b1e51 : fffffa80`09b8ca48 fffffa80`0a809a60 00000000`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0x172
fffff880`03546440 fffff880`014e806b : fffffa80`0a809a60 fffff8a0`02f5e8e0 00000000`00000000 fffff8a0`02f5e801 : Ntfs!NtfsFlushAndPurgeScb+0x1bb
fffff880`035464d0 fffff880`014d5e45 : fffffa80`0a809a60 fffffa80`06bb9dd8 fffffa80`092fe180 fffff8a0`02f5eb48 : Ntfs!NtfsOpenAttribute+0x81b
fffff880`035465e0 fffff880`014d278b : fffff880`08445470 fffffa80`0a809a60 fffff8a0`02f5eb48 fffff8a0`0000005c : Ntfs!NtfsOpenExistingAttr+0x145
fffff880`035466a0 fffff880`014d2eff : fffffa80`0a809a60 fffffa80`06bb9a80 fffff8a0`02f5eb48 fffff880`0000005c : Ntfs!NtfsOpenAttributeInExistingFile+0x5ab
fffff880`03546830 fffff880`014e3e76 : fffffa80`0a809a60 fffffa80`06bb9a80 fffff8a0`02f5eb48 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
fffff880`03546920 fffff880`014de28d : fffffa80`0a809a60 fffffa80`06bb9a80 fffff880`03546b00 fffff880`03546b48 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`035469f0 fffff880`014394dd : fffffa80`0a809a60 fffffa80`06bb9a80 fffff880`08445470 00000000`00000000 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`03546bd0 fffff800`0309c961 : fffffa80`06a45500 fffff800`03083300 fffff800`03296100 60646064`00000000 : Ntfs!NtfsFspDispatch+0x26d
fffff880`03546cb0 fffff800`033327c6 : d1e1d1e1`59ac59ac fffffa80`06a41040 00000000`00000080 fffffa80`06a24b30 : nt!ExpWorkerThread+0x111
fffff880`03546d40 fffff800`0306dc26 : fffff880`03386180 fffffa80`06a41040 fffff880`033910c0 8d5b8d5b`f16cf16c : nt!PspSystemThreadStartup+0x5a
fffff880`03546d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0311f38c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-26406-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0305f000 PsLoadedModuleList = 0xfffff800`0329ce50
Debug session time: Tue Apr 19 01:01:53.156 2011 (UTC - 4:00)
System Uptime: 0 days 0:20:04.312
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffffa8006995a60, c636f8b77f8e3d2d, c31ab2a17a4e00f1}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )
Followup: Pool_corruption
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8006995a60, the pool entry being checked.
Arg3: c636f8b77f8e3d2d, the read back flink freelist value (should be the same as 2).
Arg4: c31ab2a17a4e00f1, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Installer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003202d6f to fffff800030cf740
STACK_TEXT:
fffff880`089a5038 fffff800`03202d6f : 00000000`00000019 00000000`00000003 fffffa80`06995a60 c636f8b7`7f8e3d2d : nt!KeBugCheckEx
fffff880`089a5040 fffff800`030f7a24 : 00000000`00000000 fffffa80`07ce0ec0 fffff980`00000000 fffffa80`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`089a5130 fffff800`030f8f44 : 00000000`000002fd 00000000`00000040 fffff6fc`c0033c00 fffff880`089a5230 : nt!MiAddViewsForSection+0x1d4
fffff880`089a51c0 fffff800`030f8407 : fffff8a0`0a13a960 fffff880`03115830 fffff880`089a5368 00000000`00000000 : nt!MmMapViewInSystemCache+0x194
fffff880`089a5330 fffff800`030ee2a0 : 00000000`00000000 fffffa80`0760c840 00000000`00001000 00000000`00000001 : nt!CcGetVacbMiss+0x177
fffff880`089a53f0 fffff800`030f2a32 : 00000000`00000000 00000000`00000000 fffff880`089a54d0 fffff880`089a5540 : nt!CcGetVirtualAddress+0x1b0
fffff880`089a5480 fffff800`033c1279 : fffff8a0`0230df00 fffff880`089a55a0 fffff8a0`00001000 fffff880`089a5600 : nt!CcPinFileData+0xb2
fffff880`089a5540 fffff880`0131a0bc : fffffa80`0a9ae970 00000000`00001000 fffff880`089a57c0 fffff8a0`0230df01 : nt!CcPreparePinWrite+0xc9
fffff880`089a5600 fffff880`013191f4 : fffff8a0`0a3e46f0 fffff8a0`0a3e48b8 00000000`00000000 fffff880`089a5601 : Ntfs!NtfsPreparePinWriteStream+0x5c
fffff880`089a5650 fffff880`012e040b : fffffa80`0761f340 fffff8a0`0a3e46f0 fffff8a0`0230df18 00000000`000007ff : Ntfs!GetIndexBuffer+0x2f0
fffff880`089a5740 fffff880`01313601 : fffffa80`07b6fa90 00000000`00000001 00000000`00000400 fffff880`089a59b8 : Ntfs!PushIndexRoot+0x25f
fffff880`089a5920 fffff880`0131536d : 00000000`00000000 fffff8a0`0a3e46f0 fffff880`089a5a18 fffff8a0`0230df18 : Ntfs!AddToIndex+0x181
fffff880`089a59a0 fffff880`01314fd5 : fffffa80`0761f340 00000000`00000000 fffff8a0`02725b40 fffffa80`0761f340 : Ntfs!NtfsAddIndexEntry+0x11d
fffff880`089a5ba0 fffff880`01312d1f : fffffa80`0761f340 fffff8a0`0a3e46f0 fffff8a0`02725b40 fffff8a0`0a3e46f0 : Ntfs!NtfsAddNameToParent+0x46c
fffff880`089a5ca0 fffff880`013107b2 : fffffa80`0761f340 fffff8a0`02725c70 fffffa80`07b99180 fffffa80`0761f340 : Ntfs!NtfsAddLink+0x1c7
fffff880`089a5dc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCreateNewFile+0x8d2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+a56
fffff800`03202d6f cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+a56
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-21109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0305c000 PsLoadedModuleList = 0xfffff800`03299e50
Debug session time: Tue Apr 19 22:57:25.964 2011 (UTC - 4:00)
System Uptime: 0 days 1:31:33.105
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {8884, fffffa8004b59f70, fffffa80001ae8f0, 502}
Probably caused by : memory_corruption ( nt!MiRelinkStandbyPage+c6 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000008884, The subtype of the bugcheck.
Arg2: fffffa8004b59f70
Arg3: fffffa80001ae8f0
Arg4: 0000000000000502
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8884
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000317ae56 to fffff800030cc740
STACK_TEXT:
fffff880`072e78b8 fffff800`0317ae56 : 00000000`0000001a 00000000`00008884 fffffa80`04b59f70 fffffa80`001ae8f0 : nt!KeBugCheckEx
fffff880`072e78c0 fffff800`031d9685 : fffffa80`099a2f70 fffffa80`099c7000 00000000`00000000 00000000`00000000 : nt!MiRelinkStandbyPage+0xc6
fffff880`072e7930 fffff800`034dee44 : fffffa80`099a2000 fffff880`072e7ca0 fffff880`072e7a08 00000000`00000001 : nt!MmSetPfnListPriorities+0x175
fffff880`072e7980 fffff800`0353fb7a : 00000000`00000020 00000000`00000000 fffffa80`099a2000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
fffff880`072e79d0 fffff800`035442be : 00000000`00000000 00000000`01ccbb08 00000000`0000004f fffff880`00c1b601 : nt!PfSetSuperfetchInformation+0x199
fffff880`072e7ab0 fffff800`030cb993 : fffffa80`09730060 00000000`02e91230 00000000`0e273868 00000000`02e91e30 : nt!NtSetSystemInformation+0xb91
fffff880`072e7c20 00000000`77030daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01ccba48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77030daa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRelinkStandbyPage+c6
fffff800`0317ae56 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRelinkStandbyPage+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
BUCKET_ID: X64_0x1a_8884_nt!MiRelinkStandbyPage+c6
Followup: MachineOwner
---------