Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122810-29109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
Debug session time: Mon Dec 27 16:48:52.807 2010 (UTC - 5:00)
System Uptime: 3 days 9:49:53.246
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
..................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 5f3dc, 2, 10e519}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000005f3dc, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000010e519, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002b0932c to fffff80002a7af00
STACK_TEXT:
fffff880`08b57c08 fffff800`02b0932c : 00000000`0000004e 00000000`00000099 00000000`0005f3dc 00000000`00000002 : nt!KeBugCheckEx
fffff880`08b57c10 fffff800`02a1d3e7 : fffff980`260c0005 fffff780`c0000000 fffff880`08b57ce0 fffff880`08b57ce0 : nt!MiBadShareCount+0x4c
fffff880`08b57c50 fffff800`02d8ee35 : fffff980`26100000 fffff8a0`0cad7060 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2c1db
fffff880`08b57f30 fffff800`02a93d47 : 00000000`00000000 fffffa80`036b0c10 00000000`00000000 00000000`00100000 : nt!CcUnmapVacb+0x5d
fffff880`08b57f70 fffff800`02a6aad4 : 00000000`00000001 fffffa80`05e0cbc0 00000000`01295100 00000000`00000000 : nt!CcUnmapVacbArray+0x1b7
fffff880`08b58000 fffff800`02aa36c0 : 00000000`01295110 fffff880`01295110 fffffa80`05044310 fffffa80`0423b000 : nt!CcDeleteSharedCacheMap+0x140
fffff880`08b58070 fffff880`012fa6f8 : 00000000`c00000d8 fffff8a0`0b9f7140 fffff8a0`0b9f7140 00000000`00000000 : nt!CcUninitializeCacheMap+0x2f0
fffff880`08b580f0 fffff880`012dcd88 : fffff8a0`0b9f7010 fffff880`08b58980 fffff8a0`0b9f7140 fffffa80`066faa40 : Ntfs!NtfsDeleteInternalAttributeStream+0xf8
fffff880`08b58140 fffff880`0124baa9 : 00000000`00000000 00000000`00000000 fffff880`08b58690 fffff880`08b47000 : Ntfs!NtfsCommonCleanup+0x758
fffff880`08b58550 fffff800`02a8a64a : fffff880`08b58690 fffff880`012d7dfe fffffa80`06564920 fffff8a0`0b9f7390 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`08b58580 fffff880`0124b662 : fffff880`0124ba90 fffff880`08b58690 fffff880`08b58900 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`08b58660 fffff880`012ed244 : fffff880`08b58730 fffff880`08b58730 fffff880`08b58730 fffffa80`066faa40 : Ntfs!NtfsCommonCleanupOnNewStack+0x42
fffff880`08b586d0 fffff880`0107123f : fffff880`08b58730 fffffa80`066f6610 fffffa80`066f69b0 fffffa80`0636b1b0 : Ntfs!NtfsFsdCleanup+0x144
fffff880`08b58940 fffff880`0106f6df : fffffa80`04706de0 00000000`00000000 fffffa80`044f6e00 fffffa80`066f6610 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`08b589d0 fffff800`02d8e68f : fffffa80`066f6610 fffffa80`0616c730 00000000`00000000 fffffa80`066faa40 : fltmgr!FltpDispatch+0xcf
fffff880`08b58a30 fffff800`02d74304 : 00000000`00000000 fffffa80`0616c730 00000000`00000001 fffffa80`066faa40 : nt!IopCloseFile+0x11f
fffff880`08b58ac0 fffff800`02d8e181 : fffffa80`0616c730 fffffa80`00000001 fffff8a0`01724f90 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`08b58b40 fffff800`02d8e094 : 00000000`000013f8 fffffa80`0616c730 fffff8a0`01724f90 00000000`000013f8 : nt!ObpCloseHandleTableEntry+0xb1
fffff880`08b58bd0 fffff800`02a7a153 : fffffa80`03c43060 fffff880`08b58ca0 00000000`00000000 00000000`00000104 : nt!ObpCloseHandle+0x94
fffff880`08b58c20 00000000`7734ffaa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`11bac338 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7734ffaa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02b0932c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------