Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\ DOWNLOADS\ DUMPS\ganning59\022811-30950-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\XSymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c51000 PsLoadedModuleList = 0xfffff800`02e96e90
Debug session time: Mon Feb 28 22:40:33.933 2011 (UTC + 0:00)
System Uptime: 0 days 0:18:14.322
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 223dfa, 2, 226439}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000223dfa, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000226439, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Installer.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002d56f5c to fffff80002cd1640
STACK_TEXT:
fffff880`06a121e8 fffff800`02d56f5c : 00000000`0000004e 00000000`00000099 00000000`00223dfa 00000000`00000002 : nt!KeBugCheckEx
fffff880`06a121f0 fffff800`02c66303 : fffffa80`06532380 00000000`00000001 00000000`00000000 00000000`00000080 : nt!MiBadShareCount+0x4c
fffff880`06a12230 fffff800`02d1ee69 : 00000000`00000002 0000701a`00000001 fffffa80`06532380 00000000`0022c667 : nt! ?? ::FNODOBFM::`string'+0x11d18
fffff880`06a122c0 fffff800`02ce0004 : 00000000`00000000 00000000`00000000 fffff880`06a123c0 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x1d5
fffff880`06a12340 fffff800`02ccf76e : 00000000`00000001 00000000`1c1c4000 00000000`069b0b01 00000000`00000000 : nt!MmAccessFault+0x19e4
fffff880`06a124a0 00000000`00598e3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0018f6b4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x598e3a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02d56f5c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner