Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-18470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x8340d000 PsLoadedModuleList = 0x83557850
Debug session time: Tue Feb 1 09:08:05.338 2011 (UTC - 5:00)
System Uptime: 0 days 1:10:02.179
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
......
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00008886, The subtype of the bugcheck.
Arg2: 857e7cac
Arg3: 857e8470
Arg4: 00000504
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_8886
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 8349acd2 to 834ebf20
STACK_TEXT:
a71d0be4 8349acd2 0000001a 00008886 857e7cac nt!KeBugCheckEx+0x1e
a71d0c24 8349ea91 00000000 87c38030 00000000 nt!MiUnlinkPageFromLockedList+0x51
a71d0c90 8349d8ed 0b7d4d6e 00000000 87a96f30 nt!MiDispatchFault+0x2fa
a71d0d1c 8344e3d8 00000000 0b7d4d6e 00000001 nt!MmAccessFault+0x25cc
a71d0d1c 77af9b69 00000000 0b7d4d6e 00000001 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0e20e9f0 00000000 00000000 00000000 00000000 0x77af9b69
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkPageFromLockedList+51
8349acd2 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiUnlinkPageFromLockedList+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78a09
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromLockedList+51
BUCKET_ID: 0x1a_8886_nt!MiUnlinkPageFromLockedList+51
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-18673-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x83401000 PsLoadedModuleList = 0x8354b850
Debug session time: Tue Feb 1 07:57:20.413 2011 (UTC - 5:00)
System Uptime: 0 days 3:34:42.129
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
...........
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00000403, The subtype of the bugcheck.
Arg2: c00510a0
Arg3: 255e1867
Arg4: c001fce0
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 834a0cc9 to 834a20be
STACK_TEXT:
a44bfa24 834a0cc9 c00510a0 c0051ff8 862f3030 nt!MiDeletePteRun+0x663
a44bfb2c 834bbaeb 0a100000 0a83efff 8e6b7ca0 nt!MiDeleteVirtualAddresses+0x3c1
a44bfbc4 8343f1ea ffffffff a44bfce8 a44bfcf4 nt!NtFreeVirtualMemory+0x60b
a44bfbc4 8343d1a1 ffffffff a44bfce8 a44bfcf4 nt!KiFastCallEntry+0x12a
a44bfc4c 9a54ab1c ffffffff a44bfce8 a44bfcf4 nt!ZwFreeVirtualMemory+0x11
a44bfcec 9a54a87a 00000000 00000000 00000000 win32k!SURFACE::bDeleteSurface+0x291
a44bfd00 9a534e43 00000000 00000000 fe1a3b48 win32k!SURFREF::bDeleteSurface+0x14
a44bfd14 9a5301bd d00518a8 0018f400 d00518a8 win32k!bDeleteSurface+0x20
a44bfd28 8343f1ea d00518a8 0018f414 772a70b4 win32k!NtGdiDeleteObjectApp+0x7f
a44bfd28 772a70b4 d00518a8 0018f414 772a70b4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0018f414 00000000 00000000 00000000 00000000 0x772a70b4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+291
9a54ab1c e98f000000 jmp win32k!SURFACE::bDeleteSurface+0x325 (9a54abb0)
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+291
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7900f
FAILURE_BUCKET_ID: 0x1a_403_win32k!SURFACE::bDeleteSurface+291
BUCKET_ID: 0x1a_403_win32k!SURFACE::bDeleteSurface+291
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020211-18735-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0x83408000 PsLoadedModuleList = 0x83552850
Debug session time: Wed Feb 2 00:22:40.205 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:43.046
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 00010e09, page frame number
Arg3: 00000002, current page state
Arg4: 0002d1cd, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 834f2513 to 834e6f20
STACK_TEXT:
9eafe748 834f2513 0000004e 00000099 00010e09 nt!KeBugCheckEx+0x1e
9eafe760 834c768d c0802000 9eafe808 87e4ea68 nt!MiBadShareCount+0x24
9eafe7ac 834c77af 87e4e878 87f36030 87e4e878 nt!MiDeletePfnList+0x312
9eafec14 834c640b 87e4e878 87e4e878 00000000 nt!MiDeleteAddressesInWorkingSet+0x118
9eafec40 83672710 b4ba359c 87f36030 c0000096 nt!MmCleanProcessAddressSpace+0x8c
9eafecb4 83686051 00000000 86cac978 00000001 nt!PspExitThread+0x685
9eafeccc 834b98c0 86cac978 9eafecf8 9eafed04 nt!PsExitSpecialApc+0x22
9eafed1c 834462a4 00000001 00000000 9eafed34 nt!KiDeliverApc+0x28b
9eafed1c 76fd70b4 00000001 00000000 9eafed34 nt!KiServiceExit+0x64
WARNING: Frame IP not in any known module. Following frames may be wrong.
0186fe70 00000000 00000000 00000000 00000000 0x76fd70b4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+24
834f2513 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78a09
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
Followup: MachineOwner
---------