*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 19eb90, 0, fffffa8007ddd060}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000019eb90, page frame number
Arg3: 0000000000000000, current page state
Arg4: fffffa8007ddd060, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002b5a33c to fffff80002aca700
STACK_TEXT:
fffff880`08afb2b8 fffff800`02b5a33c : 00000000`0000004e 00000000`00000099 00000000`0019eb90 00000000`00000000 : nt!KeBugCheckEx
fffff880`08afb2c0 fffff800`02a63363 : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000c30 : nt!MiBadShareCount+0x4c
fffff880`08afb300 fffff800`02abfd49 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4780e
fffff880`08afb460 fffff800`02bfb34f : 00000000`00000000 00000000`00000000 fffff900`c00c5010 fffff880`0294b000 : nt!MiFreePagedPoolPages+0x129
fffff880`08afb5b0 fffff800`02bff87c : 00000000`00000000 fffff880`08afb780 fffff880`08afb6f0 fffff960`00000001 : nt!MiFreePoolPages+0x343
fffff880`08afb6c0 fffff960`000c60de : 00000000`00000207 fffff900`c00813bc fffff900`706d5447 00000000`00000001 : nt!ExFreePoolWithTag+0x7cc
fffff880`08afb770 fffff960`0009c6dc : 00000000`00000000 00000000`000000ef 00000000`00000000 fffff880`08afb830 : win32k!FreeTmpBuffer+0x1e
fffff880`08afb7a0 fffff960`0009c2ef : fffff880`08afbca0 fffff900`c21a0ca0 fffff880`08afbb20 fffff960`ffffffff : win32k!GreGetTextExtentExW+0x30c
fffff880`08afba60 fffff800`02ac9953 : fffff900`c21a0ca0 00000000`00000000 0000000d`00000010 00000003`00000000 : win32k!NtGdiGetTextExtentExW+0x237
fffff880`08afbbb0 00000000`74e41eda : 00000000`74e2c1ff 00000000`00000001 00000000`74e1ba1a 00000000`001e0738 : nt!KiSystemServiceCopyEnd+0x13
00000000`0019e208 00000000`74e2c1ff : 00000000`00000001 00000000`74e1ba1a 00000000`001e0738 00000000`00000400 : 0x74e41eda
00000000`0019e210 00000000`00000001 : 00000000`74e1ba1a 00000000`001e0738 00000000`00000400 00000000`00000000 : 0x74e2c1ff
00000000`0019e218 00000000`74e1ba1a : 00000000`001e0738 00000000`00000400 00000000`00000000 00000000`0568255c : 0x1
00000000`0019e220 00000000`001e0738 : 00000000`00000400 00000000`00000000 00000000`0568255c 00000000`0038cd60 : 0x74e1ba1a
00000000`0019e228 00000000`00000400 : 00000000`00000000 00000000`0568255c 00000000`0038cd60 00000000`00000000 : 0x1e0738
00000000`0019e230 00000000`00000000 : 00000000`0568255c 00000000`0038cd60 00000000`00000000 00000000`7efdd000 : 0x400
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02b5a33c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------