*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 190cf3, 3, 18c672}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000190cf3, page frame number
Arg3: 0000000000000003, current page state
Arg4: 000000000018c672, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: avp.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002f62d7c to fffff80002edcd00
STACK_TEXT:
fffff880`07f360f8 fffff800`02f62d7c : 00000000`0000004e 00000000`00000099 00000000`00190cf3 00000000`00000003 : nt!KeBugCheckEx
fffff880`07f36100 fffff800`02e92708 : 00000000`0010da27 fffffa80`05722530 00000000`00000000 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`07f36140 fffff800`031ed2c9 : fffff980`0ce40000 fffff8a0`02fcb240 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2ca47
fffff880`07f36420 fffff800`02f0048b : 00000000`02e40000 fffffa80`06cdea60 00000000`00000000 00000000`05180000 : nt!CcUnmapVacb+0x5d
fffff880`07f36460 fffff800`02eab517 : fffffa80`086a8101 fffffa80`09f037b0 00000000`00000000 00000000`00000000 : nt!CcUnmapVacbArray+0x1bb
fffff880`07f364f0 fffff880`012a751b : fffffa80`09f03d48 00000000`00000000 fffff8a0`00000000 00000000`00000000 : nt!CcPurgeCacheSection+0x147
fffff880`07f36560 fffff880`012c8033 : fffff880`0c0485f0 fffff8a0`02fcc010 fffff8a0`02fc7790 fffff880`07f36868 : Ntfs!NtfsDeleteFile+0x57b
fffff880`07f367e0 fffff880`01236cc9 : fffffa80`07ae9b60 fffffa80`07ae63c0 fffff880`0c048550 fffffa80`07849b60 : Ntfs!NtfsCommonCleanup+0x1653
fffff880`07f36bf0 fffff800`02ed4817 : fffff880`0c048550 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`07f36c20 fffff800`02ed47d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0c048420 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02f62d7c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------