The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    BSOD Debug... PFN_LIST_CORRUPT?

    Discussion in 'Gateway and eMachines' started by oamster, Apr 1, 2009.

  1. oamster

    oamster Notebook Geek

    Reputations:
    10
    Messages:
    84
    Likes Received:
    0
    Trophy Points:
    15
    Got my first BSOD last night with my new 7805u and figured out what happened.
    Now, is the PFN_List_CORRUPT a bad error? From what I've read on google, it points to either RAM or my HDD. But the debug says it could be a driver...
    Anyone mind shedding some light on this situation?


    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc). If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000007, A driver has unlocked a page more times than it locked i
    t
    Arg2: 000000000013debb, page frame number
    Arg3: 0000000000000001, current share count
    Arg4: 0000000000000000, 0

    Debugging Details:
    ------------------



    BUGCHECK_STR: 0x4E_7

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: System

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from fffff80001d043be to fffff80001caf350

    STACK_TEXT:
    fffff800`02f906f8 fffff800`01d043be : 00000000`0000004e 00000000`00000007 000000
    00`0013debb 00000000`00000001 : nt!KeBugCheckEx
    fffff800`02f90700 fffff800`01c5bdac : fffffa80`03b9c310 00000000`000009bb fffffa
    80`04375010 fffffa80`04375040 : nt! ?? ::FNODOBFM::`string'+0xb746
    fffff800`02f90740 fffffa60`06c4a05c : 00004d69`01757402 00004d7e`00000000 000000
    00`00000000 fffffa80`04375048 : nt! ?? ::FNODOBFM::`string'+0x20693
    fffff800`02f907e0 fffffa60`06c0760f : fffffa80`0634f800 00000000`00000000 000000
    00`00000500 00000000`00000000 : afd! ?? ::GFJBLGFE::`string'+0x7b0
    fffff800`02f90860 fffffa60`06c40440 : fffff800`02f90ab8 fffffa80`0634f8f0 000000
    00`ffffffff 00000000`00000000 : afd!AfdReceiveDatagramEventCommonHandler+0x18f
    fffff800`02f90aa0 fffffa60`010538e3 : fffffa80`00000500 00000000`00000000 000000
    00`00000000 00000000`00000000 : afd!AfdTLDgramReceiveEventHandler+0xe0
    fffff800`02f90b30 fffffa60`010535c8 : fffffa80`059b0000 fffffa80`05c5a010 fffff8
    00`00000000 fffffa60`01fac0c8 : tcpip!UdpDeliverDatagrams+0x163
    fffff800`02f90c90 fffffa60`0105e41d : fffffa60`01145f20 fffffa60`01145f20 fffff8
    00`02f90002 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x1c8
    fffff800`02f90d70 fffffa60`01057009 : 00000000`00000000 00000000`00000001 fffffa
    80`09102c40 fffff800`00000000 : tcpip!IppDeliverListToProtocol+0x4d
    fffff800`02f90e30 fffffa60`0105669e : fffffa60`01145f20 fffffa80`05cc95a0 000000
    00`00000011 fffff800`02f90ef0 : tcpip!IppProcessDeliverList+0x59
    fffff800`02f90ea0 fffffa60`010622e6 : 00000000`00000000 fffffa80`059bb000 fffffa
    80`059e81e0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23e
    fffff800`02f90f90 fffffa60`01061875 : fffffa80`09172010 00000000`00000000 000000
    00`00000001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8d6
    fffff800`02f91170 fffffa60`0107a3b3 : fffffa80`09102c40 fffff800`02f912a8 fffffa
    80`09102c40 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChai
    n+0x265
    fffff800`02f91250 fffffa60`00fa833c : fffffa80`06e50530 fffffa80`05f0b300 fffff8
    00`02f91400 fffffa80`06b761a0 : tcpip!FlReceiveNetBufferListChain+0xd3
    fffff800`02f912a0 fffffa60`00f71266 : fffff800`02f91400 fffff800`02f91410 000000
    00`00000001 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0xac
    fffff800`02f912f0 fffffa60`00e187c4 : fffffa80`06b761a0 00000000`00000002 000000
    00`00000000 fffffa60`09cda9b7 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff800`02f91770 fffffa60`00e187ed : 00000000`00000000 00000000`00000000 000000
    00`00000000 fffffa80`05f0b300 : ndis!ndisMTopReceiveNetBufferLists+0x24
    fffff800`02f917b0 fffffa60`00e18786 : 00000000`00000001 00000000`00000001 fffffa
    80`09403600 fffffa80`05cc94a0 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x1
    d
    fffff800`02f917f0 fffffa60`09cdb1fb : fffffa60`00000000 fffffa60`09cff440 000000
    00`00000030 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x16
    fffff800`02f91830 fffffa60`00e22966 : fffffa80`06fe4eb0 00000000`00000001 000000
    00`00000000 00000000`00000000 : nwifi!Pt6Receive+0x24f
    fffff800`02f91890 fffffa60`0300a109 : fffffa80`04551b70 fffffa80`074574b0 fffffa
    80`04551b70 fffffa60`03266afd : ndis! ?? ::FNODOBFM::`string'+0xc19f
    fffff800`02f918d0 fffffa80`04551b70 : fffffa80`074574b0 fffffa80`04551b70 fffffa
    60`03266afd fffffa80`00000001 : NETw5v64+0x9109
    fffff800`02f918d8 fffffa80`074574b0 : fffffa80`04551b70 fffffa60`03266afd fffffa
    80`00000001 fffffa80`06e48000 : 0xfffffa80`04551b70
    fffff800`02f918e0 fffffa80`04551b70 : fffffa60`03266afd fffffa80`00000001 fffffa
    80`06e48000 00000000`00000000 : 0xfffffa80`074574b0
    fffff800`02f918e8 fffffa60`03266afd : fffffa80`00000001 fffffa80`06e48000 000000
    00`00000000 fffffa80`05cc94a0 : 0xfffffa80`04551b70
    fffff800`02f918f0 fffffa80`00000001 : fffffa80`06e48000 00000000`00000000 fffffa
    80`05cc94a0 fffffa80`05a87388 : NETw5v64+0x265afd
    fffff800`02f918f8 fffffa80`06e48000 : 00000000`00000000 fffffa80`05cc94a0 fffffa
    80`05a87388 fffffa60`0316400d : 0xfffffa80`00000001
    fffff800`02f91900 00000000`00000000 : fffffa80`05cc94a0 fffffa80`05a87388 fffffa
    60`0316400d fffffa60`03173200 : 0xfffffa80`06e48000


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    afd! ?? ::GFJBLGFE::`string'+7b0
    fffffa60`06c4a05c 498bcf mov rcx,r15

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: afd! ?? ::GFJBLGFE::`string'+7b0

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: afd

    IMAGE_NAME: afd.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 47919ad7

    FAILURE_BUCKET_ID: X64_0x4E_7_afd!_??_::GFJBLGFE::_string_+7b0

    BUCKET_ID: X64_0x4E_7_afd!_??_::GFJBLGFE::_string_+7b0

    Followup: MachineOwner
    ---------

    0: kd> Implicit thread is now fffff800`01dd3b80
    0: kd>
     
  2. oamster

    oamster Notebook Geek

    Reputations:
    10
    Messages:
    84
    Likes Received:
    0
    Trophy Points:
    15
    Ran memtest and it completed once with no errors, but I didn't try to run it again...
    Also ran HD Tune and it didn't turn up any errors on the scan.

    Could it be that I was downloading a big torrent (24gb) and utorrent crashed?
     
  3. oamster

    oamster Notebook Geek

    Reputations:
    10
    Messages:
    84
    Likes Received:
    0
    Trophy Points:
    15
    Can anyone help?