*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000027c6b0, page frame number
Arg3: 0000000000000002, current page state
Arg4: 04000060000659b1, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15365
Key : Analysis.Init.CPU.mSec
Value: 1327
Key : Analysis.Init.Elapsed.mSec
Value: 2002790
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.DumpHeader
Value: 0x4e
Key : Bugcheck.Code.Register
Value: 0x4e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 062422-60656-01.dmp
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 27c6b0
BUGCHECK_P3: 2
BUGCHECK_P4: 4000060000659b1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FiveM_b2372_GTAProcess.exe
STACK_TEXT:
fffff887`c72fac68 fffff806`3f9ef5d7 : 00000000`0000004e 00000000`00000099 00000000`0027c6b0 00000000`00000002 : nt!KeBugCheckEx
fffff887`c72fac70 fffff806`3f88c768 : 00000000`00376eb1 fffff806`40250c00 00000000`0027c6b0 fffff887`000000b1 : nt!MiBadShareCount+0x5b
fffff887`c72facb0 fffff806`3f88cf3e : 00000000`00000000 fffff887`c72fb3c0 fffffa01`26dfe000 fffff887`c72fb310 : nt!MiDeletePteRun+0x1798
fffff887`c72faec0 fffff806`3f8a5edd : 00000000`00000000 ffff818b`a5fc7700 fffff887`c72fb310 fffffa01`26dfdff8 : nt!MiDeleteVaTail+0x6e
fffff887`c72faef0 fffff806`3f8a5afb : fffffa7d`00000000 ffff818b`a5fc7700 fffff887`00000000 fffff887`c72fb360 : nt!MiWalkPageTablesRecursively+0xc6d
fffff887`c72faf90 fffff806`3f8a5afb : fffffa7d`3e8049b0 ffff818b`a5fc7700 fffff887`00000001 fffff887`c72fb370 : nt!MiWalkPageTablesRecursively+0x88b
fffff887`c72fb030 fffff806`3f8a5afb : fffffa7d`3e804000 ffff818b`a5fc7700 fffff887`00000002 fffff887`c72fb380 : nt!MiWalkPageTablesRecursively+0x88b
fffff887`c72fb0d0 fffff806`3f83effb : 00000000`00000000 ffff818b`a5fc7700 00000000`00000003 fffff887`c72fb390 : nt!MiWalkPageTablesRecursively+0x88b
fffff887`c72fb170 fffff806`3f88db61 : fffff887`c72fb310 ffff818b`00000000 fffffa01`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff887`c72fb270 fffff806`3f85b350 : 00000000`00000001 fffff887`00000000 ffff818b`a5fc7550 ffff818b`aacce080 : nt!MiDeletePagablePteRange+0x4f1
fffff887`c72fb580 fffff806`3fc208e3 : ffff818b`aacce080 00000000`00000000 ffff818b`00000000 ffff818b`00000000 : nt!MiDeleteVad+0x360
fffff887`c72fb690 fffff806`3fc1eb9f : ffff818b`abc25e20 ffff818b`abc25e20 ffff818b`abfd0070 ffff818b`a5fc7080 : nt!MiCleanVad+0x43
fffff887`c72fb6c0 fffff806`3fcfaa50 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff818b`a5fc7080 : nt!MmCleanProcessAddressSpace+0x137
fffff887`c72fb740 fffff806`3fbe35de : ffff818b`a5fc7080 ffff9707`20e53930 fffff887`c72fb990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffff887`c72fb7d0 fffff806`3fcd79f8 : ffff818b`c0000005 00000000`00000001 fffff887`00000002 000000a6`5e527000 : nt!PspExitThread+0x5f6
fffff887`c72fb8d0 fffff806`3f857817 : ffff818b`ae1e9000 00000000`00000000 ffff818b`ae1e9a90 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff887`c72fb910 fffff806`3f9fc370 : 00000000`00989680 fffff887`c72fb9c0 ffff818b`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffff887`c72fb9c0 fffff806`3fa0985f : 0000024d`41a5eaf0 00000000`00000000 ffffffff`fffe7960 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff887`c72fbb00 00007ffc`86d55cc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a6`609fed38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`86d55cc4
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1766
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------