*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000002307e2, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1406
Key : Analysis.Elapsed.mSec
Value: 3248
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 108
Key : Analysis.Init.Elapsed.mSec
Value: 3914
Key : Analysis.Memory.CommitPeak.Mb
Value: 150
Key : Bugcheck.Code.LegacyAPI
Value: 0x4e
Key : Failure.Bucket
Value: 0x4E_7_ks!CKsPin::TransferKsIrp
Key : Failure.Hash
Value: {5220bb6f-c3b9-e671-73a3-40efb7e52e95}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 7
BUGCHECK_P2: 2307e2
BUGCHECK_P3: 1
BUGCHECK_P4: 0
FILE_IN_CAB: 060223-4187-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FearTherapybf-Win64-
DPC_STACK_BASE: FFFF820BF4847FB0
STACK_TEXT:
ffff820b`f48471e8 fffff802`13850f69 : 00000000`0000004e 00000000`00000007 00000000`002307e2 00000000`00000001 : nt!KeBugCheckEx
ffff820b`f48471f0 fffff802`13693e99 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiPfnReferenceCountIsZero+0x1a7a29
ffff820b`f4847230 fffff802`13692ad8 : ffff9501`19b3de30 ffff820b`f484210b ffffffff`00000002 00000000`00000000 : nt!MmUnlockPages+0x7f9
ffff820b`f4847320 fffff802`13692577 : ffff9501`17186a20 ffff9501`16a10100 ffff9501`16a10010 fffff802`1fa83181 : nt!IopfCompleteRequest+0x548
ffff820b`f4847400 fffff802`1fa843bd : 00000000`00000000 fffff802`13703a94 00000000`00000000 00000000`00000000 : nt!IofCompleteRequest+0x17
ffff820b`f4847430 fffff802`1fa82081 : 00000000`00000000 ffff9501`184bea60 ffff9501`16a10010 ffff9501`17186a20 : ks!CKsPin::TransferKsIrp+0x6d
ffff820b`f4847470 fffff802`1fa82b2c : 00000000`00000002 ffff9501`00000000 00000000`00000002 00000000`00000000 : ks!CKsQueue::UnlockStreamPointer+0x2e1
ffff820b`f4847510 fffff802`1fa8616b : 00000000`00000000 ffff9501`1722b4f0 ffff9501`198f7710 ffff9501`0dc88d40 : ks!CKsQueue::DeleteStreamPointer+0xfc
ffff820b`f4847560 fffff802`37fd553c : ffff9501`18414560 ffff9501`18414610 ffff9501`0dc88d40 fffff802`13db70b9 : ks!KsStreamPointerDelete+0x3b
ffff820b`f4847590 fffff802`13692735 : ffff9501`11b31be3 ffff820b`f4847689 ffff9501`11b31720 ffff9501`0dc88d40 : usbaudio!USBType1CompleteCallback+0x26c
ffff820b`f4847610 fffff802`13692577 : ffff9501`11b31720 00000000`00000000 ffff9501`184b4a30 00000000`00000002 : nt!IopfCompleteRequest+0x1a5
ffff820b`f48476f0 fffff802`163b811a : 00000000`00000000 ffff9501`0abcecb0 ffff9501`11b31720 ffff9501`18418010 : nt!IofCompleteRequest+0x17
ffff820b`f4847720 fffff802`163b5bbf : 00000000`00000002 ffff820b`f4847858 ffff9501`11b31720 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffff820b`f48477b0 fffff802`1fb3265e : ffff9501`19596c70 ffff9501`19596ad0 00000000`00000002 ffff9501`184b4e10 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffff820b`f4847810 fffff802`1fb320e6 : ffff9501`19596c70 ffff9501`184b4e10 ffff820b`000000c0 ffffba00`00000001 : USBXHCI!Isoch_Stage_CompleteTD+0x47e
ffff820b`f48478d0 fffff802`1fb31ef0 : ffff820b`f4847a00 ffff820b`f4847a00 00000000`00000000 ffff820b`00000000 : USBXHCI!Isoch_ProcessTransferEventWithED1+0x1d6
ffff820b`f48479b0 fffff802`1fb36910 : 00000000`00000004 ffff820b`f4847a88 00000000`00000008 ffff820b`f4847a90 : USBXHCI!Isoch_EP_TransferEventHandler+0x10
ffff820b`f48479e0 fffff802`1fb36445 : 00000000`00000780 00006afe`f58e7400 ffff9501`0ae653a0 ffff9501`0dace470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
ffff820b`f4847a40 fffff802`1fb3611c : ffff9501`053ff520 ffff9501`054d3040 00006afe`f584db08 ffff9501`053ff000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffff820b`f4847b40 fffff802`163b38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 000003cc`60084145 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffff820b`f4847b70 fffff802`1368b57e : ffffba00`94539240 ffff9501`053e7000 ffff820b`f4847e70 ffff820b`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
ffff820b`f4847bb0 fffff802`1368a864 : ffffba00`94536180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x30e
ffff820b`f4847d20 fffff802`13804195 : 00000000`00000000 ffffba00`94536180 ffffba00`950b0000 00000000`00000000 : nt!KiRetireDpcList+0x1f4
ffff820b`f4847fb0 fffff802`13803f80 : fffff802`137f7d70 fffff802`136f5f5a 00000000`00000000 0000021d`ecbbf1f0 : nt!KxRetireDpcList+0x5
ffff820b`fc28fa80 fffff802`13803705 : 00000000`00000000 fffff802`137fdd01 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff820b`fc28fab0 fffff802`137fdd01 : 00000000`00000000 00000000`00000000 ffff820b`00000001 ffff9501`00000000 : nt!KiDpcInterruptBypass+0x25
ffff820b`fc28fac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: ks!CKsPin::TransferKsIrp+6d
MODULE_NAME: ks
IMAGE_NAME: ks.sys
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6d
FAILURE_BUCKET_ID: 0x4E_7_ks!CKsPin::TransferKsIrp
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5220bb6f-c3b9-e671-73a3-40efb7e52e95}
Followup: MachineOwner
---------