PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000046acb9
Arg3: 0000000000000006
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14737
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 9a
BUGCHECK_P2: 46acb9
BUGCHECK_P3: 6
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HControl.exe
STACK_TEXT:
fffff301`f78deec8 fffff804`39021733 : 00000000`0000004e 00000000`0000009a 00000000`0046acb9 00000000`00000006 : nt!KeBugCheckEx
fffff301`f78deed0 fffff804`38e1f206 : ffffda42`051c7b88 fffff301`f78df040 fffff301`00000002 ffffda6d`00000000 : nt!MiDeleteNonPagedPoolPte+0x202403
fffff301`f78def40 fffff804`38e1ffee : ffff840a`00000400 ffff840a`524e60c0 ffff840a`524e60c0 fffff301`f78df220 : nt!MiClearNonPagedPtes+0x162
fffff301`f78df170 fffff804`38e1fe12 : 00000000`00000000 fffff301`f78df2e1 ffffffff`fffffff2 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
fffff301`f78df1f0 fffff804`38e1fda6 : 00000000`00000004 ffff840a`524e60c0 fffff804`39819f00 00000000`00000fff : nt!RtlpHpEnvFreeVA+0x12
fffff301`f78df220 fffff804`38f3eec3 : 00000000`00000000 fffff804`38f0f037 ffff840a`39481680 00000000`00000001 : nt!RtlpHpFreeVA+0x3a
fffff301`f78df260 fffff804`38f3eb6e : 00000000`00000000 00000000`fffffff2 00000000`00000002 00000000`fffffff2 : nt!RtlpHpSegMgrCommit+0x1e3
fffff301`f78df330 fffff804`38f3d357 : ffff840a`00000001 ffff840a`38f00c40 ffff840a`00000002 fffff804`0000000e : nt!RtlpHpSegPageRangeCommit+0x1ee
fffff301`f78df3d0 fffff804`38e25d7f : ffffffff`ffffffff 00000000`0000e000 ffff840a`38f62018 ffff840a`39000280 : nt!RtlpHpSegLfhVsDecommit+0xd7
fffff301`f78df420 fffff804`38ecd603 : ffff840a`38f62000 ffff840a`39000280 ffff840a`38f62000 fffff301`f78df568 : nt!RtlpHpVsSubsegmentCommitPages+0xef
fffff301`f78df4c0 fffff804`38ecbc44 : 00000000`00000000 00000000`00000e02 00010000`00000000 fffff301`00000000 : nt!RtlpHpVsContextFree+0x4d3
fffff301`f78df560 fffff804`395b2019 : fffff301`00000440 ffff840a`38fe78b0 00000000`00260024 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff301`f78df640 fffff804`479713cf : 00000000`00000000 ffff840a`4b7f6070 ffffffff`feced300 ffff840a`38fe78b0 : nt!ExFreePool+0x9
fffff301`f78df670 00000000`00000000 : ffff840a`4b7f6070 ffffffff`feced300 ffff840a`38fe78b0 00000400`53545344 : atkwmiacpi64+0x13cf
SYMBOL_NAME: atkwmiacpi64+13cf
MODULE_NAME: atkwmiacpi64
IMAGE_NAME: atkwmiacpi64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 13cf
FAILURE_BUCKET_ID: 0x4E_9a_atkwmiacpi64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9de67b89-f518-4a63-4e6d-7faf71959baf}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000046ad14
Arg3: 0000000000000006
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3842
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11585
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 9a
BUGCHECK_P2: 46ad14
BUGCHECK_P3: 6
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HControl.exe
STACK_TEXT:
ffffde86`b170edf8 fffff803`13421733 : 00000000`0000004e 00000000`0000009a 00000000`0046ad14 00000000`00000006 : nt!KeBugCheckEx
ffffde86`b170ee00 fffff803`1321f206 : ffffbddf`47eabf40 ffffde86`b170ef70 00000000`00000002 ffffbdde`00000000 : nt!MiDeleteNonPagedPoolPte+0x202403
ffffde86`b170ee70 fffff803`1321ffee : ffffbe8f`f16fc100 ffffbe8f`de4af6a0 00000000`00000000 00000000`00000074 : nt!MiClearNonPagedPtes+0x162
ffffde86`b170f0a0 fffff803`1321fe12 : 00000000`00000000 ffffde86`b170f211 ffffffff`fffffff0 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
ffffde86`b170f120 fffff803`1321fda6 : ffffbe8f`00000000 ffffbe8f`f16fc170 ffffbe8f`f16fc170 ffffde86`b170f200 : nt!RtlpHpEnvFreeVA+0x12
ffffde86`b170f150 fffff803`1333eec3 : ffffbe8f`de4af838 00000000`00000004 ffffbe8f`ed717660 ffffce81`af771050 : nt!RtlpHpFreeVA+0x3a
ffffde86`b170f190 fffff803`1333eb6e : 00000000`00000000 00000000`fffffff0 00000000`00000000 00000000`ffffffef : nt!RtlpHpSegMgrCommit+0x1e3
ffffde86`b170f260 fffff803`1333da61 : 00040004`00000001 ffffbe8f`d5701b20 00000000`00000000 ffffbe8f`00000010 : nt!RtlpHpSegPageRangeCommit+0x1ee
ffffde86`b170f300 fffff803`1333d4fb : ffffffff`ffffffff 00000000`00000011 ffffffff`ffffffff ffffbe8f`eaa68e40 : nt!RtlpHpSegPageRangeCoalesce+0x1b1
ffffde86`b170f380 fffff803`13220420 : ffffbe8f`d5800280 ffffbe8f`d5800100 ffffbe8f`d5700000 fffff803`1324f347 : nt!RtlpHpSegPageRangeShrink+0xeb
ffffde86`b170f3f0 fffff803`1321fd60 : ffffbe8f`d57d9000 fffff803`132cda98 00000000`0000000f 00010000`00000000 : nt!RtlpHpSegFree+0x9c
ffffde86`b170f430 fffff803`132265fa : 00000000`00000000 ffffbe8f`d57d9030 ffffbe8f`d57ea040 00000000`00000ffd : nt!RtlpHpSegLfhVsFree+0x10
ffffde86`b170f460 fffff803`132cd6bc : ffffbe8f`d5800280 ffffbe8f`d57d9000 ffffbe8f`d5800280 ffffde86`b170f548 : nt!RtlpHpVsSubsegmentFree+0x3a
ffffde86`b170f4a0 fffff803`132cbc44 : 00000000`00000000 00000000`00000ffd 00000000`00000000 ffffde86`00000000 : nt!RtlpHpVsContextFree+0x58c
ffffde86`b170f540 fffff803`139b2019 : ffffde86`00000450 ffffbe8f`d57da010 00000000`00260024 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffde86`b170f620 fffff803`25511279 : 00000000`00000000 ffffbe8f`f242ccc0 ffffffff`feced300 ffffbe8f`d57da010 : nt!ExFreePool+0x9
ffffde86`b170f650 00000000`00000000 : ffffbe8f`f242ccc0 ffffffff`feced300 ffffbe8f`d57da010 00000004`53545344 : atkwmiacpi64+0x1279
SYMBOL_NAME: atkwmiacpi64+1279
MODULE_NAME: atkwmiacpi64
IMAGE_NAME: atkwmiacpi64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1279
FAILURE_BUCKET_ID: 0x4E_9a_atkwmiacpi64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9de67b89-f518-4a63-4e6d-7faf71959baf}
Followup: MachineOwner
---------
2: kd> lmvm atkwmiacpi64
Browse full module list
start end module name
fffff803`25510000 fffff803`25519000 atkwmiacpi64 T (no symbols)
Loaded symbol image file: atkwmiacpi64.sys
Image path: \??\C:\Program Files (x86)\ASUS\ATK Package\ATK WMIACPI\atkwmiacpi64.sys
Image name: atkwmiacpi64.sys
Browse all global symbols functions data
Timestamp: Tue Jul 2 11:35:32 2013 (51D290D4)
CheckSum: 0000D3B2
ImageSize: 00009000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: