PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 00000000001def2d
Arg3: 0000000000000006
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JO5OOR3
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 9a
BUGCHECK_P2: 1def2d
BUGCHECK_P3: 6
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8b0e`94d71e68 fffff804`26e2b131 : 00000000`0000004e 00000000`0000009a 00000000`001def2d 00000000`00000006 : nt!KeBugCheckEx
ffff8b0e`94d71e70 fffff804`26c6f2e6 : fffff4ed`475906f8 ffff8b0e`94d71fe0 fffff804`00000002 fffff4fa`00000000 : nt!MiDeleteNonPagedPoolPte+0x1bbd21
ffff8b0e`94d71ee0 fffff804`26c692fa : 00000000`02000103 00000000`00000000 ffffda8e`9f600100 fffff804`26c6afc3 : nt!MiClearNonPagedPtes+0x162
ffff8b0e`94d72110 fffff804`26c69362 : 00000000`00000000 ffff8b0e`94d72281 ffffffff`ffffff30 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
ffff8b0e`94d72190 fffff804`26c6df8a : ffff8b0e`94d722dc fffff804`0000010e 00000000`0000000e 00000000`00000061 : nt!RtlpHpEnvFreeVA+0x12
ffff8b0e`94d721c0 fffff804`26c6afc3 : fffff804`41f3f000 00000000`fffffffc 00000000`0000000a 00000000`fffffffc : nt!RtlpHpFreeVA+0x3a
ffff8b0e`94d72200 fffff804`26ca617e : 00000000`00000000 00000000`ffffff30 00000000`00000000 00000000`fffff010 : nt!RtlpHpSegMgrCommit+0x1e3
ffff8b0e`94d722d0 fffff804`26c68411 : ffffda8e`00000010 ffffda8e`b2000020 ffffda8e`00000000 fffff804`000000d0 : nt!RtlpHpSegPageRangeCommit+0x1ee
ffff8b0e`94d72370 fffff804`26c67eab : ffffffff`ffffffff 00000000`0000000d ffffffff`ffffffff ffffda8e`aa685340 : nt!RtlpHpSegPageRangeCoalesce+0x1b1
ffff8b0e`94d723f0 fffff804`26c40dc2 : 00000000`00000000 ffffda8e`9f6001c0 00000000`b2000000 00000000`00000000 : nt!RtlpHpSegPageRangeShrink+0xeb
ffff8b0e`94d72460 fffff804`273c2019 : ffffb185`00000000 ffffda8e`a9c84bd0 fffff804`3c2bf0e0 01000000`00100000 : nt!ExFreeHeapPool+0x6b2
ffff8b0e`94d72540 fffff804`41e86b73 : ffffda8e`b20109c0 ffffda8e`b20109c0 ffffda8e`a9c84bd0 00000000`00000001 : nt!ExFreePool+0x9
ffff8b0e`94d72570 ffffda8e`b20109c0 : ffffda8e`b20109c0 ffffda8e`a9c84bd0 00000000`00000001 00000000`00000001 : rtsuvc+0x226b73
ffff8b0e`94d72578 ffffda8e`b20109c0 : ffffda8e`a9c84bd0 00000000`00000001 00000000`00000001 fffff804`3c2d253d : 0xffffda8e`b20109c0
ffff8b0e`94d72580 ffffda8e`a9c84bd0 : 00000000`00000001 00000000`00000001 fffff804`3c2d253d ffffb185`3d40a7d0 : 0xffffda8e`b20109c0
ffff8b0e`94d72588 00000000`00000001 : 00000000`00000001 fffff804`3c2d253d ffffb185`3d40a7d0 fffff804`00000000 : 0xffffda8e`a9c84bd0
ffff8b0e`94d72590 00000000`00000001 : fffff804`3c2d253d ffffb185`3d40a7d0 fffff804`00000000 ffffda8e`00000000 : 0x1
ffff8b0e`94d72598 fffff804`3c2d253d : ffffb185`3d40a7d0 fffff804`00000000 ffffda8e`00000000 fffff804`218cf100 : 0x1
ffff8b0e`94d725a0 ffffb185`3d40a7d0 : fffff804`00000000 ffffda8e`00000000 fffff804`218cf100 00000000`00000000 : ks+0x3253d
ffff8b0e`94d725a8 fffff804`00000000 : ffffda8e`00000000 fffff804`218cf100 00000000`00000000 01000000`00100000 : 0xffffb185`3d40a7d0
ffff8b0e`94d725b0 ffffda8e`00000000 : fffff804`218cf100 00000000`00000000 01000000`00100000 ffffda8e`a9c84c18 : 0xfffff804`00000000
ffff8b0e`94d725b8 fffff804`218cf100 : 00000000`00000000 01000000`00100000 ffffda8e`a9c84c18 fffff804`3c2d2451 : 0xffffda8e`00000000
ffff8b0e`94d725c0 00000000`00000000 : 01000000`00100000 ffffda8e`a9c84c18 fffff804`3c2d2451 ffffb185`37d5ebb0 : 0xfffff804`218cf100
SYMBOL_NAME: rtsuvc+226b73
MODULE_NAME: rtsuvc
IMAGE_NAME: rtsuvc.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 226b73
FAILURE_BUCKET_ID: 0x4E_9a_rtsuvc!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6d83ce9d-2fd9-f756-e19f-c20fb7e9a1cc}
Followup: MachineOwner
---------