*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 000000000001963f, page frame number
Arg3: 000003b0003b5ea0, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1593
Key : Analysis.Elapsed.mSec
Value: 7534
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 62
Key : Analysis.Init.Elapsed.mSec
Value: 30656
Key : Analysis.Memory.CommitPeak.Mb
Value: 149
Key : Bugcheck.Code.LegacyAPI
Value: 0x4e
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: 0x4E_7_nt!MiPfnReferenceCountIsZero
Key : Failure.Hash
Value: {d4c4fdf2-bb42-a5bb-4f52-718a7a31638a}
BUGCHECK_CODE: 4e
BUGCHECK_P1: 7
BUGCHECK_P2: 1963f
BUGCHECK_P3: 3b0003b5ea0
BUGCHECK_P4: 0
FILE_IN_CAB: 031823-10687-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RGBFusion.exe
STACK_TEXT:
ffff9409`c8ea6ed8 fffff803`4f28e1f5 : 00000000`0000004e 00000000`00000007 00000000`0001963f 000003b0`003b5ea0 : nt!KeBugCheckEx
ffff9409`c8ea6ee0 fffff803`4f103bd0 : 00000000`00000000 ffffc000`004c2bd0 00000000`00000000 00000000`00000000 : nt!MiPfnReferenceCountIsZero+0x182b15
ffff9409`c8ea6f20 fffff803`4f17edc5 : 00000000`00000000 ffff9409`c8ea7080 00000000`00000000 00000000`00000002 : nt!MiRemoveLockedPageChargeAndDecRef+0x230
ffff9409`c8ea6f50 fffff803`4f117c0b : 00000000`0001963f fffff803`4fa50cc0 00000000`00000001 ffff8406`0000008f : nt!MiDoubleUnlockMdlPage+0x1d
ffff9409`c8ea6f80 fffff803`4f1196ae : ffff9409`c8ea7558 ffffa880`000bca88 00000000`00000000 ffffa880`000bca88 : nt!MiDeletePteRun+0x4cb
ffff9409`c8ea7190 fffff803`4f11a28b : ffff9409`c8ea72c0 00000000`00000000 ffffa880`000bca88 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffff9409`c8ea71c0 fffff803`4f124480 : 00000000`00000001 ffff9409`00000000 ffff8406`8378d550 ffff8406`845fa080 : nt!MiDeletePagablePteRange+0x4ab
ffff9409`c8ea74d0 fffff803`4f4fdcf7 : ffff8406`845fa080 00000000`00000000 ffff8406`00000000 ffff8406`00000000 : nt!MiDeleteVad+0x360
ffff9409`c8ea75e0 fffff803`4f4fd783 : ffff8406`84f893a0 ffff8406`84f893a0 ffff8406`849da4f0 ffff8406`8378d080 : nt!MiCleanVad+0x43
ffff9409`c8ea7610 fffff803`4f46a3c8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8406`8378d080 : nt!MmCleanProcessAddressSpace+0x137
ffff9409`c8ea7690 fffff803`4f4f1392 : ffff8406`8378d080 ffffe083`a5ed85f0 ffff9409`c8ea78e0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9409`c8ea7720 fffff803`4f435d08 : 00000000`ffffffff ffff8406`92949a01 00000000`00000100 00000000`0093a000 : nt!PspExitThread+0x5f6
ffff9409`c8ea7820 fffff803`4f080ad7 : 00000000`00000101 00000000`00000010 00000000`00000010 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff9409`c8ea7860 fffff803`4f1ff560 : 00000000`00000010 ffff9409`c8ea7910 ffff9409`c8ea7b40 00000000`00000000 : nt!KiDeliverApc+0x487
ffff9409`c8ea7910 fffff803`4f20d99f : ffff8406`845fa080 00000000`00fae2a8 774a7b32`00000000 00000000`00c90868 : nt!KiInitiateUserApc+0x70
ffff9409`c8ea7a50 00007ffc`47250b14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`00fae248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`47250b14
SYMBOL_NAME: nt!MiPfnReferenceCountIsZero+182b15
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.2728
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 182b15
FAILURE_BUCKET_ID: 0x4E_7_nt!MiPfnReferenceCountIsZero
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4c4fdf2-bb42-a5bb-4f52-718a7a31638a}
Followup: MachineOwner
---------