PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000002622e5, page frame number
Arg3: 0000000000000001, current page state
Arg4: 000000000013e6e5, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6375
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10108
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 2622e5
BUGCHECK_P3: 1
BUGCHECK_P4: 13e6e5
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffdd8f`722de838 fffff805`235ec577 : 00000000`0000004e 00000000`00000099 00000000`002622e5 00000000`00000001 : nt!KeBugCheckEx
ffffdd8f`722de840 fffff805`235431db : 00000000`002622e6 80000000`00000000 00000000`00000001 00000000`000000e6 : nt!MiBadShareCount+0x5b
ffffdd8f`722de880 fffff805`234fad5c : ffffdd8f`722debf0 ffffcd8a`af362080 00000000`00000000 ffffdd8f`722df570 : nt!MiDeletePteList+0x8db
ffffdd8f`722de960 fffff805`238fb97d : ffffcd8a`aa7c0040 ffffcd8a`a3e90438 ffffcd8a`00000001 ffffcd8a`00000000 : nt!MiDecommitPages+0x3bc
ffffdd8f`722df530 fffff805`238fafe3 : ffffdd8f`722df6b0 00000000`00000000 ffffdd8f`722df6b0 ffffcd8a`a3e90410 : nt!MiDecommitRegion+0x7d
ffffdd8f`722df5b0 fffff805`238fa8d5 : ffffe38e`c9e00100 fffff805`234c73a2 ffffe38e`c9e00340 ffffdd8f`722df9ff : nt!MmFreeVirtualMemory+0x6d3
ffffdd8f`722df700 fffff805`23605fb5 : ffffcd8a`aa7c0040 00000000`00000000 00000000`00000103 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
ffffdd8f`722df760 fffff805`235f8400 : fffff805`3ec35fe8 ffffe38e`e6674c20 ffffdd8f`722df980 ffffe38e`e6674c20 : nt!KiSystemServiceCopyEnd+0x25
ffffdd8f`722df8f8 fffff805`3ec35fe8 : ffffe38e`e6674c20 ffffdd8f`722df980 ffffe38e`e6674c20 fffff805`3ec38837 : nt!KiServiceLinkage
ffffdd8f`722df900 fffff805`3ec3950a : 00000000`001ff000 ffffe38e`e4168508 ffffe38e`d0f29d60 ffffcd8a`a0a988f0 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
ffffdd8f`722df950 fffff805`3ec395b6 : fffff805`00000000 ffffcd8a`a0a988f0 00000000`00000000 fffff805`23f25440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffffdd8f`722df9c0 fffff805`3ec393d1 : fffff805`23f25440 ffffcd8a`a093a060 00000000`00000000 00000000`00000400 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
ffffdd8f`722dfa40 fffff805`235035f5 : ffffcd8a`aa7c0040 fffff805`3ec393c0 ffffcd8a`96cb7a20 00000000`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
ffffdd8f`722dfa70 fffff805`234a2ae5 : ffffcd8a`aa7c0040 00000000`00000080 ffffcd8a`96cac040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffdd8f`722dfb10 fffff805`235fbbf8 : ffff8000`ca960180 ffffcd8a`aa7c0040 fffff805`234a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffdd8f`722dfb60 00000000`00000000 : ffffdd8f`722e0000 ffffdd8f`722d9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------