PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000001bc3a3, entry in list being removed
Arg3: 00000000004bdfff, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18287
Key : Analysis.Init.CPU.mSec
Value: 468
Key : Analysis.Init.Elapsed.mSec
Value: 2040
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 2
BUGCHECK_P2: 1bc3a3
BUGCHECK_P3: 4bdfff
BUGCHECK_P4: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb685ac15f310 -- (.trap 0xffffb685ac15f310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000008a0 rbx=0000000000000000 rcx=ffffa10be5800280
rdx=000000000000008a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074904e864 rsp=ffffb685ac15f4a0 rbp=0000000000000276
r8=00000000000041a2 r9=ffffb685ac15f5a8 r10=ffffa10be5800280
r11=ffffb685ac15f340 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlpHpVsChunkCoalesce+0x84:
fffff807`4904e864 4d8b37 mov r14,qword ptr [r15] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffb685`ac15f4a0 fffff807`4904e2d8 : ffffa10b`e5800280 ffffa10b`fdeef000 ffffa10b`fdeef000 ffffb685`ac15f5a8 : nt!RtlpHpVsChunkCoalesce+0x84
ffffb685`ac15f500 fffff807`4904cc64 : ffffd70f`00000000 00000000`00000276 00010000`00000000 ffffd70f`00000000 : nt!RtlpHpVsContextFree+0x188
ffffb685`ac15f5a0 fffff807`497b1019 : ffffd70f`00000890 ffffa10b`edbd0010 ffffa10b`edbd0010 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffb685`ac15f680 fffff807`4908387f : 00000000`00000100 00000000`00000000 ffffc800`03663de0 ffffc800`03663de0 : nt!ExFreePool+0x9
ffffb685`ac15f6b0 fffff807`490b96f6 : ffffd70f`839b3650 ffffb685`ac15f7d8 ffffd70f`8250cd11 ffffd70f`8216ce50 : nt!MiDeleteSubsectionPages+0x63f
ffffb685`ac15f770 fffff807`4943e306 : 00000000`00088089 00000000`00000000 fffff807`49a50d40 00000000`00088089 : nt!MiDeleteSegmentPages+0x56
ffffb685`ac15f7d0 fffff807`491843bd : 00000000`00000001 00000000`00000000 ffffb685`ac15f8a0 ffffd70f`839b35d8 : nt!MiSegmentDelete+0x92
ffffb685`ac15f820 fffff807`491b9249 : 00000000`00000000 fffff807`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
ffffb685`ac15f8e0 fffff807`49117e85 : ffffd70f`74276040 ffffd70f`74276040 00000000`00000080 fffff807`491b9120 : nt!MiDereferenceSegmentThread+0x129
ffffb685`ac15fb10 fffff807`491fd2a8 : fffff807`47810180 ffffd70f`74276040 fffff807`49117e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb685`ac15fb60 00000000`00000000 : ffffb685`ac160000 ffffb685`ac159000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: .trap 0xffffb685ac15f310 ; kb
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.867
MODULE_NAME: Pool_Corruption
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x4E_2_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b1860d44-4a0d-3957-7a9d-ef81c7c24c6d}
Followup: Pool_corruption
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.