PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000001ac675, page frame number
Arg3: 0000000000000002, current page state
Arg4: 040000b0000b9074, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 1ac675
BUGCHECK_P3: 2
BUGCHECK_P4: 40000b0000b9074
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: PUBGLite-Win64-Shipping.exe
STACK_TEXT:
fffff904`94d0fd48 fffff803`24c384fe : 00000000`0000004e 00000000`00000099 00000000`001ac675 00000000`00000002 : nt!KeBugCheckEx
fffff904`94d0fd50 fffff803`24ae8517 : 00000000`00000003 fffff904`94d104a0 fffff904`94d104a0 fffff904`94d103f0 : nt!MiDeletePteRun+0x188a4e
fffff904`94d0ff70 fffff803`24ae4032 : ffff9902`f84f6580 ffff8401`34fe0800 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffff904`94d0ffa0 fffff803`24ae41c1 : fffff904`94d103f0 ffff8442`009a7f00 00000000`00000000 0a000000`6f2f5867 : nt!MiWalkPageTablesRecursively+0x512
fffff904`94d10060 fffff803`24ae41c1 : fffff904`94d103f0 ffff8442`21004d38 00000000`00000000 0a000001`755a5867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff904`94d10120 fffff803`24ae41c1 : fffff904`94d103f0 ffff8442`21108020 ffff8442`00000000 0a000000`9a7a6867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff904`94d101e0 fffff803`24ae394c : fffff904`94d103f0 ffffde29`24426397 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff904`94d102a0 fffff803`24ae1db8 : fffff904`94d103f0 00000000`00000002 00000000`00000001 fffff803`00000000 : nt!MiWalkPageTables+0x36c
fffff904`94d103a0 fffff803`24aeff10 : ffffffff`ffffffff ffff9902`f84f63f8 ffff9902`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff904`94d10740 fffff803`24b35b7a : 00000000`269fc0ff ffff9902`f86af080 00000000`00000000 fffff803`24aeaeea : nt!MiDeleteVad+0x860
fffff904`94d10900 fffff803`25094bd0 : 00000000`00000000 00000000`00000000 fffff904`94d10a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff904`94d10960 fffff803`2509480b : fffff904`00000002 fffff904`94d10a00 00000000`00000000 ffff890d`2c0b7400 : nt!MmFreeVirtualMemory+0x390
fffff904`94d10aa0 fffff803`24bd3c18 : ffff9902`f86af080 000000fd`a22ce6a8 fffff904`94d10b18 ffffffff`fa0a1f00 : nt!NtFreeVirtualMemory+0x8b
fffff904`94d10b00 00007fff`f1b3c434 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fd`a22ce698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`f1b3c434
SYMBOL_NAME: nt!MiDeletePteRun+188a4e
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 188a4e
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDeletePteRun
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {826a8dfe-b402-47c5-bb75-e9ab5230289f}
Followup: MachineOwner
---------