Bugcheck Analysis yazısının altındakiler bunlar :
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000000000, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0000000000000000, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1015
Key : Analysis.Elapsed.mSec
Value: 3026
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 22496
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x4e
Key : Bugcheck.Code.TargetModel
Value: 0x4e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x4E_99_nt!MiBadShareCount
Key : Failure.Hash
Value: {60e553e9-e4c5-ed08-9be6-c353e0011003}
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 110524-21546-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffa38e955c60c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
ffffc80a`3e646498 fffff803`5064a8cf : 00000000`0000004e 00000000`00000099 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc80a`3e6464a0 fffff803`5035ac97 : 00000000`007504c5 fffff803`50c6afc0 00000000`00000000 fffff081`0c77dde0 : nt!MiBadShareCount+0x4f
ffffc80a`3e6464e0 fffff803`5047713b : 00000000`00270197 00000000`00000000 00000000`00000001 00000000`00000001 : nt!MiReduceShareCount+0x53
ffffc80a`3e646510 fffff803`5028ca61 : ffffc80a`3e646600 ffffa38e`92754080 ffffc80a`3e647190 ffffc80a`3e647190 : nt!MiDeletePteList+0x23264b
ffffc80a`3e6465d0 fffff803`5028c3f8 : ffffa38e`92754700 00000000`00000011 fffff081`00000002 fffff0f8`40863be8 : nt!MiDeletePteWsleCluster+0xe1
ffffc80a`3e646700 fffff803`506c6070 : ffffa38e`9da35b00 ffffa38e`92754548 00000000`00000000 fffff803`5027c7ec : nt!MiDecommitPages+0x958
ffffc80a`3e647150 fffff803`507965b3 : 00000000`00000000 00000000`00000000 ffffc80a`3e647240 00000000`00000000 : nt!MiDecommitRegion+0x80
ffffc80a`3e647200 fffff803`50796285 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc80a`3e6473b0 : nt!MmFreeVirtualMemory+0x2f3
ffffc80a`3e647340 fffff803`5042a305 : ffffa38e`955c60c0 ffffa38e`00000000 00000000`00000000 ffffa38e`9e1978f0 : nt!NtFreeVirtualMemory+0x95
ffffc80a`3e6473a0 00007ffa`bfa90594 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000b3`301fd068 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`bfa90594
SYMBOL_NAME: nt!MiBadShareCount+4f
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.4391
STACK_COMMAND: .process /r /p 0xffffa38e92754080; .thread 0xffffa38e955c60c0 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 4f
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------