*
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000001905, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0a00000000001ac6, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IKHRUHA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 14
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 1905
BUGCHECK_P3: 2
BUGCHECK_P4: a00000000001ac6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VSSVC.exe
STACK_TEXT:
ffff800f`12a36ca8 fffff801`4ea0934b : 00000000`0000004e 00000000`00000099 00000000`00001905 00000000`00000002 : nt!KeBugCheckEx
ffff800f`12a36cb0 fffff801`4e823015 : ffffa581`21e41038 ffffa581`00000003 ffffa581`21e42011 00002000`5e2018c0 : nt!MiDecrementShareCount+0x19fbfb
ffff800f`12a36cf0 fffff801`4edda35f : ffffcf88`cc800000 ffff9005`e6850340 00000000`00000000 00000000`00000001 : nt!MmUnmapViewInSystemCache+0x9f5
ffff800f`12a36e00 fffff801`4e8215d2 : 00000000`03000000 ffffa581`22751d70 ffffa581`220b6848 00000000`00000001 : nt!CcUnmapVacb+0x63
ffff800f`12a36e40 fffff801`4e8641bc : 00000000`03100001 ffffa581`21f689e0 00000000`03000000 00000000`00000001 : nt!CcUnmapVacbArray+0x202
ffff800f`12a36eb0 fffff801`4ede4a85 : 00000000`00000000 00000000`00000001 ffff800f`12a36fc0 ffff800f`12a36fd8 : nt!CcGetVirtualAddress+0x39c
ffff800f`12a36f50 fffff801`52bc5953 : 00000000`00000000 ffffa581`2a3cf658 ffffa581`2286e180 00000000`00000000 : nt!CcMapData+0x75
ffff800f`12a36fc0 fffff801`52bc556f : ffffa581`2bd0ef10 00000000`00000000 ffffa581`2bd0ef10 ffffa581`2bd0ef10 : Ntfs!NtfsReadMftRecord+0xf3
ffff800f`12a370d0 fffff801`52bc515c : ffff800f`12a372f0 fffff801`4e81d5ed 00000000`00000000 ffffa581`2c2912c0 : Ntfs!NtfsReadFileRecord+0xcf
ffff800f`12a371e0 fffff801`52ba82a1 : ffff9005`f6761700 00000000`00000002 ffff9005`f6761718 00000000`00000000 : Ntfs!NtfsLookupInFileRecord+0x7c
ffff800f`12a37290 fffff801`52ae8210 : ffffa581`2a3cf658 ffff9005`f6761700 ffffa581`2a3cf658 ffff9005`f67615a0 : Ntfs!NtfsWriteFileSizes+0xf1
ffff800f`12a37420 fffff801`52c0d5f2 : ffffa581`2a3cf658 ffffa581`2286e180 ffff9005`f67615a0 ffff800f`12a375a0 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x318
ffff800f`12a37570 fffff801`52bea6f6 : ffffa581`2a3cf658 ffff9005`e6919620 ffffa581`2a3cf658 ffff9005`e6919620 : Ntfs!NtfsFlushVolume+0x2e2
ffff800f`12a37690 fffff801`52be9e09 : ffffa581`2a3cf658 ffffa581`27b5d010 fffff801`52be9d01 ffff800f`12a378c0 : Ntfs!NtfsCommonFlushBuffers+0x8a6
ffff800f`12a377b0 fffff801`4e84f678 : ffff800f`12a378c0 ffffa581`2a3cf658 ffffa581`27f90080 ffff800f`00000000 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffff800f`12a377e0 fffff801`4e84f5ed : fffff801`52be9df0 ffff800f`12a378c0 00000000`00000000 fffff801`52114be5 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff800f`12a37850 fffff801`52c028a9 : ffff800f`12a38000 00000000`00000000 ffff800f`12a378b0 00000000`00000004 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff800f`12a37890 fffff801`52c027dd : 00000000`00000000 ffffa581`27b5d010 ffffa581`2a3cf658 ffff800f`12a37928 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x61
ffff800f`12a37900 fffff801`4e899eb9 : ffffa581`2937aba0 ffffa581`27b5d010 ffffa581`2a3cf658 ffff800f`12a37928 : Ntfs!NtfsFsdFlushBuffers+0xdd
ffff800f`12a37970 fffff801`521155d9 : 00000000`00000000 ffff800f`12a37a50 ffffa581`27b5d010 ffff800f`12a37a60 : nt!IofCallDriver+0x59
ffff800f`12a379b0 fffff801`52113f16 : ffff800f`12a37a50 00000000`00000000 ffff800f`12a37c01 ffffa581`226a6cc0 : FLTMGR!FltIsCallbackDataDirty+0x2e9
ffff800f`12a37a30 fffff801`4e899eb9 : ffffa581`27b5d010 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltDecodeParameters+0x11b6
ffff800f`12a37a90 fffff801`4ee07ee5 : ffffa581`27b5d010 00000000`00000000 00000000`00000000 ffffa581`27fb16b0 : nt!IofCallDriver+0x59
ffff800f`12a37ad0 fffff801`4eec442c : ffffa581`00000000 ffffa581`29356060 ffffa581`27fb16b0 ffff800f`12a37cc0 : nt!IopSynchronousServiceTail+0x1a5
ffff800f`12a37b70 fffff801`4eec4216 : ffffa581`2c2912c0 00007ff6`39176230 ffffa581`2274dda0 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1fc
ffff800f`12a37c00 fffff801`4e9d3c15 : ffffa581`2c2912c0 00000083`3fe03000 00000000`00000001 ffffa581`2c4176e0 : nt!NtFlushBuffersFile+0x16
ffff800f`12a37c40 00007ffc`03e5c9d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000083`404ff338 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`03e5c9d4
SYMBOL_NAME: nt!MiDecrementShareCount+19fbfb
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.900
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 19fbfb
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {add373c4-2fe4-723e-d1db-12fcb6adef02}
Followup: MachineOwner
---------