PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000007dc45, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000000001, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: GoogleUpdate.e
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80002ee3d5c to fffff80002e9eac0
STACK_TEXT:
fffff880`06bf00c8 fffff800`02ee3d5c : 00000000`0000004e 00000000`00000099 00000000`0007dc45 00000000`00000002 : nt!KeBugCheckEx
fffff880`06bf00d0 fffff800`02f5c8dd : fffff8a0`03388040 00000000`00000000 00000000`00000000 fffffa80`02621580 : nt!MiBadShareCount+0x4c
fffff880`06bf0110 fffff800`02f62fe2 : fffffa80`03b62b00 6c800000`0000007d 00000003`000004c3 07d00000`7dc45025 : nt!MiDeletePfnList+0x48d
fffff880`06bf01a0 fffff800`02e47ebc : fffffa80`03b62b00 fffffa80`0000049c fffff8a0`000000e9 00000000`0000048f : nt!MiDeleteAddressesInWorkingSet+0x182
fffff880`06bf0a60 fffff800`032387c4 : fffff8a0`0b26f530 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCleanProcessAddressSpace+0xac
fffff880`06bf0ab0 fffff800`03296f35 : 00000000`00000000 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x944
fffff880`06bf0b70 fffff800`02eacb53 : ffffffff`ffffffff fffffa80`03c90750 fffffa80`03b62b00 00000000`005628a0 : nt!NtTerminateProcess+0x2d5
fffff880`06bf0be0 00000000`773b8fda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0015e0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b8fda
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02ee3d5c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5e98e8bd
IMAGE_VERSION: 6.1.7601.24553
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x4e_99_nt!mibadsharecount+4c
FAILURE_ID_HASH: {4c83cdad-f603-74ff-b7e1-9eb7f3029c2a}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000028c7
Arg4: fffff980125d7009
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: SearchIndexer.
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80002a8199c to fffff80002aadac0
STACK_TEXT:
fffff880`05be8258 fffff800`02a8199c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000028c7 : nt!KeBugCheckEx
fffff880`05be8260 fffff800`02b5a1e8 : fffff6fc`c006d838 00000000`00000008 00000000`00000038 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`05be82c0 fffff800`02b8c8db : fffff6fc`c006d800 00000000`6ab75921 fffff6fc`00000008 00000000`00000007 : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`05be8440 fffff800`02a49944 : fffff980`0db00000 fffff980`0db00000 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0x48b
fffff880`05be85b0 fffff800`02d14ee0 : 00000000`00008000 00000000`00000000 00000000`096c0000 fffff880`05be86e0 : nt!CcFetchDataForRead+0x84
fffff880`05be8610 fffff880`012195a0 : fffff8a0`00000001 fffff880`00000005 fffffa80`00040000 fffffa80`03a89501 : nt!CcCopyRead+0x180
fffff880`05be86d0 fffff880`0121b083 : fffff8a0`01fa2801 fffff8a0`01fa2801 fffff880`05be88d0 00000000`00000001 : Ntfs!NtfsCachedRead+0x180
fffff880`05be8730 fffff880`0121b448 : fffffa80`03c80db0 fffffa80`03c3a010 fffff880`05be8800 fffffa80`03a89400 : Ntfs!NtfsCommonRead+0x19ea
fffff880`05be88a0 fffff880`010f183f : fffffa80`03c3a3b0 fffffa80`03c3a010 fffffa80`03a89450 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`05be8950 fffff880`010f06df : fffffa80`0474cde0 fffffa80`060e04d0 fffffa80`03c3a000 fffffa80`03c3a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`05be89e0 fffff800`02d16d98 : fffffa80`060e0480 fffff880`05be8c60 fffffa80`060e04d0 00000000`00000000 : fltmgr!FltpDispatch+0xcf
fffff880`05be8a40 fffff800`02abbb53 : fffffa80`060e0900 00000000`00000738 00000000`00000000 00000000`0033f5a0 : nt!NtReadFile+0x718
fffff880`05be8b70 00000000`76fa8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0453ee48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fa8d7a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02a8199c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiAllocateWsle+28c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5e98e8bd
IMAGE_VERSION: 6.1.7601.24553
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!MiAllocateWsle+28c
BUCKET_ID: X64_0x1a_5003_nt!MiAllocateWsle+28c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_5003_nt!miallocatewsle+28c
FAILURE_ID_HASH: {13ee2b15-66d1-652c-45a1-c2e7afb587be}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000017e7
Arg4: fffff9800acb6009
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: YandexDisk2.ex
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80002ac099c to fffff80002aecac0
STACK_TEXT:
fffff880`056f9558 fffff800`02ac099c : 00000000`0000001a 00000000`00005003 fffff780`c0000000 00000000`000017e7 : nt!KeBugCheckEx
fffff880`056f9560 fffff800`02b991e8 : fffff6fc`c0056330 00000000`00000010 00000000`00000030 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`056f95c0 fffff800`02bcc250 : fffff6fc`c0056380 00000000`4d7d4921 fffff6fc`00000010 00000000`0000000f : nt!MiMakeSystemCacheRangeValid+0x198
fffff880`056f9740 fffff800`02a88944 : fffff980`0ac41000 fffff980`0ac41011 00000000`00000000 ffffffff`ffffff01 : nt!MmCheckCachedPageStates+0xe00
fffff880`056f98b0 fffff800`02d53ee0 : 00000000`000f5000 00000000`00000000 00000000`00001000 fffff880`056f99e0 : nt!CcFetchDataForRead+0x84
fffff880`056f9910 fffff880`012b112f : fffff880`00000001 00000000`00000005 fffffa80`0003f000 fffffa80`043a9b01 : nt!CcCopyRead+0x180
fffff880`056f99d0 fffff880`0119c098 : fffffa80`043a9bc0 fffffa80`040ef8f0 00000000`00000000 00000000`00000001 : Ntfs!NtfsCopyReadA+0x18f
fffff880`056f9bb0 fffff880`0119f91a : fffff880`056f9c80 fffff880`011bb400 00000000`05b91000 fffffa80`043a9b03 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`056f9c10 fffff880`011bb630 : fffffa80`043a9bc0 00000000`00000000 fffff880`056f9d78 00000000`000f5000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`056f9c50 fffff800`02d55ac1 : fffffa80`043a9bc0 00000000`00000001 00000000`00000000 fffffa80`043a9bc0 : fltmgr!FltpFastIoRead+0x1d0
fffff880`056f9cf0 fffff800`02afab53 : fffff6fb`40000170 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x441
fffff880`056f9e20 00000000`77af8d7a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012a9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77af8d7a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac099c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiAllocateWsle+28c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5e98e8bd
IMAGE_VERSION: 6.1.7601.24553
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!MiAllocateWsle+28c
BUCKET_ID: X64_0x1a_5003_nt!MiAllocateWsle+28c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_5003_nt!miallocatewsle+28c
FAILURE_ID_HASH: {13ee2b15-66d1-652c-45a1-c2e7afb587be}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000103b
Arg4: 0000000007a87009
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: dllhost.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80002ac699c to fffff80002af2ac0
STACK_TEXT:
fffff880`0630d948 fffff800`02ac699c : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000103b : nt!KeBugCheckEx
fffff880`0630d950 fffff800`02b9eed2 : fffff880`0630da00 00000000`00000001 80000000`0de96867 00000000`00000000 : nt!MiAllocateWsle+0x28c
fffff880`0630d9b0 fffff800`02bcd742 : 00000000`00000001 00000000`02b15000 00000000`00000000 ffffffff`ffffffff : nt!MiResolveDemandZeroFault+0x6f2
fffff880`0630da90 fffff800`02afebdc : 00000000`00000001 00000000`02b15000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x34a2
fffff880`0630dbe0 000007fe`f982948b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35c
00000000`01ebc920 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`f982948b
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAllocateWsle+28c
fffff800`02ac699c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiAllocateWsle+28c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5e98e8bd
IMAGE_VERSION: 6.1.7601.24553
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!MiAllocateWsle+28c
BUCKET_ID: X64_0x1a_5003_nt!MiAllocateWsle+28c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_5003_nt!miallocatewsle+28c
FAILURE_ID_HASH: {13ee2b15-66d1-652c-45a1-c2e7afb587be}
Followup: MachineOwner
---------