J
jeffready2
we get this every so often but I dont see anything that really points out the issue except a memory fault maybe
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 00000000003fea65
Arg3: 0000000000000006
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 14393.3442.amd64fre.rs1_release.191219-1727
SYSTEM_MANUFACTURER: Dell Inc.
SYSTEM_PRODUCT_NAME: PowerEdge R440
SYSTEM_SKU: SKU=NotProvided;ModelName=PowerEdge R440
BIOS_VENDOR: Dell Inc.
BIOS_VERSION: 2.2.9
BIOS_DATE: 05/08/2019
BASEBOARD_MANUFACTURER: Dell Inc.
BASEBOARD_PRODUCT: 08CYF7
BASEBOARD_VERSION: A05
DUMP_TYPE: 1
BUGCHECK_P1: 9a
BUGCHECK_P2: 3fea65
BUGCHECK_P3: 6
BUGCHECK_P4: 2
BUGCHECK_STR: 0x4E_9a
CPU_COUNT: 20
CPU_MHZ: 82f
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200005E'00000000 (cache) 200005E'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST:
ANALYSIS_SESSION_TIME: 02-06-2020 08:17:42.0707
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80350d2b4db to fffff80350debe00
STACK_TEXT:
ffff9e01`ae669b78 fffff803`50d2b4db : 00000000`0000004e 00000000`0000009a 00000000`003fea65 00000000`00000006 : nt!KeBugCheckEx
ffff9e01`ae669b80 fffff803`50d2abfc : ffff37b5`00000002 ffff8988`f47494a0 00000000`00000002 00000000`0000004d : nt!MiInsertNonPagedPoolOnSlist+0x51b
ffff9e01`ae669c70 fffff803`50edf503 : ffff8988`f7465000 ffff9e01`ae669d80 00000000`00000000 fffff803`00000000 : nt!ExFreeLargePool+0x52c
ffff9e01`ae669d40 fffff806`a1b49816 : ffff8988`f7465000 ffff8988`f1fb5900 ffff8988`f2f948d0 00000000`000000ff : nt!ExFreePoolWithTag+0x503
ffff9e01`ae669e20 fffff806`a1d379ab : ffff8988`f2f946e0 ffff9181`8dcb0000 ffff8988`f1fb0000 fffff803`50d01e1c : srvnet!PplGenericFreeFunction+0x36
ffff9e01`ae669e50 fffff806`a1d722c2 : ffff8988`f1fb5888 ffff8988`f1fb5840 ffff8988`f2f946f0 00000000`00001363 : srv2!Srv2DereferenceWorkItem+0x2ab
ffff9e01`ae669f00 fffff803`50def237 : ffff9e01`ae660140 ffff9e01`ae66a000 ffffffff`ee1e5d00 ffff9e01`ae669fd1 : srv2!RfspThreadPoolNodeWorkerProcessWorkItems+0x132
ffff9e01`ae669f80 fffff803`50def1fd : 00000000`0000c001 00000000`00000000 00000000`00000003 fffff803`50d91df1 : nt!KxSwitchKernelStackCallout+0x27
ffff9e01`b3070330 fffff803`50d91df1 : 00000000`00000003 00000000`0000c001 00000000`00000000 00000000`00000012 : nt!KiSwitchKernelStackContinue
ffff9e01`b3070350 fffff803`50d91a56 : ffff9e01`b30703e0 00000000`0000c000 ffff9e01`00000001 00000000`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x241
ffff9e01`b30703e0 fffff803`50d9191f : 00000000`00000080 ffff8988`f398b580 00000000`000001f6 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
ffff9e01`b3070440 fffff806`a1d72103 : ffff8988`f398b580 fffff803`511cacd4 00000000`00000088 ffff8988`ebea7040 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
ffff9e01`b3070490 fffff803`511cad08 : ffffd90e`90292d30 ffff8988`fcdaf580 00000000`00000000 00000000`00000003 : srv2!RfspThreadPoolNodeWorkerRun+0xe3
ffff9e01`b30704f0 fffff803`50cb4365 : ffff8988`fcdaf580 fffff803`511cacd4 00000000`00000000 00000000`00000000 : nt!IopThreadStart+0x34
ffff9e01`b3070550 fffff803`50df3106 : ffff9e01`a67c0180 ffff8988`fcdaf580 fffff803`50cb4324 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffff9e01`b30705a0 00000000`00000000 : ffff9e01`b3071000 ffff9e01`b306a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 9405f1f26173da666ff99dabb6f9ab71a5f4b0ee
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d78144f205138b719c149c38b83ce7928cf6e98e
THREAD_SHA1_HASH_MOD: 57c2f40470e3b07ec411c056a6b039c43cb69701
FOLLOWUP_IP:
srvnet!PplGenericFreeFunction+36
fffff806`a1b49816 488b5c2430 mov rbx,qword ptr [rsp+30h]
FAULT_INSTR_CODE: 245c8b48
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: srvnet!PplGenericFreeFunction+36
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srvnet
IMAGE_NAME: srvnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5c7f6540
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 36
FAILURE_BUCKET_ID: 0x4E_9a_srvnet!PplGenericFreeFunction
BUCKET_ID: 0x4E_9a_srvnet!PplGenericFreeFunction
PRIMARY_PROBLEM_CLASS: 0x4E_9a_srvnet!PplGenericFreeFunction
TARGET_TIME: 2020-02-05T23:03:41.000Z
OSBUILD: 14393
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-12-19 22:20:44
BUILDDATESTAMP_STR: 191219-1727
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.3442.amd64fre.rs1_release.191219-1727
ANALYSIS_SESSION_ELAPSED_TIME: 26de
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x4e_9a_srvnet!pplgenericfreefunction
FAILURE_ID_HASH: {d6c9c1c2-33b6-7530-c1c4-621167afa4ae}
Followup: MachineOwner
---------
14: kd> lmvm srvnet
Browse full module list
start end module name
fffff806`a1b40000 fffff806`a1b84000 srvnet (pdb symbols) C:\Program Files\Windows Kits\10\Debuggers\x64\sym\srvnet.pdb\13CECE09791E453A9DFEF5D6690E37781\srvnet.pdb
Loaded symbol image file: srvnet.sys
Image path: \SystemRoot\System32\DRIVERS\srvnet.sys
Image name: srvnet.sys
Browse all global symbols functions data
Timestamp: Tue Mar 5 22:14:24 2019 (5C7F6540)
CheckSum: 0003DB1B
ImageSize: 00044000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
14: kd> !analyze -v
\
Continue reading...
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 00000000003fea65
Arg3: 0000000000000006
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 14393.3442.amd64fre.rs1_release.191219-1727
SYSTEM_MANUFACTURER: Dell Inc.
SYSTEM_PRODUCT_NAME: PowerEdge R440
SYSTEM_SKU: SKU=NotProvided;ModelName=PowerEdge R440
BIOS_VENDOR: Dell Inc.
BIOS_VERSION: 2.2.9
BIOS_DATE: 05/08/2019
BASEBOARD_MANUFACTURER: Dell Inc.
BASEBOARD_PRODUCT: 08CYF7
BASEBOARD_VERSION: A05
DUMP_TYPE: 1
BUGCHECK_P1: 9a
BUGCHECK_P2: 3fea65
BUGCHECK_P3: 6
BUGCHECK_P4: 2
BUGCHECK_STR: 0x4E_9a
CPU_COUNT: 20
CPU_MHZ: 82f
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200005E'00000000 (cache) 200005E'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST:
ANALYSIS_SESSION_TIME: 02-06-2020 08:17:42.0707
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80350d2b4db to fffff80350debe00
STACK_TEXT:
ffff9e01`ae669b78 fffff803`50d2b4db : 00000000`0000004e 00000000`0000009a 00000000`003fea65 00000000`00000006 : nt!KeBugCheckEx
ffff9e01`ae669b80 fffff803`50d2abfc : ffff37b5`00000002 ffff8988`f47494a0 00000000`00000002 00000000`0000004d : nt!MiInsertNonPagedPoolOnSlist+0x51b
ffff9e01`ae669c70 fffff803`50edf503 : ffff8988`f7465000 ffff9e01`ae669d80 00000000`00000000 fffff803`00000000 : nt!ExFreeLargePool+0x52c
ffff9e01`ae669d40 fffff806`a1b49816 : ffff8988`f7465000 ffff8988`f1fb5900 ffff8988`f2f948d0 00000000`000000ff : nt!ExFreePoolWithTag+0x503
ffff9e01`ae669e20 fffff806`a1d379ab : ffff8988`f2f946e0 ffff9181`8dcb0000 ffff8988`f1fb0000 fffff803`50d01e1c : srvnet!PplGenericFreeFunction+0x36
ffff9e01`ae669e50 fffff806`a1d722c2 : ffff8988`f1fb5888 ffff8988`f1fb5840 ffff8988`f2f946f0 00000000`00001363 : srv2!Srv2DereferenceWorkItem+0x2ab
ffff9e01`ae669f00 fffff803`50def237 : ffff9e01`ae660140 ffff9e01`ae66a000 ffffffff`ee1e5d00 ffff9e01`ae669fd1 : srv2!RfspThreadPoolNodeWorkerProcessWorkItems+0x132
ffff9e01`ae669f80 fffff803`50def1fd : 00000000`0000c001 00000000`00000000 00000000`00000003 fffff803`50d91df1 : nt!KxSwitchKernelStackCallout+0x27
ffff9e01`b3070330 fffff803`50d91df1 : 00000000`00000003 00000000`0000c001 00000000`00000000 00000000`00000012 : nt!KiSwitchKernelStackContinue
ffff9e01`b3070350 fffff803`50d91a56 : ffff9e01`b30703e0 00000000`0000c000 ffff9e01`00000001 00000000`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x241
ffff9e01`b30703e0 fffff803`50d9191f : 00000000`00000080 ffff8988`f398b580 00000000`000001f6 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
ffff9e01`b3070440 fffff806`a1d72103 : ffff8988`f398b580 fffff803`511cacd4 00000000`00000088 ffff8988`ebea7040 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
ffff9e01`b3070490 fffff803`511cad08 : ffffd90e`90292d30 ffff8988`fcdaf580 00000000`00000000 00000000`00000003 : srv2!RfspThreadPoolNodeWorkerRun+0xe3
ffff9e01`b30704f0 fffff803`50cb4365 : ffff8988`fcdaf580 fffff803`511cacd4 00000000`00000000 00000000`00000000 : nt!IopThreadStart+0x34
ffff9e01`b3070550 fffff803`50df3106 : ffff9e01`a67c0180 ffff8988`fcdaf580 fffff803`50cb4324 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffff9e01`b30705a0 00000000`00000000 : ffff9e01`b3071000 ffff9e01`b306a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 9405f1f26173da666ff99dabb6f9ab71a5f4b0ee
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d78144f205138b719c149c38b83ce7928cf6e98e
THREAD_SHA1_HASH_MOD: 57c2f40470e3b07ec411c056a6b039c43cb69701
FOLLOWUP_IP:
srvnet!PplGenericFreeFunction+36
fffff806`a1b49816 488b5c2430 mov rbx,qword ptr [rsp+30h]
FAULT_INSTR_CODE: 245c8b48
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: srvnet!PplGenericFreeFunction+36
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srvnet
IMAGE_NAME: srvnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5c7f6540
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 36
FAILURE_BUCKET_ID: 0x4E_9a_srvnet!PplGenericFreeFunction
BUCKET_ID: 0x4E_9a_srvnet!PplGenericFreeFunction
PRIMARY_PROBLEM_CLASS: 0x4E_9a_srvnet!PplGenericFreeFunction
TARGET_TIME: 2020-02-05T23:03:41.000Z
OSBUILD: 14393
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-12-19 22:20:44
BUILDDATESTAMP_STR: 191219-1727
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.3442.amd64fre.rs1_release.191219-1727
ANALYSIS_SESSION_ELAPSED_TIME: 26de
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x4e_9a_srvnet!pplgenericfreefunction
FAILURE_ID_HASH: {d6c9c1c2-33b6-7530-c1c4-621167afa4ae}
Followup: MachineOwner
---------
14: kd> lmvm srvnet
Browse full module list
start end module name
fffff806`a1b40000 fffff806`a1b84000 srvnet (pdb symbols) C:\Program Files\Windows Kits\10\Debuggers\x64\sym\srvnet.pdb\13CECE09791E453A9DFEF5D6690E37781\srvnet.pdb
Loaded symbol image file: srvnet.sys
Image path: \SystemRoot\System32\DRIVERS\srvnet.sys
Image name: srvnet.sys
Browse all global symbols functions data
Timestamp: Tue Mar 5 22:14:24 2019 (5C7F6540)
CheckSum: 0003DB1B
ImageSize: 00044000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
14: kd> !analyze -v
\
Continue reading...