madmrfrosty
80+
		- Katılım
 - 23 Mart 2020
 
- Mesajlar
 - 121
 
- Reaksiyon skoru
 - 28
 
Merhaba, az önce bu hata ile mavi ekran aldım ve .dmp dosyasında Crash Count'un hemen altında "Radeon Software"i gördüm (PROCESS NAME). Bu durumda ne yapmam gerekir? Anlayan arkadaşlar için  .dmp dosyasını aşağı bırakıyorum. 
	
	
	
		
				
			
		Kod:
	
	************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false
   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.265 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidumps\090324-10203-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff807`23c00000 PsLoadedModuleList = 0xfffff807`248134f0
Debug session time: Tue Sep  3 18:40:45.235 2024 (UTC + 3:00)
System Uptime: 0 days 0:39:59.965
Loading Kernel Symbols
...............................................................
................................................................
................................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000d8`969b7018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`24015cb0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8485`3b70ed10=000000000000004e
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000006, The hardware PTE and/or the prototype PTE PFN data structures have
    been corrupted.
Arg2: 00000000004315c4, The page frame number
Arg3: ffff9d4f3f0b902a, The prototype PTE
Arg4: ffb79476ffac896b, The prototype PTE contents
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2031
    Key  : Analysis.Elapsed.mSec
    Value: 4699
    Key  : Analysis.IO.Other.Mb
    Value: 11
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 14
    Key  : Analysis.Init.CPU.mSec
    Value: 328
    Key  : Analysis.Init.Elapsed.mSec
    Value: 46612
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x4e
    Key  : Bugcheck.Code.TargetModel
    Value: 0x4e
    Key  : Dump.Attributes.AsUlong
    Value: 1808
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
    Key  : Failure.Bucket
    Value: 0x4E_6_nt!MiMakeProtoTransition
    Key  : Failure.Hash
    Value: {a51b63ab-2b85-e693-8e2f-fd24b6c5d031}
    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84
    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1
    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0
    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1
    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0
    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0
    Key  : Hypervisor.Flags.CpuManager
    Value: 1
    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1
    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1
    Key  : Hypervisor.Flags.Epf
    Value: 0
    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1
    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1
    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0
    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0
    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0
    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1
    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1
    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0
    Key  : Hypervisor.Flags.RootScheduler
    Value: 0
    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1
    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0
    Key  : Hypervisor.Flags.Value
    Value: 21631230
    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe
    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1
    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1
    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1
    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0
    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1
    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0
    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1
    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1
    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.Nested
    Value: 0
    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.Value
    Value: 1015
    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7
BUGCHECK_CODE:  4e
BUGCHECK_P1: 6
BUGCHECK_P2: 4315c4
BUGCHECK_P3: ffff9d4f3f0b902a
BUGCHECK_P4: ffb79476ffac896b
FILE_IN_CAB:  090324-10203-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump
FAULTING_THREAD:  ffffb0049a7aa080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  RadeonSoftware
STACK_TEXT: 
ffff8485`3b70ed08 fffff807`2409e34a     : 00000000`0000004e 00000000`00000006 00000000`004315c4 ffff9d4f`3f0b902a : nt!KeBugCheckEx
ffff8485`3b70ed10 fffff807`23e79f0f     : 00000000`00000004 00000000`00000004 ffff8485`3b70ee70 ffffacbf`fe1a6ad0 : nt!MiMakeProtoTransition+0x1d89aa
ffff8485`3b70ed70 fffff807`23f23468     : ffffacbf`fe1a7000 ffff8485`3b70f370 ffffacbf`fe1a6ff8 ffff8485`3b70f370 : nt!MiDeletePteRun+0x7af
ffff8485`3b70ef60 fffff807`23e23649     : ffff8485`3b70f370 ffffacbf`fe1a6ff8 ffffe370`0f04429b ffffb004`9b4c7740 : nt!MiDeleteVaTail+0x48
ffff8485`3b70ef90 fffff807`23e2378a     : ffff8485`00000000 ffffb004`9b4c7740 ffffacd6`00000000 ffff8485`3b70f3c0 : nt!MiWalkPageTablesRecursively+0x4e9
ffff8485`3b70f020 fffff807`23e2378a     : ffff8485`3b70f370 ffffb004`9b4c7740 ffffacd6`00000000 ffff8485`3b70f3d0 : nt!MiWalkPageTablesRecursively+0x62a
ffff8485`3b70f0b0 fffff807`23e2378a     : ffff8485`3b70f370 ffffb004`9b4c7740 ffffacd6`00000000 ffff8485`3b70f3e0 : nt!MiWalkPageTablesRecursively+0x62a
ffff8485`3b70f140 fffff807`23e23061     : 00000000`00000000 ffffb004`9b4c7740 00000000`00000000 ffff8485`3b70f3f0 : nt!MiWalkPageTablesRecursively+0x62a
ffff8485`3b70f1d0 fffff807`23f24822     : ffff8485`3b70f370 00007ffc`00000001 00000000`00000002 ffff8485`00000000 : nt!MiWalkPageTables+0x371
ffff8485`3b70f2d0 fffff807`23f32e6e     : ffffb004`9b4c7590 ffffb004`9a7aa080 ffff8485`3b70f670 ffffb004`9a7aa780 : nt!MiDeletePagablePteRange+0x3c2
ffff8485`3b70f5e0 fffff807`243c84a7     : 00000000`00000000 ffff8485`00000001 00007ffc`342c0000 ffffb004`9a6b9e80 : nt!MiDeleteVirtualAddresses+0x4e
ffff8485`3b70f630 fffff807`242a2909     : 00007ffc`34730000 ffffb004`9a6b9b60 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1b7
ffff8485`3b70f6f0 fffff807`243d3737     : ffffb004`9a6b9b60 00000000`00000000 ffffb004`9a7aa080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8485`3b70f720 fffff807`243d4a41     : ffffb004`9a6b9a20 ffffb004`9a6b9a20 ffffb004`9a6b9a20 ffffb004`9b4c70c0 : nt!MiCleanVad+0x2f
ffff8485`3b70f750 fffff807`242f828f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb004`9b4c70c0 : nt!MmCleanProcessAddressSpace+0x10d
ffff8485`3b70f7d0 fffff807`243d9ac2     : ffffb004`9b4c70c0 ffffe680`ef6e1060 ffffb004`9b4c70c0 00000000`00000000 : nt!PspRundownSingleProcess+0xbf
ffff8485`3b70f860 fffff807`243dc3f2     : 00000000`0000000e ffffb004`9b4c7001 ffffb004`9a7aa0f4 000000d8`9683e000 : nt!PspExitThread+0x64e
ffff8485`3b70f960 fffff807`2402b305     : ffffb004`000017c0 ffffb004`9a7aa080 ffffb004`9b4c70c0 ffffb004`9b4c70c0 : nt!NtTerminateProcess+0xf2
ffff8485`3b70f9e0 00007ffc`6b690524     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000d8`984fa238 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6b690524
SYMBOL_NAME:  nt!MiMakeProtoTransition+1d89aa
MODULE_NAME: nt
IMAGE_VERSION:  10.0.22621.4036
STACK_COMMAND:  .process /r /p 0xffffb0049b4c70c0; .thread 0xffffb0049a7aa080 ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  1d89aa
FAILURE_BUCKET_ID:  0x4E_6_nt!MiMakeProtoTransition
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {a51b63ab-2b85-e693-8e2f-fd24b6c5d031}
Followup:     MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'