"PFN_LIST_CORRUPT" mavi ekranı Radeon Software'den dolayı olabilir mi?

Katılım
23 Mart 2020
Mesajlar
121
Reaksiyon skoru
28
Merhaba, az önce bu hata ile mavi ekran aldım ve .dmp dosyasında Crash Count'un hemen altında "Radeon Software"i gördüm (PROCESS NAME). Bu durumda ne yapmam gerekir? Anlayan arkadaşlar için .dmp dosyasını aşağı bırakıyorum.

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.265 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 42

Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidumps\090324-10203-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff807`23c00000 PsLoadedModuleList = 0xfffff807`248134f0
Debug session time: Tue Sep  3 18:40:45.235 2024 (UTC + 3:00)
System Uptime: 0 days 0:39:59.965
Loading Kernel Symbols
...............................................................
................................................................
................................................................

Loading User Symbols
PEB is paged out (Peb.Ldr = 000000d8`969b7018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`24015cb0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8485`3b70ed10=000000000000004e
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000006, The hardware PTE and/or the prototype PTE PFN data structures have
    been corrupted.
Arg2: 00000000004315c4, The page frame number
Arg3: ffff9d4f3f0b902a, The prototype PTE
Arg4: ffb79476ffac896b, The prototype PTE contents

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2031

    Key  : Analysis.Elapsed.mSec
    Value: 4699

    Key  : Analysis.IO.Other.Mb
    Value: 11

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 14

    Key  : Analysis.Init.CPU.mSec
    Value: 328

    Key  : Analysis.Init.Elapsed.mSec
    Value: 46612

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x4e

    Key  : Bugcheck.Code.TargetModel
    Value: 0x4e

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: 0x4E_6_nt!MiMakeProtoTransition

    Key  : Failure.Hash
    Value: {a51b63ab-2b85-e693-8e2f-fd24b6c5d031}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  4e

BUGCHECK_P1: 6

BUGCHECK_P2: 4315c4

BUGCHECK_P3: ffff9d4f3f0b902a

BUGCHECK_P4: ffb79476ffac896b

FILE_IN_CAB:  090324-10203-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffffb0049a7aa080

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RadeonSoftware

STACK_TEXT: 
ffff8485`3b70ed08 fffff807`2409e34a     : 00000000`0000004e 00000000`00000006 00000000`004315c4 ffff9d4f`3f0b902a : nt!KeBugCheckEx
ffff8485`3b70ed10 fffff807`23e79f0f     : 00000000`00000004 00000000`00000004 ffff8485`3b70ee70 ffffacbf`fe1a6ad0 : nt!MiMakeProtoTransition+0x1d89aa
ffff8485`3b70ed70 fffff807`23f23468     : ffffacbf`fe1a7000 ffff8485`3b70f370 ffffacbf`fe1a6ff8 ffff8485`3b70f370 : nt!MiDeletePteRun+0x7af
ffff8485`3b70ef60 fffff807`23e23649     : ffff8485`3b70f370 ffffacbf`fe1a6ff8 ffffe370`0f04429b ffffb004`9b4c7740 : nt!MiDeleteVaTail+0x48
ffff8485`3b70ef90 fffff807`23e2378a     : ffff8485`00000000 ffffb004`9b4c7740 ffffacd6`00000000 ffff8485`3b70f3c0 : nt!MiWalkPageTablesRecursively+0x4e9
ffff8485`3b70f020 fffff807`23e2378a     : ffff8485`3b70f370 ffffb004`9b4c7740 ffffacd6`00000000 ffff8485`3b70f3d0 : nt!MiWalkPageTablesRecursively+0x62a
ffff8485`3b70f0b0 fffff807`23e2378a     : ffff8485`3b70f370 ffffb004`9b4c7740 ffffacd6`00000000 ffff8485`3b70f3e0 : nt!MiWalkPageTablesRecursively+0x62a
ffff8485`3b70f140 fffff807`23e23061     : 00000000`00000000 ffffb004`9b4c7740 00000000`00000000 ffff8485`3b70f3f0 : nt!MiWalkPageTablesRecursively+0x62a
ffff8485`3b70f1d0 fffff807`23f24822     : ffff8485`3b70f370 00007ffc`00000001 00000000`00000002 ffff8485`00000000 : nt!MiWalkPageTables+0x371
ffff8485`3b70f2d0 fffff807`23f32e6e     : ffffb004`9b4c7590 ffffb004`9a7aa080 ffff8485`3b70f670 ffffb004`9a7aa780 : nt!MiDeletePagablePteRange+0x3c2
ffff8485`3b70f5e0 fffff807`243c84a7     : 00000000`00000000 ffff8485`00000001 00007ffc`342c0000 ffffb004`9a6b9e80 : nt!MiDeleteVirtualAddresses+0x4e
ffff8485`3b70f630 fffff807`242a2909     : 00007ffc`34730000 ffffb004`9a6b9b60 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1b7
ffff8485`3b70f6f0 fffff807`243d3737     : ffffb004`9a6b9b60 00000000`00000000 ffffb004`9a7aa080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8485`3b70f720 fffff807`243d4a41     : ffffb004`9a6b9a20 ffffb004`9a6b9a20 ffffb004`9a6b9a20 ffffb004`9b4c70c0 : nt!MiCleanVad+0x2f
ffff8485`3b70f750 fffff807`242f828f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb004`9b4c70c0 : nt!MmCleanProcessAddressSpace+0x10d
ffff8485`3b70f7d0 fffff807`243d9ac2     : ffffb004`9b4c70c0 ffffe680`ef6e1060 ffffb004`9b4c70c0 00000000`00000000 : nt!PspRundownSingleProcess+0xbf
ffff8485`3b70f860 fffff807`243dc3f2     : 00000000`0000000e ffffb004`9b4c7001 ffffb004`9a7aa0f4 000000d8`9683e000 : nt!PspExitThread+0x64e
ffff8485`3b70f960 fffff807`2402b305     : ffffb004`000017c0 ffffb004`9a7aa080 ffffb004`9b4c70c0 ffffb004`9b4c70c0 : nt!NtTerminateProcess+0xf2
ffff8485`3b70f9e0 00007ffc`6b690524     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000d8`984fa238 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6b690524


SYMBOL_NAME:  nt!MiMakeProtoTransition+1d89aa

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.4036

STACK_COMMAND:  .process /r /p 0xffffb0049b4c70c0; .thread 0xffffb0049a7aa080 ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1d89aa

FAILURE_BUCKET_ID:  0x4E_6_nt!MiMakeProtoTransition

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a51b63ab-2b85-e693-8e2f-fd24b6c5d031}

Followup:     MachineOwner
---------

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
 
Yeni mesajlar Yeni Konu Aç  

   

Forum istatistikleri

Konular
1,157,134
Mesajlar
10,428,729
Üyeler
183,786
Son üye
maksut
Geri
Top