PFN_LIST_CORRUPT hatası

Tam olarak neyden kaynaklandığı belli değil.

PFN_LIST_CORRUPT (4e) olanı chrome.exe açıkken almışsınız.


Öneriler:


- BIOS güncelleyin. Beta sürüm olan F64a kullanıyorsunuz.
- F64'e güncelleyin. 12/06/2023'te çıkmış.



* Ethernet sürücünüz de eski kalmış.

* Aşağıda paylaştığım Realtek linkinden "Win10 Auto Installation Program (NDIS)" olanı indirin, tarihi 23/05/2023. Ama kurmayın.

* Daha sonra denetim masası > program ekle/kaldırdan eski sürücüleri silin.
* PC'yi yeniden başlatın.
* İndirdiğiniz güncel sürücüyü kurun.



- Chipset sürücülerini de güncelleyin.
  • Denetim masası > Program ekle / kaldırdan "AMD Chipset Software" silin.
  • Aşağıdan güncel olanı indirin ama kurmayın.
  • İndirdikten sonra interneti kesin ve PC'yi yeniden başlatın.
  • PC açılınca yeni chipset sürücülerini kurun.
  • İnterneti bağlayabilirsiniz.

Tüm bunlar sonucunda tekrar mavi ekran alırsanız paylaşın.
Duruma göre Memtest86 ile RAM testi yapılması gerekebilir.



Dökümler:
Kod:
: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000142cda, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0a000140001420fa, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1390

    Key  : Analysis.Elapsed.mSec
    Value: 1590

    Key  : Analysis.IO.Other.Mb
    Value: 4

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 6

    Key  : Analysis.Init.CPU.mSec
    Value: 78

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10435

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 146

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x4e

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x4E_99_nt!MiBadShareCount

    Key  : Failure.Hash
    Value: {60e553e9-e4c5-ed08-9be6-c353e0011003}


BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 142cda

BUGCHECK_P3: 2

BUGCHECK_P4: a000140001420fa

FILE_IN_CAB:  071623-7109-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffff9709`48ddac28 fffff807`4a5f3547     : 00000000`0000004e 00000000`00000099 00000000`00142cda 00000000`00000002 : nt!KeBugCheckEx
ffff9709`48ddac30 fffff807`4a4c6c28     : 8a000001`00000002 00000000`00000004 04e84a93`00000000 00000000`00000000 : nt!MiBadShareCount+0x5b
ffff9709`48ddac70 fffff807`4a4bf72e     : 00000000`00000000 ffff9709`48ddb380 fffffcbf`fe7d0000 ffff9709`48ddb2d0 : nt!MiDeletePteRun+0x1798
ffff9709`48ddae80 fffff807`4a46dd2d     : 00000000`00000000 ffff9d09`536c0780 ffff9709`48ddb2d0 fffffcbf`fe7cfff8 : nt!MiDeleteVaTail+0x6e
ffff9709`48ddaeb0 fffff807`4a46d94b     : fffffcfe`00000000 ffff9d09`536c0780 ffff9709`00000000 ffff9709`48ddb320 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9709`48ddaf50 fffff807`4a46d94b     : fffffcfe`7f2fff98 ffff9d09`536c0780 ffff9709`00000001 ffff9709`48ddb330 : nt!MiWalkPageTablesRecursively+0x88b
ffff9709`48ddaff0 fffff807`4a46d94b     : fffffcfe`7f2ff000 ffff9d09`536c0780 ffff9709`00000002 ffff9709`48ddb340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9709`48ddb090 fffff807`4a46a94b     : ffff9709`48ddb1a8 ffff9d09`536c0780 ffff9709`00000003 ffff9709`48ddb350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9709`48ddb130 fffff807`4a4bad41     : ffff9709`48ddb2d0 ffff9d09`00000000 ffffffff`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9709`48ddb230 fffff807`4a47e830     : 00000000`00000001 ffff9709`00000000 ffff9d09`536c05d0 ffff9d09`53728080 : nt!MiDeletePagablePteRange+0x4f1
ffff9709`48ddb540 fffff807`4a886329     : ffff9d09`5333d860 00000000`00000000 ffff9d09`00000000 ffff9d09`00000000 : nt!MiDeleteVad+0x360
ffff9709`48ddb650 fffff807`4a885ccc     : ffff9d09`5333d860 ffff9d09`51ca5d20 ffff9d09`53728080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9709`48ddb680 fffff807`4a824b1f     : ffff9d09`5333c820 ffff9d09`5333c820 ffff9d09`5333d860 ffff9d09`536c0100 : nt!MiCleanVad+0x30
ffff9709`48ddb6b0 fffff807`4a831c50     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9d09`536c0100 : nt!MmCleanProcessAddressSpace+0x137
ffff9709`48ddb730 fffff807`4a884682     : ffff9d09`536c0100 ffffc105`0ea0e7b0 ffff9709`48ddb959 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9709`48ddb7c0 fffff807`4a8c8588     : ffff9d09`00000000 fffff807`4a41bf01 00010003`00000008 00000082`3c36e000 : nt!PspExitThread+0x5f6
ffff9709`48ddb8c0 fffff807`4a4de0cd     : ffff9d09`53728080 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
ffff9709`48ddb900 fffff807`4a601510     : 00000000`00000000 ffff9709`48ddb9c0 ffff9709`48ddbb00 00000082`3f3ff8c8 : nt!KiDeliverApc+0x60d
ffff9709`48ddb9c0 fffff807`4a60f99f     : ffff9d09`53728080 ffff9d09`536a1560 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffff9709`48ddbb00 00007ffd`5352d064     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000082`3f3ff798 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5352d064


SYMBOL_NAME:  nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.3208

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  5b

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8068100d997, Address of the instruction which caused the BugCheck
Arg3: ffffe808ea87c580, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1265

    Key  : Analysis.Elapsed.mSec
    Value: 1443

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4956

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 146

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: AV_nt!ObpCaptureObjectCreateInformation

    Key  : Failure.Hash
    Value: {d923332f-b1e9-aecc-24bc-872e4bfcabd5}


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8068100d997

BUGCHECK_P3: ffffe808ea87c580

BUGCHECK_P4: 0

FILE_IN_CAB:  071523-9703-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

CONTEXT:  ffffe808ea87c580 -- (.cxr 0xffffe808ea87c580)
rax=0000000000000007 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000001 rdi=0000000000000000
rip=fffff8068100d997 rsp=ffffe808ea87cf80 rbp=ffffab06ecab0380
 r8=0000000000000000  r9=ffffe808ea87d078 r10=ffffab06ecab0380
r11=ffffe808ea87d0c8 r12=0000000000000001 r13=0000000000000000
r14=ffffab06ecaf52a0 r15=ffffe808ea87d078
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!ObpCaptureObjectCreateInformation+0x37:
fffff806`8100d997 0f110b          movups  xmmword ptr [rbx],xmm1 ds:002b:00000000`00000000=????????????????????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  services.exe

STACK_TEXT: 
ffffe808`ea87cf80 fffff806`8100eaed     : 00000000`00000000 ffffab07`03054cd0 00000000`00000000 fffff806`8101cbd7 : nt!ObpCaptureObjectCreateInformation+0x37
ffffe808`ea87d020 fffff806`8101a8c1     : ffffc187`fdf9be70 ffffc187`fdf9be70 ffffe808`ea87d940 00000000`00000000 : nt!CmpCreateKeyBody+0xcd
ffffe808`ea87d0d0 fffff806`8101a053     : ffffc187`0000001c ffffe808`ea87d420 ffffe808`ea87d3d8 ffffab07`0210a760 : nt!CmpDoParseKey+0x5d1
ffffe808`ea87d370 fffff806`8101571e     : fffff806`81019d01 00000000`00000000 ffffab07`0210a760 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffe808`ea87d510 fffff806`8100d3ea     : ffffab07`0210a700 ffffe808`ea87d778 ffffab06`00000040 ffffab06`ecaf52a0 : nt!ObpLookupObjectName+0x3fe
ffffe808`ea87d6e0 fffff806`8100d1cc     : ffffc187`00000000 00000000`00000000 00000000`00000000 ffffab06`ecaf52a0 : nt!ObOpenObjectByNameEx+0x1fa
ffffe808`ea87d810 fffff806`8100cb11     : 000000a3`7177e100 ffffe808`ea87db80 00000000`00000001 00007ff6`d3787918 : nt!ObOpenObjectByName+0x5c
ffffe808`ea87d860 fffff806`810ba362     : 000000a3`7177ee60 000000a3`7177edf8 000000a3`7177edc0 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffe808`ea87dac0 fffff806`80e0f8f8     : ffffab06`fea46000 ffffab06`feecab80 ffffe808`ea87db80 00000000`00000000 : nt!NtOpenKey+0x12
ffffe808`ea87db00 00007ff8`0400d224     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a3`7177e0a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`0400d224


SYMBOL_NAME:  nt!ObpCaptureObjectCreateInformation+37

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.3208

STACK_COMMAND:  .cxr 0xffffe808ea87c580 ; kb

BUCKET_ID_FUNC_OFFSET:  37

FAILURE_BUCKET_ID:  AV_nt!ObpCaptureObjectCreateInformation

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d923332f-b1e9-aecc-24bc-872e4bfcabd5}

Followup:     MachineOwner
---------
 

Technopat Haberler

Yeni konular

Geri
Yukarı