Centuriof
Megapat
Daha fazla
- Cinsiyet
- Erkek
Merhaba. İlk önce 1-2 hafta evvel Battlefield V oynarken oyunu alt+F4 ile kapattığımda aldım bu hatayı ama önemsemedim. Az önce de ekran kartı RGB ışıklandırmalarını düzenlemek için kullandığım rgbfusion uygulamasını açmak için tıkladığımda aldım. Minidump dosyasını aşağıya bırakıyorum. Yardımcı olursanız memnun olurum.
Minidump dosyam:
Buraya da direkt raporu yazayım belki indirmeye üşenenler olur:
Minidump dosyam:
Buraya da direkt raporu yazayım belki indirmeye üşenenler olur:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000000163ff, page frame number
Arg3: 247af70000347af7, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7885
Key : Analysis.Init.CPU.mSec
Value: 906
Key : Analysis.Init.Elapsed.mSec
Value: 157646
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Bugcheck.Code.DumpHeader
Value: 0x4e
Key : Bugcheck.Code.KiBugCheckData
Value: 0x4e
Key : Bugcheck.Code.Register
Value: 0x4e
Key : Dump.Attributes.AsUlong
Value: 1000
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: 4e
BUGCHECK_P1: 7
BUGCHECK_P2: 163ff
BUGCHECK_P3: 247af70000347af7
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: RGBFusion.exe
STACK_TEXT:
ffffb50f`adb7ff88 fffff807`39c9aeeb : 00000000`0000004e 00000000`00000007 00000000`000163ff 247af700`00347af7 : nt!KeBugCheckEx
ffffb50f`adb7ff90 fffff807`39ac8e6b : 00000000`00000000 ffffbf00`0042bfd0 ffffb50f`adb80130 ffffb900`00032b80 : nt!MiPfnReferenceCountIsZero+0x1d069b
ffffb50f`adb7ffd0 fffff807`39b51325 : 00000000`00000000 ffffbf00`0042bfd0 00000000`00000000 00000000`00000000 : nt!MiRemoveLockedPageChargeAndDecRef+0x43
ffffb50f`adb80000 fffff807`39a2aefd : 00000000`000163ff 00000000`00000000 ffffe581`43bc4870 fffff807`39a772f4 : nt!MiDoubleUnlockMdlPage+0x1d
ffffb50f`adb80030 fffff807`39a62366 : ffffa502`d67e2700 00000000`00000000 ffffb50f`adb80300 ffffb50f`adb80350 : nt!MiDeletePteRun+0xd8d
ffffb50f`adb80220 fffff807`39a633ad : ffffb50f`adb80350 00000000`00000000 ffffb900`00032b88 ffffb900`00032b90 : nt!MiDeleteVaTail+0x56
ffffb50f`adb80250 fffff807`39a666f2 : ffffa502`defe16b0 fffff807`39a66531 ffffb50f`adb805f8 00000000`00000000 : nt!MiDeletePagablePteRange+0x38d
ffffb50f`adb80560 fffff807`39e98799 : 00000000`00000000 00000000`06570000 ffffa502`d67e20c0 ffffa502`defe16b0 : nt!MiDeleteVirtualAddresses+0x52
ffffb50f`adb805b0 fffff807`39e7ee3a : ffffa502`d67e20c0 ffffa502`defe16b0 ffffa502`00000000 00000000`00000000 : nt!MiDeleteVad+0x199
ffffb50f`adb80670 fffff807`39ee6109 : ffffa502`db220b20 ffffa502`db220b20 ffffa502`d9ce8080 ffffa502`d67e20c0 : nt!MiCleanVad+0x42
ffffb50f`adb806a0 fffff807`39f0d8d3 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa502`d67e20c0 : nt!MmCleanProcessAddressSpace+0x10d
ffffb50f`adb80720 fffff807`39f02a83 : ffffa502`d67e20c0 ffff908f`9275d060 ffffb50f`adb80939 00000000`00000000 : nt!PspRundownSingleProcess+0x207
ffffb50f`adb807b0 fffff807`39fa53f8 : ffffa502`ffffffff 00000000`00000001 00000000`00000001 00000000`00acb000 : nt!PspExitThread+0x613
ffffb50f`adb808a0 fffff807`39ad031b : fffff807`3a533680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffb50f`adb808e0 fffff807`39c1cd00 : 00000000`1512fbf4 ffffb50f`adb809a0 00000000`000000c0 fffff807`39b206f7 : nt!KiDeliverApc+0x4db
ffffb50f`adb809a0 fffff807`39c2a41f : ffffa502`d9ce8080 00000000`00000001 ffffffff`fa0a1f00 ffffa502`dbad4080 : nt!KiInitiateUserApc+0x70
ffffb50f`adb80ae0 00000000`770e1cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`150ee928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770e1cf3
SYMBOL_NAME: nt!MiPfnReferenceCountIsZero+1d069b
MODULE_NAME: nt
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1d069b
FAILURE_BUCKET_ID: 0x4E_7_nt!MiPfnReferenceCountIsZero
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4c4fdf2-bb42-a5bb-4f52-718a7a31638a}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: