Windows 11 "PFN_LIST_CORRUPT" mavi ekran hatası

İşletim sistemi
Windows 11

sahinbekircan3

Femtopat
Katılım
25 Mart 2024
Mesajlar
13
Çözümler
1
Daha fazla  
Cinsiyet
Diğer
SSD veya HDD modeli
WD BLUE SN580 M.2 SSD
Ekran kartı
NVDİA GEFORCE RTX 4070
Anakart
ASUS PRİME H610-R
İşlemci
i5 14400f
Windows 10 kullanıyordum aşırı derece de mavi ekran hatası alıyordum Windows 11 temiz kurulum yaptım fakat yine bu mavi ekran hatasını aldım, yardımcı olur musunuz?

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit.
 UseExperimentalFeatureForNugetShare : true.
 AllowNugetExeUpdate : true.
 NonInteractiveNuget : true.
 AllowNugetMSCredentialProviderInstall : true.
 AllowParallelInitializationOfLocalRepositories : true.

 EnableRedirectToV8JsProvider : false.

 -- Configuring repositories.
 ----> Repository : LocalInstalled, Enabled: true.
 ----> Repository : UserExtensions, Enabled: true.

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds.

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds.
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41.

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\072924-7500-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Kernel base = 0xfffff801`36000000 PsLoadedModuleList = 0xfffff801`36c134f0
Debug session time: Mon Jul 29 04:36:42.593 2024 (UTC + 3:00)
System Uptime: 0 days 0:11:01.258
Loading Kernel Symbols.
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
...........................................................
Loading User Symbols.

Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`36415820 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff88f`422a29d0=000000000000004e
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling.
MmUnlockPages twice with the same list, etc). If a kernel debugger is.
available get the stack trace.
Arguments:
Arg1: 000000000000008d,
Arg2: 00000000002fed2e.
Arg3: 0000000000410008.
Arg4: ffffc1813d813ab8.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 874.

 Key : Analysis.Elapsed.mSec
 Value: 3470.

 Key : Analysis.IO.Other.Mb
 Value: 6

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 31.

 Key : Analysis.Init.CPU.mSec
 Value: 312.

 Key : Analysis.Init.Elapsed.mSec
 Value: 180844.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 96.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x4e.

 Key : Bugcheck.Code.TargetModel
 Value: 0x4e.

 Key : Dump.Attributes.AsUlong
 Value: 1808.

 Key : Dump.Attributes.DiagDataWrittenToHeader
 Value: 1

 Key : Dump.Attributes.ErrorCode
 Value: 0

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : Dump.Attributes.LastLine
 Value: Dump completed successfully.

 Key : Dump.Attributes.ProgressPercentage
 Value: 0

 Key : Failure.Bucket
 Value: 0x4E_8d_nt!MiZeroLocalPages

 Key : Failure.Hash
 Value: {471d810c-c75f-4533-60f3-34707bc26595}

 Key : Hypervisor.Enlightenments.ValueHex
 Value: 1417df84.

 Key : Hypervisor.Flags.AnyHypervisorPresent
 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened
 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable
 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint
 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested
 Value: 0

 Key : Hypervisor.Flags.CpuManager
 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi
 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled
 Value: 1

 Key : Hypervisor.Flags.Epf
 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks
 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable
 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber
 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl
 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush
 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing
 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone
 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos
 Value: 0

 Key : Hypervisor.Flags.RootScheduler
 Value: 0

 Key : Hypervisor.Flags.SynicAvailable
 Value: 1

 Key : Hypervisor.Flags.UseQpcBias
 Value: 0

 Key : Hypervisor.Flags.Value
 Value: 21631230.

 Key : Hypervisor.Flags.ValueHex
 Value: 14a10fe.

 Key : Hypervisor.Flags.VpAssistPage
 Value: 1

 Key : Hypervisor.Flags.VsmAvailable
 Value: 1

 Key : Hypervisor.RootFlags.AccessStats
 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor
 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading
 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync
 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV
 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt
 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.Nested
 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor
 Value: 1

 Key : Hypervisor.RootFlags.Value
 Value: 1015.

 Key : Hypervisor.RootFlags.ValueHex
 Value: 3f7.

BUGCHECK_CODE: 4e.

BUGCHECK_P1: 8d.

BUGCHECK_P2: 2fed2e.

BUGCHECK_P3: 410008.

BUGCHECK_P4: ffffc1813d813ab8.

FILE_IN_CAB: 072924-7500-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.

DUMP_FILE_ATTRIBUTES: 0x1808.
 Kernel Generated Triage Dump.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

STACK_TEXT:
fffff88f`422a29c8 fffff801`36274aa1 : 00000000`0000004e 00000000`0000008d 00000000`002fed2e 00000000`00410008 : nt!KeBugCheckEx
fffff88f`422a29d0 fffff801`363907ef : ffffe68c`61cfa230 ffffe68c`00000003 00000000`00000000 00000000`00000000 : nt!MiZeroLocalPages+0xef1
fffff88f`422a2ae0 fffff801`36354d17 : ffffe68c`61dd4080 00000000`00000080 fffff801`36390680 00000000`00000000 : nt!MiZeroNodePages+0x16f
fffff88f`422a2b30 fffff801`3641a994 : ffff8280`98311180 ffffe68c`61dd4080 fffff801`36354cc0 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffff88f`422a2b80 00000000`00000000 : fffff88f`422a3000 fffff88f`4229c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: nt!MiZeroLocalPages+ef1

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.22621.3958

STACK_COMMAND: .cxr; .ecxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: ef1.

FAILURE_BUCKET_ID: 0x4E_8d_nt!MiZeroLocalPages

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {471d810c-c75f-4533-60f3-34707bc26595}

Followup: MachineOwner.
---------
 
Son düzenleyen: Moderatör:

Technopat Haberler

Yeni konular

Geri
Yukarı