Mein PC ist aus der Reparatur zurück, mein Mainboard wurde ausgetauscht aber jetzt folgendes :
Ich kriege einen STOP 0x0000004E Fehler : PFN_LIST_CORRUPT.
Ich weiß null wie ich das beheben soll, da dies anscheinend von einer .NET Framework datei kommt.
Hoffe jemand kann mir helfen.
Mein System :
AMD Phenom 2 X6 X1075
Asus M4A87TD/EVO
2x 4GB GeiL DDR3-1333 CL9
BeQuiet 650W
WD Caviar Black 1 TB SATA3
WIN7 Professional 64-Bit (MSDNAA)
Treiber alles aktuell!
Wie gesagt, laut testberichte bei ALTERNATE war nur das MB defekt und wurde ausgetauscht.
Aber ich hatte vorher schon massive Probleme mit freezes, die bisher auch 2 mal auftraten, vielleicht aber auch mit diesem Fehler hier zusammenhängen...
Mein DUMP :
Zitat
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c66000 PsLoadedModuleList = 0xfffff800`02ea3e50
Debug session time: Wed Jan 19 18:06:24.361 2011 (UTC + 1:00)
System Uptime: 0 days 0:07:46.688
Loading Kernel Symbols
..................................................
.............
..................................................
..............
..................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdd018). Type ".hh dbgerr001" for details
Loading unloaded module list
....
**************************************************
*****************************
* *
* Bugcheck Analysis *
* *
**************************************************
*****************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 127fe0, 2, 1287df}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
5: kd> !analyze -v
**************************************************
*****************************
* *
* Bugcheck Analysis *
* *
**************************************************
*****************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000127fe0, page frame number
Arg3: 0000000000000002, current page state
Arg4: 00000000001287df, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: mscorsvw.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002d6638c to fffff80002cd6740
STACK_TEXT:
fffff880`0a93b108 fffff800`02d6638c : 00000000`0000004e 00000000`00000099 00000000`00127fe0 00000000`00000002 : nt!KeBugCheckEx
fffff880`0a93b110 fffff800`02d489ee : 00000000`00000000 fffff680`000112e8 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`0a93b150 fffff800`02caac23 : fffffa80`070d2730 fffff700`00000cb2 0000007f`fffffff8 fffff8a0`02a50c20 : nt! ? ::FNODOBFM::`string'+0x32235
fffff880`0a93b1e0 fffff800`02ca968a : fffffa80`070d2730 fffffa80`0000000b fffff8a0`0000034b 00000000`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`0a93ba90 fffff800`02fbbdcf : fffff8a0`079b8b00 00000000`00000001 00000000`00000000 fffffa80`070b4060 : nt!MmCleanProcessAddressSpace+0x96
fffff880`0a93bae0 fffff800`02f9385b : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`0a93bba0 fffff800`02cd5993 : fffffa80`070d2730 000007fe`00000000 00000000`0012f701 fffffa80`070b4060 : nt!NtTerminateProcess+0x25b
fffff880`0a93bc20 00000000`76eb001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76eb001a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02d6638c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
5: kd> !analyze -v
**************************************************
*****************************
* *
* Bugcheck Analysis *
* *
**************************************************
*****************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000127fe0, page frame number
Arg3: 0000000000000002, current page state
Arg4: 00000000001287df, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: mscorsvw.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002d6638c to fffff80002cd6740
STACK_TEXT:
fffff880`0a93b108 fffff800`02d6638c : 00000000`0000004e 00000000`00000099 00000000`00127fe0 00000000`00000002 : nt!KeBugCheckEx
fffff880`0a93b110 fffff800`02d489ee : 00000000`00000000 fffff680`000112e8 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`0a93b150 fffff800`02caac23 : fffffa80`070d2730 fffff700`00000cb2 0000007f`fffffff8 fffff8a0`02a50c20 : nt! ? ::FNODOBFM::`string'+0x32235
fffff880`0a93b1e0 fffff800`02ca968a : fffffa80`070d2730 fffffa80`0000000b fffff8a0`0000034b 00000000`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`0a93ba90 fffff800`02fbbdcf : fffff8a0`079b8b00 00000000`00000001 00000000`00000000 fffffa80`070b4060 : nt!MmCleanProcessAddressSpace+0x96
fffff880`0a93bae0 fffff800`02f9385b : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`0a93bba0 fffff800`02cd5993 : fffffa80`070d2730 000007fe`00000000 00000000`0012f701 fffffa80`070b4060 : nt!NtTerminateProcess+0x25b
fffff880`0a93bc20 00000000`76eb001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76eb001a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02d6638c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Dieser Beitrag wurde von BurningStyler bearbeitet: 19. Januar 2011 - 18:58