SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

  • Konuyu başlatan Fell
  • Başlangıç Tarihi
  • Mesaj 9
  • Görüntüleme 904

Fell

Centipat
Katılım
5 Ağustos 2020
Mesajlar
22
Yaklaşık 1 aydır aralıklarla 4 kere mavi ekran hatası aldım. MiniDump.rar minidump dosyalarını şöyle paylaşayım, ben de konu hakkında fazla bir şey bilmiyorum. Yardımcı olabilirseniz sevinirim.
 
Son düzenleyen: Moderatör:
G/Ç hatası görüyorum. G/Ç hataları çoğunlukla sabit sürücü kaynaklı oluyor.
Kod:
11: kd> !error 00000000c0000006
Error code: (NTSTATUS) 0xc0000006 (3221225478) - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/  hata durumu y z nden belle e yerle tirilmedi.
  • HDD Sentinel yazılımından tüm disklerinize dair ekran görüntüsü atabilir misiniz?
  • HD Tune ile disklerinizde "Error Scan" yapabilir misiniz? Sonucunu buraya atın.
  • Kaspersky güncel değilse güncelleyin, güncelse kaldırın.
  • MSI Afterburner'dan bir ayar yaptıysanız ayarı geri çekin ve yazılımı kaldırın. Aynı şekilde BIOS'tan da yaptıysanız BIOS'u sıfırlayın.
  • TechPowerUp GPU-Z yazılımını kaldırın.
  • DDU ile AMD GPU sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
  • MemTest86 ile belleklerde tarama yaparsanız iyi olur ama önce HD Tune'yi yapın.
  • Anakartınız hakkında pek bilgi bulamadım. BIOS güncel değilse güncelleyin.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80349835932, Address of the instruction which caused the bugcheck
Arg3: fffffc0256e52570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4950

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80349835932

BUGCHECK_P3: fffffc0256e52570

BUGCHECK_P4: 0

CONTEXT:  fffffc0256e52570 -- (.cxr 0xfffffc0256e52570)
rax=0000000000000000 rbx=fffffc0256e52fd0 rcx=0000000000000007
rdx=000000000230b5e8 rsi=0000000000000382 rdi=ffffb5099c955000
rip=fffff80349835932 rsp=fffffc0256e52f78 rbp=ffffb5099c955000
r8=000000000000001c  r9=ffffd98ff249c080 r10=000001e9eb89c5e8
r11=00000000000005e8 r12=00000000ce4cf905 r13=fffffc0256e53230
r14=0000000000000382 r15=000001e9eb7b0024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!HvpGetCellPaged+0xa2:
fffff803`49835932 418b02          mov     eax,dword ptr [r10] ds:002b:000001e9`eb89c5e8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
fffffc02`56e52f78 fffff803`498c57bf     : 00000000`7f147a21 fffffc02`56e532f0 ffffd98f`f249c080 ffffb509`9cf587c0 : nt!HvpGetCellPaged+0xa2
fffffc02`56e52f80 fffff803`498cb5e5     : 00000001`ffffffff 00000000`ce4cf905 00000000`00000000 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
fffffc02`56e52fd0 fffff803`498ce729     : ffffb509`b0be05e0 00000000`00000006 fffffc02`56e531d0 fffffc02`56e53250 : nt!CmpWalkOneLevel+0x6f5
fffffc02`56e530d0 fffff803`498cd013     : 00000000`0000001c fffffc02`56e53420 fffffc02`56e533d8 ffffd98f`f33284e0 : nt!CmpDoParseKey+0x849
fffffc02`56e53370 fffff803`498d10de     : fffff803`498ccd01 00000000`00000000 ffffd98f`f33284e0 ffffd98f`f478c701 : nt!CmpParseKey+0x2c3
fffffc02`56e53510 fffff803`498da39a     : ffffd98f`f3328400 fffffc02`56e53778 00000000`00000040 ffffd98f`db4dc820 : nt!ObpLookupObjectName+0x3fe
fffffc02`56e536e0 fffff803`498da17c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd98f`db4dc820 : nt!ObOpenObjectByNameEx+0x1fa
fffffc02`56e53810 fffff803`498d9ca1     : 0000006f`66e7e438 fffffc02`56e53b80 00000000`00000001 fffff803`494617be : nt!ObOpenObjectByName+0x5c
fffffc02`56e53860 fffff803`498d99cf     : 00000000`00000000 fffff803`4989928c ffffd98f`f249c080 0000021f`f3d60000 : nt!CmOpenKey+0x2c1
fffffc02`56e53ac0 fffff803`496058b8     : 0000021f`00000000 00000000`00000001 fffffc02`56e53b80 0000021f`f4c17ce0 : nt!NtOpenKeyEx+0xf
fffffc02`56e53b00 00007fff`a87ae1b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006f`66e7e358 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a87ae1b4


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xfffffc0256e52570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80627435932, Address of the instruction which caused the bugcheck
Arg3: ffffca05c190f570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5510

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80627435932

BUGCHECK_P3: ffffca05c190f570

BUGCHECK_P4: 0

CONTEXT:  ffffca05c190f570 -- (.cxr 0xffffca05c190f570)
rax=0000000000000000 rbx=ffffca05c190ffd0 rcx=0000000000000007
rdx=0000000001b0e418 rsi=0000000000000382 rdi=ffffb7870f152000
rip=fffff80627435932 rsp=ffffca05c190ff78 rbp=ffffb7870f152000
r8=000000000000001c  r9=ffffcb0b4e2b4080 r10=0000022279f2f418
r11=0000000000000418 r12=00000000ce4cf905 r13=ffffca05c1910230
r14=0000000000000382 r15=0000022279e42024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!HvpGetCellPaged+0xa2:
fffff806`27435932 418b02          mov     eax,dword ptr [r10] ds:002b:00000222`79f2f418=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
ffffca05`c190ff78 fffff806`274c57bf     : 00000000`7f147a21 ffffca05`c19102f0 00000000`00000000 ffffb787`2772fb50 : nt!HvpGetCellPaged+0xa2
ffffca05`c190ff80 fffff806`274cb5e5     : 00000001`ffffffff 00000000`ce4cf905 ffffca05`c19109e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffca05`c190ffd0 fffff806`274ce729     : ffffb787`2772fb50 00000000`00000006 ffffca05`c19101d0 ffffca05`c1910250 : nt!CmpWalkOneLevel+0x6f5
ffffca05`c19100d0 fffff806`274cd013     : 00000000`0000001c ffffca05`c1910420 ffffca05`c19103d8 ffffcb0b`59f11a90 : nt!CmpDoParseKey+0x849
ffffca05`c1910370 fffff806`274d10de     : fffff806`274ccd01 00000000`00000000 ffffcb0b`59f11a90 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffca05`c1910510 fffff806`274da39a     : ffffcb0b`59f11a00 ffffca05`c1910778 00000000`00000040 ffffcb0b`3d0fbbc0 : nt!ObpLookupObjectName+0x3fe
ffffca05`c19106e0 fffff806`274da17c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcb0b`3d0fbbc0 : nt!ObOpenObjectByNameEx+0x1fa
ffffca05`c1910810 fffff806`274d9ca1     : 00000016`f497e7d8 ffffca05`c1910b80 00000000`00000001 fffff806`270617be : nt!ObOpenObjectByName+0x5c
ffffca05`c1910860 fffff806`274d99cf     : 00000000`00000000 fffff806`2710f47e ffffcb0b`4e2b4080 ffffca05`c1910a88 : nt!CmOpenKey+0x2c1
ffffca05`c1910ac0 fffff806`272058b8     : 00000016`00000000 00000000`00000001 ffffca05`c1910b80 00000155`845431a0 : nt!NtOpenKeyEx+0xf
ffffca05`c1910b00 00007ffd`2c6ee1b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000016`f497e6f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`2c6ee1b4


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xffffca05c190f570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffac05b452c240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4282

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffac05b452c240

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0xa6686080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffffcc0a`37747d88 fffff801`2af081c2     : 00000000`000000ef ffffac05`b452c240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffcc0a`37747d90 fffff801`2ae3a90b     : 00000000`00000001 fffff801`2a80d6fd 00000000`00000002 fffff801`2a80bc9b : nt!PspCatchCriticalBreak+0x10e
ffffcc0a`37747e30 fffff801`2abf4070     : ffffac05`00000000 00000000`00000000 ffffac05`b452c240 ffffac05`b452c678 : nt!PspTerminateAllThreads+0x151faf
ffffcc0a`37747ea0 fffff801`2abf3e6c     : ffffac05`b452c240 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffcc0a`37747ee0 fffff801`2aa058b8     : ffffac05`b452c240 ffffac05`a6686080 ffffcc0a`37747fd0 fffff801`2ad16052 : nt!NtTerminateProcess+0x9c
ffffcc0a`37747f50 fffff801`2a9f7d00     : fffff801`2aa4e633 ffffcc0a`37748a58 ffffcc0a`37748a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffffcc0a`377480e8 fffff801`2aa4e633     : ffffcc0a`37748a58 ffffcc0a`37748a58 ffffffff`ffffffff 00007fff`066cc298 : nt!KiServiceLinkage
ffffcc0a`377480f0 fffff801`2aa05fac     : 00000000`00001000 ffffcc0a`37748b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caad3
ffffcc0a`37748920 fffff801`2aa02143     : 00000000`0009fc4e 00000000`00000001 00000000`00000000 ffffcc0a`37748b80 : nt!KiExceptionDispatch+0x12c
ffffcc0a`37748b00 00007fff`0901b26e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
00000094`19dc0f70 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0901b26e


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_a6686080_nt!PspCatchCriticalBreak

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e75a79c-53af-c7ed-b33b-cc54c8cac1fb}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffaf0aed911140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5549

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffaf0aed911140

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  ffffaf0aed911880 -- (.exr 0xffffaf0aed911880)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0xefc130c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT:
fffff588`1d03dd88 fffff805`17d081c2     : 00000000`000000ef ffffaf0a`ed911140 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff588`1d03dd90 fffff805`17c3a90b     : 00000000`00000001 fffff805`1760d6fd 00000000`00000002 fffff805`1760bc9b : nt!PspCatchCriticalBreak+0x10e
fffff588`1d03de30 fffff805`179f4070     : ffffaf0a`00000000 00000000`00000000 ffffaf0a`ed911140 ffffaf0a`ed911578 : nt!PspTerminateAllThreads+0x151faf
fffff588`1d03dea0 fffff805`179f3e6c     : ffffaf0a`ed911140 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff588`1d03dee0 fffff805`178058b8     : ffffaf0a`ed911140 ffffaf0a`efc130c0 fffff588`1d03dfd0 fffff805`17b16052 : nt!NtTerminateProcess+0x9c
fffff588`1d03df50 fffff805`177f7d00     : fffff805`1784e633 fffff588`1d03ea58 fffff588`1d03ea58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffff588`1d03e0e8 fffff805`1784e633     : fffff588`1d03ea58 fffff588`1d03ea58 ffffffff`ffffffff 00007ffb`64dec298 : nt!KiServiceLinkage
fffff588`1d03e0f0 fffff805`17805fac     : ffffaf0a`ed911880 fffff805`176f0ee6 00000000`00001000 fffff588`1d03eb00 : nt!KiDispatchException+0x1caad3
fffff588`1d03e920 fffff805`17802143     : 00000000`00000000 fffff588`1d03eb80 00000045`f60c3230 ffffaf0a`ed8b3710 : nt!KiExceptionDispatch+0x12c
fffff588`1d03eb00 00007ffb`677121d4     : 00007ffb`676f0000 00007ffb`6778fc4e 00007ffb`6778fc4e 00000000`00000000 : nt!KiPageFault+0x443
00000045`f60c1270 00007ffb`676f0000     : 00007ffb`6778fc4e 00007ffb`6778fc4e 00000000`00000000 00000045`f60c13b0 : 0x00007ffb`677121d4
00000045`f60c1278 00007ffb`6778fc4e     : 00007ffb`6778fc4e 00000000`00000000 00000045`f60c13b0 00000000`00000000 : 0x00007ffb`676f0000
00000045`f60c1280 00007ffb`6778fc4e     : 00000000`00000000 00000045`f60c13b0 00000000`00000000 00000045`f60c1308 : 0x00007ffb`6778fc4e
00000045`f60c1288 00000000`00000000     : 00000045`f60c13b0 00000000`00000000 00000045`f60c1308 00000045`f60c1348 : 0x00007ffb`6778fc4e


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_efc130c0_nt!PspCatchCriticalBreak

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b51ce1c0-797d-ef80-8482-a63ad027a89f}

Followup:     MachineOwner
---------
 
Deneyip dönüş yapacağım. Teşekkür ediyorum şimdiden ikinize.

1602086291238.png


1602086383378.png


HDD Sentinel görüntüleri bunlar.
HD Tune'de 2 diskin de error scan testi Full yeşil olarak çıktı. Hata bulunamadı.
HDD'nin SATA kablosunu değiştirsem mi acaba?
Kaspersky'i ve MSI Afterburner i sildim.
Ekran kartının sürücünü yakın zamanda dudu ile temizleyip verdiğiniz linkten yüklemiştim.
Birkaç gün deneyip eğer tekrar mavi ekran hatası alırsan sürücüyü DDU ile temizleyip tekrar temizleyeceğim. İlginiz için tekrar teşekkürler.
Google Drive'la Tanışın – Tüm dosyalarınız için tek bir yer İşlemleri yaptım fakat bugün yine hatayı aldım, dosyayı bıraktım.
 
Son düzenleyen: Moderatör:
  • Sesi USB'den alıyorsanız ilgili cihazı şimdilik kullanmayın.
  • PS/2 klavye/fare kullanıyorsanız çıkarmanız gerekecek.
Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffe20a20910140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5155

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10387

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: ef

BUGCHECK_P1: ffffe20a20910140

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME: csrss.exe

CRITICAL_PROCESS: csrss.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0x274ad080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffffa0a`25d9bd88 fffff801`719081c2 : 00000000`000000ef ffffe20a`20910140 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffa0a`25d9bd90 fffff801`7183a90b : 00000000`00000001 fffff801`7120d6fd 00000000`00000002 fffff801`7120bc9b : nt!PspCatchCriticalBreak+0x10e
fffffa0a`25d9be30 fffff801`715f4070 : ffffe20a`00000000 00000000`00000000 ffffe20a`20910140 ffffe20a`20910578 : nt!PspTerminateAllThreads+0x151faf
fffffa0a`25d9bea0 fffff801`715f3e6c : ffffe20a`20910140 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffffa0a`25d9bee0 fffff801`714058b8 : ffffe20a`20910140 ffffe20a`274ad080 fffffa0a`25d9bfd0 fffff801`71716052 : nt!NtTerminateProcess+0x9c
fffffa0a`25d9bf50 fffff801`713f7d00 : fffff801`7144e633 fffffa0a`25d9ca58 fffffa0a`25d9ca58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffffa0a`25d9c0e8 fffff801`7144e633 : fffffa0a`25d9ca58 fffffa0a`25d9ca58 ffffffff`ffffffff 00000000`00000000 : nt!KiServiceLinkage
fffffa0a`25d9c0f0 fffff801`71405fac : 00000000`00001000 fffffa0a`25d9cb00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caad3
fffffa0a`25d9c920 fffff801`71402143 : 00000000`00000000 00000000`00000001 000000df`b19ae770 fffffa0a`25d9cb80 : nt!KiExceptionDispatch+0x12c
fffffa0a`25d9cb00 00007ffe`8ce31037 : 00000000`00000000 00000000`0010000b 00007ffe`8cddb31f 00000000`00000000 : nt!KiPageFault+0x443
000000df`b1971218 00000000`00000000 : 00000000`0010000b 00007ffe`8cddb31f 00000000`00000000 000000df`b1971440 : 0x00007ffe`8ce31037


SYMBOL_NAME: nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 10e

FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_274ad080_nt!PspCatchCriticalBreak

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {fb5cc29e-fbbe-eb04-cc83-0ecf696f5c9c}

Followup: MachineOwner
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı