Merhaba. Az önce SYSTEM_SERVICE_EXCEPTION mavi ekran aldım. WinDbg Preview ile minidump baktım. Aşağıda paylaşıyorum.
@KojiroHyuga04 hocam bakabilir misiniz müsaitseniz?
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\062523-26453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff804`3a000000 PsLoadedModuleList = 0xfffff804`3ac134b0
Debug session time: Sun Jun 25 02:31:14.649 2023 (UTC + 3:00)
System Uptime: 6 days 14:40:09.572
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000054`512b9018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`3a42c280 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffe09`bda557c0=000000000000003b
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffffa55bc0e77904, Address of the instruction which caused the BugCheck
Arg3: fffffe09bda56110, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1608
Key : Analysis.Elapsed.mSec
Value: 7722
Key : Analysis.IO.Other.Mb
Value: 12
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 33
Key : Analysis.Init.CPU.mSec
Value: 467
Key : Analysis.Init.Elapsed.mSec
Value: 26964
Key : Analysis.Memory.CommitPeak.Mb
Value: 106
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 808
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_win32kbase!CitpInteractionSummaryEnsure
Key : Failure.Hash
Value: {6a31ec39-6764-7018-8219-ccd342aacbfe}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffa55bc0e77904
BUGCHECK_P3: fffffe09bda56110
BUGCHECK_P4: 0
FILE_IN_CAB: 062523-26453-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
Kernel Generated Triage Dump
CONTEXT: fffffe09bda56110 -- (.cxr 0xfffffe09bda56110)
rax=0000000000000031 rbx=0000000000000000 rcx=ffff80094e30bdc0
rdx=0500000000000501 rsi=0500000000000501 rdi=0000000000000000
rip=ffffa55bc0e77904 rsp=fffffe09bda56b30 rbp=0000000000000001
r8=0000000000000001 r9=00000000220bf75a r10=ffff80094e30be8c
r11=00000000220bf75a r12=0000000000000001 r13=0000000000000000
r14=0500000000000521 r15=ffff80094e30bdc0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
win32kbase!CitpInteractionSummaryEnsure+0x48:
ffffa55b`c0e77904 498b3e mov rdi,qword ptr [r14] ds:002b:05000000`00000521=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffffe09`bda56b30 ffffa55b`c0f1743f : ffff8009`4e30bdc0 00000000`00000000 ffff8009`274d7190 00000000`00000000 : win32kbase!CitpInteractionSummaryEnsure+0x48
fffffe09`bda56b90 ffffa55b`c0e77eb8 : 00000000`00000002 ffff8009`220bf75a 00000000`00000000 00000000`00000022 : win32kbase!CitpLastInputUpdate+0x9fa23
fffffe09`bda56be0 ffffa55b`c0e73f94 : 00000000`00000000 fffffe09`bda56d30 fffffe09`bda56d50 fffffe09`bda56d68 : win32kbase!CInputGlobals::UpdateInputGlobals+0x138
fffffe09`bda56c50 ffffa55b`c0e73c66 : ffffbc0c`1b42f140 00000000`00000001 00000000`00000001 00000000`00000000 : win32kbase!CMouseProcessor::processMouseEvent+0x320
fffffe09`bda577e0 ffffa55b`c0eebfd8 : 00000000`00000001 ffff8009`14a8e460 00000000`00000000 ffffa55b`c0e75be1 : win32kbase!ProcessMouseEvent+0x16
fffffe09`bda57810 ffffa55b`c0ec2299 : 00000000`00000002 00000000`00000000 ffff8009`14a8e460 00000000`00000000 : win32kbase!HandleMITWakeSignal+0x18a
fffffe09`bda57850 ffffa55b`c0e75ce6 : ffff8009`14a8e460 fffffe09`bda57a60 00000000`00000000 00000000`00000000 : win32kbase!<lambda_0f9e2a8fc479216b45af02f10e3c5bbd>::<lambda_invoker_cdecl>+0x9
fffffe09`bda57880 ffffa55b`c0e72ddd : 00000000`00000000 00000000`00000001 00000000`00000002 00000000`00000000 : win32kbase!IOCPDispatcher::HandleThreadDispatcherSignal+0x7e
fffffe09`bda578c0 ffffa55b`c0e75d90 : 00007ffa`6c6c1610 00000000`00000000 ffff8009`48f98d60 00007ffa`6c6c1610 : win32kbase!IOCPDispatcher::Dispatch+0x2d
fffffe09`bda57920 ffffa55b`c0e75e1f : 00000000`00000000 00007ffa`6c6c1610 00000000`00000002 00007ffa`6c4b4600 : win32kbase!UserDispatchMITCompletion+0x88
fffffe09`bda57980 ffffa55b`c1ac0a56 : ffffbc0b`f5a83080 000001f4`00000000 00000000`0000c800 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x2f
fffffe09`bda579b0 fffff804`3a440fe5 : ffffbc0b`f5a83080 ffffbc0c`0ea2a8e0 00000000`00000000 ffffbc0b`00000000 : win32k!NtMITDispatchCompletion+0x16
fffffe09`bda579e0 00007ffa`6fe07b94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000054`5167f318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`6fe07b94
SYMBOL_NAME: win32kbase!CitpInteractionSummaryEnsure+48
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr 0xfffffe09bda56110 ; kb
BUCKET_ID_FUNC_OFFSET: 48
FAILURE_BUCKET_ID: AV_win32kbase!CitpInteractionSummaryEnsure
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a31ec39-6764-7018-8219-ccd342aacbfe}
Followup: MachineOwner
---------
@KojiroHyuga04 hocam bakabilir misiniz müsaitseniz?
Son düzenleme: