Mavi ekran hatasının WinDbg sonucu

İşletim sistemi
Windows 11

Justpub

Hectopat
Katılım
13 Aralık 2019
Mesajlar
646
Çözümler
1
RAM
16 3000Mhz
SSD veya HDD modeli
XPG Spectrix S40G
Ekran kartı
6700 XT
Anakart
B450 S2H
İşlemci
R5 3600
Merhabalar 2 adet minidump dosyasını analiz etmeye çalıştım fakat yorumlayamadım tecrübeli arkadaşlar yardımcı olabilir mi?

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 43

Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\040325-11843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff800`72e00000 PsLoadedModuleList = 0xfffff800`73cf47a0
Debug session time: Thu Apr  3 12:17:45.494 2025 (UTC + 3:00)
System Uptime: 0 days 0:01:03.179
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`732b7ce0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9e81`bb65ed30=000000000000007f
7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff8d0caf166140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffff8d0caf166140, The process object that initiated the termination.
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable
*** WARNING: Check Image - Checksum mismatch - Dump: 0xc2ed94, File: 0xc31fe0 - C:\ProgramData\Dbg\sym\ntkrnlmp.exe\783A7A83144f000\ntkrnlmp.exe

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2468

    Key  : Analysis.Elapsed.mSec
    Value: 35471

    Key  : Analysis.IO.Other.Mb
    Value: 32

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 36

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 49089

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.Version.DbgEng
    Value: 10.0.27793.1000

    Key  : Analysis.Version.Description
    Value: 10.2410.02.02 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2410.2.2

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xef

    Key  : Bugcheck.Code.TargetModel
    Value: 0xef

    Key  : CriticalProcessDied.Process
    Value: csrss.exe

    Key  : Dump.Attributes.AsUlong
    Value: 0x30008

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0xEF_csrss.exe_IMAGE_csrss.exe

    Key  : Failure.Hash
    Value: {52d21f5d-7423-c024-462c-4ca2f538aeeb}


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff8d0caf166140

BUGCHECK_P2: 0

BUGCHECK_P3: ffff8d0caf166140

BUGCHECK_P4: 0

FILE_IN_CAB:  040325-11843-01.dmp

DUMP_FILE_ATTRIBUTES: 0x30008
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffff8d0cb263c0c0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

IMAGE_NAME:  csrss.exe

MODULE_NAME: csrss

FAULTING_MODULE: 0000000000000000

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff9e81bb652150 -- (.trap 0xffff9e81bb652150)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000500 rbx=0000000000000000 rcx=00000000000004ff
rdx=00000000000004f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80073481ee6 rsp=ffff9e81bb6522e8 rbp=ffff9e81bb652360
 r8=0000000000000000  r9=000000000010000b r10=ffff9e81bb651000
r11=ffff9e81bb651000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po cy
nt!_chkstk+0x36:
fffff800`73481ee6 45841b          test    byte ptr [r11],r11b ds:ffff9e81`bb651000=??
Resetting default scope

STACK_TEXT:
ffff9e81`bb65ed28 fffff800`7348cee9     : 00000000`0000007f 00000000`00000008 ffff9e81`bb65ee70 ffff9e81`bb651fd0 : nt!KeBugCheckEx
ffff9e81`bb65ed30 fffff800`73486b11     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9e81`bb65ee70 fffff800`732b7d0a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x351
ffff9e81`bb651fd0 fffff800`7348cee9     : 00000000`0000000a ffff9e81`bb651000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx+0x2a
ffff9e81`bb652010 fffff800`734881a8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9e81`bb652150 fffff800`73481ee6     : 00000000`00000000 00000000`00100000 fffff800`7319ae1c 00000000`0010000b : nt!KiPageFault+0x468
ffff9e81`bb6522e8 fffff800`7319ae1c     : 00000000`0010000b 00000000`00000000 00000000`00000081 ffff9d86`889bc4d0 : nt!_chkstk+0x36
ffff9e81`bb652300 fffff800`73030d0f     : 00000000`00000000 00000000`00000000 00000000`c0000001 00000000`00000000 : nt!RtlDispatchException+0x12c
ffff9e81`bb652560 fffff800`73031f32     : 00000000`00000000 fffff800`72e00000 fffff800`73032353 fffff800`72ed90d0 : nt!RtlRaiseStatus+0x4f
ffff9e81`bb652b00 fffff800`732b7b72     : fffff800`72ec330c ffff9e81`00000001 ffff9d86`889bc4d0 ffffffff`ffffffff : nt!RtlUnwindEx+0xe2
ffff9e81`bb653230 fffff800`73482502     : ffff9e81`bb653a50 ffff9e81`bb653830 00000000`00000091 00000000`00000091 : nt!_C_specific_handler+0xe2
ffff9e81`bb6532a0 fffff800`7319afc2     : ffff9e81`bb653330 fffff800`72e00000 fffff800`733700e2 fffff800`72efff44 : nt!RtlpExecuteHandlerForException+0x12
ffff9e81`bb6532d0 fffff800`73030d0f     : 00000000`00000000 00000000`00000000 00000000`c0000001 00000000`00000000 : nt!RtlDispatchException+0x2d2
ffff9e81`bb653a30 fffff800`73031f32     : 00000000`00000000 fffff800`72e00000 fffff800`73032353 fffff800`72ed90d0 : nt!RtlRaiseStatus+0x4f
ffff9e81`bb653fd0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlUnwindEx+0xe2


STACK_COMMAND:  .process /r /p 0xffff8d0caf166140; .thread 0xffff8d0cb263c0c0 ; kb

FAILURE_BUCKET_ID:  0xEF_csrss.exe_IMAGE_csrss.exe

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {52d21f5d-7423-c024-462c-4ca2f538aeeb}

Followup:     MachineOwner
---------

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 43

Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\040425-110843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 26100.1.amd64fre.ge_release.240331-1435
Kernel base = 0xfffff805`e2000000 PsLoadedModuleList = 0xfffff805`e2ef47a0
Debug session time: Fri Apr  4 23:37:26.420 2025 (UTC + 3:00)
System Uptime: 0 days 0:01:26.104
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`e24b7ce0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa309`485b5d00=00000000000000ef
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc90b452f1140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffffc90b452f1140, The process object that initiated the termination.
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0xc2ed94, File: 0xc31fe0 - C:\ProgramData\Dbg\sym\ntkrnlmp.exe\783A7A83144f000\ntkrnlmp.exe

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2500

    Key  : Analysis.Elapsed.mSec
    Value: 29787

    Key  : Analysis.IO.Other.Mb
    Value: 31

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 35

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 46211

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Analysis.Version.DbgEng
    Value: 10.0.27793.1000

    Key  : Analysis.Version.Description
    Value: 10.2410.02.02 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2410.2.2

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xef

    Key  : Bugcheck.Code.TargetModel
    Value: 0xef

    Key  : CriticalProcessDied.ExceptionCode
    Value: 0x4887e0c0

    Key  : CriticalProcessDied.Process
    Value: csrss.exe

    Key  : Failure.Bucket
    Value: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_4887e0c0_nt!PspCatchCriticalBreak

    Key  : Failure.Exception.Code
    Value: 0x4887e0c0

    Key  : Failure.Exception.Record
    Value: 0xc0000005

    Key  : Failure.Hash
    Value: {aa828cf8-01eb-3170-7c0b-6559856680b4}

    Key  : WER.OS.Branch
    Value: ge_release

    Key  : WER.OS.Version
    Value: 10.0.26100.1


BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc90b452f1140

BUGCHECK_P2: 0

BUGCHECK_P3: ffffc90b452f1140

BUGCHECK_P4: 0

FILE_IN_CAB:  040425-110843-01.dmp

FAULTING_THREAD:  ffffc90b4887e0c0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  00000000c0000005 -- (.exr 0xc0000005)
Cannot read Exception record @ 00000000c0000005

ERROR_CODE: (NTSTATUS) 0x4887e0c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
ffffa309`485b5cf8 fffff805`e2753700     : 00000000`000000ef ffffc90b`452f1140 00000000`00000000 ffffc90b`452f1140 : nt!KeBugCheckEx
ffffa309`485b5d00 fffff805`e2954aef     : ffffc90b`452f1140 fffff805`e226a414 00000000`00000001 ffffc90b`452f1140 : nt!PspCatchCriticalBreak+0x128
ffffa309`485b5da0 fffff805`e2954487     : ffffc90b`452f1140 ffffc90b`452f1308 ffffc90b`452f1140 00000000`00000000 : nt!PspTerminateAllThreads+0x27b
ffffa309`485b5e20 fffff805`e2952461     : ffffc90b`452f1140 00000000`00000001 ffffc90b`4887e0c0 ffffc90b`452f1140 : nt!PspTerminateProcess+0xf7
ffffa309`485b5e60 fffff805`e268c558     : ffffc90b`452f1140 ffffc90b`4887e0c0 01dba5a1`31952e15 008d0000`00000007 : nt!NtTerminateProcess+0xd1
ffffa309`485b5ee0 fffff805`e267a9b0     : fffff805`e239c324 ffffa309`485b6ae0 000000c4`466c0f90 ffffa309`485b6720 : nt!KiSystemServiceCopyEnd+0x28
ffffa309`485b6078 fffff805`e239c324     : ffffa309`485b6ae0 000000c4`466c0f90 ffffa309`485b6720 ffffa309`485b60b0 : nt!KiServiceLinkage
ffffa309`485b6080 fffff805`e268d045     : 00000000`c0000005 00000000`00000000 ffffa309`485b6b60 000000c4`466c2078 : nt!KiDispatchException+0xcc4
ffffa309`485b6900 fffff805`e2688182     : 00000000`2a860b5c 000000c4`466c2fd0 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x145
ffffa309`485b6ae0 00007ffe`1bda3ec7     : 00000000`0010000b 00000000`00000010 00007ffe`1bc53a18 000000c4`466c2110 : nt!KiPageFault+0x442
000000c4`466c1118 00000000`0010000b     : 00000000`00000010 00007ffe`1bc53a18 000000c4`466c2110 00000000`00000000 : 0x00007ffe`1bda3ec7
000000c4`466c1120 00000000`00000010     : 00007ffe`1bc53a18 000000c4`466c2110 00000000`00000000 00000000`00000000 : 0x10000b
000000c4`466c1128 00007ffe`1bc53a18     : 000000c4`466c2110 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10
000000c4`466c1130 000000c4`466c2110     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1bc53a18
000000c4`466c1138 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000000c4`466c2110


SYMBOL_NAME:  nt!PspCatchCriticalBreak+128

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.26100.3476

STACK_COMMAND:  .process /r /p 0xffffc90b452f1140; .thread 0xffffc90b4887e0c0 ; kb

BUCKET_ID_FUNC_OFFSET:  128

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_4887e0c0_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.26100.1

BUILDLAB_STR:  ge_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {aa828cf8-01eb-3170-7c0b-6559856680b4}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
@Justpub

 
Merhabalar 2 adet minidump dosyasını analiz etmeye çalıştım fakat yorumlayamadım tecrübeli arkadaşlar yardımcı olabilir mi?
csrss.exe işleminin beklenmedik şekilde sona erdiği ve bunun sistemin çökmesine yol açtığı belirtiliyor.
Bu bir sistem dosyası olduğundan aşağıdaki komutlarla sistemin dosya bütünlüğünü doğrulamanızı öneririm.
DISM /Online /Cleanup-Image /RestoreHealth
Bu komutu yönetici olarak çalıştırdığınız cmd ekranına yapıştırın ve Enter yapın.
İşlem tamamlandıktan sonra bilgisayarınızı yeniden başlatın ve aşağıdaki komutu aynı şekilde cmd ekranına yapıştırarak Enter yapın.
sfc /scannow
Bu işlem de tamamlanınca bilgisayarınızı yeniden başlatın.
Sorun devam ederse disk sağlığını, bellekleri kontrol edin. Buna ek olarak kötü amaçlı yazılım taraması yapın.
Sonuçları bildirirsiniz.
Kolay gelsin.
 
Teşekkürler hocam deniyorum.
 

Bu konuyu görüntüleyen kullanıcılar

Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…