Hocam şu anda bilgisayarda değilim. Ama minidump hata kodunu paylaşabilir iseniz yardımcı olabilirim. Ya da yeni konu açabilirsiniz.
Tam olarak hangi kısımda kod? Dosyayı açtım windbg ile ama kodu bulamadım maalesef
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff91067fe61240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4030
Key : Analysis.Elapsed.mSec
Value: 5397
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 514
Key : Analysis.Init.Elapsed.mSec
Value: 24585
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: 8071a080
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8071a080_nt!PspCatchCriticalBreak
Key : Failure.Hash
Value: {203af72f-8d4f-9537-ccf3-77118397b94b}
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff91067fe61240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 111923-7703-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: ffff91067fe61980 -- (.exr 0xffff91067fe61980)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x8071a080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
fffffd8a`4ca28d88 fffff807`5430e5a2 : 00000000`000000ef ffff9106`7fe61240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd8a`4ca28d90 fffff807`5421613f : 00000000`00000001 fffff807`53ccd1f1 00000000`00000002 fffff807`53ccd11b : nt!PspCatchCriticalBreak+0x10e
fffffd8a`4ca28e30 fffff807`54082110 : ffff9106`00000000 00000000`00000000 ffff9106`7fe61240 ffff9106`7fe61678 : nt!PspTerminateAllThreads+0x15dfaf
fffffd8a`4ca28ea0 fffff807`54081f0c : ffff9106`7fe61240 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffffd8a`4ca28ee0 fffff807`53e10ef8 : ffff9106`7fe61240 ffff9106`8071a080 fffffd8a`4ca28fd0 fffff807`5412fa92 : nt!NtTerminateProcess+0x9c
fffffd8a`4ca28f50 fffff807`53e02220 : fffff807`53e54cd5 fffffd8a`4ca29a58 fffffd8a`4ca29a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffffd8a`4ca290e8 fffff807`53e54cd5 : fffffd8a`4ca29a58 fffffd8a`4ca29a58 ffffffff`ffffffff 00007ffc`e8fa9ed0 : nt!KiServiceLinkage
fffffd8a`4ca290f0 fffff807`53e1186c : ffff9106`7fe61980 fffff807`53cb28de 00000000`00002000 fffffd8a`4ca29b00 : nt!KiDispatchException+0x18b975
fffffd8a`4ca29920 fffff807`53e0d2bd : 00007ffc`ed881408 0000022a`a831cb10 fffffd8a`4ca29b18 ffffffff`fd050f80 : nt!KiExceptionDispatch+0x12c
fffffd8a`4ca29b00 00007ffc`ed860ee8 : 00007ffc`e8e80000 00007ffc`e8ece3ac 00007ffc`e8ece3ac 00007ffc`ed881d83 : nt!KiPageFault+0x43d
000000cf`a1e016b0 00007ffc`e8e80000 : 00007ffc`e8ece3ac 00007ffc`e8ece3ac 00007ffc`ed881d83 000000cf`a1e017f0 : 0x00007ffc`ed860ee8
000000cf`a1e016b8 00007ffc`e8ece3ac : 00007ffc`e8ece3ac 00007ffc`ed881d83 000000cf`a1e017f0 00000000`00000000 : 0x00007ffc`e8e80000
000000cf`a1e016c0 00007ffc`e8ece3ac : 00007ffc`ed881d83 000000cf`a1e017f0 00000000`00000000 000000cf`a1e01748 : 0x00007ffc`e8ece3ac
000000cf`a1e016c8 00007ffc`ed881d83 : 000000cf`a1e017f0 00000000`00000000 000000cf`a1e01748 000000cf`a1e01788 : 0x00007ffc`e8ece3ac
000000cf`a1e016d0 000000cf`a1e017f0 : 00000000`00000000 000000cf`a1e01748 000000cf`a1e01788 00007ffc`e8ebad59 : 0x00007ffc`ed881d83
000000cf`a1e016d8 00000000`00000000 : 000000cf`a1e01748 000000cf`a1e01788 00007ffc`e8ebad59 00000000`00000001 : 0x000000cf`a1e017f0
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3570
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8071a080_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {203af72f-8d4f-9537-ccf3-77118397b94b}
Followup: MachineOwner
---------