Neler Yeni

Mavi ekran hatası almaya başladım?

Ryulancex

80+
Katılım
30 Temmuz 2024
Mesajlar
8
Dahası  
Reaksiyon skoru
2
İsim
Burak bora
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42

Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\083124-4468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff803`2b400000 PsLoadedModuleList = 0xfffff803`2c013510
Debug session time: Sat Aug 31 11:14:55.672 2024 (UTC + 3:00)
System Uptime: 0 days 2:31:01.265
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000d7`fd24a018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2b815fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff50a`8ca4ed00=00000000000000ef
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff800f0616a040, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: ffff800f0616a040, The process object that initiated the termination.
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2406

Key : Analysis.Elapsed.mSec
Value: 4498

Key : Analysis.IO.Other.Mb
Value: 11

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 12

Key : Analysis.Init.CPU.mSec
Value: 218

Key : Analysis.Init.Elapsed.mSec
Value: 17188

Key : Analysis.Memory.CommitPeak.Mb
Value: 86

Key : Bugcheck.Code.LegacyAPI
Value: 0xef

Key : Bugcheck.Code.TargetModel
Value: 0xef

Key : CriticalProcessDied.ExceptionCode
Value: 9c8c5c0

Key : CriticalProcessDied.Process
Value: smss.exe

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: 0xEF_smss.exe_BUGCHECK_CRITICAL_PROCESS_9c8c5c0_nt!PspCatchCriticalBreak

Key : Failure.Hash
Value: {18cab759-bc5c-9e3b-2959-8e1a29a94949}


BUGCHECK_CODE: ef

BUGCHECK_P1: ffff800f0616a040

BUGCHECK_P2: 0

BUGCHECK_P3: ffff800f0616a040

BUGCHECK_P4: 0

FILE_IN_CAB: 083124-4468-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

FAULTING_THREAD: ffff800f09c8c5c0

PROCESS_NAME: smss.exe

CRITICAL_PROCESS: smss.exe

EXCEPTION_RECORD: fffff50a8ca4f910 -- (.exr 0xfffff50a8ca4f910)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x9c8c5c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

EXCEPTION_STR: 0x0

STACK_TEXT:
fffff50a`8ca4ecf8 fffff803`2bdb0bd9 : 00000000`000000ef ffff800f`0616a040 00000000`00000000 ffff800f`0616a040 : nt!KeBugCheckEx
fffff50a`8ca4ed00 fffff803`2bd02f0b : ffff800f`0616a040 fffff803`2b755dbd 00000000`00000000 fffff803`2b7556ff : nt!PspCatchCriticalBreak+0x119
fffff50a`8ca4ed90 fffff803`2bbdc21f : ffff800f`0616a040 00000000`c0000409 ffff800f`0616a040 00000000`00000001 : nt!PspTerminateAllThreads+0x12782f
fffff50a`8ca4ee00 fffff803`2bbdc341 : ffffffff`ffffffff ffff800f`0616a040 ffff800f`09c8c5c0 ffff800f`0616a040 : nt!PspTerminateProcess+0xe7
fffff50a`8ca4ee40 fffff803`2b82b608 : fffff50a`00000278 ffff800f`09c8c5c0 ffff800f`0616a040 fffff803`2bd367b7 : nt!NtTerminateProcess+0xb1
fffff50a`8ca4eec0 fffff803`2b81ba90 : fffff803`2b8d283d ffffffff`ffffffff fffff50a`8ca4faa0 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
fffff50a`8ca4f058 fffff803`2b8d283d : ffffffff`ffffffff fffff50a`8ca4faa0 00000000`00000001 fffff50a`8ca4f090 : nt!KiServiceLinkage
fffff50a`8ca4f060 fffff803`2b82c506 : fffff50a`8ca4f910 fffff803`2b7431eb ffff800f`0616a6c0 ffffcf3f`fc614498 : nt!KiDispatchException+0x1700fd
fffff50a`8ca4f8c0 fffff803`2b82a1db : ffff800f`09c8c5c0 ffff800f`061a3d10 000000d7`fd4ff6c0 ffff800f`00000000 : nt!KiFastFailDispatch+0xc6
fffff50a`8ca4faa0 00007ff8`c27b8a88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x35b
000000d7`fd4fe590 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c27b8a88


SYMBOL_NAME: nt!PspCatchCriticalBreak+119

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.4111

STACK_COMMAND: .process /r /p 0xffff800f0616a040; .thread 0xffff800f09c8c5c0 ; kb

BUCKET_ID_FUNC_OFFSET: 119

FAILURE_BUCKET_ID: 0xEF_smss.exe_BUGCHECK_CRITICAL_PROCESS_9c8c5c0_nt!PspCatchCriticalBreak

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {18cab759-bc5c-9e3b-2959-8e1a29a94949}

Followup: MachineOwner



Kusura bakmayın bu hata nedir bilen arkadaşlar yardımcı olabilirmi ?
 
Yeni mesajlar Yeni Konu Aç      

SON KONULAR

Forum istatistikleri

Konular
993,217
Mesajlar
8,958,877
Üyeler
157,043
Son üye
xiekx
Top Bottom