ARKADAŞLAR MAVİ EKRAN HATASI ALIYORUM CRİTİCAL_PROCESS_DİED HATASI LÜTFEN YARDIM EDEBİLİR MİSİNİZ MİNİDUMP ŞEYSİNİ TEXT OLARAK ÇIKARTTIM BUYRUN ANLAYAN VARSA Bİ EL ATSIN LÜTFENN Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\pitbu\Desktop\112522-12515-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 8.1 Kernel Version 9600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 9600.20666.amd64fre.winblue_ltsb_escrow.221017-1717 Machine Name: Kernel base = 0xfffff801`77687000 PsLoadedModuleList = 0xfffff801`7794d5d0 Debug session time: Fri Nov 25 21:19:34.965 2022 (UTC + 3:00) System Uptime: 0 days 16:51:50.668 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ............. Loading User Symbols Loading unloaded module list ............................ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`777c63c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`4ff6cd90=000000000000007a 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_DATA_INPAGE_ERROR (7a) The requested page of kernel data could not be read in. Typically caused by a bad block in the paging file or disk controller error. Also see KERNEL_STACK_INPAGE_ERROR. If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185, it means the disk subsystem has experienced a failure. If the error status is 0xC000009A, then it means the request failed because a filesystem failed to make forward progress. Arguments: Arg1: fffff6e000c12560, lock type that was held (value 1,2,3, or PTE address) Arg2: ffffffffc00000c0, error status (normally i/o status code) Arg3: 000020017e498880, current process (virtual address for lock type 3, or PTE) Arg4: ffffc001824ac018, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address) Debugging Details: ------------------ GetUlongPtrFromAddress: unable to read from fffff801779d7308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4233 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 41701 Key : Analysis.IO.Other.Mb Value: 10 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 15 Key : Analysis.Init.CPU.mSec Value: 1608 Key : Analysis.Init.Elapsed.mSec Value: 103908 Key : Analysis.Memory.CommitPeak.Mb Value: 78 Key : Bugcheck.Code.DumpHeader Value: 0x7a Key : Bugcheck.Code.Register Value: 0x7a Key : WER.OS.Branch Value: winblue_ltsb_escrow Key : WER.OS.Timestamp Value: 2022-10-17T17:17:00Z Key : WER.OS.Version Value: 8.1.9600.20666 FILE_IN_CAB: 112522-12515-01.dmp BUGCHECK_CODE: 7a BUGCHECK_P1: fffff6e000c12560 BUGCHECK_P2: ffffffffc00000c0 BUGCHECK_P3: 20017e498880 BUGCHECK_P4: ffffc001824ac018 ERROR_CODE: (NTSTATUS) 0xc00000c0 - Bu ayg t, yok. CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe TRAP_FRAME: ffffd0014ff6d040 -- (.trap 0xffffd0014ff6d040) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffe0006d8c43a0 rbx=0000000000000000 rcx=00000000ffffffff rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8017770bef2 rsp=ffffd0014ff6d1d0 rbp=ffffc001824ac000 r8=0000000000000000 r9=00000000000002f8 r10=ffffe00062d06e40 r11=ffffd0014ff6d230 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!MI_LOCK_RELOCATIONS_EXCLUSIVE+0x32: fffff801`7770bef2 f0480fba2f00 lock bts qword ptr [rdi],0 ds:00000000`00000000=???????????????? Resetting default scope STACK_TEXT: ffffd001`4ff6cd88 fffff801`7776dbf2 : 00000000`0000007a fffff6e0`00c12560 ffffffff`c00000c0 00002001`7e498880 : nt!KeBugCheckEx ffffd001`4ff6cd90 fffff801`77859708 : 00000000`00000002 ffffd001`4ff6cef8 fffff801`779cfdc0 ffffd001`00000000 : nt!MiWaitForInPageComplete+0x722 ffffd001`4ff6ce80 fffff801`777092a2 : 00000000`c0033333 00000000`00000000 ffffd001`4ff6d040 ffffc001`824ac018 : nt!MiIssueHardFault+0x330 ffffd001`4ff6cf40 fffff801`777d5497 : ffffe000`6d8c4080 ffffe000`687ad800 ffffe000`77312e00 ffffe000`77357210 : nt!MmAccessFault+0x6f2 ffffd001`4ff6d040 fffff801`7770bef2 : ffffc001`824ac000 ffffc001`824ac018 ffffc001`83b3aa50 ffffe000`61eeb8e0 : nt!KiPageFault+0x317 ffffd001`4ff6d1d0 fffff801`77a62028 : ffffe000`61eeb8e0 00000000`00000000 ffffc001`824ac000 00000000`00000000 : nt!MI_LOCK_RELOCATIONS_EXCLUSIVE+0x32 ffffd001`4ff6d200 fffff801`77b11830 : 00000000`00000002 00000000`00000004 ffffd001`4ff6d360 ffffe000`61eeb8e0 : nt!MiRelocateImageAgain+0x58 ffffd001`4ff6d260 fffff801`77a2d340 : ffffd001`4ff6d4b0 ffffd001`4ff6d558 ffffc001`00000000 ffffd001`4ff6d4a8 : nt!MiCreateSection+0x8c0 ffffd001`4ff6d450 fffff801`77a6b4c7 : 00000000`00000001 00000000`11000000 00000006`00008ad8 ffffffff`800001d4 : nt!NtCreateSection+0x19c ffffd001`4ff6d4e0 fffff801`77a6af17 : 00000000`11000000 ffffe000`77312e30 00000000`00000000 ffffe000`6d8c4001 : nt!PfpFileBuildReadSupport+0x1a7 ffffd001`4ff6d5e0 fffff801`77a6f916 : ffffd001`00000000 00000000`00000010 ffffd001`00000000 00000000`00000000 : nt!PfpPrefetchFilesTrickle+0x123 ffffd001`4ff6d6d0 fffff801`77a6fbb6 : ffffc001`883f7000 ffffc001`883f7000 ffffd001`4ff6d8f0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x2ba ffffd001`4ff6d840 fffff801`77a6ee64 : 00000000`00000001 00000000`00000001 ffffc001`883f7000 ffffe000`6e62d670 : nt!PfpPrefetchRequest+0x11e ffffd001`4ff6d8c0 fffff801`77a6e624 : fffff680`2bb0f860 00000000`00000000 00000000`00000000 00000000`00000001 : nt!PfSetSuperfetchInformation+0x13c ffffd001`4ff6d9a0 fffff801`777d7f13 : ffffe000`6d8c4080 000000c7`2bfbc1f0 00000000`00000001 00000000`00000000 : nt!NtSetSystemInformation+0x1dc ffffd001`4ff6dc00 00007ffa`9bca1a5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 000000c7`2bb0f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9bca1a5a SYMBOL_NAME: nt!MiWaitForInPageComplete+722 MODULE_NAME: nt IMAGE_VERSION: 6.3.9600.20666 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 722 FAILURE_BUCKET_ID: 0x7a_c00000c0_nt!MiWaitForInPageComplete OS_VERSION: 8.1.9600.20666 BUILDLAB_STR: winblue_ltsb_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7d19656d-a91b-a228-4ebb-5edd525642eb} Followup: MachineOwner |
Bildirim