下面是死机记录的dmp文件,我分析了他,文件说是ntfs损坏,我不知道到底是哪有问题
Microsoft (R) Windows Debugger Version 10.0.22621.2428 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\012125-8625-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff805`71400000 PsLoadedModuleList = 0xfffff805`720134f0
Debug session time: Tue Jan 21 21:21:14.447 2025 (UTC + 8:00)
System Uptime: 0 days 0:15:10.090
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff805758f3a5d, Address of the instruction which caused the BugCheck
Arg3: fffffd0259770ad0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1125
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4705
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 19979
Key : Analysis.Memory.CommitPeak.Mb
Value: 131
FILE_IN_CAB: 012125-8625-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff805758f3a5d
BUGCHECK_P3: fffffd0259770ad0
BUGCHECK_P4: 0
CONTEXT: fffffd0259770ad0 -- (.cxr 0xfffffd0259770ad0)
rax=fffdad068df34d88 rbx=0000000000000000 rcx=0000000000000233
rdx=fffffd0259771530 rsi=0000000000004a33 rdi=ffffad068cfdcc80
rip=fffff805758f3a5d rsp=fffffd02597714f0 rbp=fffffd0259771d59
r8=000000003594ca33 r9=ffffad068630a1e6 r10=fffff80571620a80
r11=0000000000000104 r12=ffff990b458ba918 r13=0000000000000000
r14=ffff990b3a808540 r15=fffffd0259771af0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
Ntfs!NtfsFindPrefixHashEntry+0x72d:
fffff805`758f3a5d 4c8b6818 mov r13,qword ptr [rax+18h] ds:002b:fffdad06`8df34da0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffffd02`597714f0 fffff805`758f4d76 : ffff990b`458ba918 ffff990b`3a808540 ffffad06`6d821170 00000000`00000001 : Ntfs!NtfsFindPrefixHashEntry+0x72d
fffffd02`59771620 fffff805`758f6839 : ffff990b`458ba918 ffff990b`5bceba90 fffffd02`59771af0 fffffd02`597718f0 : Ntfs!NtfsFindStartingNode+0x886
fffffd02`597716f0 fffff805`758f1c60 : 00000000`00000000 fffffd02`59771b36 fffffd02`59771ba8 ffff990b`3a768d90 : Ntfs!NtfsCommonCreate+0x12a9
fffffd02`597719e0 fffff805`716650d5 : ffff990b`3a807030 ffff990b`5bceba90 fffffd02`59771d00 ffff990b`6e447ce0 : Ntfs!NtfsFsdCreate+0x200
fffffd02`59771c60 fffff805`74b2a1fb : ffff990b`5bceba90 ffff990b`7848b9a0 fffffd02`59771d59 fffff805`74b290c1 : nt!IofCallDriver+0x55
fffffd02`59771ca0 fffff805`74b62003 : fffffd02`59771d50 fffffd02`5976c000 ffff990b`3a768d00 fffff805`71abff73 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
fffffd02`59771d10 fffff805`716650d5 : ffff990b`6e447c00 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x323
fffffd02`59771dc0 fffff805`71abecb3 : 00000000`00000000 fffffd02`597720d0 ffff990b`6e447d78 ffff990b`3a768d90 : nt!IofCallDriver+0x55
fffffd02`59771e00 fffff805`71aca301 : fffffd02`597721f8 ffffad06`6ce51a80 00000000`0000014a fffffd02`597721f0 : nt!IopParseDevice+0x15b3
fffffd02`59771fd0 fffff805`71ac95d2 : ffff990b`68edca01 fffffd02`597721f0 00000000`00000840 ffff990b`2fe4e820 : nt!ObpLookupObjectName+0x7e1
fffffd02`59772160 fffff805`71aace47 : 00000000`00000000 ffff990b`4eb5dae0 00000027`3c97e400 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1f2
fffffd02`59772290 fffff805`71aac319 : 00000027`3c97e3a0 00000000`00100080 00000027`3c97e400 00000027`3c97e3a8 : nt!IopCreateFile+0xb17
fffffd02`59772360 fffff805`7182a508 : 00000000`00000000 00000027`3c97e7e0 000001c1`99fdead0 00000000`00000002 : nt!NtCreateFile+0x79
fffffd02`597723f0 00007ffc`cb870e84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000027`3c97e318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`cb870e84
SYMBOL_NAME: Ntfs!NtfsFindPrefixHashEntry+72d
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.22621.4800
STACK_COMMAND: .cxr 0xfffffd0259770ad0 ; kb
BUCKET_ID_FUNC_OFFSET: 72d
FAILURE_BUCKET_ID: AV_Ntfs!NtfsFindPrefixHashEntry
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5fc38b6f-0bfa-a3d5-4870-f22cae61d2d1}
Followup: MachineOwner
---------