SYSTEM_SERVICE_EXCEPTION hatası nedir?

İşletim sistemi
Windows 11

ayb123

Hectopat
Katılım
11 Aralık 2020
Mesajlar
49
Daha fazla  
Cinsiyet
Erkek
RAM
3200 MHz
Ekran kartı
Asus Geforce GTX 1650 Phoenix
Anakart
Asrock B450M
İşlemci
AMD Ryzen 5 3600
Kod:
*******************************************************************************
*
Bugcheck Analysis *
*

*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff800a7188916, Address of the instruction which caused the BugCheck.
Arg3: ffff848769a83080, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1750.

 Key : Analysis.Elapsed.mSec
 Value: 3694.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 1

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 500.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5201.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 112.

 Key : Analysis.Version.DbgEng
 Value: 10.0.27829.1001

 Key : Analysis.Version.Description
 Value: 10.2503.24.01 amd64fre.

 Key : Analysis.Version.Ext
 Value: 1.2503.24.1

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x3bdd.

 Key : Bugcheck.Code.TargetModel
 Value: 0x3b.

 Key : Dump.Attributes.AsUlong
 Value: 0x21808.

 Key : Dump.Attributes.DiagDataWrittenToHeader
 Value: 1

 Key : Dump.Attributes.ErrorCode
 Value: 0x0.

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : Dump.Attributes.LastLine
 Value: Dump completed successfully.

 Key : Dump.Attributes.ProgressPercentage
 Value: 0

 Key : Failure.Bucket
 Value: AV_nt!RtlpHpLfhOwnerGetSubsegment

 Key : Failure.Exception.IP.Address
 Value: 0xfffff800a7188916.

 Key : Failure.Exception.IP.Module
 Value: nt.

 Key : Failure.Exception.IP.Offset
 Value: 0x388916.

 Key : Failure.Hash
 Value: {b3e1430d-911b-9f64-07db-de7d2fef686f}

 Key : Hypervisor.Enlightenments.ValueHex
 Value: 0x7497cf94.

 Key : Hypervisor.Flags.AnyHypervisorPresent
 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened
 Value: 1

 Key : Hypervisor.Flags.ApicVirtualizationAvailable
 Value: 0

 Key : Hypervisor.Flags.AsyncMemoryHint
 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested
 Value: 0

 Key : Hypervisor.Flags.CpuManager
 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi
 Value: 0

 Key : Hypervisor.Flags.DynamicCpuDisabled
 Value: 1

 Key : Hypervisor.Flags.Epf
 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks
 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable
 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber
 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl
 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush
 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing
 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone
 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos
 Value: 0

 Key : Hypervisor.Flags.RootScheduler
 Value: 0

 Key : Hypervisor.Flags.SynicAvailable
 Value: 1

 Key : Hypervisor.Flags.UseQpcBias
 Value: 0

 Key : Hypervisor.Flags.Value
 Value: 38408431.

 Key : Hypervisor.Flags.ValueHex
 Value: 0x24a10ef.

 Key : Hypervisor.Flags.VpAssistPage
 Value: 1

 Key : Hypervisor.Flags.VsmAvailable
 Value: 1

 Key : Hypervisor.RootFlags.AccessStats
 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor
 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading
 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync
 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV
 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt
 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.Nested
 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor
 Value: 1

 Key : Hypervisor.RootFlags.Value
 Value: 1015.

 Key : Hypervisor.RootFlags.ValueHex
 Value: 0x3f7.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff800a7188916.

BUGCHECK_P3: ffff848769a83080.

BUGCHECK_P4: 0

FILE_IN_CAB: 072425-15734-01.dmp

DUMP_FILE_ATTRIBUTES: 0x21808.
 Kernel Generated Triage Dump.

FAULTING_THREAD: ffff8d862cce2080.

CONTEXT: ffff848769a83080 -- (.cxr 0xffff848769a83080)
rax=7fffd10d47009058 rbx=ffffd10d6f9b7000 rcx=0000000000000000
rdx=ffffd10d6fe02000 rsi=ffffd10d47009040 rdi=ffffd10d47009058
rip=fffff800a7188916 rsp=ffff848769a83ad0 rbp=ffff848769a83b10
 r8=ffff848769a83af0 r9=0000000000000000 r10=0000000000000000
r11=ffffd10d47000380 r12=ffffd10d47000440 r13=0000000000000001
r14=ffffd10d47000440 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlpHpLfhOwnerGetSubsegment+0x10e:
fffff800`a7188916 483918 cmp qword ptr [rax],rbx ds:002b:7fffd10d`47009058=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: SDXHelper.exe

STACK_TEXT:
ffff8487`69a83ad0 fffff800`a703c634 : ffffd10d`6f9b7000 0000000a`0003003f ffffd10d`47000380 ffffd10d`4a4134b8 : nt!RtlpHpLfhOwnerGetSubsegment+0x10e
ffff8487`69a83b20 fffff800`a703bdb6 : ffff8487`6b0bd0ff ffffd10d`47000440 00000000`00000070 00000000`00000002 : nt!RtlpHpLfhSlotAllocateSlow+0x1bc
ffff8487`69a83bd0 fffff800`a703a50a : ffffd10d`47000000 00000000`00000000 00000000`00000000 0000000a`0003003f : nt!RtlpHpAllocateHeap+0x2f6
ffff8487`69a83c50 fffff800`a7039f92 : 00000000`00004000 ffff8487`69a83ee0 00000000`6563744e 00000000`00000000 : nt!ExAllocateHeapPool+0x50a
ffff8487`69a83d80 fffff800`a7930189 : 00000000`00000100 ffff8d86`2b2df010 00000000`00000000 fffff800`38a58721 : nt!ExpAllocatePoolWithTagFromNode+0x52
ffff8487`69a83dc0 fffff800`a79300b7 : ffff8d86`20948400 00000000`00000401 00000000`00000000 00000000`00000000 : nt!ExAllocatePool2+0x99
ffff8487`69a83e70 fffff800`a7211cdd : fffff800`39d97800 fffff800`39d0aa19 00000000`00000001 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa7
ffff8487`69a83eb0 fffff800`a71ba212 : ffff8d86`30020a98 00000000`00000000 ffff8d86`20c391b0 00000000`00000000 : nt!ExAllocatePoolEx+0xd
ffff8487`69a83ee0 fffff800`39e70dc4 : ffff8d86`30020a98 ffff8d86`2b2df000 00020000`000267f7 fffff800`a7930189 : nt!ExAllocateFromLookasideListEx+0x72
ffff8487`69a83f20 fffff800`a703523e : ffff8d86`2ae21010 ffff8d86`208e7010 ffff8d86`2ae21078 ffff8d86`208e7a80 : Ntfs!NtfsFsdClose+0x984
ffff8487`69a84090 fffff800`38a56afc : ffff8d86`2ae21010 ffff8d86`2ae21010 ffff8d86`1c100000 00000000`00000000 : nt!IofCallDriver+0xbe
ffff8487`69a840d0 fffff800`38a55c19 : ffff8487`69a841d0 ffff8d86`20b7c260 00000000`00000000 ffff8d86`2b2df440 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x23c
ffff8487`69a84170 fffff800`a703523e : 00000000`00000000 ffff8d86`3266ade0 ffff8d86`20c1bd60 00000000`00000000 : FLTMGR!FltpDispatch+0x109
ffff8487`69a84210 fffff800`a765b349 : ffff8d86`20c39030 ffff8d86`20c1bd60 ffff8487`69a84880 ffff8d86`3266ade0 : nt!IofCallDriver+0xbe
ffff8487`69a84250 fffff800`a762deac : 00000000`00000000 ffff8d86`3266ade0 ffff8d86`3266adb0 00000000`00000000 : nt!IopDeleteFile+0x139
ffff8487`69a842e0 fffff800`a70eb61c : 00000000`00000000 00000000`00000000 ffff8487`69a84620 ffff8d86`3266ade0 : nt!ObpRemoveObjectRoutine+0xfc
ffff8487`69a84340 fffff800`a77584bd : 00000000`00000000 00000000`00000000 ffffd10d`472e1245 00000000`00000000 : nt!ObfDereferenceObject+0x7c
ffff8487`69a84380 fffff800`a7653c80 : 00000000`00000000 ffffd10d`472e12c0 00000000`00000000 ffff8487`69a84768 : nt!IopParseDevice+0xe9d
ffff8487`69a84520 fffff800`a7651c71 : ffff8d86`33fa5201 ffff8487`69a84768 ffff8d86`00000040 ffff8d86`1c7c5360 : nt!ObpLookupObjectName+0xcf0
ffff8487`69a846e0 fffff800`a77562a7 : 00000000`00000000 ffff8d86`1c7c5360 00000000`00000001 ffff8d86`3a7cc080 : nt!ObOpenObjectByNameEx+0x201
ffff8487`69a84830 fffff800`a7485f58 : 00000039`f808b173 000000fd`6ccff030 ffff8d86`2cce2080 0000022c`1b14c6f0 : nt!NtQueryFullAttributesFile+0x1c7
ffff8487`69a84ae0 00007ffc`10ae14f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fd`6ccfed58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`10ae14f4

SYMBOL_NAME: nt!RtlpHpLfhOwnerGetSubsegment+10e

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.26100.1330

STACK_COMMAND: .cxr 0xffff848769a83080 ; kb.

BUCKET_ID_FUNC_OFFSET: 10e.

FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhOwnerGetSubsegment

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b3e1430d-911b-9f64-07db-de7d2fef686f}

Followup: MachineOwner.
---------

Ne yapmam gerekiyor? Minidump okumayı bilmiyorum. 1 senedir mavi ekran almayan bilgisayar son 1 ayda çok fazla mavi ekran almaya başladı.
 
@ayb123

 
@ayb123

Drive ye yüklemeye çalıştığımda yönetici izni lazım diyor bu hali WinDbg tarafından çözülü hali iş görmez mi

@ayb123

 
@ayb123 Aygıt Yöneticisi'nde ünlem işaretli donanım var mı bakın.

BIOS sürümünüz 2020 yılına ait, güncelleyin.


 
@ayb123 Aygıt Yöneticisi'nde ünlem işaretli donanım var mı bakın.

BIOS sürümünüz 2020 yılına ait, güncelleyin.


Aman hocam bios güncellemesi bir şey yapmaz değil mi şimdi çöp etmeyelim bilgisayarı
 

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı