SYSTEM_THREAD_EXCEPTION_NOT_HANDLED Mavi ekran hatası

tnryylc

Femtopat
Katılım
22 Aralık 2020
Mesajlar
7
Daha fazla  
Cinsiyet
Erkek
Merhabalar,

Bilgisayarımda mavi ekran hatası alıyorum ve bir çok şey denememe rağmen çözümü bulamadım. Konu hakkında yardımlarınızı rica ediyorum.



Minidump:



Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)

This is a very common bugcheck.  Usually the exception address pinpoints

the driver/function that caused the problem. Always note this address

as well as the link date of the driver/image that contains this address.

Some common problems are exception code 0x80000003. This means a hard

coded breakpoint or assertion was hit, but this system was booted

/NODEBUG. This is not supposed to happen as developers should never have

hardcoded breakpoints in retail code, but ...

If this happens, make sure a debugger gets connected, and the

system is booted /DEBUG. This will let us see why this breakpoint is

happening.

Arguments:

Arg1: ffffffffc0000005, The exception code that was not handled

Arg2: fffff80125250ca2, The address that the exception occurred at

Arg3: ffff890e80f49b18, Exception Record Address

Arg4: ffff890e80f49350, Context Record Address



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : AV.Fault

Value: Read



Key : Analysis.CPU.mSec

Value: 2390



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-KFGU01Q



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.mSec

Value: 4721



Key : Analysis.Memory.CommitPeak.Mb

Value: 86



Key : Analysis.System

Value: CreateObject



Key : WER.OS.Branch

Value: vb_release



Key : WER.OS.Timestamp

Value: 2019-12-06T14:06:00Z



Key : WER.OS.Version

Value: 10.0.19041.1





ADDITIONAL_XML: 1



OS_BUILD_LAYERS: 1



BUGCHECK_CODE: 7e



BUGCHECK_P1: ffffffffc0000005



BUGCHECK_P2: fffff80125250ca2



BUGCHECK_P3: ffff890e80f49b18



BUGCHECK_P4: ffff890e80f49350



EXCEPTION_RECORD:  ffff890e80f49b18 -- (.exr 0xffff890e80f49b18)

ExceptionAddress: fffff80125250ca2 (nt!RtlpHpLfhSlotAllocate+0x0000000000000162)

   ExceptionCode: c0000005 (Access violation)

ExceptionFlags: 00000000

NumberParameters: 2

Parameter[0]: 0000000000000000

Parameter[1]: ffffffffffffffff

Attempt to read from address ffffffffffffffff



CONTEXT:  ffff890e80f49350 -- (.cxr 0xffff890e80f49350)

rax=00000000000000d8 rbx=ffffffffffffffff rcx=00000000000000d8

rdx=0000000004592704 rsi=0000000000000140 rdi=ffff51832e3e6000

rip=fffff80125250ca2 rsp=ffff890e80f49d50 rbp=ffff890e80f49e50

r8=000000000000007e r9=fffff80125c16404 r10=0000000000000020

r11=00000000000000d0 r12=0000000000000001 r13=0000000000000020

r14=0000000000000140 r15=ffffd18317008e00

iopl=0 nv up ei pl zr na po nc

cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246

nt!RtlpHpLfhSlotAllocate+0x162:

fffff801`25250ca2 0fb75724 movzx edx,word ptr [rdi+24h] ds:002b:ffff5183`2e3e6024=????

Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: chrome.exe



READ_ADDRESS: Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

fffff80125c0f330: Unable to get Flags value from nt!KdVersionBlock

ffffffffffffffff



ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.



EXCEPTION_CODE_STR: c0000005



EXCEPTION_PARAMETER1: 0000000000000000



EXCEPTION_PARAMETER2: ffffffffffffffff



EXCEPTION_STR: 0xc0000005



STACK_TEXT:

ffff890e`80f49d50 fffff801`252501c1 : ffffd183`17002340 ffffd183`17006940 ffffd183`17008e00 00000000`00000020 : nt!RtlpHpLfhSlotAllocate+0x162

ffff890e`80f49ea0 fffff801`2524fedf : 00000000`00000002 ffffd183`2202fd30 ffff890e`6c526d4d ffffd183`2ab27d78 : nt!ExAllocateHeapPool+0x2b1

ffff890e`80f49fe0 fffff801`252a1036 : 00000000`80000000 00000000`00000008 00000000`6c526d4d ffffd183`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f

ffff890e`80f4a030 fffff801`2563e7f8 : 00000000`00000000 00000000`00000004 00000000`00000001 00000000`00000000 : nt!MiAllocatePool+0x86

ffff890e`80f4a080 fffff801`2563e7ac : 00000000`00000000 ffffd183`1aafeca8 00000000`00000000 ffffd183`220fdd30 : nt!MmPrefetchPagesEx+0x40

ffff890e`80f4a0f0 fffff801`284d0bbb : 00000000`00000000 00000000`00000004 00000000`00000001 ffffd183`29253018 : nt!MmPrefetchPages+0xc

ffff890e`80f4a120 fffff801`284cea0d : ffffd183`29253018 ffffd183`2775d460 ffff890e`80f4a401 ffffd183`0000006c : Ntfs!NtfsPrefetchFile+0x43b

ffff890e`80f4a260 fffff801`284ce45d : ffffd183`29253018 00000000`00000001 00000000`00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x28d

ffff890e`80f4a2e0 fffff801`25252f55 : ffffd183`2ac69850 fffff801`216d4b46 ffffd183`2775d460 ffff890e`80f44000 : Ntfs!NtfsFsdFileSystemControl+0x17d

ffff890e`80f4a400 fffff801`216d6ccf : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`259b1019 : nt!IofCallDriver+0x55

ffff890e`80f4a440 fffff801`2170caf4 : ffff890e`80f4a4d0 00000000`00000000 00000000`000000d0 ffffd183`1a49e3c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f

ffff890e`80f4a4b0 fffff801`25252f55 : 00000000`0000000a ffffd183`2775d460 00000000`00000002 00000000`00000000 : FLTMGR!FltpFsControl+0x104

ffff890e`80f4a510 fffff801`255fd518 : ffffd183`2775d460 00000000`00000000 00000000`00000000 ffffd183`2dc82340 : nt!IofCallDriver+0x55

ffff890e`80f4a550 fffff801`255fcde5 : 00000000`00090120 ffff890e`80f4a890 00000000`00440005 ffff890e`80f4a890 : nt!IopSynchronousServiceTail+0x1a8

ffff890e`80f4a5f0 fffff801`256c393c : 00000000`00000000 ffffffff`800059f8 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5

ffff890e`80f4a730 fffff801`257f18cd : ffffab8b`d24a4310 ffffffff`80005c38 ffff890e`80f4a8b1 ffffab8b`ba28e2e8 : nt!PfSnPrefetchFileMetadata+0xe8

ffff890e`80f4a7d0 fffff801`256397e5 : 00000000`0000006c ffff890e`80f4aa00 ffffab8b`ba2a380c ffffab8b`00000000 : nt!PfSnGetSectionObject+0x1b7e65

ffff890e`80f4a900 fffff801`25225975 : ffffd183`2c8cb540 ffffd183`2c8cb540 ffffd183`176afc80 00000000`00000200 : nt!PfSnPopulateReadList+0x2b5

ffff890e`80f4aa70 fffff801`25317e25 : ffffd183`2c8cb540 00000000`00000080 ffffd183`176b1040 faf8f878`93ada471 : nt!ExpWorkerThread+0x105

ffff890e`80f4ab10 fffff801`253fcdd8 : ffffe480`8eb9e180 ffffd183`2c8cb540 fffff801`25317dd0 ffbd2b02`72488aaa : nt!PspSystemThreadStartup+0x55

ffff890e`80f4ab60 00000000`00000000 : ffff890e`80f4b000 ffff890e`80f44000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: nt!RtlpHpLfhSlotAllocate+162



MODULE_NAME: nt



IMAGE_NAME:  ntkrnlmp.exe



IMAGE_VERSION: 10.0.19041.685



STACK_COMMAND: .cxr 0xffff890e80f49350 ; kb



BUCKET_ID_FUNC_OFFSET: 162



FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSlotAllocate



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {dd47d5b7-f5b2-a302-5887-caad23ee7ef4}



Followup: MachineOwner

---------
 
1) XMP modu açıksa kapatın ve sonrasında Memtest86 testi uygulayın. Rehberi aşağıda mevcut.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

2) HD Tune ile Quick Scan tiki kapalı halde bad sector testi yapın ve diskin S.M.A.R.T. verilerini paylaşın.
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…