tnryylc
Femtopat
- Katılım
- 22 Aralık 2020
- Mesajlar
- 7
Daha fazla
- Cinsiyet
- Erkek
Merhabalar,
Bilgisayarımda mavi ekran hatası alıyorum ve bir çok şey denememe rağmen çözümü bulamadım. Konu hakkında yardımlarınızı rica ediyorum.
Minidump:
drive.google.com
Bilgisayarımda mavi ekran hatası alıyorum ve bir çok şey denememe rağmen çözümü bulamadım. Konu hakkında yardımlarınızı rica ediyorum.
Minidump:
010621-7125-01.rar

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80125250ca2, The address that the exception occurred at
Arg3: ffff890e80f49b18, Exception Record Address
Arg4: ffff890e80f49350, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2390
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KFGU01Q
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4721
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80125250ca2
BUGCHECK_P3: ffff890e80f49b18
BUGCHECK_P4: ffff890e80f49350
EXCEPTION_RECORD: ffff890e80f49b18 -- (.exr 0xffff890e80f49b18)
ExceptionAddress: fffff80125250ca2 (nt!RtlpHpLfhSlotAllocate+0x0000000000000162)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffff890e80f49350 -- (.cxr 0xffff890e80f49350)
rax=00000000000000d8 rbx=ffffffffffffffff rcx=00000000000000d8
rdx=0000000004592704 rsi=0000000000000140 rdi=ffff51832e3e6000
rip=fffff80125250ca2 rsp=ffff890e80f49d50 rbp=ffff890e80f49e50
r8=000000000000007e r9=fffff80125c16404 r10=0000000000000020
r11=00000000000000d0 r12=0000000000000001 r13=0000000000000020
r14=0000000000000140 r15=ffffd18317008e00
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlpHpLfhSlotAllocate+0x162:
fffff801`25250ca2 0fb75724 movzx edx,word ptr [rdi+24h] ds:002b:ffff5183`2e3e6024=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80125c0f330: Unable to get Flags value from nt!KdVersionBlock
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff890e`80f49d50 fffff801`252501c1 : ffffd183`17002340 ffffd183`17006940 ffffd183`17008e00 00000000`00000020 : nt!RtlpHpLfhSlotAllocate+0x162
ffff890e`80f49ea0 fffff801`2524fedf : 00000000`00000002 ffffd183`2202fd30 ffff890e`6c526d4d ffffd183`2ab27d78 : nt!ExAllocateHeapPool+0x2b1
ffff890e`80f49fe0 fffff801`252a1036 : 00000000`80000000 00000000`00000008 00000000`6c526d4d ffffd183`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffff890e`80f4a030 fffff801`2563e7f8 : 00000000`00000000 00000000`00000004 00000000`00000001 00000000`00000000 : nt!MiAllocatePool+0x86
ffff890e`80f4a080 fffff801`2563e7ac : 00000000`00000000 ffffd183`1aafeca8 00000000`00000000 ffffd183`220fdd30 : nt!MmPrefetchPagesEx+0x40
ffff890e`80f4a0f0 fffff801`284d0bbb : 00000000`00000000 00000000`00000004 00000000`00000001 ffffd183`29253018 : nt!MmPrefetchPages+0xc
ffff890e`80f4a120 fffff801`284cea0d : ffffd183`29253018 ffffd183`2775d460 ffff890e`80f4a401 ffffd183`0000006c : Ntfs!NtfsPrefetchFile+0x43b
ffff890e`80f4a260 fffff801`284ce45d : ffffd183`29253018 00000000`00000001 00000000`00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x28d
ffff890e`80f4a2e0 fffff801`25252f55 : ffffd183`2ac69850 fffff801`216d4b46 ffffd183`2775d460 ffff890e`80f44000 : Ntfs!NtfsFsdFileSystemControl+0x17d
ffff890e`80f4a400 fffff801`216d6ccf : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`259b1019 : nt!IofCallDriver+0x55
ffff890e`80f4a440 fffff801`2170caf4 : ffff890e`80f4a4d0 00000000`00000000 00000000`000000d0 ffffd183`1a49e3c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff890e`80f4a4b0 fffff801`25252f55 : 00000000`0000000a ffffd183`2775d460 00000000`00000002 00000000`00000000 : FLTMGR!FltpFsControl+0x104
ffff890e`80f4a510 fffff801`255fd518 : ffffd183`2775d460 00000000`00000000 00000000`00000000 ffffd183`2dc82340 : nt!IofCallDriver+0x55
ffff890e`80f4a550 fffff801`255fcde5 : 00000000`00090120 ffff890e`80f4a890 00000000`00440005 ffff890e`80f4a890 : nt!IopSynchronousServiceTail+0x1a8
ffff890e`80f4a5f0 fffff801`256c393c : 00000000`00000000 ffffffff`800059f8 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff890e`80f4a730 fffff801`257f18cd : ffffab8b`d24a4310 ffffffff`80005c38 ffff890e`80f4a8b1 ffffab8b`ba28e2e8 : nt!PfSnPrefetchFileMetadata+0xe8
ffff890e`80f4a7d0 fffff801`256397e5 : 00000000`0000006c ffff890e`80f4aa00 ffffab8b`ba2a380c ffffab8b`00000000 : nt!PfSnGetSectionObject+0x1b7e65
ffff890e`80f4a900 fffff801`25225975 : ffffd183`2c8cb540 ffffd183`2c8cb540 ffffd183`176afc80 00000000`00000200 : nt!PfSnPopulateReadList+0x2b5
ffff890e`80f4aa70 fffff801`25317e25 : ffffd183`2c8cb540 00000000`00000080 ffffd183`176b1040 faf8f878`93ada471 : nt!ExpWorkerThread+0x105
ffff890e`80f4ab10 fffff801`253fcdd8 : ffffe480`8eb9e180 ffffd183`2c8cb540 fffff801`25317dd0 ffbd2b02`72488aaa : nt!PspSystemThreadStartup+0x55
ffff890e`80f4ab60 00000000`00000000 : ffff890e`80f4b000 ffff890e`80f44000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlpHpLfhSlotAllocate+162
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffff890e80f49350 ; kb
BUCKET_ID_FUNC_OFFSET: 162
FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSlotAllocate
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dd47d5b7-f5b2-a302-5887-caad23ee7ef4}
Followup: MachineOwner
---------