SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80741a38a47, The address that the exception occurred at
Arg3: ffffc5822294f278, Exception Record Address
Arg4: ffffc5822294eac0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 26
Key : Analysis.Elapsed.Sec
Value: 47
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7B84
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4.00
BIOS_DATE: 12/20/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80741a38a47
BUGCHECK_P3: ffffc5822294f278
BUGCHECK_P4: ffffc5822294eac0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
FAULTING_IP:
nt!FsRtlLookupPerStreamContextInternal+67
fffff807`41a38a47 48397010 cmp qword ptr [rax+10h],rsi
EXCEPTION_RECORD: ffffc5822294f278 -- (.exr 0xffffc5822294f278)
ExceptionAddress: fffff80741a38a47 (nt!FsRtlLookupPerStreamContextInternal+0x0000000000000067)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000013
Attempt to read from address 0000000000000013
CONTEXT: ffffc5822294eac0 -- (.cxr 0xffffc5822294eac0)
rax=0000000000000003 rbx=ffffdd81642283e0 rcx=ffffdd8164228418
rdx=ffffdd8164228428 rsi=ffff8881c35a6090 rdi=0000000000000000
rip=fffff80741a38a47 rsp=ffffc5822294f4b0 rbp=0000000000000000
r8=ffffc5822294f4b8 r9=ffff8881c8af60b0 r10=fffff80741a389e0
r11=ffff8881c35da0c0 r12=0000000010000004 r13=ffff8881c8a89010
r14=0000000000000000 r15=ffff8881c8af6090
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050217
nt!FsRtlLookupPerStreamContextInternal+0x67:
fffff807`41a38a47 48397010 cmp qword ptr [rax+10h],rsi ds:002b:00000000`00000013=????????????????
Resetting default scope
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
nt!FsRtlLookupPerStreamContextInternal+67
fffff807`41a38a47 48397010 cmp qword ptr [rax+10h],rsi
BUGCHECK_STR: AV
READ_ADDRESS: fffff80741f713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000013
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000013
ANALYSIS_SESSION_HOST: DESKTOP-I8FA0KP
ANALYSIS_SESSION_TIME: 09-01-2019 00:43:38.0284
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff80744ae7c9c to fffff80741a38a47
STACK_TEXT:
ffffc582`2294f4b0 fffff807`44ae7c9c : ffff8881`cf364af0 ffffc582`2294f5f9 ffff8881`c35a6090 fffff807`41a39118 : nt!FsRtlLookupPerStreamContextInternal+0x67
ffffc582`2294f4e0 fffff807`44ae4ec2 : ffff8881`c35a6090 00000000`00000000 ffff8881`00000000 00000000`00000000 : FLTMGR!FltpGetStreamListCtrl+0x6c
ffffc582`2294f550 fffff807`44ae45a0 : ffffc582`2294f730 00000000`00000000 ffff8881`ca23f002 00000000`00000400 : FLTMGR!FltpPerformPreCallbacks+0x762
ffffc582`2294f660 fffff807`44ae4112 : ffff8881`ca23f010 ffffc582`2294f730 ffff8881`ca23f010 ffffc582`2294f740 : FLTMGR!FltpPassThroughInternal+0x90
ffffc582`2294f690 fffff807`44ae3efe : ffffffff`fffe7960 ffff8881`c3309d60 00000000`00000000 00000000`00000080 : FLTMGR!FltpPassThrough+0x162
ffffc582`2294f710 fffff807`41a31819 : ffff8881`cf364af0 fffff807`41b017e0 00000000`00001395 00000000`00000000 : FLTMGR!FltpDispatch+0x9e
ffffc582`2294f770 fffff807`41fe50fd : ffff8881`cf364af0 ffff8881`c34e6d80 ffff8881`c3309d60 ffff8881`ca23f010 : nt!IofCallDriver+0x59
ffffc582`2294f7b0 fffff807`41ff72e0 : ffffdd81`5a464510 00000000`00000000 ffff8881`c0cff2a0 fffff807`41b070ef : nt!IopDeleteFile+0x12d
ffffc582`2294f830 fffff807`41a38964 : 00000000`00000000 00000000`00000000 ffffdd81`5a464510 ffff8881`cf364af0 : nt!ObpRemoveObjectRoutine+0x80
ffffc582`2294f890 fffff807`41ff9310 : 00000000`00000000 ffff8881`c9a536a0 ffffdd81`5a464510 00000000`00000000 : nt!ObfDereferenceObject+0xa4
ffffc582`2294f8d0 fffff807`41b61a77 : fffff807`00000001 fffff807`41e68340 ffffc582`2294f9a0 ffff8881`c9a536a8 : nt!MiSegmentDelete+0x154
ffffc582`2294f920 fffff807`41b8e429 : 00000000`00000000 fffff807`00000001 00000000`00000000 fffff807`41e68340 : nt!MiProcessDereferenceList+0xc3
ffffc582`2294f9e0 fffff807`41b29e95 : ffff8881`c35da0c0 ffff8881`c35da0c0 00000000`00000080 fffff807`41b8e300 : nt!MiDereferenceSegmentThread+0x129
ffffc582`2294fc10 fffff807`41bc730a : ffffc681`62fc5180 ffff8881`c35da0c0 fffff807`41b29e40 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc582`2294fc60 00000000`00000000 : ffffc582`22950000 ffffc582`2294a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 754bf3051345200530d13794786723fbc9860a50
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7385b6d20c3278137975ed3aa147e70215e582b1
THREAD_SHA1_HASH_MOD: 00bb06696bf1fd4c5451f133a2ff0f3e16179888
FAULT_INSTR_CODE: 10703948
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!FsRtlLookupPerStreamContextInternal+67
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 35707659
IMAGE_VERSION: 10.0.18362.295
STACK_COMMAND: .cxr 0xffffc5822294eac0 ; kb
BUCKET_ID_FUNC_OFFSET: 67
FAILURE_BUCKET_ID: AV_nt!FsRtlLookupPerStreamContextInternal
BUCKET_ID: AV_nt!FsRtlLookupPerStreamContextInternal
PRIMARY_PROBLEM_CLASS: AV_nt!FsRtlLookupPerStreamContextInternal
TARGET_TIME: 2019-08-29T20:06:08.000Z
OSBUILD: 18362
OSSERVICEPACK: 295
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1998-05-31 00:12:57
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: ba30
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!fsrtllookupperstreamcontextinternal
FAILURE_ID_HASH: {b60b3c6e-4cc3-837e-9138-07e53f7b3cd5}
Followup: MachineOwner
---------