SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8014cf03d54, The address that the exception occurred at
Arg3: fffff4810baa53a8, Exception Record Address
Arg4: ffff9501163e0920, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7921
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8014cf03d54
BUGCHECK_P3: fffff4810baa53a8
BUGCHECK_P4: ffff9501163e0920
EXCEPTION_RECORD: fffff4810baa53a8 -- (.exr 0xfffff4810baa53a8)
ExceptionAddress: fffff8014cf03d54 (nt!HalpInterruptSendIpi+0x00000000000000b4)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffff9501163e0920 -- (.cxr 0xffff9501163e0920)
rax=fffff7c200009320 rbx=fffff4810baa56a0 rcx=84da8a4500013c7c
rdx=fffff7c20000d970 rsi=0000000000000000 rdi=fffff4810baa5870
rip=fffff8014cf03d54 rsp=fffff4810baa55e0 rbp=fffff4810baa5918
r8=0000000000000008 r9=0000000000000000 r10=0000000000000fff
r11=fffff4810baa58a0 r12=0000000000000001 r13=0000000000000000
r14=0000000000000001 r15=000000000000002f
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!HalpInterruptSendIpi+0xb4:
fffff801`4cf03d54 8b4114 mov eax,dword ptr [rcx+14h] ds:002b:84da8a45`00013c90=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8014d8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8014d80f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8014d80f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
BAD_STACK_POINTER: ffff9501163e00e8
STACK_TEXT:
fffff481`0baa55e0 fffff801`4ce529b8 : 00000000`00000000 fffff801`4d051d15 00000000`00000000 fffff801`00000001 : nt!HalpInterruptSendIpi+0xb4
fffff481`0baa5850 fffff801`4ce52970 : 00000000`00000000 00000000`00000001 00000000`00000000 ffff9501`15da7180 : nt!HalSendSoftwareInterrupt+0x38
fffff481`0baa58a0 fffff801`4d11a483 : 00000000`00000000 ffffb905`b02aa080 00000000`00000000 00000000`000003c0 : nt!KiSendSoftwareInterrupt+0x18
fffff481`0baa58d0 fffff801`4d11a1e0 : 00000000`00000003 00000000`00000000 00000000`00000000 ffff9501`163c0180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x277
fffff481`0baa5960 fffff801`4d06e1f6 : ffff9501`00000003 00000000`00000008 00000004`0b000000 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x94
fffff481`0baa5990 fffff801`4cee3a6f : ffffb905`00000008 00000000`00000003 fffff481`0baa5b50 00000000`00000000 : nt!KiSwapThread+0x18a1b6
fffff481`0baa5a40 fffff801`4cee3313 : fffff481`0000000b fffff481`00000000 000046e8`00000400 ffffb905`a964e180 : nt!KiCommitThreadWait+0x14f
fffff481`0baa5ae0 fffff801`5bde8eb3 : fffff801`5bde5400 ffffa78f`00000000 fffff801`00000000 fffff801`5bde5400 : nt!KeWaitForSingleObject+0x233
fffff481`0baa5bd0 fffff801`4ce66dd5 : ffffb905`a964e040 ffffffff`fd82c6a0 00000000`00000080 fffff801`5bde8df0 : bam+0x8eb3
fffff481`0baa5c10 fffff801`4cffb4f8 : ffff9501`163c0180 ffffb905`a964e040 fffff801`4ce66d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff481`0baa5c60 00000000`00000000 : fffff481`0baa6000 fffff481`0baa0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: bam+8eb3
MODULE_NAME: bam
IMAGE_NAME: bam.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr 0xffff9501163e0920 ; kb
BUCKET_ID_FUNC_OFFSET: 8eb3
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_bam!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2755dc5e-9f17-e82b-2ea5-20a895fafeb4}
Followup: MachineOwner
---------