[CODE title="hata dokumanı"]
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80103dc17bf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000010, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26437
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th2_release
Key : WER.OS.Timestamp
Value: 2015-10-29T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10586.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80103dc17bf
BUGCHECK_P3: 0
BUGCHECK_P4: 10
READ_ADDRESS: fffff801c9205520: Unable to get MiVisibleState
fffff801c914bdc0: Unable to get Flags value from nt!KdVersionBlock
0000000000000010
EXCEPTION_PARAMETER2: 0000000000000010
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffffd001af3379b0 -- (.trap 0xffffd001af3379b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff801c90c4320
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80103dc17bf rsp=ffffd001af337b40 rbp=0000000000000000
r8=fffff801c90d7140 r9=0000000000000033 r10=ffffb001263810a0
r11=0000000000010000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
NTFS+0xd17bf:
fffff801`03dc17bf 49397d10 cmp qword ptr [r13+10h],rdi ds:00000000`00000010=????????????????
Resetting default scope
STACK_TEXT:
ffffd001`af3370e8 fffff801`c8ff9eb0 : 00000000`0000001e ffffffff`c0000005 fffff801`03dc17bf 00000000`00000000 : nt!KeBugCheckEx
ffffd001`af3370f0 fffff801`c8fd3bc2 : ffffb001`00000018 ffffe001`065e4840 00000000`00000000 ffffb001`2fd71568 : nt! ?? ::FNODOBFM::`string'+0x225b0
ffffd001`af3377d0 fffff801`c8fd22a1 : ffffc000`405e6018 00000000`00000000 ffffc000`405e6018 fffff801`000000de : nt!KiExceptionDispatch+0xc2
ffffd001`af3379b0 fffff801`03dc17bf : fffff801`03d41470 ffffb001`26381d48 00000000`00082000 fffff801`c90d7140 : nt!KiPageFault+0x221
ffffd001`af337b40 fffff801`03dc11ef : ffffe001`047c7938 ffffc000`402bac80 ffffc000`40489620 ffffc000`00000000 : NTFS+0xd17bf
ffffd001`af337bf0 fffff801`03dbde93 : ffffe001`047c7938 00000000`00000011 00000000`00000000 ffffb001`2de12520 : NTFS+0xd11ef
ffffd001`af337ca0 fffff801`03db746e : ffffe001`047c7938 ffffc000`3fd5a7f2 ffffd001`aec372e0 ffffd001`aec37240 : NTFS+0xcde93
ffffd001`af337d20 fffff801`03db5e8d : ffffe001`047c7938 ffffe001`05009010 ffffd001`aec37240 ffffe001`04259001 : NTFS+0xc746e
ffffd001`af337f50 fffff801`c8fcbb47 : ffffd001`aec371d0 00000000`00000000 00000000`00000000 00000000`00000000 : NTFS+0xc5e8d
ffffd001`af337f80 fffff801`c8fcbb0d : 00000000`00006000 00000000`00000012 ffffd001`af338000 fffff801`c8efcea1 : nt!KxSwitchKernelStackCallout+0x27
ffffd001`aec37010 fffff801`c8efcea1 : ffffe001`00000006 00000000`00006000 ffffc000`403290b8 fffff801`035380c3 : nt!KiSwitchKernelStackContinue
ffffd001`aec37030 fffff801`c8efcc16 : 00000000`00000009 00000000`00006000 00000000`00000001 ffffd001`aec370b0 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x131
ffffd001`aec370b0 fffff801`c8efcadf : 00000000`00000000 ffffd001`aec371d0 00000000`00000001 ffffe001`05009010 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
ffffd001`aec37110 fffff801`03dba8d9 : 00000000`00000000 00000000`00000000 ffffe001`047c7938 ffffe001`05009010 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
ffffd001`aec37160 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NTFS+0xca8d9
SYMBOL_NAME: NTFS+d17bf
MODULE_NAME: NTFS
IMAGE_NAME: NTFS.sys
IMAGE_VERSION: 10.0.10586.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d17bf
FAILURE_BUCKET_ID: 0x1E_c0000005_R_NTFS!unknown_function
OS_VERSION: 10.0.10586.0
BUILDLAB_STR: th2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {893cb134-0bc3-f682-658e-bcaa36d03a7e}
Followup: MachineOwner
---------
[/CODE]
[CODE title="hata dokumanı"]
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800898a09e6, Address of the instruction which caused the bugcheck
Arg3: ffffd000e6c62cd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1842
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 40967
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th2_release
Key : WER.OS.Timestamp
Value: 2015-10-29T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10586.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800898a09e6
BUGCHECK_P3: ffffd000e6c62cd0
BUGCHECK_P4: 0
CONTEXT: ffffd000e6c62cd0 -- (.cxr 0xffffd000e6c62cd0)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000060
rdx=0000000000000001 rsi=ffffe0001ff93680 rdi=ffffe00021655910
rip=fffff800898a09e6 rsp=ffffd000e6c636f0 rbp=ffffe00021ac5040
r8=ffffc00067ea6450 r9=0000000000000000 r10=7fffc00067ea6450
r11=7ffffffffffffffc r12=0000000000020000 r13=ffffe00021764890
r14=ffffd000e6c63950 r15=ffffc00067ea6460
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!AlpcpDispatchNewMessage+0x2a6:
fffff800`898a09e6 816328fffeffff and dword ptr [rbx+28h],0FFFFFEFFh ds:002b:00000000`00000028=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MpCmdRun.exe
STACK_TEXT:
ffffd000`e6c636f0 fffff800`898a0029 : ffffe000`00020000 ffffe000`21ac5040 ffffe000`21764890 00000000`00000000 : nt!AlpcpDispatchNewMessage+0x2a6
ffffd000`e6c63750 fffff800`8989db9d : ffffd000`e6c63800 000001f9`d0792e10 000001f9`d0720ec8 fffff800`8981b201 : nt!AlpcpSendMessage+0x4c9
ffffd000`e6c63870 fffff800`8989e7a5 : ffffe000`21764890 ffffd000`00020000 000001f9`d0792e10 000001f9`d0720ec8 : nt!AlpcpProcessSynchronousRequest+0x2fd
ffffd000`e6c639d0 fffff800`895d47a3 : ffffd000`e6c63aa8 ffffe000`21ac5040 ffffd000`e6c63b80 00000084`dd5fe7f8 : nt!NtAlpcSendWaitReceivePort+0x235
ffffd000`e6c63a90 00007fff`68e05e44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000084`dd5fe7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`68e05e44
SYMBOL_NAME: nt!AlpcpDispatchNewMessage+2a6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.10586.0
STACK_COMMAND: .cxr 0xffffd000e6c62cd0 ; kb
BUCKET_ID_FUNC_OFFSET: 2a6
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!AlpcpDispatchNewMessage
OS_VERSION: 10.0.10586.0
BUILDLAB_STR: th2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {be599996-652a-7ddd-ec8b-26771c6d62cb}
Followup: MachineOwner
---------
[/CODE]
[CODE title="hata dokumanı"]
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80076a56122, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for EhStorClass.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 24013
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th2_release
Key : WER.OS.Timestamp
Value: 2015-10-29T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10586.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80076a56122
READ_ADDRESS: fffff803f3b85520: Unable to get MiVisibleState
fffff803f3acbdc0: Unable to get Flags value from nt!KdVersionBlock
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd000f20541c0 -- (.trap 0xffffd000f20541c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0000066b010
rdx=ffffe00001d836f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80076a56122 rsp=ffffd000f2054350 rbp=ffffd000f2054400
r8=ffffe00002ddc018 r9=0000000000001000 r10=ffffe00001d83798
r11=ffffe00001d8372c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
stornvme!SglToPrp+0x8e:
fffff800`76a56122 3930 cmp dword ptr [rax],esi ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffffd000`f2054078 fffff803`f3953ae9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`f2054080 fffff803`f39522c7 : ffffe000`04592620 ffff5a31`ca733d03 ffffe000`04592620 ffffd000`f0814520 : nt!KiBugCheckDispatch+0x69
ffffd000`f20541c0 fffff800`76a56122 : ffffe000`0066b010 fffff800`76a57ec7 ffffe000`01d836f0 00000000`00000200 : nt!KiPageFault+0x247
ffffd000`f2054350 fffff800`76a58b63 : ffffe000`0066b010 ffffe000`01d836f0 ffffe000`01d836f0 ffffe000`0066b010 : stornvme!SglToPrp+0x8e
ffffd000`f20543b0 fffff800`76a521a1 : ffffe000`01638100 ffffe000`0000000a ffffe000`01d836f0 00000000`00000000 : stornvme!ScsiToNVMe+0x273
ffffd000`f2054400 fffff800`76a75520 : ffffe000`016381a0 00000000`002a0000 ffffd000`f2054480 ffffe000`016381a0 : stornvme!NVMeHwBuildIo+0x261
ffffd000`f2054440 fffff800`76a75302 : ffffe000`016381a0 fffff800`76a752c0 ffffe000`02dda010 00000000`00000000 : storport!RaidAdapterPostScatterGatherExecute+0x1f0
ffffd000`f2054510 fffff803`f3fe6f2a : fffff800`76a752c0 ffffe000`02dda180 00000000`00000000 fffff803`f3b1bac8 : storport!RaidpAdapterContinueScatterGather+0x42
ffffd000`f2054540 fffff803`f3fe6e5f : ffffe000`02dda180 ffffe000`01638050 ffffe000`00004000 00000000`00000000 : hal!HalEnumerateProcessors+0x236a
ffffd000`f20545c0 fffff803`f3fe6cc3 : ffffe000`02dda010 ffffe000`02913550 00000000`00000000 ffffe000`016381a0 : hal!HalEnumerateProcessors+0x229f
ffffd000`f2054630 fffff800`76a74d26 : ffffe000`01d836f0 ffffe000`02913550 ffffe000`01b8c010 ffffe000`016381a0 : hal!HalEnumerateProcessors+0x2103
ffffd000`f20546c0 fffff800`76a73b88 : ffffe000`00000001 ffffd000`00000001 ffffd000`f20547d8 00000000`00000001 : storport!RaUnitStartIo+0x266
ffffd000`f2054780 fffff800`76a7346f : ffffe000`01a9ac10 ffffe000`01a9ad00 ffffe000`00000000 ffffe000`01d83702 : storport!RaidStartIoPacket+0x3c8
ffffd000`f2054860 fffff800`76a7303a : ffffe000`02f10e10 fffff800`765519fb 00000000`00004000 00000000`00000000 : storport!RaUnitScsiIrp+0x3ef
ffffd000`f2054900 fffff800`76b2601c : 00000000`00000000 ffffe000`01a9ac10 00000000`00000000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a
ffffd000`f2054940 00000000`00000000 : ffffe000`01a9ac10 00000000`00000000 00000000`00000000 00000000`00000000 : EhStorClass+0x601c
SYMBOL_NAME: stornvme!SglToPrp+8e
MODULE_NAME: stornvme
IMAGE_NAME: stornvme.sys
IMAGE_VERSION: 10.0.10586.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8e
FAILURE_BUCKET_ID: AV_stornvme!SglToPrp
OS_VERSION: 10.0.10586.0
BUILDLAB_STR: th2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c64caf4d-b890-81c9-147d-97c4619f9b74}
Followup: MachineOwner
---------
[/CODE]
[CODE title="hata dokumanı"]
Unknown bugcheck code (a0000006)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000040
Arg2: 0000000000000004
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1953
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 158751
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th2_release_sec
Key : WER.OS.Timestamp
Value: 2017-09-13T18:48:00Z
Key : WER.OS.Version
Value: 10.0.10586.1176
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a0000006
BUGCHECK_P1: 40
BUGCHECK_P2: 4
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd000`236dc508 fffff801`e1f75b3e : 00000000`a0000006 00000000`00000040 00000000`00000004 00000000`00000000 : nt!KeBugCheckEx
ffffd000`236dc510 00000000`a0000006 : 00000000`00000040 00000000`00000004 00000000`00000000 00000000`00000000 : amdkmdag+0x95b3e
ffffd000`236dc518 00000000`00000040 : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : 0xa0000006
ffffd000`236dc520 00000000`00000004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000004 : 0x40
ffffd000`236dc528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffa5c8`4ac54f41 : 0x4
SYMBOL_NAME: amdkmdag+95b3e
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 95b3e
FAILURE_BUCKET_ID: 0xA0000006_amdkmdag!unknown_function
OS_VERSION: 10.0.10586.1176
BUILDLAB_STR: th2_release_sec
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a7790927-5260-c9ed-5ec4-1542e9ce59c9}
Followup: MachineOwner
---------
[/CODE]
[CODE title="hata dokumanı"]
Unknown bugcheck code (a0000006)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000040
Arg2: 0000000000000004
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9AAJGT7
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 153667
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th2_release
Key : WER.OS.Timestamp
Value: 2015-10-29T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10586.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a0000006
BUGCHECK_P1: 40
BUGCHECK_P2: 4
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd000`20f25508 fffff801`12c25b3e : 00000000`a0000006 00000000`00000040 00000000`00000004 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20f25510 00000000`a0000006 : 00000000`00000040 00000000`00000004 00000000`00000000 00000000`00000000 : amdkmdag+0x95b3e
ffffd000`20f25518 00000000`00000040 : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : 0xa0000006
ffffd000`20f25520 00000000`00000004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000004 : 0x40
ffffd000`20f25528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000004 ffff25aa`ff9a598d : 0x4
SYMBOL_NAME: amdkmdag+95b3e
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 95b3e
FAILURE_BUCKET_ID: 0xA0000006_amdkmdag!unknown_function
OS_VERSION: 10.0.10586.0
BUILDLAB_STR: th2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a7790927-5260-c9ed-5ec4-1542e9ce59c9}
Followup: MachineOwner
---------
[/CODE]