MACHINE_CHECK_EXCEPTION (9c)
A fatal Machine Check Exception has occurred.
KeBugCheckEx parameters;
x86 Processors
If the processor has ONLY MCE feature available (For example Intel
Pentium), the parameters are:
1 - Low 32 bits of P5_MC_TYPE MSR
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of P5_MC_ADDR MSR
4 - Low 32 bits of P5_MC_ADDR MSR
If the processor also has MCA feature available (For example Intel
Pentium Pro), the parameters are:
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
IA64 Processors
1 - Bugcheck Type
1 - MCA_ASSERT
2 - MCA_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing MCA.
3 - MCA_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
4 - MCA_FATAL
FW reported a fatal MCA.
5 - MCA_NONFATAL
SAL reported a recoverable MCA and we don't support currently
support recovery or SAL generated an MCA and then couldn't
produce an error record.
0xB - INIT_ASSERT
0xC - INIT_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
0xD - INIT_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
0xE - INIT_FATAL
Not used.
2 - Address of log
3 - Size of log
4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
AMD64 Processors
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
Arguments:
Arg1: 0000000080000001
Arg2: fffff8051e097b10
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x9C_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: setup.exe
CURRENT_IRQL: f
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80519ab52a9 to fffff805199f3ea0
STACK_TEXT:
fffff805`1e097ac8 fffff805`19ab52a9 : 00000000`0000009c 00000000`80000001 fffff805`1e097b10 00000000`00000000 : nt!KeBugCheckEx
fffff805`1e097ad0 fffff805`19ab5704 : 00000000`00000004 fffff805`1e097e50 00000000`00000000 00000000`00000004 : nt!HalpMcaReportError+0x149
fffff805`1e097c40 fffff805`19ab491b : 00000000`00000000 00000000`80000001 fffff805`1e097ed0 00000000`00000000 : nt!HalpMceHandlerWithRendezvous+0x11c
fffff805`1e097c70 fffff805`19ab7165 : ffffaa8b`240f5740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpHandleMachineCheck+0x5f
fffff805`1e097ca0 fffff805`19b0c999 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalHandleMcheck+0x35
fffff805`1e097cd0 fffff805`19a02ffa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiHandleMcheck+0x9
fffff805`1e097d00 fffff805`19a02cb7 : fffff805`00000000 fffff805`19a02bec 00000000`0010bd87 00000000`00000000 : nt!KxMcheckAbort+0x7a
fffff805`1e097e40 fffff805`19921140 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff880`059dd8f0 : nt!KiMcheckAbort+0x277
ffffeb8d`592fed20 fffff805`19920f58 : 00000000`00000000 ffffeb8d`592fef00 00000000`00000000 00000000`00000000 : nt!KeFlushMultipleRangeTb+0x160
ffffeb8d`592fedc0 fffff805`19928c33 : fffff805`1a24ef40 fffff880`00000000 fffff805`00000000 ffffeb8d`592fee48 : nt!MiFlushTbList+0x88
ffffeb8d`592fedf0 fffff805`198b27f2 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc0fc`028c8f98 : nt!MiTerminateWsleCluster+0x363
ffffeb8d`592fefa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedPtes+0x1f2
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff805198f15ac-fffff805198f15b0 5 bytes - nt!MiResolveDemandZeroFault+36c
[ d7 be 7d fb f6:17 38 70 e0 c0 ]
fffff805198f15f9 - nt!MiResolveDemandZeroFault+3b9 (+0x4d)
[ f6:c0 ]
fffff805199963ae-fffff805199963b1 4 bytes - nt!MiFreeUltraMapping+32 (+0xa4db5)
[ a0 7d fb f6:20 70 e0 c0 ]
10 errors : !nt (fffff805198f15ac-fffff805199963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80681cfa320
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x133
PROCESS_NAME: PathOfExile_x6
CURRENT_IRQL: d
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff806814795de to fffff806813f3ea0
STACK_TEXT:
fffff806`86c7be18 fffff806`814795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`81cfa320 : nt!KeBugCheckEx
fffff806`86c7be20 fffff806`8130518d : 000000c7`4927a088 00000000`00000000 fffff806`86c74300 fffff806`7e971180 : nt!KeAccumulateTicks+0x17118e
fffff806`86c7be80 fffff806`8130500a : fffff806`81cf3840 fffff806`86c74310 00000000`000053f1 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff806`86c7bf30 fffff806`81280795 : fffff806`81cf3840 00000000`00000000 00000000`00000000 ffffe253`5613a082 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`86c7bf60 fffff806`813f594a : fffff806`86c74310 fffff806`81cf3840 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`86c7bfb0 fffff806`813f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`86c74290 fffff806`9b695788 : fffff806`9b032f57 00000000`00000000 ffffd303`94bd87e0 ffffd303`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`86c74428 fffff806`9b032f57 : 00000000`00000000 ffffd303`94bd87e0 ffffd303`00000001 00000000`00000000 : nvlddmkm+0x765788
fffff806`86c74430 00000000`00000000 : ffffd303`94bd87e0 ffffd303`00000001 00000000`00000000 00000000`00000000 : nvlddmkm+0x102f57
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff8067fd8cd05-fffff8067fd8cd06 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
[ 48 ff:4c 8b ]
fffff8067fd8cd0c-fffff8067fd8cd10 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
[ 0f 1f 44 00 00:e8 8f fd 4a 01 ]
fffff8067fd8cd1a-fffff8067fd8cd1b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
[ 48 ff:4c 8b ]
fffff8067fd8cd21-fffff8067fd8cd25 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
[ 0f 1f 44 00 00:e8 3a 3c 55 01 ]
fffff8067fd8cd6a-fffff8067fd8cd6b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
[ 48 ff:4c 8b ]
fffff8067fd8cd71-fffff8067fd8cd77 7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 3a 34 55 01 4c 8b ]
fffff8067fd8cd7d-fffff8067fd8cd81 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
[ 0f 1f 44 00 00:e8 0e 0f 48 01 ]
28 errors : !FLTMGR (fffff8067fd8cd05-fffff8067fd8cd81)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803474fa320
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x133
PROCESS_NAME: PathOfExile_x6
CURRENT_IRQL: d
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80346c795de to fffff80346bf3ea0
STACK_TEXT:
fffff803`4a47be18 fffff803`46c795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`474fa320 : nt!KeBugCheckEx
fffff803`4a47be20 fffff803`46b0518d : 000000b6`a62ebdc4 00000000`00000000 fffff803`4a473e00 fffff803`41fdf180 : nt!KeAccumulateTicks+0x17118e
fffff803`4a47be80 fffff803`46b0500a : fffff803`474f3840 fffff803`4a473e90 fffff803`00004cca 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff803`4a47bf30 fffff803`46a80795 : fffff803`474f3840 fffff803`4a47bf40 00000000`00000010 ffff14ba`95fddb0c : nt!HalpTimerClockIpiRoutine+0x1a
fffff803`4a47bf60 fffff803`46bf594a : fffff803`4a473e90 fffff803`474f3840 00000000`0000000e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`4a47bfb0 fffff803`46bf5eb7 : fffff803`4a473f50 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff803`4a473e10 fffff803`5ee3e47f : 00000000`00000002 fffff803`46aea558 00000000`00000020 fffff803`5f6089f4 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff803`4a473fa0 00000000`00000002 : fffff803`46aea558 00000000`00000020 fffff803`5f6089f4 00000000`00000002 : nvlddmkm+0x11e47f
fffff803`4a473fa8 fffff803`46aea558 : 00000000`00000020 fffff803`5f6089f4 00000000`00000002 fffff803`5ee3e64b : 0x2
fffff803`4a473fb0 fffff803`4a474100 : 00000000`00000002 fffff803`5f6087f0 00000000`0000001f fffff803`5ee23e47 : nt!RtlpGetStackLimits+0x28
fffff803`4a473fe0 00000000`00000002 : fffff803`5f6087f0 00000000`0000001f fffff803`5ee23e47 00000000`00000002 : 0xfffff803`4a474100
fffff803`4a473fe8 fffff803`5f6087f0 : 00000000`0000001f fffff803`5ee23e47 00000000`00000002 00000000`0000001f : 0x2
fffff803`4a473ff0 00000000`0000001f : fffff803`5ee23e47 00000000`00000002 00000000`0000001f 00000000`00000019 : nvlddmkm+0x8e87f0
fffff803`4a473ff8 fffff803`5ee23e47 : 00000000`00000002 00000000`0000001f 00000000`00000019 00000000`00000004 : 0x1f
fffff803`4a474000 00000000`00000002 : 00000000`0000001f 00000000`00000019 00000000`00000004 000623cb`5f608180 : nvlddmkm+0x103e47
fffff803`4a474008 00000000`0000001f : 00000000`00000019 00000000`00000004 000623cb`5f608180 fffff803`5f6089f4 : 0x2
fffff803`4a474010 00000000`00000019 : 00000000`00000004 000623cb`5f608180 fffff803`5f6089f4 5f608180`00000005 : 0x1f
fffff803`4a474018 00000000`00000004 : 000623cb`5f608180 fffff803`5f6089f4 5f608180`00000005 000000ff`000000ff : 0x19
fffff803`4a474020 000623cb`5f608180 : fffff803`5f6089f4 5f608180`00000005 000000ff`000000ff 5f608180`00000040 : 0x4
fffff803`4a474028 fffff803`5f6089f4 : 5f608180`00000005 000000ff`000000ff 5f608180`00000040 c01401aa`a039c965 : 0x000623cb`5f608180
fffff803`4a474030 5f608180`00000005 : 000000ff`000000ff 5f608180`00000040 c01401aa`a039c965 00000000`00000000 : nvlddmkm+0x8e89f4
fffff803`4a474038 000000ff`000000ff : 5f608180`00000040 c01401aa`a039c965 00000000`00000000 fffff803`4a46e000 : 0x5f608180`00000005
fffff803`4a474040 5f608180`00000040 : c01401aa`a039c965 00000000`00000000 fffff803`4a46e000 00000000`00000000 : 0x000000ff`000000ff
fffff803`4a474048 c01401aa`a039c965 : 00000000`00000000 fffff803`4a46e000 00000000`00000000 fffff803`4a475000 : 0x5f608180`00000040
fffff803`4a474050 00000000`00000000 : fffff803`4a46e000 00000000`00000000 fffff803`4a475000 00000000`0000000f : 0xc01401aa`a039c965
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff803433fcd05-fffff803433fcd06 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
[ 48 ff:4c 8b ]
fffff803433fcd0c-fffff803433fcd10 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
[ 0f 1f 44 00 00:e8 8f fd 63 03 ]
fffff803433fcd1a-fffff803433fcd1b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
[ 48 ff:4c 8b ]
fffff803433fcd21-fffff803433fcd25 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
[ 0f 1f 44 00 00:e8 3a 3c 6e 03 ]
fffff803433fcd6a-fffff803433fcd6b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
[ 48 ff:4c 8b ]
fffff803433fcd71-fffff803433fcd77 7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 3a 34 6e 03 4c 8b ]
fffff803433fcd7d-fffff803433fcd81 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
[ 0f 1f 44 00 00:e8 0e 0f 61 03 ]
28 errors : !FLTMGR (fffff803433fcd05-fffff803433fcd81)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff804816fa320
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x133
PROCESS_NAME: System
CURRENT_IRQL: d
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80480e795de to fffff80480df3ea0
STACK_TEXT:
fffff804`83a7be18 fffff804`80e795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`816fa320 : nt!KeBugCheckEx
fffff804`83a7be20 fffff804`80d0518d : 000000b6`ba42734e 00000000`00000000 fffff804`83a74100 fffff804`7b6df180 : nt!KeAccumulateTicks+0x17118e
fffff804`83a7be80 fffff804`80d0500a : fffff804`816f3840 fffff804`83a74110 fffff804`00004cce 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff804`83a7bf30 fffff804`80c80795 : fffff804`816f3840 00000000`00000000 00000000`00000000 ffff04e2`aad27621 : nt!HalpTimerClockIpiRoutine+0x1a
fffff804`83a7bf60 fffff804`80df594a : fffff804`83a74110 fffff804`816f3840 fffff804`83a742c0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`83a7bfb0 fffff804`80df5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`83a74090 fffff804`9867379c : 00000000`00000003 fffff804`9868e47f 00000000`00000003 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`83a74220 00000000`00000003 : fffff804`9868e47f 00000000`00000003 00000000`00000000 00000000`00000a22 : nvlddmkm+0x10379c
fffff804`83a74228 fffff804`9868e47f : 00000000`00000003 00000000`00000000 00000000`00000a22 fffff804`98e589f4 : 0x3
fffff804`83a74230 00000000`00000003 : 00000000`00000000 00000000`00000a22 fffff804`98e589f4 00000000`0000000e : nvlddmkm+0x11e47f
fffff804`83a74238 00000000`00000000 : 00000000`00000a22 fffff804`98e589f4 00000000`0000000e fffff804`9867407d : 0x3
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff8047cafcd05-fffff8047cafcd06 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
[ 48 ff:4c 8b ]
fffff8047cafcd0c-fffff8047cafcd10 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
[ 0f 1f 44 00 00:e8 8f fd 13 04 ]
fffff8047cafcd1a-fffff8047cafcd1b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
[ 48 ff:4c 8b ]
fffff8047cafcd21-fffff8047cafcd25 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
[ 0f 1f 44 00 00:e8 3a 3c 1e 04 ]
fffff8047cafcd6a-fffff8047cafcd6b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
[ 48 ff:4c 8b ]
fffff8047cafcd71-fffff8047cafcd77 7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 3a 34 1e 04 4c 8b ]
fffff8047cafcd7d-fffff8047cafcd81 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
[ 0f 1f 44 00 00:e8 0e 0f 11 04 ]
28 errors : !FLTMGR (fffff8047cafcd05-fffff8047cafcd81)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff805458cc960, Address of the instruction which caused the bugcheck
Arg3: ffffde09c5f76720, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!RtlpHpVsChunkSplit+590
fffff805`458cc960 8b4bf8 mov ecx,dword ptr [rbx-8]
CONTEXT: ffffde09c5f76720 -- (.cxr 0xffffde09c5f76720;r)
rax=ffa3d608ff6198bc rbx=ffa3d608ff6198bc rcx=000000009d818225
rdx=00000000001a0000 rsi=00000000000000e1 rdi=ffff9c89feca2e40
rip=fffff805458cc960 rsp=ffffde09c5f77120 rbp=ffffde09c5f77198
r8=1818c8ba62c337d8 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=000000000000001a r13=ffff9c89feca2000
r14=ffff9c89f2200280 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!RtlpHpVsChunkSplit+0x590:
fffff805`458cc960 8b4bf8 mov ecx,dword ptr [rbx-8] ds:002b:ffa3d608`ff6198b4=????????
Last set context:
rax=ffa3d608ff6198bc rbx=ffa3d608ff6198bc rcx=000000009d818225
rdx=00000000001a0000 rsi=00000000000000e1 rdi=ffff9c89feca2e40
rip=fffff805458cc960 rsp=ffffde09c5f77120 rbp=ffffde09c5f77198
r8=1818c8ba62c337d8 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=000000000000001a r13=ffff9c89feca2000
r14=ffff9c89f2200280 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!RtlpHpVsChunkSplit+0x590:
fffff805`458cc960 8b4bf8 mov ecx,dword ptr [rbx-8] ds:002b:ffa3d608`ff6198b4=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff805458cc1fa to fffff805458cc960
STACK_TEXT:
ffffde09`c5f77120 fffff805`458cc1fa : 0000001a`0000001a ffff9c89`feca2030 00000000`0000001a 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x590
ffffde09`c5f771e0 fffff805`458cf778 : 00000000`00000000 00000000`00000e00 ffffde09`c5f77321 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffde09`c5f77240 fffff805`458ceebf : ffffdf0e`00000000 00000000`00000008 00000000`74536d4d 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffde09`c5f77380 fffff805`45944916 : 00000000`80000000 00000000`00000db8 00000000`74536d4d ffffde09`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffde09`c5f773d0 fffff805`45952177 : 00000000`00000000 ffffde09`c5f77490 00000000`000001b7 00000000`00000000 : nt!MiAllocatePool+0x86
ffffde09`c5f77420 fffff805`45944082 : ffffffff`ffffffff ffffffff`ffffffff ffffdf0e`e413cdf0 00000000`00000000 : nt!MiCreatePrototypePtes+0x53
ffffde09`c5f774d0 fffff805`45ce5ce7 : ffffdf0e`00000001 00000000`000001b7 00000000`00000000 ffffde09`000001b7 : nt!MiAddViewsForSection+0x3c2
ffffde09`c5f775d0 fffff805`45ce57cc : 00000000`00000001 00000000`00000000 ffffde09`c5f778a8 ffffde09`c5f778b8 : nt!MiMapViewOfDataSection+0x197
ffffde09`c5f77700 fffff805`45ce48a9 : 00000000`00000000 ffffde09`c5f77a80 00000018`16477e20 00000000`00000000 : nt!MiMapViewOfSection+0x34c
ffffde09`c5f77850 fffff805`45a058b5 : ffffdf0e`e83c8080 00000018`16477de8 00000000`00000000 00000000`00000000 : nt!NtMapViewOfSection+0x159
ffffde09`c5f77990 00007ffe`6a88c2c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000018`16477dc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6a88c2c4
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff80544135ed8-fffff80544135ed9 2 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1b8
[ 48 ff:4c 8b ]
fffff80544135edf-fffff80544135ee3 5 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1bf (+0x07)
[ 0f 1f 44 00 00:e8 3c 66 74 01 ]
fffff80544135ef1-fffff80544135ef2 2 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1d1 (+0x12)
[ 48 ff:4c 8b ]
fffff80544135ef8-fffff80544135efe 7 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1d8 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 73 94 7a 01 4c 8b ]
fffff80544135f04-fffff80544135f08 5 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1e4 (+0x0c)
[ 0f 1f 44 00 00:e8 87 7d 6d 01 ]
fffff80544135f45-fffff80544135f46 2 bytes - FLTMGR!FltpPerformPreCallbacksWorker+225 (+0x41)
[ 48 ff:4c 8b ]
fffff80544135f4c-fffff80544135f50 5 bytes - FLTMGR!FltpPerformPreCallbacksWorker+22c (+0x07)
[ 0f 1f 44 00 00:e8 6f 60 70 01 ]
fffff8054413b9fd-fffff8054413b9fe 2 bytes - FLTMGR!FltpSynchronizedOperationCompletion+d (+0x5ab1)
[ 48 ff:4c 8b ]
fffff8054413ba04-fffff8054413ba08 5 bytes - FLTMGR!FltpSynchronizedOperationCompletion+14 (+0x07)
[ 0f 1f 44 00 00:e8 f7 d7 78 01 ]
fffff8054413ba2b-fffff8054413ba2c 2 bytes - FLTMGR!FltReleasePushLockEx+b (+0x27)
[ 48 ff:4c 8b ]
fffff8054413ba32-fffff8054413ba38 7 bytes - FLTMGR!FltReleasePushLockEx+12 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 19 42 7a 01 4c 8b ]
fffff8054413ba3e-fffff8054413ba42 5 bytes - FLTMGR!FltReleasePushLockEx+1e (+0x0c)
[ 0f 1f 44 00 00:e8 2d 47 7a 01 ]
fffff8054416cd05-fffff8054416cd06 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
[ 48 ff:4c 8b ]
fffff8054416cd0c-fffff8054416cd10 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
[ 0f 1f 44 00 00:e8 8f fd 6c 01 ]
fffff8054416cd1a-fffff8054416cd1b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
[ 48 ff:4c 8b ]
fffff8054416cd21-fffff8054416cd25 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
[ 0f 1f 44 00 00:e8 3a 3c 77 01 ]
fffff8054416cd6a-fffff8054416cd6b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
[ 48 ff:4c 8b ]
fffff8054416cd71-fffff8054416cd77 7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 3a 34 77 01 4c 8b ]
fffff8054416cd7d-fffff8054416cd81 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
[ 0f 1f 44 00 00:e8 0e 0f 6a 01 ]
77 errors : !FLTMGR (fffff80544135ed8-fffff8054416cd81)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffde09c5f76720 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------