*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011f3becab, The address that the exception occurred at
Arg3: ffffc10000460258, Exception Record Address
Arg4: ffffc1000045fa90, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1869
Key : Analysis.Init.CPU.mSec
Value: 46
Key : Analysis.Init.Elapsed.mSec
Value: 8778
Key : Analysis.Memory.CommitPeak.Mb
Value: 150
Key : Bugcheck.Code.DumpHeader
Value: 0x1000007e
Key : Bugcheck.Code.Register
Value: 0xb26283f2
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092522-36921-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8011f3becab
BUGCHECK_P3: ffffc10000460258
BUGCHECK_P4: ffffc1000045fa90
EXCEPTION_RECORD: ffffc10000460258 -- (.exr 0xffffc10000460258)
ExceptionAddress: fffff8011f3becab (Ntfs!NtfsFindPrefixHashEntry+0x000000000000033b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: ffffc1000045fa90 -- (.cxr 0xffffc1000045fa90)
rax=0000000000000000 rbx=ffff9881c88f1180 rcx=ffffc308b26283f2
rdx=000000000000001a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011f3becab rsp=ffffc10000460490 rbp=0000000000000008
r8=0000000000000000 r9=0000000000000002 r10=ffff9881cf153a28
r11=ffffc10000460460 r12=0000000000000009 r13=00000000000025ac
r14=ffffc10000460a30 r15=00000000000001ac
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
Ntfs!NtfsFindPrefixHashEntry+0x33b:
fffff801`1f3becab c88b4424 enter 448Bh,24h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
READ_ADDRESS: fffff8011aefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffc100`00460490 fffff801`1f3bf55c : ffff9881`cf153a28 ffff9881`c88f24f0 ffffc308`a6c03800 00000000`00000001 : Ntfs!NtfsFindPrefixHashEntry+0x33b
ffffc100`00460550 fffff801`1f3c0600 : ffff9881`cf153a28 ffff9881`cf1ac010 ffff9881`ce3be750 ffffc100`004607f0 : Ntfs!NtfsFindStartingNode+0x25c
ffffc100`00460640 fffff801`1f3bbe9b : ffff9881`cf1ac010 ffffc100`00460a30 ffff9881`cf1ac010 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
ffffc100`00460920 fffff801`1a42a6b5 : ffff9881`c88f1030 ffff9881`cf1ac010 ffffc100`00460c00 ffff9881`cf856e80 : Ntfs!NtfsFsdCreate+0x1db
ffffc100`00460ba0 fffff801`1e8170cf : 00000000`00000001 ffffc100`00460c90 ffffc100`00460c99 fffff801`1e815f3a : nt!IofCallDriver+0x55
ffffc100`00460be0 fffff801`1e849f54 : ffffc100`00460c90 ffff9881`cf856ed8 ffff9881`c88d6a00 ffff9881`c88d6a00 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffc100`00460c50 fffff801`1a42a6b5 : 00000000`00000001 ffff9881`c88b3060 00000000`00000060 ffff9881`d024bde8 : FLTMGR!FltpCreate+0x324
ffffc100`00460d00 fffff801`1a42bcb4 : 00000000`00000003 ffff9881`cf1ac010 ffff9881`6d4e6f49 fffff801`1a5487c2 : nt!IofCallDriver+0x55
ffffc100`00460d40 fffff801`1a815f5d : ffffc100`00461000 ffff9881`c88b3060 ffff9881`cf856f18 fffff801`00000000 : nt!IoCallDriverWithTracing+0x34
ffffc100`00460d90 fffff801`1a8f1257 : ffff9881`c88d6a00 ffffc308`a5e01440 ffff9881`cfab2520 00000000`00120000 : nt!IopParseDevice+0x117d
ffffc100`00460f00 fffff801`1a7ff2fe : fffff801`1a8f1190 ffffc100`00461070 ffff9881`cfab2520 ffff9881`cf85a9b0 : nt!IopParseFile+0xc7
ffffc100`00460f70 fffff801`1a828b2a : ffff9881`cfab2500 ffffc100`004611d8 00000000`00000240 ffff9881`c6cff560 : nt!ObpLookupObjectName+0x3fe
ffffc100`00461140 fffff801`1a872d5f : 00000000`00000000 ffffc100`004617c0 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffffc100`00461270 fffff801`1a87281d : ffffc100`00461688 00000000`00000000 ffffc100`004617c0 ffffc100`004616e0 : nt!IopCreateFile+0x40f
ffffc100`00461310 fffff801`1e84b7d3 : 00000000`00000000 ffffc100`00461469 ffff9881`d024bde8 00000000`00000000 : nt!IoCreateFileEx+0x11d
ffffc100`004613b0 fffff801`1e84ba37 : 00000000`00000000 ffffc100`004616f0 ffffc100`004617c0 fffff801`1a498fdf : FLTMGR!FltpCreateFile+0x16f
ffffc100`004614a0 fffff801`1f26ecc3 : ffff9881`c8682750 00000000`00000000 ffffc100`00461688 ffffc100`00461668 : FLTMGR!FltCreateFileEx2+0xe7
ffffc100`004615d0 fffff801`1a7dd894 : 00000000`00000000 ffff9881`d035c440 ffffc308`ae260c30 ffffc100`004618d8 : fileinfo!FIPfInterfaceOpen+0x3e3
ffffc100`00461790 fffff801`1a7dbe0d : ffffc100`00461950 ffffffff`fffdb610 ffffc100`004619b0 ffffffff`80002a60 : nt!PfpOpenHandleCreate+0xdc
ffffc100`00461860 fffff801`1a7dbd1b : 00000000`00000000 ffffc100`00461a80 ffffc308`af40a338 00000000`00000000 : nt!PfpPrefetchEntireDirectory+0x85
ffffc100`00461920 fffff801`1a8f58bf : ffffc308`00000000 00000000`00000003 00000000`00000000 ffffffff`80002cd0 : nt!PfSnPrefetchMetadata+0x27b
ffffc100`00461a10 fffff801`1a83393d : 00000000`00000001 00000000`00000002 00000000`000000e6 ffffc308`af40a2f8 : nt!PfSnAsyncPrefetchStep+0x23
ffffc100`00461a50 fffff801`1a452b65 : ffff9881`ce3be040 ffff9881`ce3be040 ffff9881`c6ca1010 ffff9881`cb56f550 : nt!PfSnAsyncPrefetchWorker+0x1cd
ffffc100`00461b70 fffff801`1a471d25 : ffff9881`ce3be040 00000000`00000080 ffff9881`c6c9d180 00078405`bd9bbfff : nt!ExpWorkerThread+0x105
ffffc100`00461c10 fffff801`1a600628 : fffff801`183c1180 ffff9881`ce3be040 fffff801`1a471cd0 ffffd647`4f83fb6e : nt!PspSystemThreadStartup+0x55
ffffc100`00461c60 00000000`00000000 : ffffc100`00462000 ffffc100`0045c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !Ntfs
fffff8011f3becab - Ntfs!NtfsFindPrefixHashEntry+33b
[ 48:c8 ]
1 error : !Ntfs (fffff8011f3becab)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xffffc1000045fa90 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8077ee8bdb3, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1203
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3978
Key : Analysis.Init.CPU.mSec
Value: 109
Key : Analysis.Init.Elapsed.mSec
Value: 10371
Key : Analysis.Memory.CommitPeak.Mb
Value: 138
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092622-42890-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8077ee8bdb3
READ_ADDRESS: fffff8076e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffc0970b8dba0 -- (.trap 0xfffffc0970b8dba0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffc0970b8e000
rdx=0000000000000014 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077ee8bdb3 rsp=fffffc0970b8dd30 rbp=fffffc0970b8de30
r8=0000000000000000 r9=0000000000000000 r10=ffffa983c55d4000
r11=fffffc0970b8dd10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
igdkmd64+0x8bdb3:
fffff807`7ee8bdb3 ff5008 call qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
fffffc09`70b8da58 fffff807`6e00af69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffc09`70b8da60 fffff807`6e007269 : 00000001`61010008 00000001`00000001 00000000`00000000 00001f80`00000200 : nt!KiBugCheckDispatch+0x69
fffffc09`70b8dba0 fffff807`7ee8bdb3 : ffffa983`c55d4000 00000000`00000000 fffffc09`70b8de30 00000000`00000000 : nt!KiPageFault+0x469
fffffc09`70b8dd30 ffffa983`c55d4000 : 00000000`00000000 fffffc09`70b8de30 00000000`00000000 fffff807`00000000 : igdkmd64+0x8bdb3
fffffc09`70b8dd38 00000000`00000000 : fffffc09`70b8de30 00000000`00000000 fffff807`00000000 fffff807`7f0b9380 : 0xffffa983`c55d4000
SYMBOL_NAME: igdkmd64+8bdb3
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 8bdb3
FAILURE_BUCKET_ID: AV_igdkmd64!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ae6ed5da-86a4-a1ba-84df-0618cafaf7fa}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd88c5f5de628, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff805484d5420, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1678
Key : Analysis.Init.CPU.mSec
Value: 46
Key : Analysis.Init.Elapsed.mSec
Value: 11856
Key : Analysis.Memory.CommitPeak.Mb
Value: 144
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 092522-30578-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd88c5f5de628
BUGCHECK_P2: 0
BUGCHECK_P3: fffff805484d5420
BUGCHECK_P4: 2
READ_ADDRESS: fffff80543afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd88c5f5de628
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidEmulato
TRAP_FRAME: ffffeb07a5747d70 -- (.trap 0xffffeb07a5747d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeb07a57484d0 rbx=0000000000000000 rcx=ffffc50e6f77f058
rdx=ffffc50e6df03e08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805484d5420 rsp=ffffeb07a5747f00 rbp=ffffc50e6df03a20
r8=ffffd88c5f5de570 r9=0000000000013400 r10=000000000000000c
r11=0000000000000400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Ntfs!NtfsSetupSubrequest+0x90:
fffff805`484d5420 418b8db8000000 mov ecx,dword ptr [r13+0B8h] ds:00000000`000000b8=????????
Resetting default scope
STACK_TEXT:
ffffeb07`a5747ac8 fffff805`43231a9d : 00000000`00000050 ffffd88c`5f5de628 00000000`00000000 ffffeb07`a5747d70 : nt!KeBugCheckEx
ffffeb07`a5747ad0 fffff805`430399e0 : ffffc50e`6f23d080 00000000`00000000 ffffeb07`a5747df0 00000000`00000000 : nt!MiSystemFault+0x1da08d
ffffeb07`a5747bd0 fffff805`4320715e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`43014934 : nt!MmAccessFault+0x400
ffffeb07`a5747d70 fffff805`484d5420 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffeb07`a5747f00 fffff805`484d390e : ffffc50e`6df03e08 ffffd884`53542170 ffffeb07`a5748110 00000000`00013400 : Ntfs!NtfsSetupSubrequest+0x90
ffffeb07`a5747f80 fffff805`484d3335 : ffffc50e`6f77f003 ffffc50e`6df03a20 ffffc50e`6f77f000 00000000`00013400 : Ntfs!NtfsPrepareSimpleBuffers+0x26e
ffffeb07`a5748060 fffff805`484dcb9e : ffffc50e`6f77f058 ffffeb07`a57481d0 00000000`00008000 00000000`00013400 : Ntfs!NtfsPrepareBuffers+0xc5
ffffeb07`a57480d0 fffff805`484d88d0 : 00000000`00000001 ffffeb07`a57485a0 ffffc50e`65ae9115 ffffd884`53542170 : Ntfs!NtfsNonCachedIo+0x72e
ffffeb07`a5748360 fffff805`484d926c : ffffc50e`6f77f058 ffffc50e`6df03a20 00000000`00079000 00000000`00000030 : Ntfs!NtfsCommonRead+0x1eb0
ffffeb07`a5748570 fffff805`4302a6b5 : ffffc50e`700aca20 ffffc50e`6df03a20 ffffc50e`6df03a20 ffffc50e`65ad7790 : Ntfs!NtfsFsdRead+0x1fc
ffffeb07`a5748640 fffff805`47a170cf : ffffeb07`a5748b00 00000000`00000000 c50e693c`f0c80470 00000000`00000000 : nt!IofCallDriver+0x55
ffffeb07`a5748680 fffff805`47a14a03 : ffffeb07`a5748710 ffffc50e`65ad7790 00000000`00000003 ffffd884`50ac5940 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffeb07`a57486f0 fffff805`4302a6b5 : ffffc50e`6df03a20 fffff805`43097ac3 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xa3
ffffeb07`a5748750 fffff805`430e4b27 : 00000000`00000005 ffffc50e`6df03a20 ffffc50e`696fbe60 ffffc50e`69cf0a20 : nt!IofCallDriver+0x55
ffffeb07`a5748790 fffff805`430f1d4a : 00000000`00000001 ffffeb07`a5748a20 ffffc50e`696fbe70 ffffc50e`696fbe30 : nt!IoPageReadEx+0x1d7
ffffeb07`a5748800 fffff805`430ef3cd : 00000000`00000003 ffffeb07`a57488e0 ffffeb07`a5748a58 fffff805`430ef870 : nt!MiIssueHardFaultIo+0xb6
ffffeb07`a5748850 fffff805`43039a48 : 00000000`c0033333 00000000`00000001 00000000`76754000 ffffd884`50ac5940 : nt!MiIssueHardFault+0x29d
ffffeb07`a5748960 fffff805`4320715e : ffffc50e`6f23d000 00007ffb`aa417f01 ffffeb07`a5748b80 ffffc50e`6ca35080 : nt!MmAccessFault+0x468
ffffeb07`a5748b00 00000000`7190d75e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`187cc5d4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7190d75e
SYMBOL_NAME: Ntfs!NtfsSetupSubrequest+90
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 90
FAILURE_BUCKET_ID: AV_R_(null)_Ntfs!NtfsSetupSubrequest
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {95309bf7-1d9e-1f3b-1416-b6571fae4577}
Followup: MachineOwner
---------