SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88002483825, The address that the exception occurred at
Arg3: fffff8800a655118, Exception Record Address
Arg4: fffff8800a654980, Context Record Address
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80002eb7300
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12523
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 8883
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88002483825
BUGCHECK_P3: fffff8800a655118
BUGCHECK_P4: fffff8800a654980
EXCEPTION_RECORD: fffff8800a655118 -- (.exr 0xfffff8800a655118)
ExceptionAddress: fffff88002483825 (igdkmd64+0x000000000006b825)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8800a654980 -- (.cxr 0xfffff8800a654980)
rax=000000001b400000 rbx=fffffa8004790e00 rcx=f8a0001b30e80001
rdx=0000000000000004 rsi=fffffa8004680000 rdi=fffffa800476c3e0
rip=fffff88002483825 rsp=fffff8800a655358 rbp=000000001b400000
r8=000000001b400000 r9=00000000491da001 r10=0000000000000001
r11=0000000000000000 r12=fffffa8007c99e00 r13=0000000000000000
r14=0000000000000004 r15=fffffa8005361001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010282
igdkmd64+0x6b825:
fffff880`02483825 8b4168 mov eax,dword ptr [rcx+68h] ds:002b:f8a0001b`30e80069=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002eb72f0
GetUlongPtrFromAddress: unable to read from fffff80002eb74a8
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`0a655358 fffff880`02438578 : fffffa80`04680000 00000000`00000004 00000000`00000000 fffff880`0a6554e0 : igdkmd64+0x6b825
fffff880`0a655360 fffffa80`04680000 : 00000000`00000004 00000000`00000000 fffff880`0a6554e0 fffff880`0a6554e0 : igdkmd64+0x20578
fffff880`0a655368 00000000`00000004 : 00000000`00000000 fffff880`0a6554e0 fffff880`0a6554e0 fffff880`02555896 : 0xfffffa80`04680000
fffff880`0a655370 00000000`00000000 : fffff880`0a6554e0 fffff880`0a6554e0 fffff880`02555896 fffffa80`0526ee40 : 0x4
SYMBOL_NAME: igdkmd64+6b825
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr 0xfffff8800a654980 ; kb
FAILURE_BUCKET_ID: 0x7E_igdkmd64+6b825
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {34734aa1-6175-96cc-a701-8602ec12bd99}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005c76825, The address that the exception occurred at
Arg3: fffff880071fe118, Exception Record Address
Arg4: fffff880071fd980, Context Record Address
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80002ea7300
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9572
Key : Analysis.Init.CPU.mSec
Value: 859
Key : Analysis.Init.Elapsed.mSec
Value: 10844
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2019-08-28T17:32:00Z
Key : WER.OS.Version
Value: 7.1.7601.24520
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88005c76825
BUGCHECK_P3: fffff880071fe118
BUGCHECK_P4: fffff880071fd980
EXCEPTION_RECORD: fffff880071fe118 -- (.exr 0xfffff880071fe118)
ExceptionAddress: fffff88005c76825 (igdkmd64+0x000000000006b825)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000000019a0
Attempt to read from address 00000000000019a0
CONTEXT: fffff880071fd980 -- (.cxr 0xfffff880071fd980)
rax=000000001b400000 rbx=fffffa800a171700 rcx=0000000000001938
rdx=0000000000000004 rsi=fffffa800813e000 rdi=fffffa800a172010
rip=fffff88005c76825 rsp=fffff880071fe358 rbp=000000001b400000
r8=000000001b400000 r9=00000000660d5001 r10=0000000000000001
r11=0000000000000000 r12=fffffa8009dc8c80 r13=fffffa8008108f00
r14=0000000000000004 r15=fffffa800a379001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
igdkmd64+0x6b825:
fffff880`05c76825 8b4168 mov eax,dword ptr [rcx+68h] ds:002b:00000000`000019a0=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002ea72f0
GetUlongPtrFromAddress: unable to read from fffff80002ea74a8
00000000000019a0
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000000019a0
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`071fe358 fffff880`05c2b578 : fffffa80`0813e000 00000000`00000004 fffffa80`08108f00 fffff880`071fe4e0 : igdkmd64+0x6b825
fffff880`071fe360 fffffa80`0813e000 : 00000000`00000004 fffffa80`08108f00 fffff880`071fe4e0 fffff880`071fe4e0 : igdkmd64+0x20578
fffff880`071fe368 00000000`00000004 : fffffa80`08108f00 fffff880`071fe4e0 fffff880`071fe4e0 fffff880`05d48896 : 0xfffffa80`0813e000
fffff880`071fe370 fffffa80`08108f00 : fffff880`071fe4e0 fffff880`071fe4e0 fffff880`05d48896 fffffa80`09c81e40 : 0x4
fffff880`071fe378 fffff880`071fe4e0 : fffff880`071fe4e0 fffff880`05d48896 fffffa80`09c81e40 fffffa80`0813e000 : 0xfffffa80`08108f00
fffff880`071fe380 fffff880`071fe4e0 : fffff880`05d48896 fffffa80`09c81e40 fffffa80`0813e000 00000000`00000000 : 0xfffff880`071fe4e0
fffff880`071fe388 fffff880`05d48896 : fffffa80`09c81e40 fffffa80`0813e000 00000000`00000000 fffff800`031eebe3 : 0xfffff880`071fe4e0
fffff880`071fe390 fffffa80`09c81e40 : fffffa80`0813e000 00000000`00000000 fffff800`031eebe3 fffff880`071fe4e0 : igdkmd64+0x13d896
fffff880`071fe398 fffffa80`0813e000 : 00000000`00000000 fffff800`031eebe3 fffff880`071fe4e0 fffff880`05c1c172 : 0xfffffa80`09c81e40
fffff880`071fe3a0 00000000`00000000 : fffff800`031eebe3 fffff880`071fe4e0 fffff880`05c1c172 fffffa80`0813e000 : 0xfffffa80`0813e000
SYMBOL_NAME: igdkmd64+6b825
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr 0xfffff880071fd980 ; kb
FAILURE_BUCKET_ID: 0x7E_igdkmd64+6b825
OS_VERSION: 7.1.7601.24520
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {34734aa1-6175-96cc-a701-8602ec12bd99}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005c76825, The address that the exception occurred at
Arg3: fffff88006dcb118, Exception Record Address
Arg4: fffff88006dca980, Context Record Address
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80002ef2300
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11090
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 9267
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2019-08-28T17:32:00Z
Key : WER.OS.Version
Value: 7.1.7601.24520
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88005c76825
BUGCHECK_P3: fffff88006dcb118
BUGCHECK_P4: fffff88006dca980
EXCEPTION_RECORD: fffff88006dcb118 -- (.exr 0xfffff88006dcb118)
ExceptionAddress: fffff88005c76825 (igdkmd64+0x000000000006b825)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000069
Attempt to read from address 0000000000000069
CONTEXT: fffff88006dca980 -- (.cxr 0xfffff88006dca980)
rax=000000001b400000 rbx=fffffa800b3ede40 rcx=0000000000000001
rdx=0000000000000004 rsi=fffffa800812c000 rdi=fffffa800b3e4b20
rip=fffff88005c76825 rsp=fffff88006dcb358 rbp=000000001b400000
r8=000000001b400000 r9=000000003c832001 r10=0000000000000001
r11=0000000000000000 r12=fffffa8009dcabc0 r13=fffffa800550fe40
r14=0000000000000004 r15=fffffa800b553d01
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
igdkmd64+0x6b825:
fffff880`05c76825 8b4168 mov eax,dword ptr [rcx+68h] ds:002b:00000000`00000069=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002ef22f0
GetUlongPtrFromAddress: unable to read from fffff80002ef24a8
0000000000000069
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000069
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`06dcb358 fffff880`05c2b578 : fffffa80`0812c000 00000000`00000004 fffffa80`0550fe40 fffff880`06dcb4e0 : igdkmd64+0x6b825
fffff880`06dcb360 fffffa80`0812c000 : 00000000`00000004 fffffa80`0550fe40 fffff880`06dcb4e0 fffff880`06dcb4e0 : igdkmd64+0x20578
fffff880`06dcb368 00000000`00000004 : fffffa80`0550fe40 fffff880`06dcb4e0 fffff880`06dcb4e0 fffff880`05d48896 : 0xfffffa80`0812c000
fffff880`06dcb370 fffffa80`0550fe40 : fffff880`06dcb4e0 fffff880`06dcb4e0 fffff880`05d48896 fffffa80`09bdfe40 : 0x4
fffff880`06dcb378 fffff880`06dcb4e0 : fffff880`06dcb4e0 fffff880`05d48896 fffffa80`09bdfe40 fffffa80`0812c000 : 0xfffffa80`0550fe40
fffff880`06dcb380 fffff880`06dcb4e0 : fffff880`05d48896 fffffa80`09bdfe40 fffffa80`0812c000 00000000`00000000 : 0xfffff880`06dcb4e0
fffff880`06dcb388 fffff880`05d48896 : fffffa80`09bdfe40 fffffa80`0812c000 00000000`00000000 fffffa80`00000000 : 0xfffff880`06dcb4e0
fffff880`06dcb390 fffffa80`09bdfe40 : fffffa80`0812c000 00000000`00000000 fffffa80`00000000 fffff880`06dcb4e0 : igdkmd64+0x13d896
fffff880`06dcb398 fffffa80`0812c000 : 00000000`00000000 fffffa80`00000000 fffff880`06dcb4e0 fffff880`05c1c172 : 0xfffffa80`09bdfe40
fffff880`06dcb3a0 00000000`00000000 : fffffa80`00000000 fffff880`06dcb4e0 fffff880`05c1c172 fffffa80`0812c000 : 0xfffffa80`0812c000
SYMBOL_NAME: igdkmd64+6b825
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr 0xfffff88006dca980 ; kb
FAILURE_BUCKET_ID: 0x7E_igdkmd64+6b825
OS_VERSION: 7.1.7601.24520
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {34734aa1-6175-96cc-a701-8602ec12bd99}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa800ba10518, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88005c2656c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for igdkmd64.sys
GetUlongPtrFromAddress: unable to read from fffff80002efe300
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1968
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7219
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 9325
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2019-08-28T17:32:00Z
Key : WER.OS.Version
Value: 7.1.7601.24520
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffa800ba10518
BUGCHECK_P2: 0
BUGCHECK_P3: fffff88005c2656c
BUGCHECK_P4: 0
READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002efe2f0
GetUlongPtrFromAddress: unable to read from fffff80002efe4a8
fffffa800ba10518 Nonpaged pool
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Energy Managem
TRAP_FRAME: fffff8800ad2be60 -- (.trap 0xfffff8800ad2be60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000001b400000 rbx=0000000000000000 rcx=fffffa8009a2b000
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005c2656c rsp=fffff8800ad2bff0 rbp=000000001b709000
r8=000000001b709000 r9=0000000033124811 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
igdkmd64+0x2056c:
fffff880`05c2656c 488b8bd8660000 mov rcx,qword ptr [rbx+66D8h] ds:00000000`000066d8=????????????????
Resetting default scope
STACK_TEXT:
fffff880`0ad2bd08 fffff800`02dce7a2 : 00000000`00000050 fffffa80`0ba10518 00000000`00000000 fffff880`0ad2be60 : nt!KeBugCheckEx
fffff880`0ad2bd10 fffff800`02d00ddc : 00000000`00000000 fffffa80`0ba10518 fffffa80`03993600 fffffa80`0ba09e40 : nt!MmAccessFault+0x2322
fffff880`0ad2be60 fffff880`05c2656c : fffffa80`080fe000 00000000`00000004 fffffa80`08068d00 fffff880`0ad2c170 : nt!KiPageFault+0x35c
fffff880`0ad2bff0 fffffa80`080fe000 : 00000000`00000004 fffffa80`08068d00 fffff880`0ad2c170 fffff880`0ad2c170 : igdkmd64+0x2056c
fffff880`0ad2bff8 00000000`00000004 : fffffa80`08068d00 fffff880`0ad2c170 fffff880`0ad2c170 fffff880`05d43896 : 0xfffffa80`080fe000
fffff880`0ad2c000 fffffa80`08068d00 : fffff880`0ad2c170 fffff880`0ad2c170 fffff880`05d43896 fffffa80`09a2ce40 : 0x4
fffff880`0ad2c008 fffff880`0ad2c170 : fffff880`0ad2c170 fffff880`05d43896 fffffa80`09a2ce40 fffffa80`080fe000 : 0xfffffa80`08068d00
fffff880`0ad2c010 fffff880`0ad2c170 : fffff880`05d43896 fffffa80`09a2ce40 fffffa80`080fe000 00000000`00000000 : 0xfffff880`0ad2c170
fffff880`0ad2c018 fffff880`05d43896 : fffffa80`09a2ce40 fffffa80`080fe000 00000000`00000000 00001f80`0100b060 : 0xfffff880`0ad2c170
fffff880`0ad2c020 fffffa80`09a2ce40 : fffffa80`080fe000 00000000`00000000 00001f80`0100b060 fffff880`0ad2c170 : igdkmd64+0x13d896
fffff880`0ad2c028 fffffa80`080fe000 : 00000000`00000000 00001f80`0100b060 fffff880`0ad2c170 fffff880`05c17172 : 0xfffffa80`09a2ce40
fffff880`0ad2c030 00000000`00000000 : 00001f80`0100b060 fffff880`0ad2c170 fffff880`05c17172 fffffa80`080fe000 : 0xfffffa80`080fe000
SYMBOL_NAME: igdkmd64+2056c
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x50_R_(null)_igdkmd64+2056c
OS_VERSION: 7.1.7601.24520
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {1865a552-71ca-4674-9890-5bd7e576ed99}
Followup: MachineOwner
---------
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.7, DMIVersion 39, Size=1590]
BiosMajorRelease = 0
BiosMinorRelease = 30
FirmwareMajorRelease = 0
FirmwareMinorRelease = 30
BiosVendor = LENOVO
BiosVersion = 9ACN30WW
BiosReleaseDate = 01/27/2015
SystemManufacturer = LENOVO
SystemProductName = 20351
SystemFamily = IDEAPAD
SystemVersion = Lenovo G50-70
SystemSKU = LENOVO_MT_20351_BU_idea_FM_Lenovo G50-70
BaseBoardManufacturer = LENOVO
BaseBoardProduct = Lancer 5A2
BaseBoardVersion = NANANANANO DPK
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005c9d825, The address that the exception occurred at
Arg3: fffff880071bd118, Exception Record Address
Arg4: fffff880071bc980, Context Record Address
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80002eea300
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7762
Key : Analysis.Init.CPU.mSec
Value: 812
Key : Analysis.Init.Elapsed.mSec
Value: 14094
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88005c9d825
BUGCHECK_P3: fffff880071bd118
BUGCHECK_P4: fffff880071bc980
EXCEPTION_RECORD: fffff880071bd118 -- (.exr 0xfffff880071bd118)
ExceptionAddress: fffff88005c9d825 (igdkmd64+0x000000000006b825)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880071bc980 -- (.cxr 0xfffff880071bc980)
rax=000000001b400000 rbx=fffffa800b6034c0 rcx=04a2fdc90040b040
rdx=0000000000000004 rsi=fffffa8007e67000 rdi=fffffa800b7d1690
rip=fffff88005c9d825 rsp=fffff880071bd358 rbp=000000001b400000
r8=000000001b400000 r9=000000004ddcd001 r10=0000000000000001
r11=0000000000000000 r12=fffffa8009caee00 r13=0000000000000000
r14=0000000000000004 r15=fffffa80078aa301
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
igdkmd64+0x6b825:
fffff880`05c9d825 8b4168 mov eax,dword ptr [rcx+68h] ds:002b:04a2fdc9`0040b0a8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002eea2f0
GetUlongPtrFromAddress: unable to read from fffff80002eea4a8
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`071bd358 fffff880`05c52578 : fffffa80`07e67000 00000000`00000004 00000000`00000000 fffff880`071bd4e0 : igdkmd64+0x6b825
fffff880`071bd360 fffffa80`07e67000 : 00000000`00000004 00000000`00000000 fffff880`071bd4e0 fffff880`071bd4e0 : igdkmd64+0x20578
fffff880`071bd368 00000000`00000004 : 00000000`00000000 fffff880`071bd4e0 fffff880`071bd4e0 fffff880`05d6f896 : 0xfffffa80`07e67000
fffff880`071bd370 00000000`00000000 : fffff880`071bd4e0 fffff880`071bd4e0 fffff880`05d6f896 fffffa80`09aa7e40 : 0x4
SYMBOL_NAME: igdkmd64+6b825
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr 0xfffff880071bc980 ; kb
FAILURE_BUCKET_ID: 0x7E_igdkmd64+6b825
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {34734aa1-6175-96cc-a701-8602ec12bd99}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005c74825, The address that the exception occurred at
Arg3: fffff88006dcb118, Exception Record Address
Arg4: fffff88006dca980, Context Record Address
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80002ea1300
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1717
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11244
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 8837
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff88005c74825
BUGCHECK_P3: fffff88006dcb118
BUGCHECK_P4: fffff88006dca980
EXCEPTION_RECORD: fffff88006dcb118 -- (.exr 0xfffff88006dcb118)
ExceptionAddress: fffff88005c74825 (igdkmd64+0x000000000006b825)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000000040076f
Attempt to read from address 000000000040076f
CONTEXT: fffff88006dca980 -- (.cxr 0xfffff88006dca980)
rax=000000001b400000 rbx=fffffa800a021880 rcx=0000000000400707
rdx=0000000000000004 rsi=fffffa8007e66000 rdi=fffffa800a073010
rip=fffff88005c74825 rsp=fffff88006dcb358 rbp=000000001b400000
r8=000000001b400000 r9=0000000073f98001 r10=0000000000000001
r11=0000000000000000 r12=fffffa8009ce3e00 r13=0000000000000000
r14=0000000000000004 r15=fffffa800a15a001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010202
igdkmd64+0x6b825:
fffff880`05c74825 8b4168 mov eax,dword ptr [rcx+68h] ds:002b:00000000`0040076f=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002ea12f0
GetUlongPtrFromAddress: unable to read from fffff80002ea14a8
000000000040076f
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000000040076f
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff880`06dcb358 fffff880`05c29578 : fffffa80`07e66000 00000000`00000004 00000000`00000000 fffff880`06dcb4e0 : igdkmd64+0x6b825
fffff880`06dcb360 fffffa80`07e66000 : 00000000`00000004 00000000`00000000 fffff880`06dcb4e0 fffff880`06dcb4e0 : igdkmd64+0x20578
fffff880`06dcb368 00000000`00000004 : 00000000`00000000 fffff880`06dcb4e0 fffff880`06dcb4e0 fffff880`05d46896 : 0xfffffa80`07e66000
fffff880`06dcb370 00000000`00000000 : fffff880`06dcb4e0 fffff880`06dcb4e0 fffff880`05d46896 fffffa80`09a5de40 : 0x4
SYMBOL_NAME: igdkmd64+6b825
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr 0xfffff88006dca980 ; kb
FAILURE_BUCKET_ID: 0x7E_igdkmd64+6b825
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {34734aa1-6175-96cc-a701-8602ec12bd99}
Followup: MachineOwner
---------