Arda Elmalı
Decapat
- Katılım
- 17 Ağustos 2018
- Mesajlar
- 21
- Page fault in nonpaged area
- System service exception
- Kernel Security check failure
- IRQL_NOT_LESS_OR_EQUAL
Son düzenleyen: Moderatör:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac8c54dcb87a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8073d8f88d0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5265
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 34289
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs5_release
Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z
Key : WER.OS.Version
Value: 10.0.17763.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffac8c54dcb87a
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8073d8f88d0
BUGCHECK_P4: 2
READ_ADDRESS: fffff8073d6bdf08: Unable to get Flags value from nt!KdVersionBlock
GetUlongFromAddress: unable to read from fffff8073d782500
fffff8073d7fd390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8073d6bdf08: Unable to get Flags value from nt!KdVersionBlock
ffffac8c54dcb87a
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: fffff205be510030 -- (.trap 0xfffff205be510030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe081d1aa1000 rbx=0000000000000000 rcx=ffff9a819ede44e0
rdx=ffffe081d1aa1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073d8f88d0 rsp=fffff205be5101c0 rbp=ffff9a819ede44e0
r8=ffffac8c54dcb87a r9=fffffffff94f0000 r10=0000000000000004
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiApplyCompressedFixups+0x60:
fffff807`3d8f88d0 0fb613 movzx edx,byte ptr [rbx] ds:00000000`00000000=??
Resetting default scope
STACK_TEXT:
fffff205`be50fd48 fffff807`3d49fb73 : 00000000`00000050 ffffac8c`54dcb87a 00000000`00000000 fffff205`be510030 : nt!KeBugCheckEx
fffff205`be50fd50 fffff807`3d36cc68 : fffff807`3d6f7250 ffff8000`00000000 ffffe081`d1aa1000 ffffac8c`54dcb87a : nt!MiSystemFault+0x1b9673
fffff205`be50fe90 fffff807`3d4815c9 : 00000000`00000000 00000000`00000000 3fffffff`ffffffff ffff9700`025a83e0 : nt!MmAccessFault+0x1d8
fffff205`be510030 fffff807`3d8f88d0 : 00000000`00000001 ffff9700`03a122c0 00000000`00000001 fffff807`3d6f7060 : nt!KiPageFault+0x349
fffff205`be5101c0 fffff807`3d8f87b0 : ffffe081`d1aa1000 ffffac8c`54dcb87a 00000000`00000927 00000000`00000004 : nt!MiApplyCompressedFixups+0x60
fffff205`be510220 fffff807`3d8f868f : ffffac84`54dae000 ffff9a81`9ede44e0 ffff9a81`9ede44e0 ffffffff`f94f0000 : nt!MiPerformFixups+0x88
fffff205`be5102c0 fffff807`3d358d95 : ffffd270`40e8aea0 ffff9700`05ff5920 00000000`00135b64 00000000`00000000 : nt!MiRelocateImagePfn+0x18f
fffff205`be510330 fffff807`3d853191 : 00000000`ffffffff 00000000`00000000 00000000`00000000 ffffd270`40e8aea0 : nt!MiWalkEntireImage+0xc15
fffff205`be510550 fffff807`3d852bbb : ffff9a81`9ede44e0 ffffd270`40e8aea0 00000000`00000000 ffffac84`54dae000 : nt!MiSwitchBaseAddress+0x5d
fffff205`be510580 fffff807`3d852674 : 00000000`5a2e0000 00000000`00000000 00000000`60df0000 ffff9a81`a0d45080 : nt!MiRelocateImageAgain+0x19b
fffff205`be510600 fffff807`3d92081e : 00000000`00000001 fffff205`00000000 ffff9a81`a1846820 fffff205`be510840 : nt!MiValidateExistingImage+0x64
fffff205`be5106a0 fffff807`3d91ffe5 : ffff9a81`a1846820 fffff205`be510840 ffff9a81`a0d45080 00000000`00000002 : nt!MiShareExistingControlArea+0xc2
fffff205`be5106d0 fffff807`3d91f63e : ffff9a81`9ede44e0 00000000`00000000 ffff9a81`a1846820 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1e5
fffff205`be5107c0 fffff807`3d91f408 : fffff205`be5109b8 00000000`01000000 fffff205`be510b80 00000000`00000001 : nt!MiCreateSection+0x10e
fffff205`be510940 fffff807`3d91f204 : 00000000`098be2e8 00000000`0000000f 00000000`00000000 00000000`00000001 : nt!MiCreateSectionCommon+0x1f8
fffff205`be510a20 fffff807`3d484d08 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x54
fffff205`be510a90 00007ff9`28e500a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`098be248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`28e500a4
SYMBOL_NAME: nt!MiApplyCompressedFixups+60
MODULE_NAME: nt
IMAGE_VERSION: 10.0.17763.1217
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 60
FAILURE_BUCKET_ID: AV_R_INVALID_nt!MiApplyCompressedFixups
OS_VERSION: 10.0.17763.1
BUILDLAB_STR: rs5_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {651d4d46-768e-c310-7395-6118b790f7b1}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8020d0f0d50, The address that the exception occurred at
Arg3: fffff407e2296aa8, Exception Record Address
Arg4: fffff407e22962f0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 5671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 48890
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs5_release
Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z
Key : WER.OS.Version
Value: 10.0.17763.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8020d0f0d50
BUGCHECK_P3: fffff407e2296aa8
BUGCHECK_P4: fffff407e22962f0
EXCEPTION_RECORD: fffff407e2296aa8 -- (.exr 0xfffff407e2296aa8)
ExceptionAddress: fffff8020d0f0d50 (nt!MiDemoteCombinedPte+0x0000000000000040)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff407e22962f0 -- (.cxr 0xfffff407e22962f0)
rax=fffff0783c1e0000 rbx=8100000902bc686f rcx=ffffb184ef3fb9c0
rdx=fffff00000094160 rsi=fffff00000094160 rdi=ffff92001b083520
rip=fffff8020d0f0d50 rsp=fffff407e2296ce0 rbp=0000000000000000
r8=8000000000000000 r9=0000000000000000 r10=fffff0783c1e0000
r11=fffff00000000000 r12=ffffb184e8318b20 r13=fffff407e2297450
r14=8000000000000000 r15=ffffb184ef3fb9c0
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!MiDemoteCombinedPte+0x40:
fffff802`0d0f0d50 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
READ_ADDRESS: fffff8020d408f08: Unable to get Flags value from nt!KdVersionBlock
GetUlongFromAddress: unable to read from fffff8020d4cd4c0
fffff8020d548390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020d408f08: Unable to get Flags value from nt!KdVersionBlock
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff407`e2296ce0 fffff802`0d0efc99 : ffffb184`e8318b20 ffffb184`ef3fb9c0 fffff407`e2297350 fffff407`e2297450 : nt!MiDemoteCombinedPte+0x40
fffff407`e2296db0 fffff802`0d0f4c0e : 00000000`00000001 00000000`00000004 fffff000`00094160 00000000`00000000 : nt!MiAgePte+0x3b9
fffff407`e2296e40 fffff802`0d0f4774 : fffff407`e2297450 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x127e
fffff407`e2296f20 fffff802`0d0f4774 : fffff407`e2297450 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiWalkPageTablesRecursively+0xde4
fffff407`e2297000 fffff802`0d0f4774 : fffff407`e2297450 00000000`00000000 00000000`00000002 ffffb184`73576d4d : nt!MiWalkPageTablesRecursively+0xde4
fffff407`e22970e0 fffff802`0d0f362a : fffff407`e2297450 ffffb184`00000000 fffff407`00000003 fffff802`0d35006d : nt!MiWalkPageTablesRecursively+0xde4
fffff407`e22971c0 fffff802`0d0f2cee : fffff407`e2297450 ffffb184`00000002 ffffb184`00000000 00000000`00000000 : nt!MiWalkPageTables+0x1da
fffff407`e22972c0 fffff802`0d0f2475 : ffff47e8`01a31c06 ffffc780`9661e000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x38e
fffff407`e22977d0 fffff802`0d0f1c35 : 00000000`00000000 fffff407`e2297a80 fffff407`e22979b0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3e5
fffff407`e22978b0 fffff802`0d13221a : fffff802`00000002 fffff802`00000000 fffff802`0d443980 ffffb184`e3e43530 : nt!MiProcessWorkingSets+0x255
fffff407`e2297a60 fffff802`0d18b437 : 00000000`00000004 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xaa
fffff407`e2297b20 fffff802`0d0803a5 : ffffb184`e3eed040 00000000`00000080 fffff802`0d18b2f0 558948f7`558966ef : nt!KeBalanceSetManager+0x147
fffff407`e2297c10 fffff802`0d1c5f2c : ffffc780`961ad180 ffffb184`e3eed040 fffff802`0d080350 483874c0`8548d88b : nt!PspSystemThreadStartup+0x55
fffff407`e2297c60 00000000`00000000 : fffff407`e2298000 fffff407`e2292000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c
SYMBOL_NAME: nt!MiDemoteCombinedPte+40
MODULE_NAME: nt
IMAGE_VERSION: 10.0.17763.1158
STACK_COMMAND: .cxr 0xfffff407e22962f0 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_nt!MiDemoteCombinedPte
OS_VERSION: 10.0.17763.1
BUILDLAB_STR: rs5_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c577c73b-79a7-0c44-6c62-58e1d697b6d8}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80721371e16, Address of the instruction which caused the bugcheck
Arg3: ffffdf09c5137790, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 62
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 60
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80721371e16
BUGCHECK_P3: ffffdf09c5137790
BUGCHECK_P4: 0
CONTEXT: ffffdf09c5137790 -- (.cxr 0xffffdf09c5137790)
rax=0000000000000000 rbx=ffffffffffffffff rcx=0000000800000000
rdx=0000000000000000 rsi=0000000800000000 rdi=0000000000000000
rip=fffff80721371e16 rsp=ffffdf09c5138180 rbp=ffffe50e96dd6c00
r8=ffffe50e9f9f7970 r9=0000000000000000 r10=fffff80721371df0
r11=ffffbe7cf5000000 r12=0000000000000001 r13=ffffe50e9b77b970
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010246
fffff807`21371e16 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffdf09`c5136e58 fffff807`214802e9 : 00000000`0000003b 00000000`c0000005 fffff807`21371e16 ffffdf09`c5137790 : 0xfffff807`2146eab0
ffffdf09`c5136e60 00000000`0000003b : 00000000`c0000005 fffff807`21371e16 ffffdf09`c5137790 00000000`00000000 : 0xfffff807`214802e9
ffffdf09`c5136e68 00000000`c0000005 : fffff807`21371e16 ffffdf09`c5137790 00000000`00000000 ffffdf09`00000008 : 0x3b
ffffdf09`c5136e70 fffff807`21371e16 : ffffdf09`c5137790 00000000`00000000 ffffdf09`00000008 00000000`00000000 : 0xc0000005
ffffdf09`c5136e78 ffffdf09`c5137790 : 00000000`00000000 ffffdf09`00000008 00000000`00000000 00000000`00000000 : 0xfffff807`21371e16
ffffdf09`c5136e80 00000000`00000000 : ffffdf09`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffdf09`c5137790
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x3B_c0000005
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {74bb4c27-742f-ebb4-fa0a-8074317b8a14}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.