KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807744cb380, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!KiTryUnwaitThread+50
fffff807`744cb380 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_RECORD: 1fba17458948c933 -- (.exr 0x1fba17458948c933)
Cannot read Exception record @ 1fba17458948c933
TRAP_FRAME: 0ff3000002401f45 -- (.trap 0xff3000002401f45)
Unable to read trap frame at 0ff30000`02401f45
LAST_CONTROL_TRANSFER: from fffff807746f4d4e to fffff807745f3ea0
STACK_TEXT:
ffffdd01`70528158 fffff807`746f4d4e : 00000000`0000001e ffffffff`c0000005 fffff807`744cb380 00000000`00000000 : nt!KeBugCheckEx
ffffdd01`70528160 fffff807`745fcd62 : fffff807`746f4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffdd01`705281a0 fffff807`74485027 : ffffdd01`70528710 00000000`00000000 ffff8e01`dec37c60 fffff807`745f7a0e : nt!RtlpExecuteHandlerForException+0x12
ffffdd01`705281d0 fffff807`74483ce6 : ffff8e01`dec37598 ffffdd01`70528e20 ffff8e01`dec37598 ffffbc07`13abd100 : nt!RtlDispatchException+0x297
ffffdd01`705288f0 fffff807`745f4d32 : 1fba1745`8948c933 c7076589`44000200 0ff30000`02401f45 20247489`4c27457f : nt!KiDispatchException+0x186
ffffdd01`70528fb0 fffff807`745f4d00 : fffff807`74605fa5 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8e01`dec37458 fffff807`74605fa5 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8e01`dec37460 fffff807`74601ce0 : fffff807`7443fff0 fffff807`7443b310 00000000`00000000 ffffbc07`0f7d29a8 : nt!KiExceptionDispatch+0x125
ffff8e01`dec37640 fffff807`744cb380 : 00000000`00000000 ffffbc07`0dbfaae0 00000000`00000001 00000000`00989680 : nt!KiGeneralProtectionFault+0x320
ffff8e01`dec377d0 fffff807`744c42a6 : ffffbc07`13abd188 00000000`00000000 ffffbc07`13abd250 00000000`00000000 : nt!KiTryUnwaitThread+0x50
ffff8e01`dec37830 fffff807`744c3e4c : ffffbc07`13abd180 00000000`00000000 ffff8e01`dec37b18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6
ffff8e01`dec378e0 fffff807`744e9509 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000aacd : nt!KiProcessExpiredTimerList+0xdc
ffff8e01`dec379d0 fffff807`745f7a0e : ffffffff`00000000 ffffdd01`70508180 ffffdd01`70513140 ffffbc07`141c1080 : nt!KiRetireDpcList+0x9d9
ffff8e01`dec37c60 00000000`00000000 : ffff8e01`dec38000 ffff8e01`dec32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff807745963ae-fffff807745963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:60 fe fc f9 ]
fffff807745f72ac-fffff807745f72ad 2 bytes - nt!KiIsrLinkage+43b (+0x60efe)
[ 48 ff:4c 8b ]
fffff807745f72b3-fffff807745f72b6 4 bytes - nt!KiIsrLinkage+442 (+0x07)
[ 0f 1f 44 00:e8 68 e1 61 ]
fffff807745f76b0-fffff807745f76b4 5 bytes - nt!KiCallUserMode+220 (+0x3fd)
[ ff e1 cc cc cc:e8 0b da 61 00 ]
15 errors : !nt (fffff807745963ae-fffff807745f76b4)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80329c4e0e7, The address that the exception occurred at
Arg3: fffff40ec86298d8, Exception Record Address
Arg4: ffffc601b19e2920, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!KeDeleteThread+1ca8cf
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi
EXCEPTION_RECORD: fffff40ec86298d8 -- (.exr 0xfffff40ec86298d8)
ExceptionAddress: fffff80329c4e0e7 (nt!KeDeleteThread+0x00000000001ca8cf)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffc601b19e2920 -- (.cxr 0xffffc601b19e2920;r)
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff
r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000
r14=0000000000000000 r15=fffff8032a524440
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Last set context:
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff
r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000
r14=0000000000000000 r15=fffff8032a524440
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
FOLLOWUP_IP:
nt!KeDeleteThread+1ca8cf
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_STR: 0x0
LAST_CONTROL_TRANSFER: from fffff80329a836ac to fffff80329c4e0e7
STACK_TEXT:
fffff40e`c8629b10 fffff803`29a836ac : ffffd70b`160b34d8 fffff803`29a83680 00000000`00000000 00000000`00000b00 : nt!KeDeleteThread+0x1ca8cf
fffff40e`c8629b40 fffff803`29ac1f15 : ffffd70b`0dc27540 ffffd70b`0ac6ecf0 ffffd70b`0ac6ecf0 ffffd70b`00000000 : nt!PspReaper+0x2c
fffff40e`c8629b70 fffff803`29a66dd5 : ffffd70b`0dc27540 00000000`00000080 ffffd70b`0ac8a080 00000000`00000001 : nt!ExpWorkerThread+0x105
fffff40e`c8629c10 fffff803`29bfb4f8 : ffffc601`b1908180 ffffd70b`0dc27540 fffff803`29a66d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff40e`c8629c60 00000000`00000000 : fffff40e`c862a000 fffff40e`c8624000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80329b963ae-fffff80329b963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:00 3a 74 e8 ]
4 errors : !nt (fffff80329b963ae-fffff80329b963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffc601b19e2920 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8067b5f6ce8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8067b5f6ce8, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff8067b5f6ce8
CURRENT_IRQL: 0
FAULTING_IP:
+64bd760751e9359
fffff806`7b5f6ce8 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFF91073F23EFB0
TRAP_FRAME: ffff91073f237aa0 -- (.trap 0xffff91073f237aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8068e81
r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
fffff806`7b5f6ce8 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8067f605e69 to fffff8067f5f3ea0
FAILED_INSTRUCTION_ADDRESS:
+64bd760751e9359
fffff806`7b5f6ce8 ?? ???
STACK_TEXT:
ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69
ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469
ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8
ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a
ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140
ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080
ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763
ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8067f5963ae-fffff8067f5963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:e0 e1 c3 87 ]
4 errors : !nt (fffff8067f5963ae-fffff8067f5963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
GPU-Z kaldırın. X. M.P kapalı olarak yaptıysanız testi açıp tekrar yapınız.Kod:KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: fffff807744cb380, The address that the exception occurred at. Arg3: 0000000000000000, Parameter 0 of the exception. Arg4: ffffffffffffffff, Parameter 1 of the exception. Debugging Details: ------------------ READ_ADDRESS: unable to get nt!MmSpecialPoolStart. unable to get nt!MmSpecialPoolEnd. unable to get nt!MmPagedPoolEnd. unable to get nt!MmNonPagedPoolStart. unable to get nt!MmSizeOfNonPagedPoolInBytes. ffffffffffffffff. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba. FAULTING_IP: nt!KiTryUnwaitThread+50. fffff807`744cb380 f0480fba6b4000 lock bts qword ptr [rbx+40h],0. EXCEPTION_PARAMETER2: ffffffffffffffff. BUGCHECK_STR: 0x1E_c0000005_R. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: CODE_CORRUPTION. PROCESS_NAME: System. CURRENT_IRQL: 2. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre. EXCEPTION_RECORD: 1fba17458948c933 -- (.exr 0x1fba17458948c933) Cannot read Exception record @ 1fba17458948c933. TRAP_FRAME: 0ff3000002401f45 -- (.trap 0xff3000002401f45) Unable to read trap frame at 0ff30000`02401f45. LAST_CONTROL_TRANSFER: from fffff807746f4d4e to fffff807745f3ea0. STACK_TEXT: ffffdd01`70528158 fffff807`746f4d4e : 00000000`0000001e ffffffff`c0000005 fffff807`744cb380 00000000`00000000 : nt!KeBugCheckEx. ffffdd01`70528160 fffff807`745fcd62 : fffff807`746f4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22. ffffdd01`705281a0 fffff807`74485027 : ffffdd01`70528710 00000000`00000000 ffff8e01`dec37c60 fffff807`745f7a0e : nt!RtlpExecuteHandlerForException+0x12. ffffdd01`705281d0 fffff807`74483ce6 : ffff8e01`dec37598 ffffdd01`70528e20 ffff8e01`dec37598 ffffbc07`13abd100 : nt!RtlDispatchException+0x297. ffffdd01`705288f0 fffff807`745f4d32 : 1fba1745`8948c933 c7076589`44000200 0ff30000`02401f45 20247489`4c27457f : nt!KiDispatchException+0x186. ffffdd01`70528fb0 fffff807`745f4d00 : fffff807`74605fa5 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12. ffff8e01`dec37458 fffff807`74605fa5 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue. ffff8e01`dec37460 fffff807`74601ce0 : fffff807`7443fff0 fffff807`7443b310 00000000`00000000 ffffbc07`0f7d29a8 : nt!KiExceptionDispatch+0x125. ffff8e01`dec37640 fffff807`744cb380 : 00000000`00000000 ffffbc07`0dbfaae0 00000000`00000001 00000000`00989680 : nt!KiGeneralProtectionFault+0x320. ffff8e01`dec377d0 fffff807`744c42a6 : ffffbc07`13abd188 00000000`00000000 ffffbc07`13abd250 00000000`00000000 : nt!KiTryUnwaitThread+0x50. ffff8e01`dec37830 fffff807`744c3e4c : ffffbc07`13abd180 00000000`00000000 ffff8e01`dec37b18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6. ffff8e01`dec378e0 fffff807`744e9509 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000aacd : nt!KiProcessExpiredTimerList+0xdc. ffff8e01`dec379d0 fffff807`745f7a0e : ffffffff`00000000 ffffdd01`70508180 ffffdd01`70513140 ffffbc07`141c1080 : nt!KiRetireDpcList+0x9d9. ffff8e01`dec37c60 00000000`00000000 : ffff8e01`dec38000 ffff8e01`dec32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e. STACK_COMMAND: kb. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt. fffff807745963ae-fffff807745963b1 4 bytes - nt!MiFreeUltraMapping+32. [ a0 7d fb f6:60 fe fc f9 ] fffff807745f72ac-fffff807745f72ad 2 bytes - nt!KiIsrLinkage+43b (+0x60efe) [ 48 ff:4c 8b ] fffff807745f72b3-fffff807745f72b6 4 bytes - nt!KiIsrLinkage+442 (+0x07) [ 0f 1f 44 00:e8 68 e1 61 ] fffff807745f76b0-fffff807745f76b4 5 bytes - nt!KiCallUserMode+220 (+0x3fd) [ ff e1 cc cc cc:e8 0b da 61 00 ] 15 errors : !nt (fffff807745963ae-fffff807745f76b4) MODULE_NAME: memory_corruption. IMAGE_NAME: memory_corruption. FOLLOWUP_NAME: memory_corruption. DEBUG_FLR_IMAGE_TIMESTAMP: 0. MEMORY_CORRUPTOR: LARGE. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE. BUCKET_ID: MEMORY_CORRUPTION_LARGE. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:memory_corruption_large. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption. --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard. coded breakpoint or assertion was hit, but this system was booted. /NODEBUG. This is not supposed to happen as developers should never have. hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the. system is booted /DEBUG. This will let us see why this breakpoint is. happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: fffff80329c4e0e7, The address that the exception occurred at. Arg3: fffff40ec86298d8, Exception Record Address. Arg4: ffffc601b19e2920, Context Record Address. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba. FAULTING_IP: nt!KeDeleteThread+1ca8cf. fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi. EXCEPTION_RECORD: fffff40ec86298d8 -- (.exr 0xfffff40ec86298d8) ExceptionAddress: fffff80329c4e0e7 (nt!KeDeleteThread+0x00000000001ca8cf) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000. NumberParameters: 2. Parameter[0]: 0000000000000000. Parameter[1]: ffffffffffffffff. Attempt to read from address ffffffffffffffff. CONTEXT: ffffc601b19e2920 -- (.cxr 0xffffc601b19e2920;r) rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001. rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470. rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff. r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8. r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000. r14=0000000000000000 r15=fffff8032a524440. iopl=0 nv up ei pl nz na po nc. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206. nt!KeDeleteThread+0x1ca8cf: fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=???????????????? Last set context: rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001. rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470. rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff. r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8. r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000. r14=0000000000000000 r15=fffff8032a524440. iopl=0 nv up ei pl nz na po nc. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206. nt!KeDeleteThread+0x1ca8cf: fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=???????????????? Resetting default scope. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: CODE_CORRUPTION. PROCESS_NAME: System. CURRENT_IRQL: 2. ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba. EXCEPTION_PARAMETER1: 0000000000000000. EXCEPTION_PARAMETER2: ffffffffffffffff. READ_ADDRESS: unable to get nt!MmSpecialPoolStart. unable to get nt!MmSpecialPoolEnd. unable to get nt!MmPagedPoolEnd. unable to get nt!MmNonPagedPoolStart. unable to get nt!MmSizeOfNonPagedPoolInBytes. ffffffffffffffff. FOLLOWUP_IP: nt!KeDeleteThread+1ca8cf. fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi. BUGCHECK_STR: AV. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre. EXCEPTION_STR: 0x0. LAST_CONTROL_TRANSFER: from fffff80329a836ac to fffff80329c4e0e7. STACK_TEXT: fffff40e`c8629b10 fffff803`29a836ac : ffffd70b`160b34d8 fffff803`29a83680 00000000`00000000 00000000`00000b00 : nt!KeDeleteThread+0x1ca8cf. fffff40e`c8629b40 fffff803`29ac1f15 : ffffd70b`0dc27540 ffffd70b`0ac6ecf0 ffffd70b`0ac6ecf0 ffffd70b`00000000 : nt!PspReaper+0x2c. fffff40e`c8629b70 fffff803`29a66dd5 : ffffd70b`0dc27540 00000000`00000080 ffffd70b`0ac8a080 00000000`00000001 : nt!ExpWorkerThread+0x105. fffff40e`c8629c10 fffff803`29bfb4f8 : ffffc601`b1908180 ffffd70b`0dc27540 fffff803`29a66d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55. fffff40e`c8629c60 00000000`00000000 : fffff40e`c862a000 fffff40e`c8624000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt. fffff80329b963ae-fffff80329b963b1 4 bytes - nt!MiFreeUltraMapping+32. [ a0 7d fb f6:00 3a 74 e8 ] 4 errors : !nt (fffff80329b963ae-fffff80329b963b1) MODULE_NAME: memory_corruption. IMAGE_NAME: memory_corruption. FOLLOWUP_NAME: memory_corruption. DEBUG_FLR_IMAGE_TIMESTAMP: 0. MEMORY_CORRUPTOR: LARGE. STACK_COMMAND: .cxr 0xffffc601b19e2920 ; kb. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE. BUCKET_ID: MEMORY_CORRUPTION_LARGE. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:memory_corruption_large. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption. --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: fffff8067b5f6ce8, memory referenced. Arg2: 00000000000000ff, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff8067b5f6ce8, address which referenced memory. Debugging Details: ------------------ READ_ADDRESS: unable to get nt!MmSpecialPoolStart. unable to get nt!MmSpecialPoolEnd. unable to get nt!MmPagedPoolEnd. unable to get nt!MmNonPagedPoolStart. unable to get nt!MmSizeOfNonPagedPoolInBytes. fffff8067b5f6ce8. CURRENT_IRQL: 0. FAULTING_IP: +64bd760751e9359. fffff806`7b5f6ce8 ?? ??? ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target. BUGCHECK_STR: DISABLED_INTERRUPT_FAULT. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: CODE_CORRUPTION. PROCESS_NAME: System. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre. DPC_STACK_BASE: FFFF91073F23EFB0. TRAP_FRAME: ffff91073f237aa0 -- (.trap 0xffff91073f237aa0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000. r8=0000000000000008 r9=0000000000000000 r10=0000fffff8068e81. r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up di ng nz na pe nc. fffff806`7b5f6ce8 ?? ??? Resetting default scope. LAST_CONTROL_TRANSFER: from fffff8067f605e69 to fffff8067f5f3ea0. FAILED_INSTRUCTION_ADDRESS: +64bd760751e9359. fffff806`7b5f6ce8 ?? ??? STACK_TEXT: ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx. ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69. ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469. ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8. ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a. ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140. ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080. ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763. ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90. STACK_COMMAND: kb. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt. fffff8067f5963ae-fffff8067f5963b1 4 bytes - nt!MiFreeUltraMapping+32. [ a0 7d fb f6:e0 e1 c3 87 ] 4 errors : !nt (fffff8067f5963ae-fffff8067f5963b1) MODULE_NAME: memory_corruption. IMAGE_NAME: memory_corruption. FOLLOWUP_NAME: memory_corruption. DEBUG_FLR_IMAGE_TIMESTAMP: 0. MEMORY_CORRUPTOR: LARGE. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE. BUCKET_ID: MEMORY_CORRUPTION_LARGE. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:memory_corruption_large. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption. ---------
DRIVER_IRQL_NOT_LESS_OR_EQUEL hatası driver hatasıdır bende de uzun bir süre vardı ekran kartımın driverını silip eski bir driverını kurunca düzelmişti. Genelde ekran kartı driverıyla alakalı oluyor ama başka bir driver da olabilir.
Memtest86 ile RAM'lerinizi test eder misiniz?Reis dediklerinizin hepsini yaptım.
Ekran kartında bir şey yok gibi değerlerde normaldi ısınmalar falan olsun.
4.40'da tekrar mavi ekran yedim sorun kodu ise şu DRIVER_IRQL_NOT_LESS_OR_EQUEL (üstte iste minidump dosyasını attım lütfen bakar mısınız)
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8067b5f6ce8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8067b5f6ce8, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OOL53A3
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22487
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff8067b5f6ce8
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8067b5f6ce8
READ_ADDRESS: fffff8067fefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8067b5f6ce8
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff91073f237aa0 -- (.trap 0xffff91073f237aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8068e81
r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
fffff806`7b5f6ce8 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`7b5f6ce8 ?? ???
STACK_TEXT:
ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69
ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469
ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8
ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a
ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140
ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080
ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763
ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
Followup: MachineOwner
---------
Memtest86 ile RAM'lerinizi test eder misiniz?
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: fffff8067b5f6ce8, memory referenced. Arg2: 00000000000000ff, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff8067b5f6ce8, address which referenced memory. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 3483. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-OOL53A3. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 22487. Key : Analysis.Memory.CommitPeak.Mb. Value: 76. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: d1. BUGCHECK_P1: fffff8067b5f6ce8. BUGCHECK_P2: ff. BUGCHECK_P3: 0. BUGCHECK_P4: fffff8067b5f6ce8. READ_ADDRESS: fffff8067fefa390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock. fffff8067fe0f2e0: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. fffff8067b5f6ce8. ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. TRAP_FRAME: ffff91073f237aa0 -- (.trap 0xffff91073f237aa0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000. r8=0000000000000008 r9=0000000000000000 r10=0000fffff8068e81. r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up di ng nz na pe nc. fffff806`7b5f6ce8 ?? ??? Resetting default scope. FAILED_INSTRUCTION_ADDRESS: +0. fffff806`7b5f6ce8 ?? ??? STACK_TEXT: ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx. ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69. ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469. ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8. ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a. ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140. ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080. ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763. ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90. SYMBOL_NAME: nt!KiPageFault+469. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.19041.508. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 469. FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36} Followup: MachineOwner. ---------
Son hata bellekle ilgili gözüküyor ama. İlginç.Reis ettim zaten 4 saat 20 dakika sürdü tam tamına fakat hiçbir erorrs yazmadı bir sorun çıkmadı.
DDU ile sürücü kaldırıp kurmadan sonra sorununuz çözüldü mü? Çözülmediyse yeni dosyaları atın.