KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807744cb380, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!KiTryUnwaitThread+50
fffff807`744cb380 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_RECORD: 1fba17458948c933 -- (.exr 0x1fba17458948c933)
Cannot read Exception record @ 1fba17458948c933
TRAP_FRAME: 0ff3000002401f45 -- (.trap 0xff3000002401f45)
Unable to read trap frame at 0ff30000`02401f45
LAST_CONTROL_TRANSFER: from fffff807746f4d4e to fffff807745f3ea0
STACK_TEXT:
ffffdd01`70528158 fffff807`746f4d4e : 00000000`0000001e ffffffff`c0000005 fffff807`744cb380 00000000`00000000 : nt!KeBugCheckEx
ffffdd01`70528160 fffff807`745fcd62 : fffff807`746f4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffdd01`705281a0 fffff807`74485027 : ffffdd01`70528710 00000000`00000000 ffff8e01`dec37c60 fffff807`745f7a0e : nt!RtlpExecuteHandlerForException+0x12
ffffdd01`705281d0 fffff807`74483ce6 : ffff8e01`dec37598 ffffdd01`70528e20 ffff8e01`dec37598 ffffbc07`13abd100 : nt!RtlDispatchException+0x297
ffffdd01`705288f0 fffff807`745f4d32 : 1fba1745`8948c933 c7076589`44000200 0ff30000`02401f45 20247489`4c27457f : nt!KiDispatchException+0x186
ffffdd01`70528fb0 fffff807`745f4d00 : fffff807`74605fa5 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8e01`dec37458 fffff807`74605fa5 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8e01`dec37460 fffff807`74601ce0 : fffff807`7443fff0 fffff807`7443b310 00000000`00000000 ffffbc07`0f7d29a8 : nt!KiExceptionDispatch+0x125
ffff8e01`dec37640 fffff807`744cb380 : 00000000`00000000 ffffbc07`0dbfaae0 00000000`00000001 00000000`00989680 : nt!KiGeneralProtectionFault+0x320
ffff8e01`dec377d0 fffff807`744c42a6 : ffffbc07`13abd188 00000000`00000000 ffffbc07`13abd250 00000000`00000000 : nt!KiTryUnwaitThread+0x50
ffff8e01`dec37830 fffff807`744c3e4c : ffffbc07`13abd180 00000000`00000000 ffff8e01`dec37b18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6
ffff8e01`dec378e0 fffff807`744e9509 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000aacd : nt!KiProcessExpiredTimerList+0xdc
ffff8e01`dec379d0 fffff807`745f7a0e : ffffffff`00000000 ffffdd01`70508180 ffffdd01`70513140 ffffbc07`141c1080 : nt!KiRetireDpcList+0x9d9
ffff8e01`dec37c60 00000000`00000000 : ffff8e01`dec38000 ffff8e01`dec32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff807745963ae-fffff807745963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:60 fe fc f9 ]
fffff807745f72ac-fffff807745f72ad 2 bytes - nt!KiIsrLinkage+43b (+0x60efe)
[ 48 ff:4c 8b ]
fffff807745f72b3-fffff807745f72b6 4 bytes - nt!KiIsrLinkage+442 (+0x07)
[ 0f 1f 44 00:e8 68 e1 61 ]
fffff807745f76b0-fffff807745f76b4 5 bytes - nt!KiCallUserMode+220 (+0x3fd)
[ ff e1 cc cc cc:e8 0b da 61 00 ]
15 errors : !nt (fffff807745963ae-fffff807745f76b4)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80329c4e0e7, The address that the exception occurred at
Arg3: fffff40ec86298d8, Exception Record Address
Arg4: ffffc601b19e2920, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!KeDeleteThread+1ca8cf
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi
EXCEPTION_RECORD: fffff40ec86298d8 -- (.exr 0xfffff40ec86298d8)
ExceptionAddress: fffff80329c4e0e7 (nt!KeDeleteThread+0x00000000001ca8cf)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffc601b19e2920 -- (.cxr 0xffffc601b19e2920;r)
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff
r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000
r14=0000000000000000 r15=fffff8032a524440
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Last set context:
rax=0400000000000000 rbx=ffffd70b160b3080 rcx=0400000000000001
rdx=0000000000001000 rsi=0000000000000000 rdi=ffffd70b160b3470
rip=fffff80329c4e0e7 rsp=fffff40ec8629b10 rbp=ffffffffffffffff
r8=000000000000000c r9=ffffc601b19c2180 r10=0000fffff80329a8
r11=ffffb5f987400000 r12=0000000000000b00 r13=0000000000000000
r14=0000000000000000 r15=fffff8032a524440
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!KeDeleteThread+0x1ca8cf:
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi ds:002b:04000000`00000009=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
FOLLOWUP_IP:
nt!KeDeleteThread+1ca8cf
fffff803`29c4e0e7 48397908 cmp qword ptr [rcx+8],rdi
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_STR: 0x0
LAST_CONTROL_TRANSFER: from fffff80329a836ac to fffff80329c4e0e7
STACK_TEXT:
fffff40e`c8629b10 fffff803`29a836ac : ffffd70b`160b34d8 fffff803`29a83680 00000000`00000000 00000000`00000b00 : nt!KeDeleteThread+0x1ca8cf
fffff40e`c8629b40 fffff803`29ac1f15 : ffffd70b`0dc27540 ffffd70b`0ac6ecf0 ffffd70b`0ac6ecf0 ffffd70b`00000000 : nt!PspReaper+0x2c
fffff40e`c8629b70 fffff803`29a66dd5 : ffffd70b`0dc27540 00000000`00000080 ffffd70b`0ac8a080 00000000`00000001 : nt!ExpWorkerThread+0x105
fffff40e`c8629c10 fffff803`29bfb4f8 : ffffc601`b1908180 ffffd70b`0dc27540 fffff803`29a66d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff40e`c8629c60 00000000`00000000 : fffff40e`c862a000 fffff40e`c8624000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80329b963ae-fffff80329b963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:00 3a 74 e8 ]
4 errors : !nt (fffff80329b963ae-fffff80329b963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffc601b19e2920 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8067b5f6ce8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8067b5f6ce8, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff8067b5f6ce8
CURRENT_IRQL: 0
FAULTING_IP:
+64bd760751e9359
fffff806`7b5f6ce8 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFF91073F23EFB0
TRAP_FRAME: ffff91073f237aa0 -- (.trap 0xffff91073f237aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067b5f6ce8 rsp=ffff91073f237c38 rbp=0000000000000000
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8068e81
r11=ffffaf79f4400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
fffff806`7b5f6ce8 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8067f605e69 to fffff8067f5f3ea0
FAILED_INSTRUCTION_ADDRESS:
+64bd760751e9359
fffff806`7b5f6ce8 ?? ???
STACK_TEXT:
ffff9107`3f237958 fffff806`7f605e69 : 00000000`0000000a fffff806`7b5f6ce8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff9107`3f237960 fffff806`7f602169 : 00000000`00000001 00000000`00000000 ffffbf81`edd08180 ffffd08f`e3328010 : nt!KiBugCheckDispatch+0x69
ffff9107`3f237aa0 fffff806`7b5f6ce8 : fffff806`7f5f79ca 00000000`00000010 00000000`00040282 ffff9107`3f237c60 : nt!KiPageFault+0x469
ffff9107`3f237c38 fffff806`7f5f79ca : 00000000`00000010 00000000`00040282 ffff9107`3f237c60 00000000`00000018 : 0xfffff806`7b5f6ce8
ffff9107`3f237c40 ffffbf81`edd13140 : ffffd08f`e6c92080 00000000`00000763 ffff9107`3f237c90 00000000`00000000 : nt!KiIdleLoop+0x5a
ffff9107`3f237c70 ffffd08f`e6c92080 : 00000000`00000763 ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 : 0xffffbf81`edd13140
ffff9107`3f237c78 00000000`00000763 : ffff9107`3f237c90 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 : 0xffffd08f`e6c92080
ffff9107`3f237c80 ffff9107`3f237c90 : 00000000`00000000 ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 : 0x763
ffff9107`3f237c88 00000000`00000000 : ffff9107`3f238000 ffff9107`3f232000 00000000`00000000 00000000`00000000 : 0xffff9107`3f237c90
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8067f5963ae-fffff8067f5963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:e0 e1 c3 87 ]
4 errors : !nt (fffff8067f5963ae-fffff8067f5963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------