NamertClk
Hectopat
- Katılım
- 12 Ekim 2017
- Mesajlar
- 347
- Çözümler
- 3
Daha fazla
- Cinsiyet
- Erkek
Son düzenleyen: Moderatör:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff8c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8801122c912, address which referenced memory
Debugging Details:
------------------
fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b1300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7916
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffffffffffff8c
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8801122c912
WRITE_ADDRESS: fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b12f0
GetUlongPtrFromAddress: unable to read from fffff800034b14a8
ffffffffffffff8c
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff880049be240 -- (.trap 0xfffff880049be240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008111490
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8801122c912 rsp=fffff880049be3d0 rbp=fffff880049be3d0
r8=fffffa8006c07000 r9=0000000000000002 r10=fffff880115e4db8
r11=fffffa800830da58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
amdkmdag+0x21b912:
fffff880`1122c912 20488b and byte ptr [rax-75h],cl ds:ffffffff`ffffff8c=??
Resetting default scope
MISALIGNED_IP:
amdkmdag+21b912
fffff880`1122c912 20488b and byte ptr [rax-75h],cl
STACK_TEXT:
fffff880`049be0f8 fffff800`032b5fe9 : 00000000`0000000a ffffffff`ffffff8c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`049be100 fffff800`032b3dce : 00000000`00000001 ffffffff`ffffff8c 00000000`00000000 fffff880`049be5c0 : nt!KiBugCheckDispatch+0x69
fffff880`049be240 fffff880`1122c912 : fffffa80`06be1020 fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd : nt!KiPageFault+0x44e
fffff880`049be3d0 fffffa80`06be1020 : fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 : amdkmdag+0x21b912
fffff880`049be3d8 fffffa80`08131200 : fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 : 0xfffffa80`06be1020
fffff880`049be3e0 fffffa80`08120020 : fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 00000000`00000000 : 0xfffffa80`08131200
fffff880`049be3e8 fffff880`112cbabd : fffffa80`08120020 fffff880`049be5c0 00000000`00000000 fffffa80`06992170 : 0xfffffa80`08120020
fffff880`049be3f0 fffffa80`08120020 : fffff880`049be5c0 00000000`00000000 fffffa80`06992170 00000000`00000246 : amdkmdag+0x2baabd
fffff880`049be3f8 fffff880`049be5c0 : 00000000`00000000 fffffa80`06992170 00000000`00000246 00000000`00000001 : 0xfffffa80`08120020
fffff880`049be400 00000000`00000000 : fffffa80`06992170 00000000`00000246 00000000`00000001 00000000`00000100 : 0xfffff880`049be5c0
SYMBOL_NAME: amdkmdag+21b912
MODULE_NAME: hardware
IMAGE_NAME: hardware
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_amdkmdag.sys
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {28c2d36a-10ec-7743-516b-554c363072af}
Followup: MachineOwner
---------
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: fffffa8008e41300, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: fffffa80089078ff, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This bugcheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the object's reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
fffff8000362f0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800036ea300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5378
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 18
BUGCHECK_P1: 0
BUGCHECK_P2: fffffa8008e41300
BUGCHECK_P3: 2
BUGCHECK_P4: fffffa80089078ff
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe.exe
STACK_TEXT:
fffff880`0ac92958 fffff800`03515b81 : 00000000`00000018 00000000`00000000 fffffa80`08e41300 00000000`00000002 : nt!KeBugCheckEx
fffff880`0ac92960 fffff800`0373224f : fffff880`0ac92b60 fffffa80`08e41300 00000000`0672fa40 fffffa80`09ab93b0 : nt! ?? ::FNODOBFM::`string'+0x22581
fffff880`0ac929c0 fffff800`034eec53 : fffffa80`08e24060 00000000`0672fa18 fffff880`0ac92a88 00000000`0d144340 : nt!NtRemoveIoCompletion+0x14f
fffff880`0ac92a70 00000000`76d98daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0672f9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d98daa
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+22581
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.24557
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+22581
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {a7f3f9de-8cb7-d588-8038-d198feb835f4}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000deadc007, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880111f1119, address which referenced memory
Debugging Details:
------------------
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ee300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2390
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4076
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: deadc007
BUGCHECK_P2: a
BUGCHECK_P3: 0
BUGCHECK_P4: fffff880111f1119
READ_ADDRESS: fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034ee2f0
GetUlongPtrFromAddress: unable to read from fffff800034ee4a8
00000000deadc007
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffff8800877f2f0 -- (.trap 0xfffff8800877f2f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008018000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff880111f1119 rsp=fffff8800877f488 rbp=fffffa8008018000
r8=fffffa8008037b60 r9=0000000000002d40 r10=00000000000000b5
r11=fffffa8008144ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
amdkmdag+0x183119:
fffff880`111f1119 8b8218010000 mov eax,dword ptr [rdx+118h] ds:00000000`deadc007=????????
Resetting default scope
STACK_TEXT:
fffff880`0877f1a8 fffff800`032f2fe9 : 00000000`0000000a 00000000`deadc007 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff880`0877f1b0 fffff800`032f0dce : 00000000`00000000 00000000`deadc007 fffff880`0877f300 fffff880`0877f550 : nt!KiBugCheckDispatch+0x69
fffff880`0877f2f0 fffff880`111f1119 : fffff880`111f1546 fffffa80`08018000 00000000`00000000 fffff880`0877f550 : nt!KiPageFault+0x44e
fffff880`0877f488 fffff880`111f1546 : fffffa80`08018000 00000000`00000000 fffff880`0877f550 fffffa80`08102000 : amdkmdag+0x183119
fffff880`0877f490 fffffa80`08018000 : 00000000`00000000 fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 : amdkmdag+0x183546
fffff880`0877f498 00000000`00000000 : fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 fffff880`111f0eee : 0xfffffa80`08018000
SYMBOL_NAME: amdkmdag+183119
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xD1_amdkmdag+183119
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {f3d38223-f324-e082-e608-a36548787e4b}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88010f695b2, address which referenced memory
Debugging Details:
------------------
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b7300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1937
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6820
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff88010f695b2
WRITE_ADDRESS: fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b72f0
GetUlongPtrFromAddress: unable to read from fffff800034b74a8
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff880026e52f0 -- (.trap 0xfffff880026e52f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008131200
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88010f695b2 rsp=fffff880026e5480 rbp=fffffa8007dafcf0
r8=fffffa8008490000 r9=0000000000000002 r10=fffff880113d5db8
r11=fffffa800830aa58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
amdkmdag+0x1675b2:
fffff880`10f695b2 0100 add dword ptr [rax],eax ds:00000000`00000000=????????
Resetting default scope
MISALIGNED_IP:
amdkmdag+1675b2
fffff880`10f695b2 0100 add dword ptr [rax],eax
STACK_TEXT:
fffff880`026e51a8 fffff800`032bbfe9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`026e51b0 fffff800`032b9dce : 00000000`00000001 00000000`00000000 00000000`00000000 fffff880`026e55c0 : nt!KiBugCheckDispatch+0x69
fffff880`026e52f0 fffff880`10f695b2 : fffffa80`0812e200 fffffa80`08120020 fffff880`1126e430 00000000`00000000 : nt!KiPageFault+0x44e
fffff880`026e5480 fffffa80`0812e200 : fffffa80`08120020 fffff880`1126e430 00000000`00000000 fffffa80`0812e200 : amdkmdag+0x1675b2
fffff880`026e5488 fffffa80`08120020 : fffff880`1126e430 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 : 0xfffffa80`0812e200
fffff880`026e5490 fffff880`1126e430 : 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 : 0xfffffa80`08120020
fffff880`026e5498 00000000`00000000 : fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 fffffa80`0812e200 : amdkmdag+0x46c430
SYMBOL_NAME: amdkmdag+1675b2
MODULE_NAME: hardware
IMAGE_NAME: hardware
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_amdkmdag.sys
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {28c2d36a-10ec-7743-516b-554c363072af}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880038e7b2e, Address of the instruction which caused the bugcheck
Arg3: fffff8800acaca50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b7300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5791
Key : Analysis.Memory.CommitPeak.Mb
Value: 64
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff880038e7b2e
BUGCHECK_P3: fffff8800acaca50
BUGCHECK_P4: 0
CONTEXT: fffff8800acaca50 -- (.cxr 0xfffff8800acaca50)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8800acad550
rdx=fffff900c021df01 rsi=fffff8800acad7f0 rdi=0000000000000000
rip=fffff880038e7b2e rsp=fffff8800acad420 rbp=fffff8a004556c90
r8=fffff8a0042429f0 r9=0000000000000952 r10=fffffa80069fe530
r11=fffff8a004548000 r12=0000000000000003 r13=0000000000000000
r14=0000000000001080 r15=00000000000000e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgkrnl!DXGCONTEXT::Present+0x32b2:
fffff880`038e7b2e 898424dc000000 mov dword ptr [rsp+0DCh],eax ss:0018:fffff880`0acad4fc=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff880`0acad420 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGCONTEXT::Present+0x32b2
SYMBOL_NAME: dxgkrnl!DXGCONTEXT::Present+32b2
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 6.1.7601.24546
STACK_COMMAND: .cxr 0xfffff8800acaca50 ; kb
FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!DXGCONTEXT::Present+32b2
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {c0395a61-7eb0-0328-14c6-a35e7848687c}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff88006bc4a95, The address that the exception occurred at
Arg3: fffff88002fc6678, Exception Record Address
Arg4: fffff88002fc5ee0, Context Record Address
Debugging Details:
------------------
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ee300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2093
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8689
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff88006bc4a95
BUGCHECK_P3: fffff88002fc6678
BUGCHECK_P4: fffff88002fc5ee0
EXCEPTION_RECORD: fffff88002fc6678 -- (.exr 0xfffff88002fc6678)
ExceptionAddress: fffff88006bc4a95 (farflt+0x0000000000009a95)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000000
CONTEXT: fffff88002fc5ee0 -- (.cxr 0xfffff88002fc5ee0)
rax=fffff88006bdfd18 rbx=fffffa8007de1840 rcx=0000000000000003
rdx=fffff80003435180 rsi=fffff88006bdfd28 rdi=fffff88006bdfd18
rip=fffff88006bc4a95 rsp=fffff88002fc68b0 rbp=fffffa8008699970
r8=0000000000011e18 r9=0000000000000030 r10=fffff80003250000
r11=0000000000000727 r12=0000000000000001 r13=fffff88000dcc201
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00000287
farflt+0x9a95:
fffff880`06bc4a95 cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM} Kesme Noktas Bir kesme noktas na ula ld .
EXCEPTION_CODE_STR: 80000003
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_STR: 0x80000003
STACK_TEXT:
fffff880`02fc68b0 00000000`00000001 : 00000000`00000000 fffffa80`6c557241 00000000`0000071b 00000000`00000001 : farflt+0x9a95
fffff880`02fc68b8 00000000`00000000 : fffffa80`6c557241 00000000`0000071b 00000000`00000001 fffff880`06bc5065 : 0x1
SYMBOL_NAME: farflt+9a95
MODULE_NAME: farflt
IMAGE_NAME: farflt.sys
STACK_COMMAND: .cxr 0xfffff88002fc5ee0 ; kb
FAILURE_BUCKET_ID: 0x7E_farflt+9a95
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {40ffe52a-30ab-4f34-3b15-5c6cd0594e74}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff800033dd7d8
Debugging Details:
------------------
fffff800033e60e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a1300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5002
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: 80050031
BUGCHECK_P3: 406f8
BUGCHECK_P4: fffff800033dd7d8
TRAP_FRAME: fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800943f8b0 rbx=0000000000000000 rcx=fffffa80088ef181
rdx=fffffa800943f8b1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033dd7d8 rsp=fffff300142881a0 rbp=0000000000000000
r8=fffffa800943f8b0 r9=00000000000000a0 r10=fffff800033e8d60
r11=fffffa80088ef180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ExFreePoolWithTag+0x248:
fffff800`033dd7d8 5f pop rdi
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTAIV.exe
BAD_STACK_POINTER: fffff300142881a0
STACK_TEXT:
fffff800`00ba6d28 fffff800`032a5fe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba6d30 fffff800`032a2a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba6e70 fffff800`033dd7d8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291
fffff300`142881a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248
SYMBOL_NAME: nt!KiDoubleFaultAbort+291
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.24557
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {226c6897-082d-0f7d-1b21-14822ef4ea3e}
Followup: MachineOwner
---------
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff88008d8f590, Virtual address for the attempted execute.
Arg2: 80000001507fc963, PTE contents.
Arg3: fffff88008d8f260, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b9300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3639
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: fc
BUGCHECK_P1: fffff88008d8f590
BUGCHECK_P2: 80000001507fc963
BUGCHECK_P3: fffff88008d8f260
BUGCHECK_P4: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTAIV.exe
TRAP_FRAME: fffff88008d8f260 -- (.trap 0xfffff88008d8f260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8009e49c60
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88008d8f590 rsp=fffff88008d8f3f0 rbp=fffff88008d8f3e0
r8=fffff88008d8f400 r9=0000000000000000 r10=fffffa80085fec28
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff880`08d8f590 10f0 adc al,dh
Resetting default scope
STACK_TEXT:
fffff880`08d8f108 fffff800`033890b0 : 00000000`000000fc fffff880`08d8f590 80000001`507fc963 fffff880`08d8f260 : nt!KeBugCheckEx
fffff880`08d8f110 fffff800`032bbcdc : 00000000`00000008 fffff880`08d8f590 00000000`63416500 fffffa80`099b4b20 : nt!MmAccessFault+0x1d20
fffff880`08d8f260 fffff880`08d8f590 : 00000000`1000000c fffffa80`065ef010 00000000`00000000 fffff880`010050f7 : nt!KiPageFault+0x35c
fffff880`08d8f3f0 00000000`1000000c : fffffa80`065ef010 00000000`00000000 fffff880`010050f7 fffffa80`00000000 : 0xfffff880`08d8f590
fffff880`08d8f3f8 fffffa80`065ef010 : 00000000`00000000 fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 : 0x1000000c
fffff880`08d8f400 00000000`00000000 : fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 fffffa80`08692230 : 0xfffffa80`065ef010
SYMBOL_NAME: nt!KiPageFault+35c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.24557
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xFC_nt!KiPageFault+35c
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {78ea4ca1-4a63-db29-9f18-d9a441d9c783}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff800033e97d8
Debugging Details:
------------------
fffff800033f20e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ad300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3342
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: 80050031
BUGCHECK_P3: 406f8
BUGCHECK_P4: fffff800033e97d8
TRAP_FRAME: fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800558bc60 rbx=0000000000000000 rcx=fffffa8009df1161
rdx=fffffa800558bc61 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033e97d8 rsp=fffff3000ef13550 rbp=0000000000000000
r8=fffffa800558bc60 r9=00000000000000a0 r10=fffff800033f4d60
r11=fffffa8009df1160 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!ExFreePoolWithTag+0x248:
fffff800`033e97d8 5f pop rdi
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTAIV.exe
BAD_STACK_POINTER: fffff3000ef13550
STACK_TEXT:
fffff800`00ba6d28 fffff800`032b1fe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba6d30 fffff800`032aea51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba6e70 fffff800`033e97d8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291
fffff300`0ef13550 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248
SYMBOL_NAME: nt!KiDoubleFaultAbort+291
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.24557
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {226c6897-082d-0f7d-1b21-14822ef4ea3e}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff1401fbbd504, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800032e7f2d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003504300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4997
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff1401fbbd504
BUGCHECK_P2: 0
BUGCHECK_P3: fffff800032e7f2d
BUGCHECK_P4: 7
READ_ADDRESS: fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800035042f0
GetUlongPtrFromAddress: unable to read from fffff800035044a8
fffff1401fbbd504
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88004bfdc40 -- (.trap 0xfffff88004bfdc40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00fddea30 rbx=0000000000000000 rcx=fffff8a00fddea7e
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e7f2d rsp=fffff88004bfddd8 rbp=fffff88004bfdfe0
r8=000000000000002a r9=fffff80003266000 r10=fffff8000344c840
r11=fffff8a00fddea7e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!memcpy+0x2d:
fffff800`032e7f2d 668b040a mov ax,word ptr [rdx+rcx] ds:fffff8a0`0fddea86=????
Resetting default scope
LOCK_ADDRESS: fffff800034d7240 -- (!locks fffff800034d7240)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff800034d7240) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff800034d7240
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
fffff880`04bfdae8 fffff800`033d2a48 : 00000000`00000050 fffff140`1fbbd504 00000000`00000000 fffff880`04bfdc40 : nt!KeBugCheckEx
fffff880`04bfdaf0 fffff800`03306cdc : 00000000`00000000 fffff140`1fbbd504 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x6b8
fffff880`04bfdc40 fffff800`032e7f2d : fffff800`0355e585 fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 : nt!KiPageFault+0x35c
fffff880`04bfddd8 fffff800`0355e585 : fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 fffff8a0`019f8b00 : nt!memcpy+0x2d
fffff880`04bfdde0 fffff800`037152bf : fffff8a0`00023160 fffff8a0`00023160 fffff880`04bfe001 fffff880`04bfe440 : nt!CmpGetSymbolicLink+0x1e5
fffff880`04bfdee0 fffff800`036720a4 : fffffa80`062be1c8 00000000`00000000 fffffa80`062be010 fffffa80`054c6f00 : nt!CmpParseKey+0xdef
fffff880`04bfe1d0 fffff800`0354d586 : 00000000`00000000 fffff880`04bfe350 00000000`00000240 fffffa80`05511a40 : nt!ObpLookupObjectName+0x784
fffff880`04bfe2d0 fffff800`0352f4f1 : fffff880`04bfe400 00000000`00000000 fffffa80`006ab500 00000000`0002391f : nt!ObOpenObjectByName+0x306
fffff880`04bfe3a0 fffff800`0352f202 : fffff880`04bfe7b8 fffff800`000f003f fffff880`04bfe7d0 00000000`00000111 : nt!CmCreateKey+0x2e1
fffff880`04bfe510 fffff800`03308c53 : 00000000`00000001 fffffa80`05478000 00000000`00001000 fffff800`0343e026 : nt!NtCreateKey+0x2e
fffff880`04bfe560 fffff800`032fe3e0 : fffff800`0359e492 00000000`00000001 20207050`032ec544 00000000`000000b5 : nt!KiSystemServiceCopyEnd+0x13
fffff880`04bfe768 fffff800`0359e492 : 00000000`00000001 20207050`032ec544 00000000`000000b5 fffff880`04bfe9e0 : nt!KiServiceLinkage
fffff880`04bfe770 fffff800`03595266 : 00000000`00000001 00000000`00000002 00000000`00000002 00000000`000f003f : nt!IopCreateRegistryKeyEx+0x7e
fffff880`04bfe840 fffff800`0359da6d : 00000000`00000002 00000000`00000000 fffff880`04bfea40 00000000`00000001 : nt!IopGetDeviceInterfaces+0x146
fffff880`04bfe9b0 fffff800`03595025 : 00000000`00000002 00000000`00000000 00000000`00000000 fffff8a0`0d5a66b0 : nt!PiGetInterfaceDeviceList+0x41
fffff880`04bfea10 fffff800`03566ca4 : fffff8a0`0d5a66b0 fffff800`00008000 fffff880`04bfeb01 fffff800`037a1de0 : nt!PiControlGetInterfaceDeviceList+0x111
fffff880`04bfea90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtPlugPlayControl+0x100
SYMBOL_NAME: nt!KiPageFault+35c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.24557
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x50_nt!KiPageFault+35c
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {abc8ff04-6eef-b968-5cc6-5fd732588240}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003e08502, address which referenced memory
Debugging Details:
------------------
fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a7300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1686
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4898
Key : Analysis.Memory.CommitPeak.Mb
Value: 64
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 58
BUGCHECK_P2: a
BUGCHECK_P3: 0
BUGCHECK_P4: fffff88003e08502
READ_ADDRESS: fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034a72f0
GetUlongPtrFromAddress: unable to read from fffff800034a74a8
0000000000000058
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff880009f7240 -- (.trap 0xfffff880009f7240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000007
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003e08502 rsp=fffff880009f73d0 rbp=fffffa80082d1410
r8=0000000000000001 r9=0000000000000000 r10=fffffa80082d1bd0
r11=fffffa8008322ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
fffff880`03e08502 837b5803 cmp dword ptr [rbx+58h],3 ds:00000000`00000058=????????
Resetting default scope
STACK_TEXT:
fffff880`009f70f8 fffff800`032abfe9 : 00000000`0000000a 00000000`00000058 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff880`009f7100 fffff800`032a9dce : 00000000`00000000 00000000`00000058 fffff880`112c2800 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009f7240 fffff880`03e08502 : fffffa80`08322cc0 fffffa80`082d1410 fffffa80`08322000 fffffa80`08322000 : nt!KiPageFault+0x44e
fffff880`009f73d0 fffff880`03e081a5 : fffffa80`08322000 00000000`00000000 fffffa80`00000001 fffff880`009f7540 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
fffff880`009f7460 fffff880`03e07fa6 : 00000000`00000247 00000000`00002701 fffffa80`082fa000 fffffa80`0677b000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ed
fffff880`009f74b0 fffff880`03edb13f : fffffa80`07219480 00000000`0000000f fffffa80`08172020 fffff880`11049bae : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`009f74e0 fffff880`10f67757 : fffff880`009f7610 fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`009f7510 fffff880`009f7610 : fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 : amdkmdag+0xfc757
fffff880`009f7518 fffff880`009f7610 : fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea : 0xfffff880`009f7610
fffff880`009f7520 fffff880`009f7590 : fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 : 0xfffff880`009f7610
fffff880`009f7528 fffff880`1102f478 : fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 0000000c`00000247 : 0xfffff880`009f7590
fffff880`009f7530 fffffa80`08172001 : fffff880`10f018ea fffffa80`00000001 0000000c`00000247 fffffa80`00000000 : amdkmdag+0x1c4478
fffff880`009f7538 fffff880`10f018ea : fffffa80`00000001 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 : 0xfffffa80`08172001
fffff880`009f7540 fffffa80`00000001 : 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 : amdkmdag+0x968ea
fffff880`009f7548 0000000c`00000247 : fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 : 0xfffffa80`00000001
fffff880`009f7550 fffffa80`00000000 : fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 00000000`00000000 : 0x0000000c`00000247
fffff880`009f7558 fffffa80`09799968 : fffffa80`09799968 fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 : 0xfffffa80`00000000
fffff880`009f7560 fffffa80`09799968 : fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 : 0xfffffa80`09799968
fffff880`009f7568 fffff880`10e76a40 : 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 : 0xfffffa80`09799968
fffff880`009f7570 00000000`00000000 : fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 fffffa80`0677b1c8 : amdkmdag+0xba40
SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+46
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 6.1.7601.24546
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {212d731e-833f-ded6-ccf2-de19468acde6}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000323df20, address which referenced memory
Debugging Details:
------------------
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b9300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1749
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6061
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8000323df20
READ_ADDRESS: fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b92f0
GetUlongPtrFromAddress: unable to read from fffff800034b94a8
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff8800371d340 -- (.trap 0xfffff8800371d340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000323df20 rsp=fffff8800371d4d8 rbp=0000000000000000
r8=fffffa8005503b88 r9=0000000000000002 r10=00000000000241a9
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!KeInterlockedClearProcessorAffinityEx+0x20:
fffff800`0323df20 894c2408 mov dword ptr [rsp+8],ecx ss:0018:fffff880`0371d4e0=00000002
Resetting default scope
STACK_TEXT:
fffff880`0371d1f8 fffff800`032bdfe9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0371d200 fffff800`032bbdce : 00000000`00000000 00000000`00000000 fffff880`0371d400 fffff880`02d00180 : nt!KiBugCheckDispatch+0x69
fffff880`0371d340 fffff800`0323df20 : fffff800`032b2465 00000000`00000002 00000000`00000000 fffffa80`07230000 : nt!KiPageFault+0x44e
fffff880`0371d4d8 fffff800`032b2465 : 00000000`00000002 00000000`00000000 fffffa80`07230000 00001f80`00ee00d3 : nt!KeInterlockedClearProcessorAffinityEx+0x20
fffff880`0371d4e0 fffff800`032b207a : 00000000`00000000 ffffffff`fffffffb fffff880`02d7b101 fffffa80`08092d50 : nt!SwapContext_PatchXSave+0xc5
fffff880`0371d520 fffff800`032641a2 : 00000000`00000000 fffffa80`084456c0 00000000`00000000 00000000`0000000b : nt!KiSwapContext+0x7a
fffff880`0371d660 fffff800`03256392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x1d2
fffff880`0371d6f0 fffff960`0013730d : 00000000`00000004 fffffa80`07cde220 00000000`00000001 00000000`0000000d : nt!KeWaitForMultipleObjects+0x272
fffff880`0371d9b0 00000000`00000004 : fffffa80`07cde220 00000000`00000001 00000000`0000000d fffff960`0036ae00 : win32k+0xc730d
fffff880`0371d9b8 fffffa80`07cde220 : 00000000`00000001 00000000`0000000d fffff960`0036ae00 00000000`000b0001 : 0x4
fffff880`0371d9c0 00000000`00000001 : 00000000`0000000d fffff960`0036ae00 00000000`000b0001 00000000`00000000 : 0xfffffa80`07cde220
fffff880`0371d9c8 00000000`0000000d : fffff960`0036ae00 00000000`000b0001 00000000`00000000 fffffa80`08443c90 : 0x1
fffff880`0371d9d0 fffff960`0036ae00 : 00000000`000b0001 00000000`00000000 fffffa80`08443c90 00000000`00000000 : 0xd
fffff880`0371d9d8 00000000`000b0001 : 00000000`00000000 fffffa80`08443c90 00000000`00000000 00000000`00000000 : win32k+0x2fae00
fffff880`0371d9e0 00000000`00000000 : fffffa80`08443c90 00000000`00000000 00000000`00000000 fffffa80`084391e0 : 0xb0001
SYMBOL_NAME: win32k+c730d
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xA_win32k+c730d
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {353837b9-bf73-ac32-d992-6f0de72e4b8f}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff880112b9de0, The address that the exception occurred at
Arg3: fffff88005f99178, Exception Record Address
Arg4: fffff88005f989e0, Context Record Address
Debugging Details:
------------------
fffff800034450e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003500300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1749
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6668
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff880112b9de0
BUGCHECK_P3: fffff88005f99178
BUGCHECK_P4: fffff88005f989e0
EXCEPTION_RECORD: fffff88005f99178 -- (.exr 0xfffff88005f99178)
ExceptionAddress: fffff880112b9de0 (amdkmdag+0x0000000000254de0)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000000
CONTEXT: fffff88005f989e0 -- (.cxr 0xfffff88005f989e0)
rax=fffffa800810c020 rbx=fffffa8008c75000 rcx=fffffa800810c020
rdx=fffffa8008110200 rsi=fffff88005f995c0 rdi=fffffa8008110200
rip=fffff880112b9de0 rsp=fffff88005f993b8 rbp=0000000000000000
r8=fffff88011657878 r9=0000000000000000 r10=0000000000000002
r11=0000000000000001 r12=fffffa8008c75000 r13=fffff88005f996c0
r14=fffffa8008110200 r15=fffffa8008c75020
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000246
amdkmdag+0x254de0:
fffff880`112b9de0 4c8bc1 mov r8,rcx
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM} Kesme Noktas Bir kesme noktas na ula ld .
EXCEPTION_CODE_STR: 80000003
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_STR: 0x80000003
STACK_TEXT:
fffff880`05f993b8 fffff880`1131fa11 : 00000000`0001c2e1 fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 : amdkmdag+0x254de0
fffff880`05f993c0 00000000`0001c2e1 : fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 : amdkmdag+0x2baa11
fffff880`05f993c8 fffff880`113153e0 : fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab : 0x1c2e1
fffff880`05f993d0 fffffa80`08c75020 : fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 : amdkmdag+0x2b03e0
fffff880`05f993d8 fffffa80`08110200 : fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 00000000`00000009 : 0xfffffa80`08c75020
fffff880`05f993e0 fffffa80`06a47000 : fffff880`1131feab 000000ff`4395c000 00000000`00000009 00000000`00000000 : 0xfffffa80`08110200
fffff880`05f993e8 fffff880`1131feab : 000000ff`4395c000 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 : 0xfffffa80`06a47000
fffff880`05f993f0 000000ff`4395c000 : 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 : amdkmdag+0x2baeab
fffff880`05f993f8 00000000`00000009 : 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 00000000`00000000 : 0x000000ff`4395c000
fffff880`05f99400 00000000`00000000 : fffffa80`07ed18d0 00000000`00000002 00000000`00000000 00000000`00000100 : 0x9
SYMBOL_NAME: amdkmdag+254de0
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .cxr 0xfffff88005f989e0 ; kb
FAILURE_BUCKET_ID: 0x7E_amdkmdag+254de0
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {e309d79c-74fa-4541-0c0e-f0390630a8da}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff7ff8e415511, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000321e7ef, address which referenced memory
Debugging Details:
------------------
fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a5300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4292
Key : Analysis.Memory.CommitPeak.Mb
Value: 61
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff7ff8e415511
BUGCHECK_P2: f
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8000321e7ef
READ_ADDRESS: fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034a52f0
GetUlongPtrFromAddress: unable to read from fffff800034a54a8
fffff7ff8e415511
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTAIV.exe
DPC_STACK_BASE: FFFFF880009FEFB0
TRAP_FRAME: fffff880009fec80 -- (.trap 0xfffff880009fec80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=fffff80003415510
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000321e7ef rsp=fffff880009fee10 rbp=fffff80003415510
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000049 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KeInsertQueueDpc+0x3f:
fffff800`0321e7ef 0f83a9010000 jae nt!KeInsertQueueDpc+0x1ee (fffff800`0321e99e) [br=0]
Resetting default scope
STACK_TEXT:
fffff880`009feb38 fffff800`032a9fe9 : 00000000`0000000a fffff7ff`8e415511 00000000`0000000f 00000000`00000000 : nt!KeBugCheckEx
fffff880`009feb40 fffff800`032a7dce : 00000000`00000000 fffff7ff`8e415511 00000000`00000200 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`009fec80 fffff800`0321e7ef : 00000000`003cfc11 00000000`00000000 fffffa80`0802d000 fffff880`040ddebc : nt!KiPageFault+0x44e
fffff880`009fee10 fffff800`03304d43 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`009aa180 : nt!KeInsertQueueDpc+0x3f
fffff880`009feea0 fffff800`033a4b77 : 00000000`00000049 00000000`00000000 00000002`89c93ea7 00000002`2f00eaff : nt!PpmCheckPhaseComplete+0x13
fffff880`009feed0 fffff800`03241dfc : fffff880`009aa180 fffffa80`0002aae5 fffffa80`07c84000 00000000`000000e5 : nt!PpmPerfAction+0x27
fffff880`009fef00 fffff800`0329e305 : 00000000`00000000 fffffa80`05fb1850 00000000`00000000 fffff800`033a4b50 : nt!KiRetireDpcList+0x1bc
fffff880`009fefb0 fffff800`0329e11c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`08108ab0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
SYMBOL_NAME: nt!KeInsertQueueDpc+3f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.24557
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xA_nt!KeInsertQueueDpc+3f
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {35faa44a-9f45-890c-9b38-be06ae6afc73}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88003e8b774, Address of the instruction which caused the bugcheck
Arg3: fffff88009e11890, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
fffff8000343f0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034fa300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1764
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4311
Key : Analysis.Memory.CommitPeak.Mb
Value: 63
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff88003e8b774
BUGCHECK_P3: fffff88009e11890
BUGCHECK_P4: 0
CONTEXT: fffff88009e11890 -- (.cxr 0xfffff88009e11890)
rax=fffff88009e12810 rbx=fffff8a00412ee40 rcx=fffff8a00412eed0
rdx=fffff8a00412ee40 rsi=000000003b0101ee rdi=fffff88009e127f0
rip=fffff88003e8b774 rsp=fffff88009e12260 rbp=0000000000000030
r8=00000000000110c1 r9=00000000000003e0 r10=fffff88009e127f0
r11=0000000000000000 r12=fffff96000308d50 r13=0000000010040195
r14=fffff88009e127f0 r15=0000000000000030
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4:
fffff880`03e8b774 004d1b add byte ptr [rbp+1Bh],cl ss:0018:00000000`0000004b=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
MISALIGNED_IP:
dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4
fffff880`03e8b774 004d1b add byte ptr [rbp+1Bh],cl
STACK_TEXT:
fffff880`09e12260 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4
SYMBOL_NAME: dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4
IMAGE_NAME: hardware
IMAGE_VERSION: 6.1.7601.24546
STACK_COMMAND: .cxr 0xfffff88009e11890 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_dxgkrnl.sys
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {4baef1c4-80c9-3ccc-f0ef-4c23adb576f1}
Followup: MachineOwner
---------
GTA 4'ü zaten zar zor bitirebildim AMD GPU sürücülerini bu forumda daha önce açtığım başlıklardaki tavsiyeler ışığında da defalarca silip tekrar yükledim ama AMD benim GPU ma sürücü yazılımı yapmayı becerememiş galiba Memtest86 testimde biraz kırmızı bölümler çıkmıştı kısacası bilgisayarım sakat ben de çözüm bulamadım aylarca artık böyle idare etmeye çalışıyorum. Desteğiniz için teşekkürler.Mavi ekran hatalarınızın neredeyse tamamı AMD GPU'nuz kaynaklı. DDU ile AMD GPU sürücünüzü kaldırıp yeniden kurmayı deneyebilirsiniz.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Sorununuz çözülmezse artık GPU'yu değiştirmekten başka çare göremiyorum.
Ek olarak, MemTest86 ile belleklerinizde tarama yapmanız iyi olacaktır.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Malwarebytes kaynaklı hata aldığınızı da görüyorum ancak yazılımlar genellikle kendi içlerinde hata verir. Yine de bir süreliğine kaldırırsanız güzel olur ama sorunun payında Malwarebytes'ın olduğunu zannetmiyorum.
Sorununuz çözülürse GTA 4 oynarken kanser olmamanız dileğiyle.
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffffffffffff8c, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff8801122c912, address which referenced memory Debugging Details: ------------------ fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034b1300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2640 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7916 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: ffffffffffffff8c BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8801122c912 WRITE_ADDRESS: fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800034b12f0 GetUlongPtrFromAddress: unable to read from fffff800034b14a8 ffffffffffffff8c CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff880049be240 -- (.trap 0xfffff880049be240) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008111490 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8801122c912 rsp=fffff880049be3d0 rbp=fffff880049be3d0 r8=fffffa8006c07000 r9=0000000000000002 r10=fffff880115e4db8 r11=fffffa800830da58 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc amdkmdag+0x21b912: fffff880`1122c912 20488b and byte ptr [rax-75h],cl ds:ffffffff`ffffff8c=?? Resetting default scope MISALIGNED_IP: amdkmdag+21b912 fffff880`1122c912 20488b and byte ptr [rax-75h],cl STACK_TEXT: fffff880`049be0f8 fffff800`032b5fe9 : 00000000`0000000a ffffffff`ffffff8c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`049be100 fffff800`032b3dce : 00000000`00000001 ffffffff`ffffff8c 00000000`00000000 fffff880`049be5c0 : nt!KiBugCheckDispatch+0x69 fffff880`049be240 fffff880`1122c912 : fffffa80`06be1020 fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd : nt!KiPageFault+0x44e fffff880`049be3d0 fffffa80`06be1020 : fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 : amdkmdag+0x21b912 fffff880`049be3d8 fffffa80`08131200 : fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 : 0xfffffa80`06be1020 fffff880`049be3e0 fffffa80`08120020 : fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 00000000`00000000 : 0xfffffa80`08131200 fffff880`049be3e8 fffff880`112cbabd : fffffa80`08120020 fffff880`049be5c0 00000000`00000000 fffffa80`06992170 : 0xfffffa80`08120020 fffff880`049be3f0 fffffa80`08120020 : fffff880`049be5c0 00000000`00000000 fffffa80`06992170 00000000`00000246 : amdkmdag+0x2baabd fffff880`049be3f8 fffff880`049be5c0 : 00000000`00000000 fffffa80`06992170 00000000`00000246 00000000`00000001 : 0xfffffa80`08120020 fffff880`049be400 00000000`00000000 : fffffa80`06992170 00000000`00000246 00000000`00000001 00000000`00000100 : 0xfffff880`049be5c0 SYMBOL_NAME: amdkmdag+21b912 MODULE_NAME: hardware IMAGE_NAME: hardware STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: IP_MISALIGNED_amdkmdag.sys OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {28c2d36a-10ec-7743-516b-554c363072af} Followup: MachineOwner --------- REFERENCE_BY_POINTER (18) Arguments: Arg1: 0000000000000000, Object type of the object whose reference count is being lowered Arg2: fffffa8008e41300, Object whose reference count is being lowered Arg3: 0000000000000002, Reserved Arg4: fffffa80089078ff, Reserved The reference count of an object is illegal for the current state of the object. Each time a driver uses a pointer to an object the driver calls a kernel routine to increment the reference count of the object. When the driver is done with the pointer the driver calls another kernel routine to decrement the reference count. Drivers must match calls to the increment and decrement routines. This bugcheck can occur because an object's reference count goes to zero while there are still open handles to the object, in which case the fourth parameter indicates the number of opened handles. It may also occur when the object's reference count drops below zero whether or not there are open handles to the object, and in that case the fourth parameter contains the actual value of the pointer references count. Debugging Details: ------------------ fffff8000362f0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800036ea300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2546 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5378 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 18 BUGCHECK_P1: 0 BUGCHECK_P2: fffffa8008e41300 BUGCHECK_P3: 2 BUGCHECK_P4: fffffa80089078ff CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe.exe STACK_TEXT: fffff880`0ac92958 fffff800`03515b81 : 00000000`00000018 00000000`00000000 fffffa80`08e41300 00000000`00000002 : nt!KeBugCheckEx fffff880`0ac92960 fffff800`0373224f : fffff880`0ac92b60 fffffa80`08e41300 00000000`0672fa40 fffffa80`09ab93b0 : nt! ?? ::FNODOBFM::`string'+0x22581 fffff880`0ac929c0 fffff800`034eec53 : fffffa80`08e24060 00000000`0672fa18 fffff880`0ac92a88 00000000`0d144340 : nt!NtRemoveIoCompletion+0x14f fffff880`0ac92a70 00000000`76d98daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0672f9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d98daa SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+22581 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 6.1.7601.24557 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+22581 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {a7f3f9de-8cb7-d588-8038-d198feb835f4} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000deadc007, memory referenced Arg2: 000000000000000a, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff880111f1119, address which referenced memory Debugging Details: ------------------ fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034ee300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2390 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 4076 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: deadc007 BUGCHECK_P2: a BUGCHECK_P3: 0 BUGCHECK_P4: fffff880111f1119 READ_ADDRESS: fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800034ee2f0 GetUlongPtrFromAddress: unable to read from fffff800034ee4a8 00000000deadc007 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe TRAP_FRAME: fffff8800877f2f0 -- (.trap 0xfffff8800877f2f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008018000 rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000 rip=fffff880111f1119 rsp=fffff8800877f488 rbp=fffffa8008018000 r8=fffffa8008037b60 r9=0000000000002d40 r10=00000000000000b5 r11=fffffa8008144ce0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc amdkmdag+0x183119: fffff880`111f1119 8b8218010000 mov eax,dword ptr [rdx+118h] ds:00000000`deadc007=???????? Resetting default scope STACK_TEXT: fffff880`0877f1a8 fffff800`032f2fe9 : 00000000`0000000a 00000000`deadc007 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx fffff880`0877f1b0 fffff800`032f0dce : 00000000`00000000 00000000`deadc007 fffff880`0877f300 fffff880`0877f550 : nt!KiBugCheckDispatch+0x69 fffff880`0877f2f0 fffff880`111f1119 : fffff880`111f1546 fffffa80`08018000 00000000`00000000 fffff880`0877f550 : nt!KiPageFault+0x44e fffff880`0877f488 fffff880`111f1546 : fffffa80`08018000 00000000`00000000 fffff880`0877f550 fffffa80`08102000 : amdkmdag+0x183119 fffff880`0877f490 fffffa80`08018000 : 00000000`00000000 fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 : amdkmdag+0x183546 fffff880`0877f498 00000000`00000000 : fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 fffff880`111f0eee : 0xfffffa80`08018000 SYMBOL_NAME: amdkmdag+183119 MODULE_NAME: amdkmdag IMAGE_NAME: amdkmdag.sys STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0xD1_amdkmdag+183119 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {f3d38223-f324-e082-e608-a36548787e4b} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88010f695b2, address which referenced memory Debugging Details: ------------------ fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034b7300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1937 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6820 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff88010f695b2 WRITE_ADDRESS: fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800034b72f0 GetUlongPtrFromAddress: unable to read from fffff800034b74a8 0000000000000000 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff880026e52f0 -- (.trap 0xfffff880026e52f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008131200 rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88010f695b2 rsp=fffff880026e5480 rbp=fffffa8007dafcf0 r8=fffffa8008490000 r9=0000000000000002 r10=fffff880113d5db8 r11=fffffa800830aa58 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac po cy amdkmdag+0x1675b2: fffff880`10f695b2 0100 add dword ptr [rax],eax ds:00000000`00000000=???????? Resetting default scope MISALIGNED_IP: amdkmdag+1675b2 fffff880`10f695b2 0100 add dword ptr [rax],eax STACK_TEXT: fffff880`026e51a8 fffff800`032bbfe9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`026e51b0 fffff800`032b9dce : 00000000`00000001 00000000`00000000 00000000`00000000 fffff880`026e55c0 : nt!KiBugCheckDispatch+0x69 fffff880`026e52f0 fffff880`10f695b2 : fffffa80`0812e200 fffffa80`08120020 fffff880`1126e430 00000000`00000000 : nt!KiPageFault+0x44e fffff880`026e5480 fffffa80`0812e200 : fffffa80`08120020 fffff880`1126e430 00000000`00000000 fffffa80`0812e200 : amdkmdag+0x1675b2 fffff880`026e5488 fffffa80`08120020 : fffff880`1126e430 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 : 0xfffffa80`0812e200 fffff880`026e5490 fffff880`1126e430 : 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 : 0xfffffa80`08120020 fffff880`026e5498 00000000`00000000 : fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 fffffa80`0812e200 : amdkmdag+0x46c430 SYMBOL_NAME: amdkmdag+1675b2 MODULE_NAME: hardware IMAGE_NAME: hardware STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: IP_MISALIGNED_amdkmdag.sys OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {28c2d36a-10ec-7743-516b-554c363072af} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff880038e7b2e, Address of the instruction which caused the bugcheck Arg3: fffff8800acaca50, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034b7300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1890 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5791 Key : Analysis.Memory.CommitPeak.Mb Value: 64 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff880038e7b2e BUGCHECK_P3: fffff8800acaca50 BUGCHECK_P4: 0 CONTEXT: fffff8800acaca50 -- (.cxr 0xfffff8800acaca50) rax=0000000000000000 rbx=0000000000000000 rcx=fffff8800acad550 rdx=fffff900c021df01 rsi=fffff8800acad7f0 rdi=0000000000000000 rip=fffff880038e7b2e rsp=fffff8800acad420 rbp=fffff8a004556c90 r8=fffff8a0042429f0 r9=0000000000000952 r10=fffffa80069fe530 r11=fffff8a004548000 r12=0000000000000003 r13=0000000000000000 r14=0000000000001080 r15=00000000000000e0 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 dxgkrnl!DXGCONTEXT::Present+0x32b2: fffff880`038e7b2e 898424dc000000 mov dword ptr [rsp+0DCh],eax ss:0018:fffff880`0acad4fc=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe STACK_TEXT: fffff880`0acad420 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGCONTEXT::Present+0x32b2 SYMBOL_NAME: dxgkrnl!DXGCONTEXT::Present+32b2 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 6.1.7601.24546 STACK_COMMAND: .cxr 0xfffff8800acaca50 ; kb FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!DXGCONTEXT::Present+32b2 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {c0395a61-7eb0-0328-14c6-a35e7848687c} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffff80000003, The exception code that was not handled Arg2: fffff88006bc4a95, The address that the exception occurred at Arg3: fffff88002fc6678, Exception Record Address Arg4: fffff88002fc5ee0, Context Record Address Debugging Details: ------------------ fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034ee300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2093 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 8689 Key : Analysis.Memory.CommitPeak.Mb Value: 62 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffff80000003 BUGCHECK_P2: fffff88006bc4a95 BUGCHECK_P3: fffff88002fc6678 BUGCHECK_P4: fffff88002fc5ee0 EXCEPTION_RECORD: fffff88002fc6678 -- (.exr 0xfffff88002fc6678) ExceptionAddress: fffff88006bc4a95 (farflt+0x0000000000009a95) ExceptionCode: 80000003 (Break instruction exception) ExceptionFlags: 00000000 NumberParameters: 1 Parameter[0]: 0000000000000000 CONTEXT: fffff88002fc5ee0 -- (.cxr 0xfffff88002fc5ee0) rax=fffff88006bdfd18 rbx=fffffa8007de1840 rcx=0000000000000003 rdx=fffff80003435180 rsi=fffff88006bdfd28 rdi=fffff88006bdfd18 rip=fffff88006bc4a95 rsp=fffff88002fc68b0 rbp=fffffa8008699970 r8=0000000000011e18 r9=0000000000000030 r10=fffff80003250000 r11=0000000000000727 r12=0000000000000001 r13=fffff88000dcc201 r14=0000000000000000 r15=0000000000000001 iopl=0 nv up ei ng nz na po cy cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00000287 farflt+0x9a95: fffff880`06bc4a95 cc int 3 Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM} Kesme Noktas Bir kesme noktas na ula ld . EXCEPTION_CODE_STR: 80000003 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_STR: 0x80000003 STACK_TEXT: fffff880`02fc68b0 00000000`00000001 : 00000000`00000000 fffffa80`6c557241 00000000`0000071b 00000000`00000001 : farflt+0x9a95 fffff880`02fc68b8 00000000`00000000 : fffffa80`6c557241 00000000`0000071b 00000000`00000001 fffff880`06bc5065 : 0x1 SYMBOL_NAME: farflt+9a95 MODULE_NAME: farflt IMAGE_NAME: farflt.sys STACK_COMMAND: .cxr 0xfffff88002fc5ee0 ; kb FAILURE_BUCKET_ID: 0x7E_farflt+9a95 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {40ffe52a-30ab-4f34-3b15-5c6cd0594e74} Followup: MachineOwner --------- UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050031 Arg3: 00000000000406f8 Arg4: fffff800033dd7d8 Debugging Details: ------------------ fffff800033e60e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034a1300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2124 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5002 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7f BUGCHECK_P1: 8 BUGCHECK_P2: 80050031 BUGCHECK_P3: 406f8 BUGCHECK_P4: fffff800033dd7d8 TRAP_FRAME: fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa800943f8b0 rbx=0000000000000000 rcx=fffffa80088ef181 rdx=fffffa800943f8b1 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800033dd7d8 rsp=fffff300142881a0 rbp=0000000000000000 r8=fffffa800943f8b0 r9=00000000000000a0 r10=fffff800033e8d60 r11=fffffa80088ef180 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!ExFreePoolWithTag+0x248: fffff800`033dd7d8 5f pop rdi Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: GTAIV.exe BAD_STACK_POINTER: fffff300142881a0 STACK_TEXT: fffff800`00ba6d28 fffff800`032a5fe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx fffff800`00ba6d30 fffff800`032a2a51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`00ba6e70 fffff800`033dd7d8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291 fffff300`142881a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248 SYMBOL_NAME: nt!KiDoubleFaultAbort+291 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 6.1.7601.24557 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {226c6897-082d-0f7d-1b21-14822ef4ea3e} Followup: MachineOwner --------- ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff88008d8f590, Virtual address for the attempted execute. Arg2: 80000001507fc963, PTE contents. Arg3: fffff88008d8f260, (reserved) Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034b9300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2140 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3639 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: fc BUGCHECK_P1: fffff88008d8f590 BUGCHECK_P2: 80000001507fc963 BUGCHECK_P3: fffff88008d8f260 BUGCHECK_P4: 2 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: GTAIV.exe TRAP_FRAME: fffff88008d8f260 -- (.trap 0xfffff88008d8f260) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8009e49c60 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88008d8f590 rsp=fffff88008d8f3f0 rbp=fffff88008d8f3e0 r8=fffff88008d8f400 r9=0000000000000000 r10=fffffa80085fec28 r11=0000000000000011 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc fffff880`08d8f590 10f0 adc al,dh Resetting default scope STACK_TEXT: fffff880`08d8f108 fffff800`033890b0 : 00000000`000000fc fffff880`08d8f590 80000001`507fc963 fffff880`08d8f260 : nt!KeBugCheckEx fffff880`08d8f110 fffff800`032bbcdc : 00000000`00000008 fffff880`08d8f590 00000000`63416500 fffffa80`099b4b20 : nt!MmAccessFault+0x1d20 fffff880`08d8f260 fffff880`08d8f590 : 00000000`1000000c fffffa80`065ef010 00000000`00000000 fffff880`010050f7 : nt!KiPageFault+0x35c fffff880`08d8f3f0 00000000`1000000c : fffffa80`065ef010 00000000`00000000 fffff880`010050f7 fffffa80`00000000 : 0xfffff880`08d8f590 fffff880`08d8f3f8 fffffa80`065ef010 : 00000000`00000000 fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 : 0x1000000c fffff880`08d8f400 00000000`00000000 : fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 fffffa80`08692230 : 0xfffffa80`065ef010 SYMBOL_NAME: nt!KiPageFault+35c MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 6.1.7601.24557 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0xFC_nt!KiPageFault+35c OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {78ea4ca1-4a63-db29-9f18-d9a441d9c783} Followup: MachineOwner --------- UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050031 Arg3: 00000000000406f8 Arg4: fffff800033e97d8 Debugging Details: ------------------ fffff800033f20e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034ad300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1905 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 3342 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7f BUGCHECK_P1: 8 BUGCHECK_P2: 80050031 BUGCHECK_P3: 406f8 BUGCHECK_P4: fffff800033e97d8 TRAP_FRAME: fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa800558bc60 rbx=0000000000000000 rcx=fffffa8009df1161 rdx=fffffa800558bc61 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800033e97d8 rsp=fffff3000ef13550 rbp=0000000000000000 r8=fffffa800558bc60 r9=00000000000000a0 r10=fffff800033f4d60 r11=fffffa8009df1160 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po cy nt!ExFreePoolWithTag+0x248: fffff800`033e97d8 5f pop rdi Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: GTAIV.exe BAD_STACK_POINTER: fffff3000ef13550 STACK_TEXT: fffff800`00ba6d28 fffff800`032b1fe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx fffff800`00ba6d30 fffff800`032aea51 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff800`00ba6e70 fffff800`033e97d8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291 fffff300`0ef13550 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248 SYMBOL_NAME: nt!KiDoubleFaultAbort+291 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 6.1.7601.24557 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {226c6897-082d-0f7d-1b21-14822ef4ea3e} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff1401fbbd504, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff800032e7f2d, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000007, (reserved) Debugging Details: ------------------ Could not read faulting driver name fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff80003504300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2452 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 4997 Key : Analysis.Memory.CommitPeak.Mb Value: 62 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: fffff1401fbbd504 BUGCHECK_P2: 0 BUGCHECK_P3: fffff800032e7f2d BUGCHECK_P4: 7 READ_ADDRESS: fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800035042f0 GetUlongPtrFromAddress: unable to read from fffff800035044a8 fffff1401fbbd504 MM_INTERNAL_CODE: 7 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe TRAP_FRAME: fffff88004bfdc40 -- (.trap 0xfffff88004bfdc40) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8a00fddea30 rbx=0000000000000000 rcx=fffff8a00fddea7e rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800032e7f2d rsp=fffff88004bfddd8 rbp=fffff88004bfdfe0 r8=000000000000002a r9=fffff80003266000 r10=fffff8000344c840 r11=fffff8a00fddea7e r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!memcpy+0x2d: fffff800`032e7f2d 668b040a mov ax,word ptr [rdx+rcx] ds:fffff8a0`0fddea86=???? Resetting default scope LOCK_ADDRESS: fffff800034d7240 -- (!locks fffff800034d7240) Cannot get _ERESOURCE type Resource @ nt!PiEngineLock (0xfffff800034d7240) Available 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff800034d7240 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 STACK_TEXT: fffff880`04bfdae8 fffff800`033d2a48 : 00000000`00000050 fffff140`1fbbd504 00000000`00000000 fffff880`04bfdc40 : nt!KeBugCheckEx fffff880`04bfdaf0 fffff800`03306cdc : 00000000`00000000 fffff140`1fbbd504 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x6b8 fffff880`04bfdc40 fffff800`032e7f2d : fffff800`0355e585 fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 : nt!KiPageFault+0x35c fffff880`04bfddd8 fffff800`0355e585 : fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 fffff8a0`019f8b00 : nt!memcpy+0x2d fffff880`04bfdde0 fffff800`037152bf : fffff8a0`00023160 fffff8a0`00023160 fffff880`04bfe001 fffff880`04bfe440 : nt!CmpGetSymbolicLink+0x1e5 fffff880`04bfdee0 fffff800`036720a4 : fffffa80`062be1c8 00000000`00000000 fffffa80`062be010 fffffa80`054c6f00 : nt!CmpParseKey+0xdef fffff880`04bfe1d0 fffff800`0354d586 : 00000000`00000000 fffff880`04bfe350 00000000`00000240 fffffa80`05511a40 : nt!ObpLookupObjectName+0x784 fffff880`04bfe2d0 fffff800`0352f4f1 : fffff880`04bfe400 00000000`00000000 fffffa80`006ab500 00000000`0002391f : nt!ObOpenObjectByName+0x306 fffff880`04bfe3a0 fffff800`0352f202 : fffff880`04bfe7b8 fffff800`000f003f fffff880`04bfe7d0 00000000`00000111 : nt!CmCreateKey+0x2e1 fffff880`04bfe510 fffff800`03308c53 : 00000000`00000001 fffffa80`05478000 00000000`00001000 fffff800`0343e026 : nt!NtCreateKey+0x2e fffff880`04bfe560 fffff800`032fe3e0 : fffff800`0359e492 00000000`00000001 20207050`032ec544 00000000`000000b5 : nt!KiSystemServiceCopyEnd+0x13 fffff880`04bfe768 fffff800`0359e492 : 00000000`00000001 20207050`032ec544 00000000`000000b5 fffff880`04bfe9e0 : nt!KiServiceLinkage fffff880`04bfe770 fffff800`03595266 : 00000000`00000001 00000000`00000002 00000000`00000002 00000000`000f003f : nt!IopCreateRegistryKeyEx+0x7e fffff880`04bfe840 fffff800`0359da6d : 00000000`00000002 00000000`00000000 fffff880`04bfea40 00000000`00000001 : nt!IopGetDeviceInterfaces+0x146 fffff880`04bfe9b0 fffff800`03595025 : 00000000`00000002 00000000`00000000 00000000`00000000 fffff8a0`0d5a66b0 : nt!PiGetInterfaceDeviceList+0x41 fffff880`04bfea10 fffff800`03566ca4 : fffff8a0`0d5a66b0 fffff800`00008000 fffff880`04bfeb01 fffff800`037a1de0 : nt!PiControlGetInterfaceDeviceList+0x111 fffff880`04bfea90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtPlugPlayControl+0x100 SYMBOL_NAME: nt!KiPageFault+35c MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 6.1.7601.24557 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0x50_nt!KiPageFault+35c OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {abc8ff04-6eef-b968-5cc6-5fd732588240} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000058, memory referenced Arg2: 000000000000000a, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff88003e08502, address which referenced memory Debugging Details: ------------------ fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034a7300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1686 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 4898 Key : Analysis.Memory.CommitPeak.Mb Value: 64 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: 58 BUGCHECK_P2: a BUGCHECK_P3: 0 BUGCHECK_P4: fffff88003e08502 READ_ADDRESS: fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800034a72f0 GetUlongPtrFromAddress: unable to read from fffff800034a74a8 0000000000000058 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff880009f7240 -- (.trap 0xfffff880009f7240) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000007 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88003e08502 rsp=fffff880009f73d0 rbp=fffffa80082d1410 r8=0000000000000001 r9=0000000000000000 r10=fffffa80082d1bd0 r11=fffffa8008322ce0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac po cy dxgmms1!VidSchiProcessIsrCompletedPacket+0x46: fffff880`03e08502 837b5803 cmp dword ptr [rbx+58h],3 ds:00000000`00000058=???????? Resetting default scope STACK_TEXT: fffff880`009f70f8 fffff800`032abfe9 : 00000000`0000000a 00000000`00000058 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx fffff880`009f7100 fffff800`032a9dce : 00000000`00000000 00000000`00000058 fffff880`112c2800 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`009f7240 fffff880`03e08502 : fffffa80`08322cc0 fffffa80`082d1410 fffffa80`08322000 fffffa80`08322000 : nt!KiPageFault+0x44e fffff880`009f73d0 fffff880`03e081a5 : fffffa80`08322000 00000000`00000000 fffffa80`00000001 fffff880`009f7540 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46 fffff880`009f7460 fffff880`03e07fa6 : 00000000`00000247 00000000`00002701 fffffa80`082fa000 fffffa80`0677b000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ed fffff880`009f74b0 fffff880`03edb13f : fffffa80`07219480 00000000`0000000f fffffa80`08172020 fffff880`11049bae : dxgmms1!VidSchDdiNotifyInterrupt+0x9e fffff880`009f74e0 fffff880`10f67757 : fffff880`009f7610 fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 : dxgkrnl!DxgNotifyInterruptCB+0x83 fffff880`009f7510 fffff880`009f7610 : fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 : amdkmdag+0xfc757 fffff880`009f7518 fffff880`009f7610 : fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea : 0xfffff880`009f7610 fffff880`009f7520 fffff880`009f7590 : fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 : 0xfffff880`009f7610 fffff880`009f7528 fffff880`1102f478 : fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 0000000c`00000247 : 0xfffff880`009f7590 fffff880`009f7530 fffffa80`08172001 : fffff880`10f018ea fffffa80`00000001 0000000c`00000247 fffffa80`00000000 : amdkmdag+0x1c4478 fffff880`009f7538 fffff880`10f018ea : fffffa80`00000001 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 : 0xfffffa80`08172001 fffff880`009f7540 fffffa80`00000001 : 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 : amdkmdag+0x968ea fffff880`009f7548 0000000c`00000247 : fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 : 0xfffffa80`00000001 fffff880`009f7550 fffffa80`00000000 : fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 00000000`00000000 : 0x0000000c`00000247 fffff880`009f7558 fffffa80`09799968 : fffffa80`09799968 fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 : 0xfffffa80`00000000 fffff880`009f7560 fffffa80`09799968 : fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 : 0xfffffa80`09799968 fffff880`009f7568 fffff880`10e76a40 : 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 : 0xfffffa80`09799968 fffff880`009f7570 00000000`00000000 : fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 fffffa80`0677b1c8 : amdkmdag+0xba40 SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+46 MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys IMAGE_VERSION: 6.1.7601.24546 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {212d731e-833f-ded6-ccf2-de19468acde6} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8000323df20, address which referenced memory Debugging Details: ------------------ fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034b9300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1749 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6061 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8000323df20 READ_ADDRESS: fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800034b92f0 GetUlongPtrFromAddress: unable to read from fffff800034b94a8 0000000000000000 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe TRAP_FRAME: fffff8800371d340 -- (.trap 0xfffff8800371d340) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000323df20 rsp=fffff8800371d4d8 rbp=0000000000000000 r8=fffffa8005503b88 r9=0000000000000002 r10=00000000000241a9 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe nc nt!KeInterlockedClearProcessorAffinityEx+0x20: fffff800`0323df20 894c2408 mov dword ptr [rsp+8],ecx ss:0018:fffff880`0371d4e0=00000002 Resetting default scope STACK_TEXT: fffff880`0371d1f8 fffff800`032bdfe9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`0371d200 fffff800`032bbdce : 00000000`00000000 00000000`00000000 fffff880`0371d400 fffff880`02d00180 : nt!KiBugCheckDispatch+0x69 fffff880`0371d340 fffff800`0323df20 : fffff800`032b2465 00000000`00000002 00000000`00000000 fffffa80`07230000 : nt!KiPageFault+0x44e fffff880`0371d4d8 fffff800`032b2465 : 00000000`00000002 00000000`00000000 fffffa80`07230000 00001f80`00ee00d3 : nt!KeInterlockedClearProcessorAffinityEx+0x20 fffff880`0371d4e0 fffff800`032b207a : 00000000`00000000 ffffffff`fffffffb fffff880`02d7b101 fffffa80`08092d50 : nt!SwapContext_PatchXSave+0xc5 fffff880`0371d520 fffff800`032641a2 : 00000000`00000000 fffffa80`084456c0 00000000`00000000 00000000`0000000b : nt!KiSwapContext+0x7a fffff880`0371d660 fffff800`03256392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x1d2 fffff880`0371d6f0 fffff960`0013730d : 00000000`00000004 fffffa80`07cde220 00000000`00000001 00000000`0000000d : nt!KeWaitForMultipleObjects+0x272 fffff880`0371d9b0 00000000`00000004 : fffffa80`07cde220 00000000`00000001 00000000`0000000d fffff960`0036ae00 : win32k+0xc730d fffff880`0371d9b8 fffffa80`07cde220 : 00000000`00000001 00000000`0000000d fffff960`0036ae00 00000000`000b0001 : 0x4 fffff880`0371d9c0 00000000`00000001 : 00000000`0000000d fffff960`0036ae00 00000000`000b0001 00000000`00000000 : 0xfffffa80`07cde220 fffff880`0371d9c8 00000000`0000000d : fffff960`0036ae00 00000000`000b0001 00000000`00000000 fffffa80`08443c90 : 0x1 fffff880`0371d9d0 fffff960`0036ae00 : 00000000`000b0001 00000000`00000000 fffffa80`08443c90 00000000`00000000 : 0xd fffff880`0371d9d8 00000000`000b0001 : 00000000`00000000 fffffa80`08443c90 00000000`00000000 00000000`00000000 : win32k+0x2fae00 fffff880`0371d9e0 00000000`00000000 : fffffa80`08443c90 00000000`00000000 00000000`00000000 fffffa80`084391e0 : 0xb0001 SYMBOL_NAME: win32k+c730d MODULE_NAME: win32k IMAGE_NAME: win32k.sys STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0xA_win32k+c730d OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {353837b9-bf73-ac32-d992-6f0de72e4b8f} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffff80000003, The exception code that was not handled Arg2: fffff880112b9de0, The address that the exception occurred at Arg3: fffff88005f99178, Exception Record Address Arg4: fffff88005f989e0, Context Record Address Debugging Details: ------------------ fffff800034450e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff80003500300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1749 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6668 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffff80000003 BUGCHECK_P2: fffff880112b9de0 BUGCHECK_P3: fffff88005f99178 BUGCHECK_P4: fffff88005f989e0 EXCEPTION_RECORD: fffff88005f99178 -- (.exr 0xfffff88005f99178) ExceptionAddress: fffff880112b9de0 (amdkmdag+0x0000000000254de0) ExceptionCode: 80000003 (Break instruction exception) ExceptionFlags: 00000000 NumberParameters: 1 Parameter[0]: 0000000000000000 CONTEXT: fffff88005f989e0 -- (.cxr 0xfffff88005f989e0) rax=fffffa800810c020 rbx=fffffa8008c75000 rcx=fffffa800810c020 rdx=fffffa8008110200 rsi=fffff88005f995c0 rdi=fffffa8008110200 rip=fffff880112b9de0 rsp=fffff88005f993b8 rbp=0000000000000000 r8=fffff88011657878 r9=0000000000000000 r10=0000000000000002 r11=0000000000000001 r12=fffffa8008c75000 r13=fffff88005f996c0 r14=fffffa8008110200 r15=fffffa8008c75020 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000246 amdkmdag+0x254de0: fffff880`112b9de0 4c8bc1 mov r8,rcx Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM} Kesme Noktas Bir kesme noktas na ula ld . EXCEPTION_CODE_STR: 80000003 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_STR: 0x80000003 STACK_TEXT: fffff880`05f993b8 fffff880`1131fa11 : 00000000`0001c2e1 fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 : amdkmdag+0x254de0 fffff880`05f993c0 00000000`0001c2e1 : fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 : amdkmdag+0x2baa11 fffff880`05f993c8 fffff880`113153e0 : fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab : 0x1c2e1 fffff880`05f993d0 fffffa80`08c75020 : fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 : amdkmdag+0x2b03e0 fffff880`05f993d8 fffffa80`08110200 : fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 00000000`00000009 : 0xfffffa80`08c75020 fffff880`05f993e0 fffffa80`06a47000 : fffff880`1131feab 000000ff`4395c000 00000000`00000009 00000000`00000000 : 0xfffffa80`08110200 fffff880`05f993e8 fffff880`1131feab : 000000ff`4395c000 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 : 0xfffffa80`06a47000 fffff880`05f993f0 000000ff`4395c000 : 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 : amdkmdag+0x2baeab fffff880`05f993f8 00000000`00000009 : 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 00000000`00000000 : 0x000000ff`4395c000 fffff880`05f99400 00000000`00000000 : fffffa80`07ed18d0 00000000`00000002 00000000`00000000 00000000`00000100 : 0x9 SYMBOL_NAME: amdkmdag+254de0 MODULE_NAME: amdkmdag IMAGE_NAME: amdkmdag.sys STACK_COMMAND: .cxr 0xfffff88005f989e0 ; kb FAILURE_BUCKET_ID: 0x7E_amdkmdag+254de0 OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {e309d79c-74fa-4541-0c0e-f0390630a8da} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff7ff8e415511, memory referenced Arg2: 000000000000000f, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8000321e7ef, address which referenced memory Debugging Details: ------------------ fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034a5300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1733 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 4292 Key : Analysis.Memory.CommitPeak.Mb Value: 61 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: fffff7ff8e415511 BUGCHECK_P2: f BUGCHECK_P3: 0 BUGCHECK_P4: fffff8000321e7ef READ_ADDRESS: fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock Unable to get MmSystemRangeStart GetUlongPtrFromAddress: unable to read from fffff800034a52f0 GetUlongPtrFromAddress: unable to read from fffff800034a54a8 fffff7ff8e415511 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: GTAIV.exe DPC_STACK_BASE: FFFFF880009FEFB0 TRAP_FRAME: fffff880009fec80 -- (.trap 0xfffff880009fec80) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000000000000f rbx=0000000000000000 rcx=fffff80003415510 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000321e7ef rsp=fffff880009fee10 rbp=fffff80003415510 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000049 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!KeInsertQueueDpc+0x3f: fffff800`0321e7ef 0f83a9010000 jae nt!KeInsertQueueDpc+0x1ee (fffff800`0321e99e) [br=0] Resetting default scope STACK_TEXT: fffff880`009feb38 fffff800`032a9fe9 : 00000000`0000000a fffff7ff`8e415511 00000000`0000000f 00000000`00000000 : nt!KeBugCheckEx fffff880`009feb40 fffff800`032a7dce : 00000000`00000000 fffff7ff`8e415511 00000000`00000200 00000000`00000001 : nt!KiBugCheckDispatch+0x69 fffff880`009fec80 fffff800`0321e7ef : 00000000`003cfc11 00000000`00000000 fffffa80`0802d000 fffff880`040ddebc : nt!KiPageFault+0x44e fffff880`009fee10 fffff800`03304d43 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`009aa180 : nt!KeInsertQueueDpc+0x3f fffff880`009feea0 fffff800`033a4b77 : 00000000`00000049 00000000`00000000 00000002`89c93ea7 00000002`2f00eaff : nt!PpmCheckPhaseComplete+0x13 fffff880`009feed0 fffff800`03241dfc : fffff880`009aa180 fffffa80`0002aae5 fffffa80`07c84000 00000000`000000e5 : nt!PpmPerfAction+0x27 fffff880`009fef00 fffff800`0329e305 : 00000000`00000000 fffffa80`05fb1850 00000000`00000000 fffff800`033a4b50 : nt!KiRetireDpcList+0x1bc fffff880`009fefb0 fffff800`0329e11c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5 fffff880`08108ab0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue SYMBOL_NAME: nt!KeInsertQueueDpc+3f MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 6.1.7601.24557 STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: 0xA_nt!KeInsertQueueDpc+3f OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {35faa44a-9f45-890c-9b38-be06ae6afc73} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff88003e8b774, Address of the instruction which caused the bugcheck Arg3: fffff88009e11890, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ fffff8000343f0e8: Unable to get Flags value from nt!KdVersionBlock GetUlongPtrFromAddress: unable to read from fffff800034fa300 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1764 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 4311 Key : Analysis.Memory.CommitPeak.Mb Value: 63 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: win7sp1_ldr_escrow Key : WER.OS.Timestamp Value: 2020-06-10T19:07:00Z Key : WER.OS.Version Value: 7.1.7601.24557 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff88003e8b774 BUGCHECK_P3: fffff88009e11890 BUGCHECK_P4: 0 CONTEXT: fffff88009e11890 -- (.cxr 0xfffff88009e11890) rax=fffff88009e12810 rbx=fffff8a00412ee40 rcx=fffff8a00412eed0 rdx=fffff8a00412ee40 rsi=000000003b0101ee rdi=fffff88009e127f0 rip=fffff88003e8b774 rsp=fffff88009e12260 rbp=0000000000000030 r8=00000000000110c1 r9=00000000000003e0 r10=fffff88009e127f0 r11=0000000000000000 r12=fffff96000308d50 r13=0000000010040195 r14=fffff88009e127f0 r15=0000000000000030 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4: fffff880`03e8b774 004d1b add byte ptr [rbp+1Bh],cl ss:0018:00000000`0000004b=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe MISALIGNED_IP: dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4 fffff880`03e8b774 004d1b add byte ptr [rbp+1Bh],cl STACK_TEXT: fffff880`09e12260 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4 SYMBOL_NAME: dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4 IMAGE_NAME: hardware IMAGE_VERSION: 6.1.7601.24546 STACK_COMMAND: .cxr 0xfffff88009e11890 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED_dxgkrnl.sys OS_VERSION: 7.1.7601.24557 BUILDLAB_STR: win7sp1_ldr_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 7 FAILURE_ID_HASH: {4baef1c4-80c9-3ccc-f0ef-4c23adb576f1} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.