SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804c680e3c6, The address that the exception occurred at
Arg3: ffffdb05c58e6588, Exception Record Address
Arg4: ffffdb05c58e5dc0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 4499
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25759
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804c680e3c6
BUGCHECK_P3: ffffdb05c58e6588
BUGCHECK_P4: ffffdb05c58e5dc0
EXCEPTION_RECORD: ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588)
ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048
CONTEXT: ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0)
rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070
rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28
rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed
r8=fffff804c680e386 r9=ffffdb05c58e69d8 r10=0000000000000048
r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005
r14=0000000000000001 r15=0000000000000009
iopl=0 ov up ei pl nz ac po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a16
BEDaisy+0x2de3c6:
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000048
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000048
MISALIGNED_IP:
BEDaisy+2de3c6
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx]
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffdb05`c58e67c0 00000000`00000004 : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6
ffffdb05`c58e67c8 00000000`00000005 : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4
ffffdb05`c58e67d0 ffffc80a`14b1fce0 : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5
ffffdb05`c58e67d8 00000000`00000000 : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0
SYMBOL_NAME: BEDaisy+2de3c6
IMAGE_NAME: hardware
STACK_COMMAND: .cxr 0xffffdb05c58e5dc0 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e}
Followup: MachineOwner
---------
5: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3800
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor
Update Status = REG_DWORD 3
VendorIdentifier = REG_SZ AuthenticAMD
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80754d25016, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4843
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8578
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80754d25016
READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: fffff407e94df030 -- (.trap 0xfffff407e94df030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HalpInterruptSendIpi+0x46:
fffff807`54d25016 0000 add byte ptr [rax],al ds:537af407`eb4d49b8=??
Resetting default scope
MISALIGNED_IP:
nt!HalpInterruptSendIpi+46
fffff807`54d25016 0000 add byte ptr [rax],al
STACK_TEXT:
fffff407`e94deee8 fffff807`54e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff407`e94deef0 fffff807`54e03469 : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69
fffff407`e94df030 fffff807`54d25016 : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469
fffff407`e94df1c0 00000000`00000000 : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46
SYMBOL_NAME: nt!HalpInterruptSendIpi+46
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8023cfbd5bc, The address that the exception occurred at
Arg3: ffffd1017ec534b8, Exception Record Address
Arg4: ffff9000731a9920, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10075
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff8023cfbd5bc
BUGCHECK_P3: ffffd1017ec534b8
BUGCHECK_P4: ffff9000731a9920
EXCEPTION_RECORD: ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8)
ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffff9000731a9920 -- (.cxr 0xffff9000731a9920)
rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0
rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0
rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0
r8=000000000000005c r9=0000000000000002 r10=fffff8023a330eb0
r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8
r14=ffffa58a1658b020 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
ndis!ndisNsiGetAllInterfaceInformation+0xe3c:
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld .
EXCEPTION_CODE_STR: c000001d
EXCEPTION_STR: 0xc000001d
BAD_STACK_POINTER: ffff9000731a90e8
FAILED_INSTRUCTION_ADDRESS:
ndis!ndisNsiGetAllInterfaceInformation+e3c
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h]
STACK_TEXT:
ffffd101`7ec536f0 fffff802`3d1359da : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c
ffffd101`7ec53820 fffff802`3d13ec9d : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a
ffffd101`7ec53990 fffff802`3d13ea71 : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d
ffffd101`7ec54760 fffff802`838f3afc : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11
ffffd101`7ec54790 fffff802`83928737 : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc
ffffd101`7ec547c0 fffff802`838f38fd : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3
ffffd101`7ec54a80 fffff802`3a21aa33 : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d
ffffd101`7ec54b00 fffff802`3a3034b5 : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93
ffffd101`7ec54b70 fffff802`3a2a29a5 : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffd101`7ec54c10 fffff802`3a3fc868 : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd101`7ec54c60 00000000`00000000 : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: NETIO!NsiGetAllParametersEx+24a
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .cxr 0xffff9000731a9920 ; kb
BUCKET_ID_FUNC_OFFSET: 24a
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c092daa6-3bf4-0dbc-0db7-7576bdae5a66}
Followup: MachineOwner
---------