barisbehram
Decapat
- Katılım
- 13 Eylül 2018
- Mesajlar
- 23
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff965008fceff8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa0831b4cd3c0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5923
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: be
BUGCHECK_P1: ffff965008fceff8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffffa0831b4cd3c0
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffa0831b4cd3c0 -- (.trap 0xffffa0831b4cd3c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000311c5e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805646f5590 rsp=ffffa0831b4cd550 rbp=0000000000000000
r8=0000000fffffffff r9=0000000000311c5e r10=0000000f002fefaa
r11=ffff965008fceff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiUnlinkPageFromList+0x6d0:
fffff805`646f5590 f0490fb10b lock cmpxchg qword ptr [r11],rcx ds:ffff9650`08fceff8=????????????????
Resetting default scope
STACK_TEXT:
ffffa083`1b4cd1c8 fffff805`6484075e : 00000000`000000be ffff9650`08fceff8 8a000000`00200121 ffffa083`1b4cd3c0 : nt!KeBugCheckEx
ffffa083`1b4cd1d0 fffff805`646ea6cf : 8a000000`00200121 00000000`00000003 ffffa083`1b4cd440 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812
ffffa083`1b4cd220 fffff805`6480275e : ffffab5a`676b1108 00000267`6b176000 0000007f`fffffff8 ffffe506`448c7080 : nt!MmAccessFault+0x4ef
ffffa083`1b4cd3c0 fffff805`646f5590 : ffff9380`0da86f80 8a000004`8d7a8867 ffffa881`33b58bb0 00000000`00000000 : nt!KiPageFault+0x35e
ffffa083`1b4cd550 fffff805`646f4be0 : 00000000`00000003 fffff805`00000000 00000000`003796a9 ffffa083`1b4cd6c0 : nt!MiUnlinkPageFromList+0x6d0
ffffa083`1b4cd5e0 fffff805`646f41c4 : ffffa083`1b4cd880 ffffa083`1b4cd920 0000000f`ffffffff 00000003`796a9880 : nt!MiHandleTransitionFault+0x180
ffffa083`1b4cd660 fffff805`646f3c16 : ffffa083`1b4cd880 00000000`00000000 ffff9380`088b31e0 00000000`00000002 : nt!MiResolveTransitionFault+0x424
ffffa083`1b4cd720 fffff805`646ec425 : ffffa083`1b4cd880 00000000`00000002 ffffa083`1b4cd860 ffffe506`448c7700 : nt!MiResolveProtoPteFault+0x1236
ffffa083`1b4cd820 fffff805`646ea369 : 00000000`00000110 00000000`00000004 00000000`c0000016 ffffac07`f573f458 : nt!MiDispatchFault+0x3d5
ffffa083`1b4cd960 fffff805`6480275e : ffffe506`3ec8f080 00000000`00000000 00000000`00000000 ffffffff`ffaa17d0 : nt!MmAccessFault+0x189
ffffa083`1b4cdb00 00007ff9`71ec74b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000091`6abfdb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`71ec74b4
SYMBOL_NAME: nt!MiRaisedIrqlFault+1be812
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1be812
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000005df530, page frame number
Arg3: 0000000000000003, current page state
Arg4: 00000000005df531, 0
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6156
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11087
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 5df530
BUGCHECK_P3: 3
BUGCHECK_P4: 5df531
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
STACK_TEXT:
fffff402`04d58638 fffff807`779ec577 : 00000000`0000004e 00000000`00000099 00000000`005df530 00000000`00000003 : nt!KeBugCheckEx
fffff402`04d58640 fffff807`779494d8 : 00000000`00000000 90000005`e30ff025 ffffb584`69fca740 ffffb584`69fca740 : nt!MiBadShareCount+0x5b
fffff402`04d58680 fffff807`77949cae : fffff402`04d58c58 fffff402`04d58a10 00000000`00000000 fffff402`04d58960 : nt!MiDeletePteRun+0x1798
fffff402`04d58890 fffff807`7794a88b : fffff402`04d589c0 00000000`00000000 ffffec80`b14b1978 00000000`00000000 : nt!MiDeleteVaTail+0x6e
fffff402`04d588c0 fffff807`77922ae0 : 00000000`00000001 fffff402`00000000 ffffb584`69fca590 ffffb584`6a009080 : nt!MiDeletePagablePteRange+0x4ab
fffff402`04d58bd0 fffff807`77d04aa9 : ffffb584`00000000 00000000`00000000 00000162`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffff402`04d58ce0 fffff807`77d04882 : ffffb584`6b054c80 00000000`00000000 ffffb584`69fca0c0 00000000`00000000 : nt!MiUnmapVad+0x49
fffff402`04d58d10 fffff807`77d046f9 : ffffb584`6a009080 00000021`0f3fc280 00000162`9f1b8040 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff402`04d58df0 fffff807`77a064f1 : ffffb584`6a009080 00000162`96320000 00000021`0f3fc248 ffffb584`69fca0c0 : nt!NtUnmapViewOfSectionEx+0x99
fffff402`04d58e40 00007ffb`89d4f704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000021`0f3fc268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`89d4f704
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801066917b3, The address that the exception occurred at
Arg3: ffff8800d86dbbf8, Exception Record Address
Arg4: ffff8800d86db430, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 43992
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801066917b3
BUGCHECK_P3: ffff8800d86dbbf8
BUGCHECK_P4: ffff8800d86db430
EXCEPTION_RECORD: ffff8800d86dbbf8 -- (.exr 0xffff8800d86dbbf8)
ExceptionAddress: fffff801066917b3 (nt!MiDrainZeroLookasides+0x00000000000000b3)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000080
Attempt to read from address 0000000000000080
CONTEXT: ffff8800d86db430 -- (.cxr 0xffff8800d86db430)
rax=0000000000000080 rbx=0000000000000202 rcx=fffff8800057a5f0
rdx=fffff880044355f0 rsi=fffffb8000006750 rdi=0000000000000080
rip=fffff801066917b3 rsp=ffff8800d86dbe30 rbp=fffff8801220e860
r8=fffff880044355f0 r9=fffffb8000007c90 r10=fffffb8000006750
r11=fffff8800057a5f0 r12=000000000001d375 r13=0000000000000076
r14=0000000000000075 r15=fffff8801220e5f0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!MiDrainZeroLookasides+0xb3:
fffff801`066917b3 488b07 mov rax,qword ptr [rdi] ds:002b:00000000`00000080=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 2
PROCESS_NAME: System
READ_ADDRESS: fffff801070fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock
fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000080
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000080
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff8800`d86dbe30 fffff801`0671b613 : fffff880`1220e5f0 fffffb80`00003a00 fffff880`00000076 ffffffff`00000001 : nt!MiDrainZeroLookasides+0xb3
ffff8800`d86dbec0 fffff801`0671b1bb : 00000000`00000000 fffff27c`00000000 00000000`ffffffff 00000000`00000000 : nt!MiTradePage+0x363
ffff8800`d86dbf90 fffff801`0671c37d : fffff880`1220e500 00000000`00000000 00000000`ffffffff 00000000`000009d2 : nt!MiClaimPhysicalRun+0xbb
ffff8800`d86dc030 fffff801`066ab215 : 00000000`69646d4d fffff801`066ca78f 00000000`00000002 00000000`00012000 : nt!MiFindContiguousPages+0x5cd
ffff8800`d86dc1f0 fffff801`0663b113 : ffffffff`ffffffff 00000000`00000004 ffffa901`89b86760 fffff801`0663a955 : nt!MiAllocateMostlyContiguousPagesForMdl+0x85
ffff8800`d86dc280 fffff801`0663b204 : 00000000`00800000 ffff8800`d86dc3e9 00000000`00000000 00007fff`ffffffff : nt!MiFindPagesForMdl+0x107
ffff8800`d86dc2f0 fffff801`0663a749 : 00000000`00000000 00000000`4d52564e 00000000`00000527 00000000`00000000 : nt!MiAllocatePagesForMdl+0xc4
ffff8800`d86dc430 fffff801`0663a5ed : ffff8800`d86dc570 ffff8800`d86dc5b0 ffffa901`81c95030 01a00070`00000000 : nt!MmAllocatePartitionNodePagesForMdlEx+0xc9
ffff8800`d86dc4b0 fffff801`123a00a0 : 00000000`00000001 00000000`4d52564e 00000000`4d52564e 00000000`00000000 : nt!MmAllocatePagesForMdlEx+0x4d
ffff8800`d86dc500 fffff801`165dde83 : ffffa901`81c95030 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 : dxgkrnl!DxgkAllocatePagesForMdlCB+0x90
ffff8800`d86dc540 ffffa901`81c95030 : 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 : nvlddmkm+0x80de83
ffff8800`d86dc548 00000000`0e6f4dbf : ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe : 0xffffa901`81c95030
ffff8800`d86dc550 ffffa901`81c66000 : ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe 00000000`00800000 : 0xe6f4dbf
ffff8800`d86dc558 ffffa901`89b871f0 : 00000000`00000000 fffff801`15f642fe 00000000`00800000 00007fff`ffffffff : 0xffffa901`81c66000
ffff8800`d86dc560 00000000`00000000 : fffff801`15f642fe 00000000`00800000 00007fff`ffffffff 00000000`00000000 : 0xffffa901`89b871f0
SYMBOL_NAME: dxgkrnl!DxgkAllocatePagesForMdlCB+90
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .cxr 0xffff8800d86db430 ; kb
BUCKET_ID_FUNC_OFFSET: 90
FAILURE_BUCKET_ID: AV_dxgkrnl!DxgkAllocatePagesForMdlCB
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5383e1be-168d-19bd-cf93-ac69beaa556a}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff3fffd2fffe8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff9d039b0669a0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10213
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: be
BUGCHECK_P1: fffff3fffd2fffe8
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: ffff9d039b0669a0
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Adobe Premiere Pro.exe
TRAP_FRAME: ffff9d039b0672a0 -- (.trap 0xffff9d039b0672a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a82daaa0 rbx=0000000000000000 rcx=00000000a82dc030
rdx=fffff6d69affb4a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff6ac895f8322 rsp=ffff9d039b067438 rbp=0000000000000003
r8=0000000000000010 r9=000000000000000b r10=0000fffff6ac8958
r11=fffff6d7432d77a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32kfull!memcpy+0x122:
fffff6ac`895f8322 0f2951d0 movaps xmmword ptr [rcx-30h],xmm2 ds:00000000`a82dc000=????????????????????????????????
Resetting default scope
STACK_TEXT:
ffff9d03`9b0667a8 fffff803`5864075e : 00000000`000000be fffff3ff`fd2fffe8 8a000000`00200121 ffff9d03`9b0669a0 : nt!KeBugCheckEx
ffff9d03`9b0667b0 fffff803`584ea6cf : 8a000000`00200121 00000000`00000003 ffff9d03`9b066a20 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812
ffff9d03`9b066800 fffff803`5860275e : fffff6d7`40621878 fffff6ac`8987030a fffff6d7`429e2ad0 fffff6ac`885143a5 : nt!MmAccessFault+0x4ef
ffff9d03`9b0669a0 fffff803`584f1167 : 00000008`000006e5 fffff803`584ef59e 00000000`00000010 00000000`00040246 : nt!KiPageFault+0x35e
ffff9d03`9b066b30 fffff803`584f02eb : fffff803`58e50c00 fffff100`000000a5 00000000`000000a5 00000000`00000000 : nt!MiGetPage+0x547
ffff9d03`9b066c10 fffff803`584ed958 : ffff9d03`9b066fd0 00000000`00000000 00000000`00000001 fffff803`00000001 : nt!MiGetPageChain+0x48b
ffff9d03`9b066e50 fffff803`584e8440 : ffff9d03`9b066fd0 ffffffff`ffffffff fffff803`00000000 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8
ffff9d03`9b066f80 fffff803`584eb0cd : ffff9d03`9b0671c0 ffff9d03`9b067100 ffff9d03`9b067108 ffff9d03`9b067118 : nt!MiZeroFault+0x380
ffff9d03`9b067070 fffff803`584ea34a : 00000000`00000001 00000000`00000000 00000080`00000000 00000000`00000000 : nt!MiUserFault+0x80d
ffff9d03`9b067100 fffff803`5860275e : 00000000`00000001 00000000`00000000 ffffcc85`ac2f37c0 fffff803`5854aadf : nt!MmAccessFault+0x16a
ffff9d03`9b0672a0 fffff6ac`895f8322 : fffff6ac`89584268 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 : nt!KiPageFault+0x35e
ffff9d03`9b067438 fffff6ac`89584268 : 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 00000000`00000000 : win32kfull!memcpy+0x122
ffff9d03`9b067440 fffff6ac`894b1429 : 00000000`00000000 ffff9d03`9b0678b0 fffff6d7`446a5b18 00000000`00000000 : win32kfull!vSrcCopyS32D32Identity+0x68
ffff9d03`9b067470 fffff6ac`894e18d1 : 00000000`00000000 fffff6d7`40911000 ffff9d03`9b067828 fffff6d7`40911000 : win32kfull!EngCopyBits+0x389
ffff9d03`9b0677b0 fffff6ac`894e27b3 : ffff9d03`9b067ae0 00000000`00000000 00000000`00000000 fffff6d7`40911000 : win32kfull!BLTRECORD::bBitBlt+0x32d
ffff9d03`9b0679e0 fffff6ac`8959f568 : ffffffff`e9050e00 00000000`00000001 ffff9d03`9b060f33 00000000`00501802 : win32kfull!GreStretchBltInternal+0x557
ffff9d03`9b067cd0 fffff6ac`8851d2c8 : fffff6ac`8851d248 ffff9d03`9b067d50 00000000`00000008 ffff8fba`48386c5c : win32kfull!NtGdiStretchBlt+0x68
ffff9d03`9b067d50 fffff803`586064f1 : ffffffff`c8050bfa fffff803`587a3de0 00000000`00000000 00000000`0085000f : win32k!NtGdiStretchBlt+0x80
ffff9d03`9b067dd0 00007ffa`327a1664 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`0014b278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`327a1664
SYMBOL_NAME: win32kfull!memcpy+122
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 122
FAILURE_BUCKET_ID: 0xBE_win32kfull!memcpy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67acf149-7ea6-7101-7227-4f64dad41787}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80021a7531c, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000000, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
Unable to load image \SystemRoot\system32\drivers\aswVmm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswVmm.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10941
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: fffff80021a7531c
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd10d`8051faf8 fffff800`1c01db56 : 00000000`00000001 fffff800`21a7531c 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffd10d`8051fb00 fffff800`1bf035f5 : ffffbe81`3a2e1080 ffffbe81`3a2e1080 fffff800`1be1a9a0 ffffbe81`00000000 : nt!IopProcessWorkItem+0x2031b6
ffffd10d`8051fb70 fffff800`1bea2ae5 : ffffbe81`3a2e1080 00000000`00000080 ffffbe81`366ab040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffd10d`8051fc10 fffff800`1bffbbf8 : ffff8800`99680180 ffffbe81`3a2e1080 fffff800`1bea2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd10d`8051fc60 00000000`00000000 : ffffd10d`80520000 ffffd10d`8051a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: aswVmm+2531c
MODULE_NAME: aswVmm
IMAGE_NAME: aswVmm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2531c
FAILURE_BUCKET_ID: 0x1_SysCallNum_0_aswVmm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6d7ff2fa-6f4a-c543-4f38-d3321bfdbca7}
Followup: MachineOwner
---------
Bios Güncellemesi yapıldı.
- Epey eski bir BIOS kullanıyorsunuz, güncelleyin.
- Anakartınız Rev1.0 ise: X570 AORUS PRO (Rev. 1.0) | Anakart | GIGABYTE
- Anakartınız Rev1.1/1.2 ise: X570 AORUS PRO (Rev. 1.1/1.2) | Anakart | GIGABYTE
- MemTest86 yapın.
- DDU ile GPU sürücülerinizi kaldırıp WHQL onaylı güncel sürücüyü kurun.
- DDU rehberi: DDU ile Sürücü Kaldırma Rehberi - Technopat Sosyal
- Avast'ı kaldırın.
Kod:ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffff965008fceff8, Virtual address for the attempted write. Arg2: 8a00000000200121, PTE contents. Arg3: ffffa0831b4cd3c0, (reserved) Arg4: 000000000000000a, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4374 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 5923 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: be BUGCHECK_P1: ffff965008fceff8 BUGCHECK_P2: 8a00000000200121 BUGCHECK_P3: ffffa0831b4cd3c0 BUGCHECK_P4: a BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe TRAP_FRAME: ffffa0831b4cd3c0 -- (.trap 0xffffa0831b4cd3c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000311c5e rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff805646f5590 rsp=ffffa0831b4cd550 rbp=0000000000000000 r8=0000000fffffffff r9=0000000000311c5e r10=0000000f002fefaa r11=ffff965008fceff8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!MiUnlinkPageFromList+0x6d0: fffff805`646f5590 f0490fb10b lock cmpxchg qword ptr [r11],rcx ds:ffff9650`08fceff8=???????????????? Resetting default scope STACK_TEXT: ffffa083`1b4cd1c8 fffff805`6484075e : 00000000`000000be ffff9650`08fceff8 8a000000`00200121 ffffa083`1b4cd3c0 : nt!KeBugCheckEx ffffa083`1b4cd1d0 fffff805`646ea6cf : 8a000000`00200121 00000000`00000003 ffffa083`1b4cd440 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812 ffffa083`1b4cd220 fffff805`6480275e : ffffab5a`676b1108 00000267`6b176000 0000007f`fffffff8 ffffe506`448c7080 : nt!MmAccessFault+0x4ef ffffa083`1b4cd3c0 fffff805`646f5590 : ffff9380`0da86f80 8a000004`8d7a8867 ffffa881`33b58bb0 00000000`00000000 : nt!KiPageFault+0x35e ffffa083`1b4cd550 fffff805`646f4be0 : 00000000`00000003 fffff805`00000000 00000000`003796a9 ffffa083`1b4cd6c0 : nt!MiUnlinkPageFromList+0x6d0 ffffa083`1b4cd5e0 fffff805`646f41c4 : ffffa083`1b4cd880 ffffa083`1b4cd920 0000000f`ffffffff 00000003`796a9880 : nt!MiHandleTransitionFault+0x180 ffffa083`1b4cd660 fffff805`646f3c16 : ffffa083`1b4cd880 00000000`00000000 ffff9380`088b31e0 00000000`00000002 : nt!MiResolveTransitionFault+0x424 ffffa083`1b4cd720 fffff805`646ec425 : ffffa083`1b4cd880 00000000`00000002 ffffa083`1b4cd860 ffffe506`448c7700 : nt!MiResolveProtoPteFault+0x1236 ffffa083`1b4cd820 fffff805`646ea369 : 00000000`00000110 00000000`00000004 00000000`c0000016 ffffac07`f573f458 : nt!MiDispatchFault+0x3d5 ffffa083`1b4cd960 fffff805`6480275e : ffffe506`3ec8f080 00000000`00000000 00000000`00000000 ffffffff`ffaa17d0 : nt!MmAccessFault+0x189 ffffa083`1b4cdb00 00007ff9`71ec74b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e 00000091`6abfdb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`71ec74b4 SYMBOL_NAME: nt!MiRaisedIrqlFault+1be812 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 1be812 FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d} Followup: MachineOwner --------- PFN_LIST_CORRUPT (4e) Typically caused by drivers passing bad memory descriptor lists (ie: calling MmUnlockPages twice with the same list, etc). If a kernel debugger is available get the stack trace. Arguments: Arg1: 0000000000000099, A PTE or PFN is corrupt Arg2: 00000000005df530, page frame number Arg3: 0000000000000003, current page state Arg4: 00000000005df531, 0 Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6156 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 11087 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 4e BUGCHECK_P1: 99 BUGCHECK_P2: 5df530 BUGCHECK_P3: 3 BUGCHECK_P4: 5df531 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: StartMenuExperienceHost.exe STACK_TEXT: fffff402`04d58638 fffff807`779ec577 : 00000000`0000004e 00000000`00000099 00000000`005df530 00000000`00000003 : nt!KeBugCheckEx fffff402`04d58640 fffff807`779494d8 : 00000000`00000000 90000005`e30ff025 ffffb584`69fca740 ffffb584`69fca740 : nt!MiBadShareCount+0x5b fffff402`04d58680 fffff807`77949cae : fffff402`04d58c58 fffff402`04d58a10 00000000`00000000 fffff402`04d58960 : nt!MiDeletePteRun+0x1798 fffff402`04d58890 fffff807`7794a88b : fffff402`04d589c0 00000000`00000000 ffffec80`b14b1978 00000000`00000000 : nt!MiDeleteVaTail+0x6e fffff402`04d588c0 fffff807`77922ae0 : 00000000`00000001 fffff402`00000000 ffffb584`69fca590 ffffb584`6a009080 : nt!MiDeletePagablePteRange+0x4ab fffff402`04d58bd0 fffff807`77d04aa9 : ffffb584`00000000 00000000`00000000 00000162`00000000 00000000`00000000 : nt!MiDeleteVad+0x360 fffff402`04d58ce0 fffff807`77d04882 : ffffb584`6b054c80 00000000`00000000 ffffb584`69fca0c0 00000000`00000000 : nt!MiUnmapVad+0x49 fffff402`04d58d10 fffff807`77d046f9 : ffffb584`6a009080 00000021`0f3fc280 00000162`9f1b8040 00000000`00000000 : nt!MiUnmapViewOfSection+0x152 fffff402`04d58df0 fffff807`77a064f1 : ffffb584`6a009080 00000162`96320000 00000021`0f3fc248 ffffb584`69fca0c0 : nt!NtUnmapViewOfSectionEx+0x99 fffff402`04d58e40 00007ffb`89d4f704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 00000021`0f3fc268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`89d4f704 SYMBOL_NAME: nt!MiBadShareCount+5b MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 5b FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff801066917b3, The address that the exception occurred at Arg3: ffff8800d86dbbf8, Exception Record Address Arg4: ffff8800d86db430, Context Record Address Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : AV.Dereference Value: NullClassPtr Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 6734 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 43992 Key : Analysis.Memory.CommitPeak.Mb Value: 90 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff801066917b3 BUGCHECK_P3: ffff8800d86dbbf8 BUGCHECK_P4: ffff8800d86db430 EXCEPTION_RECORD: ffff8800d86dbbf8 -- (.exr 0xffff8800d86dbbf8) ExceptionAddress: fffff801066917b3 (nt!MiDrainZeroLookasides+0x00000000000000b3) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000080 Attempt to read from address 0000000000000080 CONTEXT: ffff8800d86db430 -- (.cxr 0xffff8800d86db430) rax=0000000000000080 rbx=0000000000000202 rcx=fffff8800057a5f0 rdx=fffff880044355f0 rsi=fffffb8000006750 rdi=0000000000000080 rip=fffff801066917b3 rsp=ffff8800d86dbe30 rbp=fffff8801220e860 r8=fffff880044355f0 r9=fffffb8000007c90 r10=fffffb8000006750 r11=fffff8800057a5f0 r12=000000000001d375 r13=0000000000000076 r14=0000000000000075 r15=fffff8801220e5f0 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202 nt!MiDrainZeroLookasides+0xb3: fffff801`066917b3 488b07 mov rax,qword ptr [rdi] ds:002b:00000000`00000080=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 2 PROCESS_NAME: System READ_ADDRESS: fffff801070fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock fffff8010700f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000080 ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000080 EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffff8800`d86dbe30 fffff801`0671b613 : fffff880`1220e5f0 fffffb80`00003a00 fffff880`00000076 ffffffff`00000001 : nt!MiDrainZeroLookasides+0xb3 ffff8800`d86dbec0 fffff801`0671b1bb : 00000000`00000000 fffff27c`00000000 00000000`ffffffff 00000000`00000000 : nt!MiTradePage+0x363 ffff8800`d86dbf90 fffff801`0671c37d : fffff880`1220e500 00000000`00000000 00000000`ffffffff 00000000`000009d2 : nt!MiClaimPhysicalRun+0xbb ffff8800`d86dc030 fffff801`066ab215 : 00000000`69646d4d fffff801`066ca78f 00000000`00000002 00000000`00012000 : nt!MiFindContiguousPages+0x5cd ffff8800`d86dc1f0 fffff801`0663b113 : ffffffff`ffffffff 00000000`00000004 ffffa901`89b86760 fffff801`0663a955 : nt!MiAllocateMostlyContiguousPagesForMdl+0x85 ffff8800`d86dc280 fffff801`0663b204 : 00000000`00800000 ffff8800`d86dc3e9 00000000`00000000 00007fff`ffffffff : nt!MiFindPagesForMdl+0x107 ffff8800`d86dc2f0 fffff801`0663a749 : 00000000`00000000 00000000`4d52564e 00000000`00000527 00000000`00000000 : nt!MiAllocatePagesForMdl+0xc4 ffff8800`d86dc430 fffff801`0663a5ed : ffff8800`d86dc570 ffff8800`d86dc5b0 ffffa901`81c95030 01a00070`00000000 : nt!MmAllocatePartitionNodePagesForMdlEx+0xc9 ffff8800`d86dc4b0 fffff801`123a00a0 : 00000000`00000001 00000000`4d52564e 00000000`4d52564e 00000000`00000000 : nt!MmAllocatePagesForMdlEx+0x4d ffff8800`d86dc500 fffff801`165dde83 : ffffa901`81c95030 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 : dxgkrnl!DxgkAllocatePagesForMdlCB+0x90 ffff8800`d86dc540 ffffa901`81c95030 : 00000000`0e6f4dbf ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 : nvlddmkm+0x80de83 ffff8800`d86dc548 00000000`0e6f4dbf : ffffa901`81c66000 ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe : 0xffffa901`81c95030 ffff8800`d86dc550 ffffa901`81c66000 : ffffa901`89b871f0 00000000`00000000 fffff801`15f642fe 00000000`00800000 : 0xe6f4dbf ffff8800`d86dc558 ffffa901`89b871f0 : 00000000`00000000 fffff801`15f642fe 00000000`00800000 00007fff`ffffffff : 0xffffa901`81c66000 ffff8800`d86dc560 00000000`00000000 : fffff801`15f642fe 00000000`00800000 00007fff`ffffffff 00000000`00000000 : 0xffffa901`89b871f0 SYMBOL_NAME: dxgkrnl!DxgkAllocatePagesForMdlCB+90 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffff8800d86db430 ; kb BUCKET_ID_FUNC_OFFSET: 90 FAILURE_BUCKET_ID: AV_dxgkrnl!DxgkAllocatePagesForMdlCB OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {5383e1be-168d-19bd-cf93-ac69beaa556a} Followup: MachineOwner --------- ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff3fffd2fffe8, Virtual address for the attempted write. Arg2: 8a00000000200121, PTE contents. Arg3: ffff9d039b0669a0, (reserved) Arg4: 000000000000000a, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6452 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10213 Key : Analysis.Memory.CommitPeak.Mb Value: 86 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: be BUGCHECK_P1: fffff3fffd2fffe8 BUGCHECK_P2: 8a00000000200121 BUGCHECK_P3: ffff9d039b0669a0 BUGCHECK_P4: a BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Adobe Premiere Pro.exe TRAP_FRAME: ffff9d039b0672a0 -- (.trap 0xffff9d039b0672a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000a82daaa0 rbx=0000000000000000 rcx=00000000a82dc030 rdx=fffff6d69affb4a0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff6ac895f8322 rsp=ffff9d039b067438 rbp=0000000000000003 r8=0000000000000010 r9=000000000000000b r10=0000fffff6ac8958 r11=fffff6d7432d77a0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc win32kfull!memcpy+0x122: fffff6ac`895f8322 0f2951d0 movaps xmmword ptr [rcx-30h],xmm2 ds:00000000`a82dc000=???????????????????????????????? Resetting default scope STACK_TEXT: ffff9d03`9b0667a8 fffff803`5864075e : 00000000`000000be fffff3ff`fd2fffe8 8a000000`00200121 ffff9d03`9b0669a0 : nt!KeBugCheckEx ffff9d03`9b0667b0 fffff803`584ea6cf : 8a000000`00200121 00000000`00000003 ffff9d03`9b066a20 00000000`00000000 : nt!MiRaisedIrqlFault+0x1be812 ffff9d03`9b066800 fffff803`5860275e : fffff6d7`40621878 fffff6ac`8987030a fffff6d7`429e2ad0 fffff6ac`885143a5 : nt!MmAccessFault+0x4ef ffff9d03`9b0669a0 fffff803`584f1167 : 00000008`000006e5 fffff803`584ef59e 00000000`00000010 00000000`00040246 : nt!KiPageFault+0x35e ffff9d03`9b066b30 fffff803`584f02eb : fffff803`58e50c00 fffff100`000000a5 00000000`000000a5 00000000`00000000 : nt!MiGetPage+0x547 ffff9d03`9b066c10 fffff803`584ed958 : ffff9d03`9b066fd0 00000000`00000000 00000000`00000001 fffff803`00000001 : nt!MiGetPageChain+0x48b ffff9d03`9b066e50 fffff803`584e8440 : ffff9d03`9b066fd0 ffffffff`ffffffff fffff803`00000000 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8 ffff9d03`9b066f80 fffff803`584eb0cd : ffff9d03`9b0671c0 ffff9d03`9b067100 ffff9d03`9b067108 ffff9d03`9b067118 : nt!MiZeroFault+0x380 ffff9d03`9b067070 fffff803`584ea34a : 00000000`00000001 00000000`00000000 00000080`00000000 00000000`00000000 : nt!MiUserFault+0x80d ffff9d03`9b067100 fffff803`5860275e : 00000000`00000001 00000000`00000000 ffffcc85`ac2f37c0 fffff803`5854aadf : nt!MmAccessFault+0x16a ffff9d03`9b0672a0 fffff6ac`895f8322 : fffff6ac`89584268 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 : nt!KiPageFault+0x35e ffff9d03`9b067438 fffff6ac`89584268 : 00000000`00000000 ffffcc85`afce00c0 fffff6d7`40911000 00000000`00000000 : win32kfull!memcpy+0x122 ffff9d03`9b067440 fffff6ac`894b1429 : 00000000`00000000 ffff9d03`9b0678b0 fffff6d7`446a5b18 00000000`00000000 : win32kfull!vSrcCopyS32D32Identity+0x68 ffff9d03`9b067470 fffff6ac`894e18d1 : 00000000`00000000 fffff6d7`40911000 ffff9d03`9b067828 fffff6d7`40911000 : win32kfull!EngCopyBits+0x389 ffff9d03`9b0677b0 fffff6ac`894e27b3 : ffff9d03`9b067ae0 00000000`00000000 00000000`00000000 fffff6d7`40911000 : win32kfull!BLTRECORD::bBitBlt+0x32d ffff9d03`9b0679e0 fffff6ac`8959f568 : ffffffff`e9050e00 00000000`00000001 ffff9d03`9b060f33 00000000`00501802 : win32kfull!GreStretchBltInternal+0x557 ffff9d03`9b067cd0 fffff6ac`8851d2c8 : fffff6ac`8851d248 ffff9d03`9b067d50 00000000`00000008 ffff8fba`48386c5c : win32kfull!NtGdiStretchBlt+0x68 ffff9d03`9b067d50 fffff803`586064f1 : ffffffff`c8050bfa fffff803`587a3de0 00000000`00000000 00000000`0085000f : win32k!NtGdiStretchBlt+0x80 ffff9d03`9b067dd0 00007ffa`327a1664 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 00000000`0014b278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`327a1664 SYMBOL_NAME: win32kfull!memcpy+122 MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 122 FAILURE_BUCKET_ID: 0xBE_win32kfull!memcpy OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {67acf149-7ea6-7101-7227-4f64dad41787} Followup: MachineOwner --------- APC_INDEX_MISMATCH (1) This is a kernel internal error. The most common reason to see this bugcheck is when a filesystem or a driver has a mismatched number of calls to disable and re-enable APCs. The key data item is the Thread->CombinedApcDisable field. This consists of two separate 16-bit fields, the SpecialApcDisable and the KernelApcDisable. A negative value of either indicates that a driver has disabled special or normal APCs (respectively) without re-enabling them; a positive value indicates that a driver has enabled special or normal APCs (respectively) too many times. Arguments: Arg1: fffff80021a7531c, Address of system call function or worker routine Arg2: 0000000000000000, Thread->ApcStateIndex Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable Arg4: 0000000000000000, Call type (0 - system call, 1 - worker routine) Debugging Details: ------------------ Unable to load image \SystemRoot\system32\drivers\aswVmm.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for aswVmm.sys *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4015 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10941 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1 BUGCHECK_P1: fffff80021a7531c BUGCHECK_P2: 0 BUGCHECK_P3: ffff BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffffd10d`8051faf8 fffff800`1c01db56 : 00000000`00000001 fffff800`21a7531c 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx ffffd10d`8051fb00 fffff800`1bf035f5 : ffffbe81`3a2e1080 ffffbe81`3a2e1080 fffff800`1be1a9a0 ffffbe81`00000000 : nt!IopProcessWorkItem+0x2031b6 ffffd10d`8051fb70 fffff800`1bea2ae5 : ffffbe81`3a2e1080 00000000`00000080 ffffbe81`366ab040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105 ffffd10d`8051fc10 fffff800`1bffbbf8 : ffff8800`99680180 ffffbe81`3a2e1080 fffff800`1bea2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffd10d`8051fc60 00000000`00000000 : ffffd10d`80520000 ffffd10d`8051a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: aswVmm+2531c MODULE_NAME: aswVmm IMAGE_NAME: aswVmm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2531c FAILURE_BUCKET_ID: 0x1_SysCallNum_0_aswVmm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {6d7ff2fa-6f4a-c543-4f38-d3321bfdbca7} Followup: MachineOwner ---------