SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011ce8a825, The address that the exception occurred at
Arg3: ffffd00023445e58, Exception Record Address
Arg4: ffffd00023445670, Context Record Address
Debugging Details:
------------------
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff8038e1d9308
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3827
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14806
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_ltsb_escrow
Key : WER.OS.Timestamp
Value: 2020-08-14T18:23:00Z
Key : WER.OS.Version
Value: 8.1.9600.19812
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8011ce8a825
BUGCHECK_P3: ffffd00023445e58
BUGCHECK_P4: ffffd00023445670
EXCEPTION_RECORD: ffffd00023445e58 -- (.exr 0xffffd00023445e58)
ExceptionAddress: fffff8011ce8a825 (igdkmd64+0x000000000006b825)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000c024848bb0
Attempt to read from address 000000c024848bb0
CONTEXT: ffffd00023445670 -- (.cxr 0xffffd00023445670)
rax=0000000013400000 rbx=ffffe001680ede00 rcx=000000c024848b48
rdx=0000000000000004 rsi=ffffe00166c00000 rdi=ffffe001679cdb20
rip=fffff8011ce8a825 rsp=ffffd00023446098 rbp=0000000013400000
r8=0000000013400000 r9=000000002bfe4011 r10=0000000000000001
r11=0000000000000000 r12=ffffe0016803b3c0 r13=ffffe00167b98580
r14=0000000000000004 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010206
igdkmd64+0x6b825:
fffff801`1ce8a825 8b4168 mov eax,dword ptr [rcx+68h] ds:002b:000000c0`24848bb0=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff8038e1d92a8
GetUlongPtrFromAddress: unable to read from fffff8038e1d9530
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
000000c024848bb0
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000c024848bb0
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffd000`23446098 fffff801`1ce3f578 : ffffe001`66c00000 00000000`00000004 ffffe001`67b98580 ffffd000`23446250 : igdkmd64+0x6b825
ffffd000`234460a0 ffffe001`66c00000 : 00000000`00000004 ffffe001`67b98580 ffffd000`23446250 ffffd000`23446250 : igdkmd64+0x20578
ffffd000`234460a8 00000000`00000004 : ffffe001`67b98580 ffffd000`23446250 ffffd000`23446250 fffff801`1cf5c896 : 0xffffe001`66c00000
ffffd000`234460b0 ffffe001`67b98580 : ffffd000`23446250 ffffd000`23446250 fffff801`1cf5c896 ffffe001`679f3e40 : 0x4
ffffd000`234460b8 ffffd000`23446250 : ffffd000`23446250 fffff801`1cf5c896 ffffe001`679f3e40 ffffe001`66c00000 : 0xffffe001`67b98580
ffffd000`234460c0 ffffd000`23446250 : fffff801`1cf5c896 ffffe001`679f3e40 ffffe001`66c00000 00000000`00000000 : 0xffffd000`23446250
ffffd000`234460c8 fffff801`1cf5c896 : ffffe001`679f3e40 ffffe001`66c00000 00000000`00000000 00000000`00000000 : 0xffffd000`23446250
ffffd000`234460d0 ffffe001`679f3e40 : ffffe001`66c00000 00000000`00000000 00000000`00000000 ffffd000`23446250 : igdkmd64+0x13d896
ffffd000`234460d8 ffffe001`66c00000 : 00000000`00000000 00000000`00000000 ffffd000`23446250 fffff801`1ce30172 : 0xffffe001`679f3e40
ffffd000`234460e0 00000000`00000000 : 00000000`00000000 ffffd000`23446250 fffff801`1ce30172 ffffe001`66c00000 : 0xffffe001`66c00000
SYMBOL_NAME: igdkmd64+6b825
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr 0xffffd00023445670 ; kb
BUCKET_ID_FUNC_OFFSET: 6b825
FAILURE_BUCKET_ID: AV_igdkmd64!unknown_function
OS_VERSION: 8.1.9600.19812
BUILDLAB_STR: winblue_ltsb_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {ae6ed5da-86a4-a1ba-84df-0618cafaf7fa}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800e9b20df2, Address of the instruction which caused the bugcheck
Arg3: ffffd001ce533600, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
fffff802ec31ee58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff802ec3db308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18589
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_ltsb_escrow
Key : WER.OS.Timestamp
Value: 2020-05-19T19:14:00Z
Key : WER.OS.Version
Value: 8.1.9600.19724
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800e9b20df2
BUGCHECK_P3: ffffd001ce533600
BUGCHECK_P4: 0
CONTEXT: ffffd001ce533600 -- (.cxr 0xffffd001ce533600)
rax=ffffd001ce534460 rbx=ffffd001ce534a00 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe001d54391c0
rip=fffff800e9b20df2 rsp=ffffd001ce534020 rbp=ffffd001ce534120
r8=0000000000000000 r9=0000000000000001 r10=ffffe001d60eccd0
r11=0000000000000000 r12=ffffd001ce5341c0 r13=ffffc0019d2246e0
r14=ffffe001d51a7a40 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
atikmpag+0xcdf2:
fffff800`e9b20df2 45399888000000 cmp dword ptr [r8+88h],r11d ds:002b:00000000`00000088=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SwordWithSauce
STACK_TEXT:
ffffd001`ce534020 ffffe001`d7656000 : 000000da`198e0000 00000000`08000008 ffffe001`00000000 00000000`00001001 : atikmpag+0xcdf2
ffffd001`ce534028 000000da`198e0000 : 00000000`08000008 ffffe001`00000000 00000000`00001001 ffffc001`ac846a10 : 0xffffe001`d7656000
ffffd001`ce534030 00000000`08000008 : ffffe001`00000000 00000000`00001001 ffffc001`ac846a10 00000000`00000001 : 0x000000da`198e0000
ffffd001`ce534038 ffffe001`00000000 : 00000000`00001001 ffffc001`ac846a10 00000000`00000001 ffffc001`9d2246e0 : 0x8000008
ffffd001`ce534040 00000000`00001001 : ffffc001`ac846a10 00000000`00000001 ffffc001`9d2246e0 00000001`00000000 : 0xffffe001`00000000
ffffd001`ce534048 ffffc001`ac846a10 : 00000000`00000001 ffffc001`9d2246e0 00000001`00000000 ffffd001`ce534460 : 0x1001
ffffd001`ce534050 00000000`00000001 : ffffc001`9d2246e0 00000001`00000000 ffffd001`ce534460 00000000`00000000 : 0xffffc001`ac846a10
ffffd001`ce534058 ffffc001`9d2246e0 : 00000001`00000000 ffffd001`ce534460 00000000`00000000 ffffd001`00000000 : 0x1
ffffd001`ce534060 00000001`00000000 : ffffd001`ce534460 00000000`00000000 ffffd001`00000000 fffff800`00000000 : 0xffffc001`9d2246e0
ffffd001`ce534068 ffffd001`ce534460 : 00000000`00000000 ffffd001`00000000 fffff800`00000000 fffff802`ec023164 : 0x00000001`00000000
ffffd001`ce534070 00000000`00000000 : ffffd001`00000000 fffff800`00000000 fffff802`ec023164 00000040`ffffffff : 0xffffd001`ce534460
SYMBOL_NAME: atikmpag+cdf2
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
STACK_COMMAND: .cxr 0xffffd001ce533600 ; kb
BUCKET_ID_FUNC_OFFSET: cdf2
FAILURE_BUCKET_ID: 0x3B_c0000005_atikmpag!unknown_function
OS_VERSION: 8.1.9600.19724
BUILDLAB_STR: winblue_ltsb_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {89cde08b-30ee-78ac-bffb-f5a78e9a675a}
Followup: MachineOwner
---------