SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8065e2a60ae, The address that the exception occurred at
Arg3: ffff9d07e002ffd8, Exception Record Address
Arg4: ffffca000ec46930, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2564
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8065e2a60ae
BUGCHECK_P3: ffff9d07e002ffd8
BUGCHECK_P4: ffffca000ec46930
EXCEPTION_RECORD: ffff9d07e002ffd8 -- (.exr 0xffff9d07e002ffd8)
ExceptionAddress: fffff8065e2a60ae (nt!KiDeliverApc+0x00000000000000ee)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffca000ec46930 -- (.cxr 0xffffca000ec46930)
rax=0000000000000000 rbx=ffffb607eece6680 rcx=0000000000000000
rdx=fbffb607eece6718 rsi=fbffb607eece6708 rdi=ffffb607eece6718
rip=fffff8065e2a60ae rsp=ffff9d07e0030210 rbp=ffff9d07e0030269
r8=0000000000000000 r9=0000000000000000 r10=0000000000000003
r11=ffffb607e94068a0 r12=ffffb607e7c8f180 r13=0000000000000001
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!KiDeliverApc+0xee:
fffff806`5e2a60ae 488b4e30 mov rcx,qword ptr [rsi+30h] ds:002b:fbffb607`eece6738=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8065e7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8065e62a3b8: Unable to get Flags value from nt!KdVersionBlock
fffff8065e62a3b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff9d07`e0030210 fffff806`5e2cf44b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`00000003 : nt!KiDeliverApc+0xee
ffff9d07`e00302d0 fffff806`5e2a294e : ffffb607`e7fd6000 00000000`00000000 ffffb607`e9406960 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x2b
ffff9d07`e0030300 fffff806`5e24f392 : 00000000`00000000 ffff9d07`e0030380 00000000`00000050 fffff806`6e9df880 : nt!KeLeaveCriticalRegionThread+0x2e
ffff9d07`e0030330 fffff806`5e24d32e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpEventWriteFull+0x1452
ffff9d07`e00306b0 fffff806`5e24d1cb : 00000004`00000003 ffff9d07`00000000 ffff9d07`e0030810 ffff9d07`e00309a9 : nt!EtwWriteEx+0x14e
ffff9d07`e00307c0 fffff806`6e9c5ac6 : 00000000`00000000 00000000`00000000 ffffca00`0ebe2180 00000000`00000002 : nt!EtwWriteTransfer+0x2b
ffff9d07`e0030810 fffff806`6e9c625a : ffff9d07`00000000 fffff806`00000000 00000000`00000000 00000000`00000008 : dxgmms2+0x25ac6
ffff9d07`e0030850 fffff806`6e9bbd91 : ffffb607`eece6680 fffff806`5e26df46 00000000`000000e3 ffffb607`eeba1000 : dxgmms2+0x2625a
ffff9d07`e00308d0 fffff806`6ea1a37c : ffff9d07`e0030a01 00000000`00989680 0000001b`97b1b5a9 00000000`00000000 : dxgmms2+0x1bd91
ffff9d07`e00309f0 fffff806`6e9a8786 : ffffb607`f46109a0 ffffb607`eeba3000 ffff9d07`e0030b19 00000000`00989680 : dxgmms2!VidMmInterface+0x3db9c
ffff9d07`e0030ac0 fffff806`6ea29c00 : ffffb607`f4d35400 ffffb607`eeba3000 ffffb607`f4d354a0 ffffb607`f29a84e0 : dxgmms2+0x8786
ffff9d07`e0030b80 fffff806`6ea29bba : ffffb607`eeba3400 fffff806`6ea29af0 ffffb607`eeba3000 00000000`00000000 : dxgmms2!VidMmInterface+0x4d420
ffff9d07`e0030bd0 fffff806`5e31e155 : ffffb607`eece6680 fffff806`00000001 ffffb607`eeba3000 00000067`bcbbbdff : dxgmms2!VidMmInterface+0x4d3da
ffff9d07`e0030c10 fffff806`5e3c99c8 : ffffca00`0ebe2180 ffffb607`eece6680 fffff806`5e31e100 049d3c38`fffffff0 : nt!PspSystemThreadStartup+0x55
ffff9d07`e0030c60 00000000`00000000 : ffff9d07`e0031000 ffff9d07`e002b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2+25ac6
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.18362.890
STACK_COMMAND: .cxr 0xffffca000ec46930 ; kb
BUCKET_ID_FUNC_OFFSET: 25ac6
FAILURE_BUCKET_ID: AV_dxgmms2!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ef88c03d-a690-ebe1-e688-902a4fce2373}
Followup: MachineOwner
---------
10: kd> !thread
THREAD ffffb607eece6680 Cid 0004.02c0 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor a
Not impersonating
GetUlongFromAddress: unable to read from fffff8065e62ca04
Owning Process ffffb607e7c8f180 Image: System
Attached Process N/A Image: N/A
fffff78000000000: Unable to get shared data
Wait Start TickCount 758443
Context Switch Count 8200539 IdealProcessor: 10
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address dxgmms2!VidMmInterface (0xfffff8066ea29af0)
Stack Init ffff9d07e0030c90 Current ffff9d07e0030620
Base ffff9d07e0031000 Limit ffff9d07e002b000 Call 0000000000000000
Priority 16 BasePriority 16 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffff9d07`e0030210 fffff806`5e2cf44b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`00000003 : nt!KiDeliverApc+0xee
ffff9d07`e00302d0 fffff806`5e2a294e : ffffb607`e7fd6000 00000000`00000000 ffffb607`e9406960 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x2b
ffff9d07`e0030300 fffff806`5e24f392 : 00000000`00000000 ffff9d07`e0030380 00000000`00000050 fffff806`6e9df880 : nt!KeLeaveCriticalRegionThread+0x2e
ffff9d07`e0030330 fffff806`5e24d32e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpEventWriteFull+0x1452
ffff9d07`e00306b0 fffff806`5e24d1cb : 00000004`00000003 ffff9d07`00000000 ffff9d07`e0030810 ffff9d07`e00309a9 : nt!EtwWriteEx+0x14e
ffff9d07`e00307c0 fffff806`6e9c5ac6 : 00000000`00000000 00000000`00000000 ffffca00`0ebe2180 00000000`00000002 : nt!EtwWriteTransfer+0x2b
ffff9d07`e0030810 fffff806`6e9c625a : ffff9d07`00000000 fffff806`00000000 00000000`00000000 00000000`00000008 : dxgmms2+0x25ac6
ffff9d07`e0030850 fffff806`6e9bbd91 : ffffb607`eece6680 fffff806`5e26df46 00000000`000000e3 ffffb607`eeba1000 : dxgmms2+0x2625a
ffff9d07`e00308d0 fffff806`6ea1a37c : ffff9d07`e0030a01 00000000`00989680 0000001b`97b1b5a9 00000000`00000000 : dxgmms2+0x1bd91
ffff9d07`e00309f0 fffff806`6e9a8786 : ffffb607`f46109a0 ffffb607`eeba3000 ffff9d07`e0030b19 00000000`00989680 : dxgmms2!VidMmInterface+0x3db9c
ffff9d07`e0030ac0 fffff806`6ea29c00 : ffffb607`f4d35400 ffffb607`eeba3000 ffffb607`f4d354a0 ffffb607`f29a84e0 : dxgmms2+0x8786
ffff9d07`e0030b80 fffff806`6ea29bba : ffffb607`eeba3400 fffff806`6ea29af0 ffffb607`eeba3000 00000000`00000000 : dxgmms2!VidMmInterface+0x4d420
ffff9d07`e0030bd0 fffff806`5e31e155 : ffffb607`eece6680 fffff806`00000001 ffffb607`eeba3000 00000067`bcbbbdff : dxgmms2!VidMmInterface+0x4d3da
ffff9d07`e0030c10 fffff806`5e3c99c8 : ffffca00`0ebe2180 ffffb607`eece6680 fffff806`5e31e100 049d3c38`fffffff0 : nt!PspSystemThreadStartup+0x55
ffff9d07`e0030c60 00000000`00000000 : ffff9d07`e0031000 ffff9d07`e002b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28