Çözüldü SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10
Çözüm
Hata sebebi Broadcom ağ kartı sürücüsü.


Ama enteresan bir olay var.
MEMORY_MANAGEMENT hatası altında da çökmüş sürücü.

Yine de RAM testi yapılmasını da istiyorum.
Hata sebebi Broadcom ağ kartı sürücüsü.


Ama enteresan bir olay var.
MEMORY_MANAGEMENT hatası altında da çökmüş sürücü.

Yine de RAM testi yapılmasını da istiyorum.
 
Çözüm
Hata sebebi Broadcom ağ kartı sürücüsü.

Ama enteresan bir olay var.
MEMORY_MANAGEMENT hatası altında da çökmüş sürücü.

Yine de RAM testi yapılmasını da istiyorum.

Tamam deneyip yazayım.
Hata sebebi Broadcom ağ kartı sürücüsü.

Ama enteresan bir olay var.
MEMORY_MANAGEMENT hatası altında da çökmüş sürücü.

Yine de RAM testi yapılmasını da istiyorum.

Elimde flash bellek yok SD kart ile testi yapabilir miyim?
 
Son düzenleme:
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80512af318a, The address that the exception occurred at
Arg3: ffffb1882cf15698, Exception Record Address
Arg4: ffffb1882cf14ed0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 4546

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 37468

    Key  : Analysis.Init.CPU.mSec
    Value: 515

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1770

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80512af318a

BUGCHECK_P3: ffffb1882cf15698

BUGCHECK_P4: ffffb1882cf14ed0

EXCEPTION_RECORD:  ffffb1882cf15698 -- (.exr 0xffffb1882cf15698)
ExceptionAddress: fffff80512af318a (bcmwl63a+0x000000000015318a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000deadbf05
Attempt to read from address 00000000deadbf05

CONTEXT:  ffffb1882cf14ed0 -- (.cxr 0xffffb1882cf14ed0)
rax=00000000deadbeef rbx=ffffe504fa793420 rcx=ffffe504fab5d4e0
rdx=ffffe50500c03010 rsi=ffffe504fc02ef80 rdi=ffffe504fabf4010
rip=fffff80512af318a rsp=ffffb1882cf158d0 rbp=0000000000000020
 r8=0000000000000000  r9=0000000000006e9e r10=0000000000002280
r11=0000000000006a5c r12=ffffe50501092170 r13=0000000000000000
r14=ffffe50500c03010 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
bcmwl63a+0x15318a:
fffff805`12af318a 0fb74816        movzx   ecx,word ptr [rax+16h] ds:002b:00000000`deadbf05=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8050defa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000deadbf05

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000deadbf05

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffb188`2cf158d0 00000000`00000001     : 00000000`0000001f ffffe504`fac5e8c0 00000000`00000001 ffffe504`fc050000 : bcmwl63a+0x15318a
ffffb188`2cf158d8 00000000`0000001f     : ffffe504`fac5e8c0 00000000`00000001 ffffe504`fc050000 00000000`00000000 : 0x1
ffffb188`2cf158e0 ffffe504`fac5e8c0     : 00000000`00000001 ffffe504`fc050000 00000000`00000000 00006e9e`22806a5c : 0x1f
ffffb188`2cf158e8 00000000`00000001     : ffffe504`fc050000 00000000`00000000 00006e9e`22806a5c 00000000`00000000 : 0xffffe504`fac5e8c0
ffffb188`2cf158f0 ffffe504`fc050000     : 00000000`00000000 00006e9e`22806a5c 00000000`00000000 ffffe504`fc05002e : 0x1
ffffb188`2cf158f8 00000000`00000000     : 00006e9e`22806a5c 00000000`00000000 ffffe504`fc05002e ffffe504`fc050048 : 0xffffe504`fc050000


SYMBOL_NAME:  bcmwl63a+15318a

MODULE_NAME: bcmwl63a

IMAGE_NAME:  bcmwl63a.sys

STACK_COMMAND:  .cxr 0xffffb1882cf14ed0 ; kb

BUCKET_ID_FUNC_OFFSET:  15318a

FAILURE_BUCKET_ID:  AV_bcmwl63a!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {923870c9-9263-9e30-c5a3-4f73aa64fade}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8034116318a, The address that the exception occurred at
Arg3: ffffdf87843f8698, Exception Record Address
Arg4: ffffdf87843f7ed0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 3906

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15674

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1767

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8034116318a

BUGCHECK_P3: ffffdf87843f8698

BUGCHECK_P4: ffffdf87843f7ed0

EXCEPTION_RECORD:  ffffdf87843f8698 -- (.exr 0xffffdf87843f8698)
ExceptionAddress: fffff8034116318a (bcmwl63a+0x000000000015318a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000deadbf05
Attempt to read from address 00000000deadbf05

CONTEXT:  ffffdf87843f7ed0 -- (.cxr 0xffffdf87843f7ed0)
rax=00000000deadbeef rbx=ffffcc88144e1520 rcx=ffffcc881231e260
rdx=ffffcc8812776010 rsi=ffffcc8812d11f80 rdi=ffffcc8812965010
rip=fffff8034116318a rsp=ffffdf87843f88d0 rbp=000000000000001f
 r8=0000000000000000  r9=0000000000006e9e r10=0000000000002280
r11=0000000000006a5c r12=ffffcc88163084d0 r13=0000000000000000
r14=ffffcc8812776010 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
bcmwl63a+0x15318a:
fffff803`4116318a 0fb74816        movzx   ecx,word ptr [rax+16h] ds:002b:00000000`deadbf05=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8033b6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000deadbf05

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000deadbf05

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffdf87`843f88d0 00000000`00000001     : 00000000`0000001e ffffcc88`129cf500 00000000`00000001 ffffcc88`12d21000 : bcmwl63a+0x15318a
ffffdf87`843f88d8 00000000`0000001e     : ffffcc88`129cf500 00000000`00000001 ffffcc88`12d21000 00000000`00000000 : 0x1
ffffdf87`843f88e0 ffffcc88`129cf500     : 00000000`00000001 ffffcc88`12d21000 00000000`00000000 00006e9e`22806a5c : 0x1e
ffffdf87`843f88e8 00000000`00000001     : ffffcc88`12d21000 00000000`00000000 00006e9e`22806a5c 00000000`00000000 : 0xffffcc88`129cf500
ffffdf87`843f88f0 ffffcc88`12d21000     : 00000000`00000000 00006e9e`22806a5c 00000000`00000000 ffffcc88`12d2102e : 0x1
ffffdf87`843f88f8 00000000`00000000     : 00006e9e`22806a5c 00000000`00000000 ffffcc88`12d2102e ffffcc88`12d21048 : 0xffffcc88`12d21000


SYMBOL_NAME:  bcmwl63a+15318a

MODULE_NAME: bcmwl63a

IMAGE_NAME:  bcmwl63a.sys

STACK_COMMAND:  .cxr 0xffffdf87843f7ed0 ; kb

BUCKET_ID_FUNC_OFFSET:  15318a

FAILURE_BUCKET_ID:  AV_bcmwl63a!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {923870c9-9263-9e30-c5a3-4f73aa64fade}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8004b0c318a, The address that the exception occurred at
Arg3: ffffc5820c099698, Exception Record Address
Arg4: ffffc5820c098ed0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 4890

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 36549

    Key  : Analysis.Init.CPU.mSec
    Value: 515

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1766

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8004b0c318a

BUGCHECK_P3: ffffc5820c099698

BUGCHECK_P4: ffffc5820c098ed0

EXCEPTION_RECORD:  ffffc5820c099698 -- (.exr 0xffffc5820c099698)
ExceptionAddress: fffff8004b0c318a (bcmwl63a+0x000000000015318a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000deadbf05
Attempt to read from address 00000000deadbf05

CONTEXT:  ffffc5820c098ed0 -- (.cxr 0xffffc5820c098ed0)
rax=00000000deadbeef rbx=ffff870a92b8bba0 rcx=ffff870a96cd7d80
rdx=ffff870a9f6c1010 rsi=ffff870a8e1c3f80 rdi=ffff870a93ebd360
rip=fffff8004b0c318a rsp=ffffc5820c0998d0 rbp=0000000000000005
 r8=0000000000000000  r9=0000000000006e9e r10=0000000000002280
r11=0000000000006a5c r12=ffff870a8ead1d00 r13=0000000000000000
r14=ffff870a9f6c1010 r15=0000000000000002
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
bcmwl63a+0x15318a:
fffff800`4b0c318a 0fb74816        movzx   ecx,word ptr [rax+16h] ds:002b:00000000`deadbf05=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff800430fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000deadbf05

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000deadbf05

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffc582`0c0998d0 00000000`00000001     : 00000000`00000004 ffff870a`943869a0 00000000`00000001 ffff870a`8e1a6800 : bcmwl63a+0x15318a
ffffc582`0c0998d8 00000000`00000004     : ffff870a`943869a0 00000000`00000001 ffff870a`8e1a6800 00000000`00000000 : 0x1
ffffc582`0c0998e0 ffff870a`943869a0     : 00000000`00000001 ffff870a`8e1a6800 00000000`00000000 00006e9e`22806a5c : 0x4
ffffc582`0c0998e8 00000000`00000001     : ffff870a`8e1a6800 00000000`00000000 00006e9e`22806a5c 00000000`00000000 : 0xffff870a`943869a0
ffffc582`0c0998f0 ffff870a`8e1a6800     : 00000000`00000000 00006e9e`22806a5c 00000000`00000000 ffff870a`8e1a682e : 0x1
ffffc582`0c0998f8 00000000`00000000     : 00006e9e`22806a5c 00000000`00000000 ffff870a`8e1a682e ffff870a`8e1a6848 : 0xffff870a`8e1a6800


SYMBOL_NAME:  bcmwl63a+15318a

MODULE_NAME: bcmwl63a

IMAGE_NAME:  bcmwl63a.sys

STACK_COMMAND:  .cxr 0xffffc5820c098ed0 ; kb

BUCKET_ID_FUNC_OFFSET:  15318a

FAILURE_BUCKET_ID:  AV_bcmwl63a!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {923870c9-9263-9e30-c5a3-4f73aa64fade}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
    user space of the system process. Parameter 2 contains the
    address of the attempted write.
Arg2: 00000000deadbf07
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3343

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 26915

    Key  : Analysis.Init.CPU.mSec
    Value: 514

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1787

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 4477

BUGCHECK_P2: deadbf07

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffef871dcd8800 -- (.trap 0xffffef871dcd8800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdc0db25ebf88 rbx=0000000000000000 rcx=ae3ecbd693710000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047d929502 rsp=ffffef871dcd8990 rbp=0000000000000000
 r8=ffffdc0db25cef80  r9=0000000000006edf r10=0000000000000014
r11=ffffdc0db21fcec0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
bcmwl63a+0x179502:
fffff804`7d929502 44896f18        mov     dword ptr [rdi+18h],r13d ds:00000000`00000018=????????
Resetting default scope

STACK_TEXT: 
ffffef87`1dcd8478 fffff804`7482cb2b     : 00000000`0000001a 00000000`00004477 00000000`deadbf07 00000000`00000000 : nt!KeBugCheckEx
ffffef87`1dcd8480 fffff804`7469fdc7     : 00000000`00000000 fffff279`00000000 ffffef87`1dcd8800 fffff279`000037a8 : nt!MiInPagePageTable+0x1d3c0b
ffffef87`1dcd85d0 fffff804`7469f26a     : 00000000`00000000 ffffdc0d`00000000 ffffdc0d`b25ce850 00000000`00000000 : nt!MiUserFault+0x5e7
ffffef87`1dcd8660 fffff804`7480535e     : ffffdc0d`b2213010 00000000`00000000 ffffdc0d`b25ce826 fffff804`00000000 : nt!MmAccessFault+0x16a
ffffef87`1dcd8800 fffff804`7d929502     : 00000000`00000000 00000000`00000000 00000000`0000c000 ffffdc0d`b20a12b0 : nt!KiPageFault+0x35e
ffffef87`1dcd8990 00000000`00000000     : 00000000`00000000 00000000`0000c000 ffffdc0d`b20a12b0 ffffdc0d`08759bab : bcmwl63a+0x179502


SYMBOL_NAME:  bcmwl63a+179502

MODULE_NAME: bcmwl63a

IMAGE_NAME:  bcmwl63a.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  179502

FAILURE_BUCKET_ID:  0x1a_4477_bcmwl63a!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c3aafd5b-1ec9-55de-8478-e7f1065927fa}

Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
    user space of the system process. Parameter 2 contains the
    address of the attempted write.
Arg2: 00000000deadbf07
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3093

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 31987

    Key  : Analysis.Init.CPU.mSec
    Value: 499

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1770

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 4477

BUGCHECK_P2: deadbf07

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffac895188b800 -- (.trap 0xffffac895188b800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf01b2bd7788 rbx=0000000000000000 rcx=70cc8ec3ec4d0000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff807563e9502 rsp=ffffac895188b990 rbp=0000000000000000
 r8=0000000000000001  r9=0000000000000000 r10=fffff8074ab65ac0
r11=ffffac895188b6d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
bcmwl63a+0x179502:
fffff807`563e9502 44896f18        mov     dword ptr [rdi+18h],r13d ds:00000000`00000018=????????
Resetting default scope

STACK_TEXT: 
ffffac89`5188b478 fffff807`4c82cb2b     : 00000000`0000001a 00000000`00004477 00000000`deadbf07 00000000`00000000 : nt!KeBugCheckEx
ffffac89`5188b480 fffff807`4c69fdc7     : 00000000`00000000 fffffcfe`00000000 ffffac89`5188b800 fffffcfe`400037a8 : nt!MiInPagePageTable+0x1d3c0b
ffffac89`5188b5d0 fffff807`4c69f26a     : 00000000`00000000 ffffdf01`00000000 ffffdf01`b23fbc60 00000000`00000000 : nt!MiUserFault+0x5e7
ffffac89`5188b660 fffff807`4c80535e     : ffffdf01`b2be002e ffffdf01`b2be0048 0000060e`000005f4 fffff807`000005f4 : nt!MmAccessFault+0x16a
ffffac89`5188b800 fffff807`563e9502     : 00000000`00000000 00000000`00000002 00000000`0000c000 ffffdf01`b2784de0 : nt!KiPageFault+0x35e
ffffac89`5188b990 00000000`00000000     : 00000000`00000002 00000000`0000c000 ffffdf01`b2784de0 ffffdf01`0ff76286 : bcmwl63a+0x179502


SYMBOL_NAME:  bcmwl63a+179502

MODULE_NAME: bcmwl63a

IMAGE_NAME:  bcmwl63a.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  179502

FAILURE_BUCKET_ID:  0x1a_4477_bcmwl63a!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c3aafd5b-1ec9-55de-8478-e7f1065927fa}

Followup:     MachineOwner
---------
 

Geri
Yukarı