Mmpool Driver Is Corrupted
- TechNet Blogs The troubleshooters and problem solvers You got a B.S.O.D. Blue Screen of Death, known as Bug Checks, now what.
- The MACHINE_CHECK_EXCEPTION bug check has a value of 0x0000009C. This bug check indicates that a fatal machine check exception has occurred.
- John Carrona,BSOD crash analysis support, BSOD debugging and error reports and help for Microsoft Windows Operating Systems, driver research,crash dump analysis.
STOP 메시지 일반적인 해결방법 블루스크린 참고사이트입니다.. STOP: 0x0000000A 메시지해결 knowledge base.
ブルースクリーンエラー バグチェックコードstop 0x000000d1 driver_irql_not_less_or_equalエラーの解説 driver_irql_not_less_or_equalは.
Subscribe to the RSS feed Last updated: 22 Oct 2015 bugcodes.txt Win10 SDK BugChecks and what to do about them: Bugchecks with no descriptions are either.
You got a B.S.O.D. (Blue Screen of Death, known as Bug Checks), now what?
The MACHINE_CHECK_EXCEPTION bug check has a value of 0x0000009C. This bug check indicates that a fatal machine check exception has occurred.
Important This topic is for programmers. If you are a customer who has received a blue screen error code while using your computer, see
Troubleshoot blue screen errors.
MACHINE_CHECK_EXCEPTION Parameters
The four parameters that are listed in the message have different meanings, depending on the processor type.
If the processor is based on an older x86-based architecture and has the Machine Check Exception MCE feature but not the Machine Check Architecture MCA feature for example, the Intel Pentium processor, the parameters have the following meaning.
The low 32 bits of P5_MC_TYPE Machine Service Report MSR
The address of the MCA_EXCEPTION structure
The high 32 bits of P5_MC_ADDR MSR
The low 32 bits of P5_MC_ADDR MSR
If the processor is based on a newer x86-based architecture and has the MCA feature and the MCE feature for example, any Intel Processor of family 6 or higher, such as Pentium Pro, Pentium IV, or Xeon, or if the processor is an x64-based processor, the parameters have the following meaning.
The high 32 bits of MCi_STATUS MSR for the MCA bank that had the error
The low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
On an Itanium-based processor, the parameters have the following meaning.
Note Parameter 1 indicates the type of violation.
Parameter 1Parameter 2Parameter 3Parameter 4Cause
The system abstraction layer SAL returned an error for SAL_GET_STATEINFO while processing MCA.
SAL returned an error for SAL_CLEAR_STATEINFO while it processed MCA.
Firmware FW reported a fatal MCA.
There are two possible causes:
SAL reported a recoverable MCA, but this recovery is not currently supported.
SAL generated an MCA but could not produce an error record.
SAL returned an error for SAL_GET_STATEINFO while processing an INIT event.
SAL returned an error for SAL_CLEAR_STATEINFO while it processed an INIT event.
In Windows Vista and later operating systems, this bug check occurs only in the following circumstances.
WHEA is not fully initialized.
All processors that rendezvous have no errors in their registers.
For other circumstances, this bug check has been replaced with bug Check 0x124: WHEA_UNCORRECTABLE_ERROR in Windows Vista and later operating systems.
For more information about Machine Check Architecture MCA, see the Intel or AMD Web sites.
For example, when you get a Stop A. What do those Arguments mean.
Once you install the Debugging Tools for Windows, which is available from here:
Download and Install Debugging Tools for Windows
Arguments 00000000 00000018 00000000 00000002 00000000 00000000 fffff802 d154b7bf
The arguments are Parameters that can be passed.
In the example above, we got a Stop A. You could use the Debugger.CHM file to find out what the Arguments/Parameters mean for that specific bug check.
Bug Check 0xA: IRQL_NOT_LESS_OR_EQUAL
4 Address which referenced memory
I m also able to get this information by typing . analyze -show A
An attempt was made to access a pageable or completely invalid address at an
interrupt request level IRQL that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arg1: 0000000000000000, memory referenced
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 read operation, 1 write operation
bit 3 : value 0 not an execute operation, 1 execute operation only on chips which support this level of status
Arg4: 0000000000000000, address which referenced memory
Based on this information, I know that in the example above for my Stop A:
And the address which referenced memory was fffff802 d154b7bf.
The nice thing about the Debugger.CHM and the MSDN library link below is that they list the common
This has all the list of every single bug check code that we have:
0x00000001 APC_INDEX_MISMATCH
INVALID_PROCESS_ATTACH_ATTEMPT
INVALID_PROCESS_DETACH_ATTEMPT
NO_EXCEPTION_HANDLING_SUPPORT
MAXIMUM_WAIT_OBJECTS_EXCEEDED
CREATE_DELETE_LOCK_NOT_LOCKED
LAST_CHANCE_CALLED_FROM_KMODE
KERNEL_APC_PENDING_DURING_EXIT
UNEXPECTED_INITIALIZATION_CALL
DEVICE_REFERENCE_COUNT_NOT_ZERO
INTERRUPT_EXCEPTION_NOT_HANDLED
MULTIPROCESSOR_CONFIGURATION_NOT_SUPPORTED
MULTIPLE_IRP_COMPLETE_REQUESTS
CANCEL_STATE_IN_COMPLETED_IRP
PAGE_FAULT_WITH_INTERRUPTS_OFF
IRQL_GT_ZERO_AT_SYSTEM_SERVICE
INSTRUCTION_COHERENCY_EXCEPTION
SECURITY_INITIALIZATION_FAILED
PROCESS_INITIALIZATION_FAILED
OBJECT1_INITIALIZATION_FAILED
SECURITY1_INITIALIZATION_FAILED
SYMBOLIC_INITIALIZATION_FAILED
MEMORY1_INITIALIZATION_FAILED
PROCESS1_INITIALIZATION_FAILED
SESSION1_INITIALIZATION_FAILED
SESSION2_INITIALIZATION_FAILED
SESSION3_INITIALIZATION_FAILED
SESSION4_INITIALIZATION_FAILED
SESSION5_INITIALIZATION_FAILED
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
KERNEL_MODE_EXCEPTION_NOT_HANDLED
SESSION_HAS_VALID_POOL_ON_EXIT
VIDEO_DRIVER_DEBUG_REPORT_REQUEST
SESSION_HAS_VALID_VIEWS_ON_EXIT
NETWORK_BOOT_INITIALIZATION_FAILED
NETWORK_BOOT_DUPLICATE_ADDRESS
ATTEMPTED_WRITE_TO_READONLY_MEMORY
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION
DRIVER_VERIFIER_DETECTED_VIOLATION
DRIVER_CAUGHT_MODIFYING_FREED_POOL
DRIVER_VERIFIER_IOMANAGER_VIOLATION
DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS
PAGE_FAULT_IN_FREED_SPECIAL_POOL
PAGE_FAULT_BEYOND_END_OF_ALLOCATION
DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
TERMINAL_SERVER_DRIVER_MADE_INCORRECT_MEMORY_REFERENCE
DRIVER_IRQL_NOT_LESS_OR_EQUAL
DRIVER_PORTION_MUST_BE_NONPAGED
SYSTEM_SCAN_AT_RAISED_IRQL_CAUGHT_IMPROPER_DRIVER_UNLOAD
DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL
DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION
DRIVER_UNMAPPING_INVALID_VIEW
LOCKED_PAGES_TRACKER_CORRUPTION
WORKER_THREAD_RETURNED_AT_BAD_IRQL
DRIVER_VERIFIER_DMA_VIOLATION
ACTIVE_EX_WORKER_THREAD_TERMINATION
THREAD_STUCK_IN_DEVICE_DRIVER
DIRTY_MAPPED_PAGES_CONGESTION
SESSION_HAS_VALID_SPECIAL_POOL_ON_EXIT
SCSI_VERIFIER_DETECTED_VIOLATION
PCI_VERIFIER_DETECTED_VIOLATION
RAMDISK_BOOT_INITIALIZATION_FAILED
DRIVER_RETURNED_STATUS_REPARSE_FOR_VOLUME_OPEN
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY
DIRTY_NOWRITE_PAGES_CONGESTION
THIRD_PARTY_FILE_SYSTEM_FAILURE
CRITICAL_STRUCTURE_CORRUPTION
APP_TAGGING_INITIALIZATION_FAILED
FSRTL_EXTRA_CREATE_PARAMETER_VIOLATION
VIDEO_MEMORY_MANAGEMENT_INTERNAL
RESOURCE_MANAGER_EXCEPTION_NOT_HANDLED
VIDEO_SHADOW_DRIVER_FATAL_ERROR
VIDEO_SCHEDULER_INTERNAL_ERROR
DRIVER_RETURNED_HOLDING_CANCEL_LOCK
ATTEMPTED_WRITE_TO_CM_PROTECTED_STORAGE
FAULTY_HARDWARE_CORRUPTED_PAGE
KERNEL_SECURITY_CHECK_FAILURE
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M
UNEXPECTED_KERNEL_MODE_TRAP_M
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M
THREAD_STUCK_IN_DEVICE_DRIVER_M
STATUS_CANNOT_LOAD_REGISTRY_FILE
STATUS_SYSTEM_PROCESS_TERMINATED
STATUS_IMAGE_CHECKSUM_MISMATCH
Bug Check 0x9C: MACHINE_CHECK_EXCEPTION
다음은, 일명 공포의 블루 스크린이나 메모리 덤프시에 기록 되는 버그 체크 코드 목록 입니다. 주로 몇 십개 정도만 자주.