Bsod Errors

FLTMGR_FIL

The FLTMGR_FILE_SYSTEM bug check has a value of 0x000000F5. This indicates that an unrecoverable failure occurred in the Filter Manager.

FSRTL_EXTR

The FSRTL_EXTRA_CREATE_PARAMETER_VIOLATION bug check has a value of 0x0000010C. This indicates that a violation was detected in the File system Run-time library (FsRtl) Extra Create Parameter (ECP) package.

FTDISK_INT

The FTDISK_INTERNAL_ERROR bug check has a value of 0x00000058. This is issued if the system is booted from the wrong copy of a mirrored partition.

GPIO_CONTR

The GPIO_CONTROLLER_DRIVER_ERROR bug check has a value of 0x00000138. This bug check indicates that the GPIO class extension driver encountered a fatal error.

HAL1_INITI

The HAL1_INITIALIZATION_FAILED bug check has a value of 0x00000061.

HAL_INITIA

The HAL_INITIALIZATION_FAILED bug check has a value of 0x0000005C.

HAL_MEMORY

The HAL_MEMORY_ALLOCATION bug check has a value of 0x000000AC. This bug check indicates that the hardware abstraction layer (HAL) could not obtain sufficient memory.

HTTP_DRIVE

The HTTP_DRIVER_CORRUPTED bug check has a value of 0x000000FA. This indicates that the HTTP kernel driver (Http.sys) has reached a corrupted state and cannot recover.

IMPERSONAT

The IMPERSONATING_WORKER_THREAD bug check has a value of 0x000000DF. This indicates that a workitem did not disable impersonation before it completed.

INACCESSIB

The INACCESSIBLE_BOOT_DEVICE bug check has a value of 0x0000007B. This bug check indicates that the Microsoft Windows operating system has lost access to the system partition during startup.

INCONSISTE

The INCONSISTENT_IRP bug check has a value of 0x0000002A. This indicates that an IRP was found to contain inconsistent information.

INSTALL_MO

The INSTALL_MORE_MEMORY bug check has a value of 0x0000007D. This bug check indicates that there is not enough memory to start up the Microsoft Windows operating system.

INSTRUCTIO

The INSTRUCTION_BUS_ERROR bug check has a value of 0x0000002F.

INSTRUCTIO

The INSTRUCTION_COHERENCY_EXCEPTION bug check has a value of 0x00000056.

INSUFFICIE

The INSUFFICIENT_SYSTEM_MAP_REGS bug check has a value of 0x00000045.

INTERNAL_P

The INTERNAL_POWER_ERROR bug check has a value of 0x000000A0. This bug check indicates that the power policy manager experienced a fatal error.

INTERRUPT_

The INTERRUPT_EXCEPTION_NOT_HANDLED bug check has a value of 0x0000003D.

INTERRUPT_

The INTERRUPT_UNWIND_ATTEMPTED bug check has a value of 0x0000003C.

INVALID_AF

The INVALID_AFFINITY_SET bug check has a value of 0x00000003.

INVALID_CA

The INVALID_CANCEL_OF_FILE_OPEN bug check has a value of 0x000000E8. This indicates that an invalid file object was passed to IoCancelFileOpen.

INVALID_DA

The INVALID_DATA_ACCESS_TRAP bug check has a value of 0x00000004.

INVALID_FL

The INVALID_FLOATING_POINT_STATE bug check has a value of 0x000000E7. This indicates that a thread's saved floating-point state is invalid.

INVALID_KE

The INVALID_KERNEL_HANDLE bug check has a value of 0x00000093. This bug check indicates that an invalid or protected handle was passed to NtClose.

INVALID_PR

The INVALID_PROCESS_ATTACH_ATTEMPT bug check has a value of 0x00000005. This generally indicates that the thread was attached to a process in a situation where that is not allowed. For example, this bug check could occur if KeAttachProcess was called when

INVALID_PR

The INVALID_PROCESS_DETACH_ATTEMPT bug check has a value of 0x00000006.

INVALID_RE

The INVALID_REGION_OR_SEGMENT bug check has a value of 0x00000099. This bug check indicates that ExInitializeRegion or ExInterlockedExtendRegion was called with an invalid set of parameters.

INVALID_SO

The INVALID_SOFTWARE_INTERRUPT bug check has a value of 0x00000007.

INVALID_WO

The INVALID_WORK_QUEUE_ITEM bug check has a value of 0x00000096. This bug check indicates that a queue entry was removed that contained a NULL pointer.

IO1_INITIA

The IO1_INITIALIZATION_FAILED bug check has a value of 0x00000069. This bug check indicates that the initialization of the I/O system failed for some reason.

IRQL_GT_ZE

The IRQL_GT_ZERO_AT_SYSTEM_SERVICE bug check has a value of 0x0000004A. This indicates that a thread is returning to user mode from a system call when its IRQL is still above PASSIVE_LEVEL.

IRQL_NOT_D

The IRQL_NOT_DISPATCH_LEVEL bug check has a value of 0x00000008.

IRQL_NOT_G

The IRQL_NOT_GREATER_OR_EQUAL bug check has a value of 0x00000009.

IRQL_NOT_L

The IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x0000000A. This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.

IRQL_UNEXP

The IRQL_UNEXPECTED_VALUE bug check has a value of 0x000000C8. This indicates that the processor's IRQL is not what it should be at this time.

KERNEL_APC

The KERNEL_APC_PENDING_DURING_EXIT bug check has a value of 0x00000020. This indicates that an asynchronous procedure call (APC) was still pending when a thread exited.

KERNEL_DAT

The KERNEL_DATA_INPAGE_ERROR bug check has a value of 0x0000007A. This bug check indicates that the requested page of kernel data from the paging file could not be read into memory.

KERNEL_MOD

The KERNEL_MODE_EXCEPTION_NOT_HANDLED bug check has a value of 0x0000008E. This bug check indicates that a kernel-mode application generated an exception that the error handler did not catch.

KERNEL_MOD

The KERNEL_MODE_EXCEPTION_NOT_HANDLED_M bug check has a value of 0x1000008E. This indicates that a kernel-mode program generated an exception which the error handler did not catch.

KERNEL_SEC

The KERNEL_SECURITY_CHECK_FAILURE bug check has a value of 0x00000139. This bug check indicates that the kernel has detected the corruption of a critical data structure.

KERNEL_STA

The KERNEL_STACK_INPAGE_ERROR bug check has a value of 0x00000077. This bug check indicates that the requested page of kernel data from the paging file could not be read into memory.

KERNEL_STA

The KERNEL_STACK_LOCKED_AT_EXIT bug check has a value of 0x00000094. This bug check indicates that a thread exited while its kernel stack was marked as not swappable

KMODE_EXCE

The KMODE_EXCEPTION_NOT_HANDLED bug check has a value of 0x0000001E. This indicates that a kernel-mode program generated an exception which the error handler did not catch.

LAST_CHANC

The LAST_CHANCE_CALLED_FROM_KMODE bug check has a value of 0x00000015.

LM_SERVER_

The LM_SERVER_INTERNAL_ERROR bug check has a value of 0x00000054.

LOADER_BLO

The LOADER_BLOCK_MISMATCH bug check has a value of 0x00000100. This indicates that either the loader block is invalid, or it does not match the system that is being loaded.

LOCKED_PAG

The LOCKED_PAGES_TRACKER_CORRUPTION bug check has a value of 0x000000D9. This indicates that the internal locked-page tracking structures have been corrupted.

LPC_INITIA

The LPC_INITIALIZATION_FAILED bug check has a value of 0x0000006A.

MACHINE_CH

The MACHINE_CHECK_EXCEPTION bug check has a value of 0x0000009C. This bug check indicates that a fatal machine check exception has occurred.

MAILSLOT_F

The MAILSLOT_FILE_SYSTEM bug check has a value of 0x00000052.

MANUALLY_I

The MANUALLY_INITIATED_CRASH bug check has a value of 0x000000E2. This indicates that the user deliberately initiated a crash dump from either the kernel debugger or the keyboard.