************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : false AllowNugetExeUpdate : false AllowNugetMSCredentialProviderInstall : false AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (20 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff807`2d200000 PsLoadedModuleList = 0xfffff807`2de2a6d0 Debug session time: Sun Dec 10 13:38:48.972 2023 (UTC + 3:00) System Uptime: 1 days 14:27:25.054 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ..................................................... Loading User Symbols Loading unloaded module list ...................................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`2d5fd730 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8a8e`6da0ed50=000000000000007e 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80b5a2b800c, The address that the exception occurred at Arg3: ffff8a8e6da0fd48, Exception Record Address Arg4: ffff8a8e6da0f580, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 1952 Key : Analysis.Elapsed.mSec Value: 2043 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 296 Key : Analysis.Init.Elapsed.mSec Value: 24276 Key : Analysis.Memory.CommitPeak.Mb Value: 118 Key : Bugcheck.Code.KiBugCheckData Value: 0x7e Key : Bugcheck.Code.LegacyAPI Value: 0x7e Key : Failure.Bucket Value: AV_igdkmdnd64!unknown_function Key : Failure.Hash Value: {f72986a3-e8f9-3600-9d7c-dd8a40f557df} Key : Hypervisor.Enlightenments.Value Value: 0 Key : Hypervisor.Enlightenments.ValueHex Value: 0 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 0 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 0 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 0 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 0 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 0 Key : Hypervisor.Flags.Phase0InitDone Value: 0 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 0 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 16908288 Key : Hypervisor.Flags.ValueHex Value: 1020000 Key : Hypervisor.Flags.VpAssistPage Value: 0 Key : Hypervisor.Flags.VsmAvailable Value: 0 Key : Hypervisor.RootFlags.AccessStats Value: 0 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 0 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 0 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 0 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 0 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 0 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 0 Key : Hypervisor.RootFlags.MceEnlightened Value: 0 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 0 Key : Hypervisor.RootFlags.Value Value: 0 Key : Hypervisor.RootFlags.ValueHex Value: 0 Key : SecureKernel.HalpHvciEnabled Value: 0 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80b5a2b800c BUGCHECK_P3: ffff8a8e6da0fd48 BUGCHECK_P4: ffff8a8e6da0f580 FILE_IN_CAB: MEMORY.DMP EXCEPTION_RECORD: ffff8a8e6da0fd48 -- (.exr 0xffff8a8e6da0fd48) ExceptionAddress: fffff80b5a2b800c (igdkmdnd64+0x000000000040800c) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: ffff8a8e6da0f580 -- (.cxr 0xffff8a8e6da0f580) rax=0000000000000001 rbx=000000034cde9007 rcx=ffff8a8e6da0ffb0 rdx=dffff5f94c60f000 rsi=ffffd182117d6000 rdi=ffffd1821e990000 rip=fffff80b5a2b800c rsp=ffff8a8e6da0ff80 rbp=00000000fc400000 r8=0000000000000001 r9=dfffffffffffffff r10=ffff8a8e6da0ffd0 r11=0000000000000000 r12=0000000000000000 r13=00000000fc400000 r14=000000034cde9007 r15=0000000000000002 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206 igdkmdnd64+0x40800c: fffff80b`5a2b800c 48891a mov qword ptr [rdx],rbx ds:002b:dffff5f9`4c60f000=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System READ_ADDRESS: ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffff8a8e`6da0ff80 fffff80b`5a1e73f1 : 00000003`00000001 ffffd182`1e990e48 ffffd182`1266a760 ffffd182`117d6000 : igdkmdnd64+0x40800c ffff8a8e`6da0ffd0 fffff80b`5a164ec1 : ffffd182`125792c0 00000000`00000000 00000000`fc400000 00000000`00000001 : igdkmdnd64+0x3373f1 ffff8a8e`6da100e0 fffff80b`5a20d82c : 00000000`00000000 ffffd181`fb5cdd70 ffff8a8e`6da10520 00000000`00000000 : igdkmdnd64+0x2b4ec1 ffff8a8e`6da102b0 fffff80b`5a15010e : ffffd182`1f947000 00000000`00000001 ffffa985`3e482de0 fffff807`2d525cd9 : igdkmdnd64+0x35d82c ffff8a8e`6da10350 fffff807`450f6dd5 : ffff8a8e`6da10520 00000000`00000000 ffffd182`168088b0 00000000`ffffffff : igdkmdnd64+0x2a010e ffff8a8e`6da103c0 fffff807`45003c79 : 00000000`00000000 00000000`00000000 00000000`00000020 ffff8a8e`6da105d0 : dxgkrnl!ADAPTER_RENDER::DdiBuildPagingBuffer+0x145 ffff8a8e`6da10470 fffff807`29861c88 : ffffa985`64866890 fffff807`00000001 00000000`00000000 00000000`00040286 : dxgkrnl!ADAPTER_RENDER_DdiBuildPagingBuffer+0x9 ffff8a8e`6da104a0 fffff807`299120a4 : 00000000`00000020 ffff8a8e`6da105d0 ffffd182`1f947000 ffff8a8e`6da10570 : dxgmms2!ADAPTER_RENDER::DdiBuildPagingBuffer+0x18 ffff8a8e`6da104d0 fffff807`29911f2e : 00000000`00000020 ffffa985`64866890 ffffd182`1dd9a7a0 ffffe601`e15b7540 : dxgmms2!VIDMM_GLOBAL::MapVideoApertureSegmentInternal+0x168 ffff8a8e`6da10690 fffff807`298f701d : 00000000`00000001 00000000`ffffffff 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MapVideoApertureSegment+0x52 ffff8a8e`6da106f0 fffff807`299246da : 00000000`00000000 ffffa985`64866890 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_APERTURE_SEGMENT::MapApertureRange+0x6d ffff8a8e`6da10750 fffff807`298fb45d : 00000000`00000001 ffff8a8e`6da108c0 ffffa985`469e4f00 ffffd182`1f947000 : dxgmms2!VIDMM_APERTURE_SEGMENT::RestoreFromPurge+0xaa ffff8a8e`6da107c0 fffff807`298ed622 : ffffa985`469e4ed0 ffff8a8e`00000001 00000000`00000001 ffffa985`6b01b2a0 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0x33fad ffff8a8e`6da10940 fffff807`298f71c9 : ffffa985`6b01b230 00330030`00410001 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462 ffff8a8e`6da10b20 fffff807`2d5078e5 : ffffd182`17b1a040 fffff807`298f71c0 ffffa985`6b01b230 0065006e`00650047 : dxgmms2!VidMmWorkerThreadProc+0x9 ffff8a8e`6da10b50 fffff807`2d606368 : ffffe601`e16a6180 ffffd182`17b1a040 fffff807`2d507890 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffff8a8e`6da10ba0 00000000`00000000 : ffff8a8e`6da11000 ffff8a8e`6da0a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: igdkmdnd64+40800c MODULE_NAME: igdkmdnd64 IMAGE_NAME: igdkmdnd64.sys IMAGE_VERSION: 31.0.101.4255 STACK_COMMAND: .cxr 0xffff8a8e6da0f580 ; kb BUCKET_ID_FUNC_OFFSET: 40800c FAILURE_BUCKET_ID: AV_igdkmdnd64!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f72986a3-e8f9-3600-9d7c-dd8a40f557df} Followup: MachineOwner ---------