************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : false AllowNugetExeUpdate : false AllowNugetMSCredentialProviderInstall : false AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (20 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff801`12e00000 PsLoadedModuleList = 0xfffff801`13a2a2c0 Debug session time: Wed Nov 8 15:46:40.924 2023 (UTC + 3:00) System Uptime: 0 days 20:08:45.617 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ...................................................... Loading User Symbols Loading unloaded module list ........................................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`131fd800 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd106`59574ce0=000000000000007e 19: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff801448474b7, The address that the exception occurred at Arg3: ffffd10659575cd8, Exception Record Address Arg4: ffffd10659575510, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 1858 Key : Analysis.Elapsed.mSec Value: 1947 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 327 Key : Analysis.Init.Elapsed.mSec Value: 14420 Key : Analysis.Memory.CommitPeak.Mb Value: 118 Key : Bugcheck.Code.KiBugCheckData Value: 0x7e Key : Bugcheck.Code.LegacyAPI Value: 0x7e Key : Failure.Bucket Value: AV_igdkmdnd64!unknown_function Key : Failure.Hash Value: {f72986a3-e8f9-3600-9d7c-dd8a40f557df} Key : Hypervisor.Enlightenments.Value Value: 0 Key : Hypervisor.Enlightenments.ValueHex Value: 0 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 0 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 0 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 0 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 0 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 0 Key : Hypervisor.Flags.Phase0InitDone Value: 0 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 0 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 16908288 Key : Hypervisor.Flags.ValueHex Value: 1020000 Key : Hypervisor.Flags.VpAssistPage Value: 0 Key : Hypervisor.Flags.VsmAvailable Value: 0 Key : Hypervisor.RootFlags.AccessStats Value: 0 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 0 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 0 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 0 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 0 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 0 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 0 Key : Hypervisor.RootFlags.MceEnlightened Value: 0 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 0 Key : Hypervisor.RootFlags.Value Value: 0 Key : Hypervisor.RootFlags.ValueHex Value: 0 Key : SecureKernel.HalpHvciEnabled Value: 0 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff801448474b7 BUGCHECK_P3: ffffd10659575cd8 BUGCHECK_P4: ffffd10659575510 FILE_IN_CAB: MEMORY.DMP EXCEPTION_RECORD: ffffd10659575cd8 -- (.exr 0xffffd10659575cd8) ExceptionAddress: fffff801448474b7 (igdkmdnd64+0x00000000004174b7) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: ffffd10659575510 -- (.cxr 0xffffd10659575510) rax=0000000000000000 rbx=0000000000000000 rcx=dbffbcf98ce0f000 rdx=ffffd10659575f40 rsi=ffffd20fc9819000 rdi=00000001ecaed007 rip=fffff801448474b7 rsp=ffffd10659575f10 rbp=00000001ecaed000 r8=0000fffffffff000 r9=ffffd10659575f40 r10=0000000000000000 r11=000000000000002e r12=00000000fc400000 r13=0000000000000000 r14=00000000fc400000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 igdkmdnd64+0x4174b7: fffff801`448474b7 488939 mov qword ptr [rcx],rdi ds:002b:dbffbcf9`8ce0f000=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System READ_ADDRESS: ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffffd106`59575f10 fffff801`4477e25b : 00000001`00000001 ffffd20f`c981aa20 00000001`ecaed007 0000000c`00001000 : igdkmdnd64+0x4174b7 ffffd106`59575f70 fffff801`446ecc35 : ffffd20f`d3e4a034 ffffd106`59576180 ffffd20f`c9813000 00000000`00000001 : igdkmdnd64+0x34e25b ffffd106`59576070 fffff801`44798deb : 00000000`00000001 fffff801`130216f0 ffffd106`59576520 ffffd20f`c4208f90 : igdkmdnd64+0x2bcc35 ffffd106`59576270 fffff801`446d6a1b : 00000000`00000000 ffffd106`59576520 ffffd20f`d3e51cb0 00000000`00000002 : igdkmdnd64+0x368deb ffffd106`59576310 fffff801`287c6dd5 : 00000000`00000002 ffffd106`59576520 00000000`00000000 ffffd20f`c850ab00 : igdkmdnd64+0x2a6a1b ffffd106`595763c0 fffff801`286d3c79 : 00000000`00000000 00000000`00000000 00000000`00000050 ffffd106`595765d0 : dxgkrnl!ADAPTER_RENDER::DdiBuildPagingBuffer+0x145 ffffd106`59576470 fffff801`10a21c88 : ffff8404`a65f1cb0 00000000`00000001 00000000`00000000 ffffd20f`ca6bf000 : dxgkrnl!ADAPTER_RENDER_DdiBuildPagingBuffer+0x9 ffffd106`595764a0 fffff801`10ad20a4 : 00000000`00000050 ffffd106`595765d0 ffffd20f`ca6bf000 ffffd106`59576570 : dxgmms2!ADAPTER_RENDER::DdiBuildPagingBuffer+0x18 ffffd106`595764d0 fffff801`10ad1f2e : 00000000`00000050 ffff8404`a65f1cb0 ffffd20f`c98b5dc0 ffffad00`1d252540 : dxgmms2!VIDMM_GLOBAL::MapVideoApertureSegmentInternal+0x168 ffffd106`59576690 fffff801`10ab701d : 00000000`00000001 00000000`ffffffff 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MapVideoApertureSegment+0x52 ffffd106`595766f0 fffff801`10ae46da : 00000000`00000000 ffff8404`a65f1cb0 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_APERTURE_SEGMENT::MapApertureRange+0x6d ffffd106`59576750 fffff801`10abb45d : 00000000`00000001 ffffd106`595768c0 ffff8404`8f631ca0 ffffd20f`ca6bf000 : dxgmms2!VIDMM_APERTURE_SEGMENT::RestoreFromPurge+0xaa ffffd106`595767c0 fffff801`10aad622 : ffff8404`8f631c70 ffffd106`00000001 00000000`00000001 ffff8404`8f70eb20 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0x33fad ffffd106`59576940 fffff801`10ab71c9 : ffff8404`8f70eab0 ffffd20f`ca61d201 00000000`00000000 00000000`0993c000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462 ffffd106`59576b20 fffff801`1310e7e5 : ffffd20f`ca61d240 fffff801`10ab71c0 ffff8404`8f70eab0 002fe47f`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9 ffffd106`59576b50 fffff801`13206438 : ffffad00`1cea5180 ffffd20f`ca61d240 fffff801`1310e790 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffd106`59576ba0 00000000`00000000 : ffffd106`59577000 ffffd106`59570000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: igdkmdnd64+4174b7 MODULE_NAME: igdkmdnd64 IMAGE_NAME: igdkmdnd64.sys IMAGE_VERSION: 31.0.101.4887 STACK_COMMAND: .cxr 0xffffd10659575510 ; kb BUCKET_ID_FUNC_OFFSET: 4174b7 FAILURE_BUCKET_ID: AV_igdkmdnd64!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f72986a3-e8f9-3600-9d7c-dd8a40f557df} Followup: MachineOwner ---------