Graphics
Intel® graphics drivers and software, compatibility, troubleshooting, performance, and optimization
20589 Discussions

acrcontroller.exec crash windows 11 2022h2

fkueveryday
Beginner
323 Views

4aa971c4fdf1b62900267b63855cdaa.png

5c7b66ce288c260a1d3576e8aac21fb.png

  

 

my device:

intel a750 gpu card

 i5-13600KF

msi m760 ddr4 16g x4

 

 

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\011623-6234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 22621 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`6ca00000 PsLoadedModuleList = 0xfffff803`6d613010
Debug session time: Mon Jan 16 22:48:11.193 2023 (UTC + 8:00)
System Uptime: 0 days 12:26:31.873
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`6ce28f20 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff968f`8bf67200=00000000000000be
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffd48420554000, Virtual address for the attempted write.
Arg2: 0000000000000020, PTE contents.
Arg3: ffff968f8bf67420, (reserved)
Arg4: 000000000000000e, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 828

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1108

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 218

    Key  : Analysis.Init.Elapsed.mSec
    Value: 23174

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 107

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xbe

    Key  : Bugcheck.Code.Register
    Value: 0xbe

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  011623-6234-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  be

BUGCHECK_P1: ffffd48420554000

BUGCHECK_P2: 20

BUGCHECK_P3: ffff968f8bf67420

BUGCHECK_P4: e

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ArcControl.exe

TRAP_FRAME:  ffff968f8bf67420 -- (.trap 0xffff968f8bf67420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd48420552800 rbx=0000000000000000 rcx=ffffd48420554010
rdx=00002d8d7779a040 rsi=0000000000000000 rdi=0000000000000000
rip=ffffff26d02f2d53 rsp=ffff968f8bf675b8 rbp=ffff968f8bf67750
 r8=0000000000000030  r9=000000000000008f r10=fffff8041e9e76d8
r11=0000021197cf0440 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
win32kfull!memcpy+0x113:
ffffff26`d02f2d53 0f2941f0        movaps  xmmword ptr [rcx-10h],xmm0 ds:ffffd484`20554000=????????????????????????????????
Resetting default scope

STACK_TEXT:  
ffff968f`8bf671f8 fffff803`6ce81e71     : 00000000`000000be ffffd484`20554000 00000000`00000020 ffff968f`8bf67420 : nt!KeBugCheckEx
ffff968f`8bf67200 fffff803`6cc575cc     : fffff803`6d6695c0 00000000`00000002 ffff968f`8bf673b9 00000000`00000000 : nt!MiSystemFault+0x22d7c1
ffff968f`8bf67300 fffff803`6ce39b29     : ffffd483`fbc6f470 ffffff26`cf0853b7 fffff804`1e9e76d8 00000000`00001001 : nt!MmAccessFault+0x29c
ffff968f`8bf67420 ffffff26`d02f2d53     : ffffff26`d026b46a ffff968f`8bf677f0 00000000`00000000 fffff803`ce80aab8 : nt!KiPageFault+0x369
ffff968f`8bf675b8 ffffff26`d026b46a     : ffff968f`8bf677f0 00000000`00000000 fffff803`ce80aab8 ffffff26`cf050646 : win32kfull!memcpy+0x113
ffff968f`8bf675c0 ffffff26`d026b22a     : fffff804`1e9e76c0 00000000`00000000 00000000`00003c00 fffff803`00003c00 : win32kfull!bDoGetSetBitmapBits+0x132
ffff968f`8bf67650 ffffff26`d026b0ab     : 00000000`00000000 00000000`00000870 00000000`00000f00 00000000`00000006 : win32kfull!GreSetBitmapBitsInternal+0x172
ffff968f`8bf677d0 ffffff26`cf015d74     : ffff968f`8bf67a01 ffffff26`00000000 00000000`00000000 00000000`00000000 : win32kfull!GreSetBitmapBits+0x2b
ffff968f`8bf67820 ffffff26`d0270fe1     : ffff968f`00000000 00000000`00000000 00000000`00000020 00000000`00000870 : win32kbase!GreCreateBitmapInternal+0x374
ffff968f`8bf678f0 ffffff26`cf54adec     : ffffc18f`78a96080 ffff968f`8bf67aa0 00000040`498fde88 ffff968f`8bf679c8 : win32kfull!NtGdiCreateBitmap+0x61
ffff968f`8bf67970 fffff803`6ce3dce5     : 00000000`00000000 ffffff26`d02ade44 00000000`00000040 aaaaaaaa`aaaaaaaa : win32k!NtGdiCreateBitmap+0x20
ffff968f`8bf679b0 00007fff`802a2174     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000040`498fde68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`802a2174


SYMBOL_NAME:  win32kfull!memcpy+113

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.22621.1105

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  113

FAILURE_BUCKET_ID:  AV_win32kfull!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {23cab79c-0979-b42a-ec0e-d7a3379768ec}

Followup:     MachineOwner
---------

outpu

0 Kudos
0 Replies
Reply