************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff800`63000000 PsLoadedModuleList = 0xfffff800`63c2a770
Debug session time: Wed Mar 13 07:20:34.816 2024 (UTC - 5:00)
System Uptime: 0 days 9:20:01.443
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`633fd5b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8002`fcb02550=0000000000000050
13: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe7, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffdf7e9ae2fd63, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 3718
Key : Analysis.Elapsed.mSec
Value: 5789
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 781
Key : Analysis.Init.Elapsed.mSec
Value: 127330
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.KiBugCheckData
Value: 0x50
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Bugcheck.Code.TargetModel
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_win32kbase!SURFACE::bDeleteSurface
Key : Failure.Hash
Value: {b6eca5ca-792f-4c4c-1643-864ab524a65b}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffffe7
BUGCHECK_P2: 0
BUGCHECK_P3: ffffdf7e9ae2fd63
BUGCHECK_P4: 2
FILE_IN_CAB: MEMORY.DMP
READ_ADDRESS: unable to get nt!PspSessionIdBitmap
ffffffffffffffe7
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8002fcb027f0 -- (.trap 0xffff8002fcb027f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdf7e9ae2fd63 rsp=ffff8002fcb02980 rbp=0000000000000080
r8=0000000000000020 r9=0000000000000001 r10=0000000000000000
r11=fffff80063000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
Page 7be293 not present in the dump file. Type ".hh dbgerr004" for details
Page 7be293 not present in the dump file. Type ".hh dbgerr004" for details
ffffdf7e`9ae2fd63 ?? ???
Resetting default scope
STACK_TEXT:
ffff8002`fcb02548 fffff800`6343ba7d : 00000000`00000050 ffffffff`ffffffe7 00000000`00000000 ffff8002`fcb027f0 : nt!KeBugCheckEx
ffff8002`fcb02550 fffff800`63224660 : 00000000`00000000 00000000`00000000 ffff8002`fcb02870 00000000`00000000 : nt!MiSystemFault+0x1d851d
ffff8002`fcb02650 fffff800`6340d358 : 00000000`00000000 fffff800`5fa74ae0 fffff800`5fa70ac0 00000000`00000000 : nt!MmAccessFault+0x400
ffff8002`fcb027f0 ffffdf7e`9ae2fd63 : 00000000`00000090 ffffb90f`000000f0 ffffb90f`32cd6000 ffffb90f`00000002 : nt!KiPageFault+0x358
ffff8002`fcb02980 00000000`00000090 : ffffb90f`000000f0 ffffb90f`32cd6000 ffffb90f`00000002 ffff8002`00000001 : 0xffffdf7e`9ae2fd63
ffff8002`fcb02988 ffffb90f`000000f0 : ffffb90f`32cd6000 ffffb90f`00000002 ffff8002`00000001 ffff8cdd`d8a0b935 : 0x90
ffff8002`fcb02990 ffffb90f`32cd6000 : ffffb90f`00000002 ffff8002`00000001 ffff8cdd`d8a0b935 01000101`80910018 : 0xffffb90f`000000f0
ffff8002`fcb02998 ffffb90f`00000002 : ffff8002`00000001 ffff8cdd`d8a0b935 01000101`80910018 ffffb90f`3cfac160 : 0xffffb90f`32cd6000
ffff8002`fcb029a0 ffff8002`00000001 : ffff8cdd`d8a0b935 01000101`80910018 ffffb90f`3cfac160 0002b6c0`8091000e : 0xffffb90f`00000002
ffff8002`fcb029a8 ffff8cdd`d8a0b935 : 01000101`80910018 ffffb90f`3cfac160 0002b6c0`8091000e ffffb90f`203b7000 : 0xffff8002`00000001
ffff8002`fcb029b0 ffffdf7e`99e00000 : 00000002`a6cea000 00000002`a6cea000 00000000`00000000 00000000`00e62000 : win32kbase!SURFACE::bDeleteSurface+0x785
ffff8002`fcb02b70 00000002`a6cea000 : 00000002`a6cea000 00000000`00000000 00000000`00e62000 ffffb90f`2038bf80 : 0xffffdf7e`99e00000
ffff8002`fcb02b78 00000002`a6cea000 : 00000000`00000000 00000000`00e62000 ffffb90f`2038bf80 00000000`0002b6c0 : 0x00000002`a6cea000
ffff8002`fcb02b80 00000000`00000000 : 00000000`00e62000 ffffb90f`2038bf80 00000000`0002b6c0 00000000`0002b6c0 : 0x00000002`a6cea000
SYMBOL_NAME: win32kbase!SURFACE::bDeleteSurface+785
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 785
FAILURE_BUCKET_ID: AV_R_(null)_win32kbase!SURFACE::bDeleteSurface
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b6eca5ca-792f-4c4c-1643-864ab524a65b}
Followup: MachineOwner
---------