SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803220b42fa, The address that the exception occurred at
Arg3: ffff8d86f3cd1218, Exception Record Address
Arg4: ffff8d86f3cd0a50, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F60c
BIOS_DATE: 10/29/2020
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803220b42fa
BUGCHECK_P3: ffff8d86f3cd1218
BUGCHECK_P4: ffff8d86f3cd0a50
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExpWnfFindScopeInstance+2a
fffff803`220b42fa 3b6bf4 cmp ebp,dword ptr [rbx-0Ch]
EXCEPTION_RECORD: ffff8d86f3cd1218 -- (.exr 0xffff8d86f3cd1218)
ExceptionAddress: fffff803220b42fa (nt!ExpWnfFindScopeInstance+0x000000000000002a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000033d75714
Attempt to read from address 0000000033d75714
CONTEXT: ffff8d86f3cd0a50 -- (.cxr 0xffff8d86f3cd0a50)
rax=0000000000000001 rbx=0000000033d75720 rcx=80f042e88bcbffff
rdx=0000527f424e5250 rsi=ffffe0062c4f6f10 rdi=ffffe0062c4f6f08
rip=fffff803220b42fa rsp=ffff8d86f3cd1450 rbp=0000000000000008
r8=0000000000000008 r9=0000000000000001 r10=ffffffff80002000
r11=ffffe0062c4664c0 r12=ffffe0062c4f6f10 r13=0000000000000003
r14=ffff8d86f3cd15d0 r15=ffffe0062c4bc3b0
iopl=0 nv up ei pl nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050203
nt!ExpWnfFindScopeInstance+0x2a:
fffff803`220b42fa 3b6bf4 cmp ebp,dword ptr [rbx-0Ch] ds:002b:00000000`33d75714=????????
Resetting default scope
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::SendWnfNotificationToProcess+c9
fffff803`32ac04fd 488b4d18 mov rcx,qword ptr [rbp+18h]
BUGCHECK_STR: AV
READ_ADDRESS: fffff803226fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000033d75714
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000033d75714
ANALYSIS_SESSION_HOST: DESKTOP-GULEPCP
ANALYSIS_SESSION_TIME: 11-29-2020 21:58:15.0293
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff803220b20dc to fffff803220b42fa
STACK_TEXT:
ffff8d86`f3cd1450 fffff803`220b20dc : ffff8d86`f3cd15d0 ffff8d86`f3cd14f0 ffffe006`31642ab0 ffffe006`2c4f6f08 : nt!ExpWnfFindScopeInstance+0x2a
ffff8d86`f3cd1480 fffff803`220b11a3 : ffff8d86`f3cd15a8 ffffcb8b`dbca2040 00000000`00000000 00000000`00000000 : nt!ExpWnfResolveScopeInstance+0x248
ffff8d86`f3cd1530 fffff803`220b0fae : 00000000`00000000 ffffcb8b`e4d03000 00000000`00000000 ffffcb8b`dbca2040 : nt!ExpNtUpdateWnfStateData+0x1e7
ffff8d86`f3cd1650 fffff803`21e06bb8 : 00000000`00000000 ffffe006`325aadc8 00000000`00000000 00000000`00000000 : nt!NtUpdateWnfStateData+0x2e
ffff8d86`f3cd16a0 fffff803`21df9070 : fffff803`32ac04fd ffff8d86`f3cd1b00 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffff8d86`f3cd18a8 fffff803`32ac04fd : ffff8d86`f3cd1b00 00000000`00000000 00000000`00000000 ffffe006`30177950 : nt!KiServiceLinkage
ffff8d86`f3cd18b0 fffff803`32ac0338 : 00000000`00000001 ffffffff`80002030 00000000`35a4e900 0000010c`a74b5a6e : dxgmms2!VIDMM_GLOBAL::SendWnfNotificationToProcess+0xc9
ffff8d86`f3cd1940 fffff803`32ae9aa3 : ffffcb8b`e4d0cc60 ffffcb8b`e4d03000 ffff8d86`f3cd1b00 ffffcb8b`e4d0cc70 : dxgmms2!VIDMM_GLOBAL::HandleTrimWnf+0x698
ffff8d86`f3cd1a00 fffff803`32af3e99 : ffffe006`30177950 ffffcb8b`e4bbc200 00000000`00000000 00000000`037d7900 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x933
ffff8d86`f3cd1be0 fffff803`21ca29a5 : ffffcb8b`e4bbc280 fffff803`32af3e90 ffffe006`30177950 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8d86`f3cd1c10 fffff803`21dfc868 : ffff8f81`a81e6180 ffffcb8b`e4bbc280 fffff803`21ca2950 80469670`0234b300 : nt!PspSystemThreadStartup+0x55
ffff8d86`f3cd1c60 00000000`00000000 : ffff8d86`f3cd2000 ffff8d86`f3ccc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
THREAD_SHA1_HASH_MOD_FUNC: ef418afd3cdc004e3e601b90c36bec5f76427fe6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 234b000598446c17c59ce8ceb3b82a610e153172
THREAD_SHA1_HASH_MOD: 5e154bf3d4d8ac35bc657423cd53de93c7884560
FAULT_INSTR_CODE: 184d8b48
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::SendWnfNotificationToProcess+c9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.606
STACK_COMMAND: .cxr 0xffff8d86f3cd0a50 ; kb
BUCKET_ID_FUNC_OFFSET: c9
FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::SendWnfNotificationToProcess
BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::SendWnfNotificationToProcess
PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VIDMM_GLOBAL::SendWnfNotificationToProcess
TARGET_TIME: 2020-11-28T10:33:57.000Z
OSBUILD: 19041
OSSERVICEPACK: 630
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2023-08-28 01:21:11
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 1228b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidmm_global::sendwnfnotificationtoprocess
FAILURE_ID_HASH: {dc586323-28ff-7696-45f6-a81e91a31143}
Followup: MachineOwner