Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Desktop\minidump\121920-8828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`3c000000 PsLoadedModuleList = 0xfffff803`3cc2a2b0
Debug session time: Sat Dec 19 01:54:11.916 2020 (UTC + 3:00)
System Uptime: 0 days 22:14:59.604
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
.......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`3c3f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8201`7d4f6d60=000000000000010e
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffb78bf7d40b30
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22063
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 10e
BUGCHECK_P1: 33
BUGCHECK_P2: ffffb78bf7d40b30
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
ffff8201`7d4f6d58 fffff803`53fb3ad0 : 00000000`0000010e 00000000`00000033 ffffb78b`f7d40b30 00000000`00000000 : nt!KeBugCheckEx
ffff8201`7d4f6d60 fffff803`54fa7f45 : 00000000`00000000 ffffb78b`f7d40c30 ffff918a`c4d03000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
ffff8201`7d4f6da0 fffff803`54f1253a : ffffb78b`f7d40b30 00000000`00000000 ffffb78c`05f45c50 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27879
ffff8201`7d4f6de0 fffff803`54f806a9 : ffffb78b`f7d40b30 00000000`00000000 ffffb78c`05f45c50 ffff918a`c4bbd010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
ffff8201`7d4f6e10 fffff803`54f80115 : 00000000`00000000 ffffb78c`05f45c50 ffffb78b`f7d40b30 ffff918a`bdf5c080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
ffff8201`7d4f6e40 fffff803`54f1257e : ffffb78c`05181120 ffff8201`7d4f6ff9 ffff918a`c4bbd010 00000000`4b677844 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
ffff8201`7d4f6f00 fffff803`53d545ba : 00000000`00000030 00000000`00000799 00000000`00000002 ffff918a`d14bb350 : dxgmms2!VidMmCloseAdapter+0x1e
ffff8201`7d4f6f30 fffff803`53d1323f : ffff918a`bd802100 fffff803`3c24caf2 ffff918a`bd802340 00000000`000000ff : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2e
ffff8201`7d4f6f60 fffff803`53cd9c55 : ffffb78c`05181120 ffffb78b`00000002 ffffb78c`05181120 ffff918a`c4bbd010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
ffff8201`7d4f7060 fffff803`53cd873d : ffff918a`c4ba7000 fffff803`00000001 ffff918a`c4ba7000 fffff803`00000001 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
ffff8201`7d4f70f0 fffff803`53d186c9 : ffffb78b`ec840f10 ffff8201`7d4f7240 00000000`0000028f ffffb78b`ec840de0 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
ffff8201`7d4f7140 fffff803`53d138e5 : ffffb78b`ec840de0 ffff918a`ce2da340 ffffb78b`ec840de0 00000000`00040282 : dxgkrnl!DXGPROCESS::Destroy+0x341
ffff8201`7d4f73b0 fffff803`53c06b67 : 00000000`00000000 ffffb78b`ec840de0 ffff918a`c27d3a20 ffff8201`7d4f7510 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8201`7d4f7500 fffff803`3c63759f : 00000000`00000000 ffff918a`ce2da340 ffff918a`c27d3d50 fffff803`01046000 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8201`7d4f7560 fffff803`3c662894 : ffff918a`ce2da300 ffff918a`ce2da340 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8201`7d4f7630 fffff803`3c706552 : ffff918a`bdf5c4b8 00000000`00000000 ffff8201`7d4f7820 00000000`00000000 : nt!PspExitProcess+0x70
ffff8201`7d4f7660 fffff803`3c6d22e8 : 00000000`e0464645 00000000`00000001 00000000`00000000 00000040`20280000 : nt!PspExitThread+0x5b2
ffff8201`7d4f7760 fffff803`3c267fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8201`7d4f77a0 fffff803`3c3f9d20 : 00000000`00000000 ffff8201`7d4f7850 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff8201`7d4f7850 fffff803`3c40725f : 00000000`00000000 00000000`00000000 ffff918a`bdf5c080 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffff8201`7d4f7990 00007ffd`3720cb04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000040`20a7f768 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`3720cb04
SYMBOL_NAME: dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27879
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 27879
FAILURE_BUCKET_ID: 0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {590e82e4-fa32-3e14-0943-e6b01c6637c4}
Followup: MachineOwner
---------