************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.359 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 46
Microsoft (R) Windows Debugger Version 10.0.29482.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ogunm\OneDrive\Masaüstü\010826-5031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff806`8e200000 PsLoadedModuleList = 0xfffff806`8f0f5010
Debug session time: Thu Jan 8 00:00:26.344 2026 (UTC + 3:00)
System Uptime: 0 days 10:50:02.977
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00374018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`8e6fb310 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe809`6e8472c0=0000000000000050
10: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00374018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8d0001522ac8, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8068e46db8e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Invalid
Key : AV.Page.Virtual
Value: 0xffff8d0001520000
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1546
Key : Analysis.Elapsed.mSec
Value: 7030
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 8
Key : Analysis.Init.CPU.mSec
Value: 765
Key : Analysis.Init.Elapsed.mSec
Value: 28624
Key : Analysis.Memory.CommitPeak.Mb
Value: 120
Key : Analysis.Version.DbgEng
Value: 10.0.29482.1003
Key : Analysis.Version.Description
Value: 10.2509.29.03 amd64fre
Key : Analysis.Version.Ext
Value: 1.2509.29.3
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Bugcheck.Code.TargetModel
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace
Key : Failure.Exception.IP.Address
Value: 0xfffff8068e46db8e
Key : Failure.Exception.IP.Module
Value: nt
Key : Failure.Exception.IP.Offset
Value: 0x26db8e
Key : Failure.Hash
Value: {19d98517-59c7-0b9d-6f39-afd9affd277d}
Key : Faulting.IP.Type
Value: Paged
Key : WER.System.BIOSRevision
Value: 5.17.0.0
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8d0001522ac8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8068e46db8e
BUGCHECK_P4: 2
FILE_IN_CAB: 010826-5031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffff8c0ffbbf9080
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffff8d0001522ac8
READ_ADDRESS: fffff8068f1c44c0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8d0001522ac8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
IP_IN_PAGED_CODE:
nt!MiManageSubsectionView+20e
fffff806`8e46db8e 4c3938 cmp qword ptr [rax],r15
STACK_TEXT:
ffffe809`6e8472b8 fffff806`8e5661e0 : 00000000`00000050 ffff8d00`01522ac8 00000000`00000000 ffffe809`6e847520 : nt!KeBugCheckEx
ffffe809`6e8472c0 fffff806`8e553146 : ffffe809`6e8474f0 ffff8000`00000000 ffff8d00`01522ac8 0000007f`fffffff8 : nt!MiSystemFault+0x850
ffffe809`6e8473b0 fffff806`8e8b11cb : 00000000`00000000 00000000`00000000 ffff8c0f`fbbf99c0 00000000`00000000 : nt!MmAccessFault+0x646
ffffe809`6e847520 fffff806`8e46db8e : ffff8c00`01522b28 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x38b
ffffe809`6e8476b0 fffff806`8eadc084 : 00000000`00000008 ffffe809`6e847770 ffff8c0f`f09a70c0 ffffd802`96e7e3a0 : nt!MiManageSubsectionView+0x20e
ffffe809`6e847700 fffff806`8eadbc69 : ffff8c0f`f09a70c0 ffff8c00`09b247a0 00000000`00000000 ffff8c00`01522b40 : nt!MiDeleteVad+0x354
ffffe809`6e8477b0 fffff806`8eadb8ea : ffff8c00`09b247a0 ffffe809`6e847859 00000000`0a4e0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe809`6e8477e0 fffff806`8eadb5ff : ffffd802`95ef6270 ffffd802`9c968700 00000000`0013ab5c ffffd802`96e7df80 : nt!MiUnmapViewOfSection+0x146
ffffe809`6e8478c0 fffff806`351d12e0 : 00000000`71c0d790 00000000`00000000 00000000`00153bed 00000000`00000000 : nt!MmUnmapViewOfSection+0xf
ffffe809`6e8478f0 fffff806`3516ba7d : 00000000`00153bed 00000000`00000000 00000000`71c0cd80 00000000`00000000 : win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace+0x4c
ffffe809`6e847920 fffff806`3516b9de : ffffd802`b0b55010 ffffd802`b0b55010 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CBatch::Clear+0x59
ffffe809`6e847950 fffff806`3516b30e : ffffd802`b0b55000 00000000`00000000 00000000`00000000 8c0ffb7f`64b01281 : win32kbase!DirectComposition::CApplicationChannel:

rocessReturnedBatches+0x7e
ffffe809`6e847980 fffff806`35314e5b : 00000000`00000000 ffffe809`0013ab5c 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x2e
ffffe809`6e8479f0 fffff806`351dd48b : 00000000`69f125c0 ffffe809`6e847b20 00000000`69f125c0 ffff8c0f`fb7f64e0 : win32kbase!DirectComposition::CApplicationChannel:

reallocateNextBatch+0x2f
ffffe809`6e847a30 fffff806`1ff1473f : 00000000`69f125c0 00000000`00000004 ffffd802`b0b55010 00000000`00000000 : win32kbase!NtDCompositionSynchronize+0x3b
ffffe809`6e847a70 fffff806`8e8b5658 : ffff8c0f`fbbf9080 00000000`0000084c ffff8c0f`fbbf9080 00000000`00000000 : win32k!NtDCompositionSynchronize+0x3f
ffffe809`6e847aa0 00007ff9`dcb53a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`71c0d628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dcb53a84
SYMBOL_NAME: win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace+4c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.26100.7309
STACK_COMMAND: .process /r /p 0xffff8c0ffb5c90c0; .thread 0xffff8c0ffbbf9080 ; kb
BUCKET_ID_FUNC_OFFSET: 4c
FAILURE_BUCKET_ID: AV_win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19d98517-59c7-0b9d-6f39-afd9affd277d}
Followup: MachineOwner
---------
10: kd> .process /r /p 0xffff8c0ffb5c90c0; .thread 0xffff8c0ffbbf9080 ; kb
Implicit process is now ffff8c0f`fb5c90c0
Loading User Symbols
Unable to get PEB pointer
Implicit thread is now ffff8c0f`fbbf9080
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 fffff806`8e5661e0 : 00000000`00000050 ffff8d00`01522ac8 00000000`00000000 ffffe809`6e847520 : nt!KeBugCheckEx
01 fffff806`8e553146 : ffffe809`6e8474f0 ffff8000`00000000 ffff8d00`01522ac8 0000007f`fffffff8 : nt!MiSystemFault+0x850
02 fffff806`8e8b11cb : 00000000`00000000 00000000`00000000 ffff8c0f`fbbf99c0 00000000`00000000 : nt!MmAccessFault+0x646
03 fffff806`8e46db8e : ffff8c00`01522b28 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x38b
04 fffff806`8eadc084 : 00000000`00000008 ffffe809`6e847770 ffff8c0f`f09a70c0 ffffd802`96e7e3a0 : nt!MiManageSubsectionView+0x20e
05 fffff806`8eadbc69 : ffff8c0f`f09a70c0 ffff8c00`09b247a0 00000000`00000000 ffff8c00`01522b40 : nt!MiDeleteVad+0x354
06 fffff806`8eadb8ea : ffff8c00`09b247a0 ffffe809`6e847859 00000000`0a4e0000 00000000`00000000 : nt!MiUnmapVad+0x49
07 fffff806`8eadb5ff : ffffd802`95ef6270 ffffd802`9c968700 00000000`0013ab5c ffffd802`96e7df80 : nt!MiUnmapViewOfSection+0x146
08 fffff806`351d12e0 : 00000000`71c0d790 00000000`00000000 00000000`00153bed 00000000`00000000 : nt!MmUnmapViewOfSection+0xf
09 fffff806`3516ba7d : 00000000`00153bed 00000000`00000000 00000000`71c0cd80 00000000`00000000 : win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace+0x4c
0a fffff806`3516b9de : ffffd802`b0b55010 ffffd802`b0b55010 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CBatch::Clear+0x59
0b fffff806`3516b30e : ffffd802`b0b55000 00000000`00000000 00000000`00000000 8c0ffb7f`64b01281 : win32kbase!DirectComposition::CApplicationChannel:

rocessReturnedBatches+0x7e
0c fffff806`35314e5b : 00000000`00000000 ffffe809`0013ab5c 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x2e
0d fffff806`351dd48b : 00000000`69f125c0 ffffe809`6e847b20 00000000`69f125c0 ffff8c0f`fb7f64e0 : win32kbase!DirectComposition::CApplicationChannel:

reallocateNextBatch+0x2f
0e fffff806`1ff1473f : 00000000`69f125c0 00000000`00000004 ffffd802`b0b55010 00000000`00000000 : win32kbase!NtDCompositionSynchronize+0x3b
0f fffff806`8e8b5658 : ffff8c0f`fbbf9080 00000000`0000084c ffff8c0f`fbbf9080 00000000`00000000 : win32k!NtDCompositionSynchronize+0x3f
10 00007ff9`dcb53a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
11 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dcb53a84
10: kd> !memusage 8
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Search: READ_PVOID error
InitTypeRead(nt!MmPhysicalMemoryBlock, nt!_PHYSICAL_MEMORY_DESCRIPTOR) error 1
PhysicalMemoryBlock not found.
10: kd> lmvm win32kbase
Browse full module list
start end module name
fffff806`350f0000 fffff806`35421000 win32kbase (pdb symbols) C:\ProgramData\Dbg\sym\win32kbase.pdb\8C6FC183E1C437D51003CE91E1609CF81\win32kbase.pdb
Loaded symbol image file: win32kbase.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\win32kbase.sys\BB362062331000\win32kbase.sys
Image path: win32kbase.sys
Image name: win32kbase.sys
Browse all global symbols functions data Symbol Reload
Image was built with /Brepro flag.
Timestamp: BB362062 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00332AE7
ImageSize: 00331000
Mapping Form: Loaded
File version: 10.0.26100.7309
Product version: 10.0.26100.7309
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: win32kbase.sys
OriginalFilename: win32kbase.sys
ProductVersion: 10.0.26100.7309
FileVersion: 10.0.26100.7309 (WinBuild.160101.0800)
FileDescription: Base Win32k Kernel Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
10: kd> !errrec ffff8d0001522ac8
===============================================================================
Common Platform Error Record @ ffff8d0001522ac8
-------------------------------------------------------------------------------
Signature : *** INVALID ***
Revision : 0.0
Record Id : 0000000000000000
Severity : Recoverable (0)
Length : 0
Creator : {00000000-0000-0000-0000-000000000000}
Notify Type : {00000000-0000-0000-0000-000000000000}
Flags : 0x00000000