I encountered a problem when starting with the palServer.
Here are the relevant logs, as well as the crash analysis that was initiated.
The following is the analysis result of the crash information of WinDBD.
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 312
Key : Analysis.Elapsed.mSec
Value: 1356
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 234
Key : Analysis.Init.Elapsed.mSec
Value: 17825
Key : Analysis.Memory.CommitPeak.Mb
Value: 354
Key : Analysis.Version.DbgEng
Value: 10.0.29482.1003
Key : Analysis.Version.Description
Value: 10.2509.29.03 amd64fre
Key : Analysis.Version.Ext
Value: 1.2509.29.3
Key : Failure.Bucket
Value: INVALID_POINTER_READ_c0000005_PalServer-Win64-Shipping-Cmd.exe!Unknown
Key : Failure.Exception.Code
Value: 0xc0000005
Key : Failure.Exception.IP.Address
Value: 0x7ff638617cb9
Key : Failure.Exception.IP.Module
Value: PalServer_Win64_Shipping_Cmd
Key : Failure.Exception.IP.Offset
Value: 0x2f87cb9
Key : Failure.Hash
Value: {659556df-f6a7-db21-80a3-9a009be10f9e}
Key : Failure.ProblemClass.Primary
Value: INVALID_POINTER_READ
Key : Faulting.IP.Type
Value: Paged
Key : Timeline.OS.Boot.DeltaSec
Value: 3725
Key : Timeline.Process.Start.DeltaSec
Value: 2
Key : WER.OS.Branch
Value: ge_release
Key : WER.OS.Version
Value: 10.0.26100.1
Key : WER.Process.Version
Value: 5.1.1.0
FILE_IN_CAB: crash_2026_01_24_11_01_33.5467046.dmp
NTGLOBALFLAG: 0
CONTEXT: (.ecxr)
rax=00007ff63c367e20 rbx=00000016eb17f878 rcx=0000000000000000
rdx=000000000000020c rsi=00007ff636bbae50 rdi=00000016eb17f878
rip=00007ff638617cb9 rsp=00000016eb17f490 rbp=00000016eb17f749
r8=0000000000000083 r9=000000007ffe7000 r10=0000000000000001
r11=fffffffff93723c8 r12=00000191d6ccf900 r13=00000000ffffffff
r14=00007ff63dc940c0 r15=00007ff63dc93d98
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x1494709:
00007ff638617cb9 488b01 mov rax,qword ptr [rcx] ds:0000000000000000=????????????????
Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ff638617cb9 (PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x0000000001494709)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
PROCESS_NAME: PalServer-Win64-Shipping-Cmd.exe
READ_ADDRESS: 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p %s
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
STACK_TEXT:
00000016eb17f490 00007ff63861229e : 00000191f444b150 00000191f444b140 0000000000000008 00000016eb17f510 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x1494709
00000016eb17f4e0 00007ff63869ed59 : 00000191d6403d30 000000003317c3fd 00000191fd6b7c20 000000006feb9350 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x148ecee
00000016eb17f510 00007ff63868f1e1 : 00007ff63dc607f0 000000006feb9350 0000000100000000 00000191fa70cbf8 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x151b7a9
00000016eb17f540 00007ff63868d1a4 : 00000191f759e4c0 0000000000000000 00007ff63dc93d98 00007ff63dc940c0 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x150bc31
00000016eb17f590 00007ff63869a16d : 00000016eb17f6f0 0000000000000000 00000008ac62d297 00000191d6ccf900 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x1509bf4
00000016eb17f5c0 00007ff6371fdb49 : 00000191fa70cb80 00000191f759e4c0 00000191f759e4c0 0000000000000000 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x1516bbd
00000016eb17f5f0 00007ff6386b26c2 : 00007ff63dbc58e8 0000000000023fe4 00000191f759cca8 0000000000000000 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x7a599
00000016eb17f6d0 00007ff6386b2358 : 00007ff63dc93d98 0000000000023fe4 00000016eb17f701 00000016eb17f830 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x152f112
00000016eb17f7b0 00007ff63720c58b : 0000000000023fe4 00000191e9976220 0000001800000014 00000191f42bc8f0 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x152eda8
00000016eb17f800 00007ff63721efb0 : 0000000000023fe4 00000016eb17f8c0 00007ffdef575de0 00000016eb17d940 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x88fdb
00000016eb17f830 00007ff6388155bc : 0000000000000000 00007ff6386a4b25 00000191d6cc0000 00007ff600007228 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x9ba00
00000016eb17f8a0 00007ff6361a7bd7 : 0000eb623d336de6 00007ff6386a4bdc 0000000000000000 00007ff6361a886a : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x169200c
00000016eb17f8d0 00007ff6361a5db9 : 00007ff63dd64250 0000000000000000 00007ff600000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x29aff7
00000016eb17f900 00007ff6361a94c6 : 0000000000000001 0000000000000000 0000000000000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x2991d9
00000016eb17f930 00007ff6361af7e4 : 000000000000000a 0000000000000000 0000000000000000 00007ffdef6970b0 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x29c8e6
00000016eb17f970 00007ff63b12be3a : 000000000000000a 0000000000000000 0000000000000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x2a2c04
00000016eb17f9b0 00007ffdf003e8d7 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!agsCheckDriverVersion+0x1872a
00000016eb17f9f0 00007ffdf1f0c53c : 0000000000000000 0000000000000000 000004f0fffffb30 000004d0fffffb30 : kernel32!BaseThreadInitThunk+0x17
00000016eb17fa20 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : ntdll!RtlUserThreadStart+0x2c
STACK_COMMAND: ~0s; .ecxr ; kb
IP_IN_PAGED_CODE:
PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+1494709
00007ff6`38617cb9 488b01 mov rax,qword ptr [rcx]
SYMBOL_NAME: PalServer_Win64_Shipping_Cmd+2f87cb9
MODULE_NAME: PalServer_Win64_Shipping_Cmd
IMAGE_NAME: PalServer-Win64-Shipping-Cmd.exe
FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_PalServer-Win64-Shipping-Cmd.exe!Unknown
OS_VERSION: 10.0.26100.1
BUILDLAB_STR: ge_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
IMAGE_VERSION: 5.1.1.0
FAILURE_ID_HASH: {659556df-f6a7-db21-80a3-9a009be10f9e}
Followup: MachineOwner
UE4SS.log
I encountered a problem when starting with the palServer.
Here are the relevant logs, as well as the crash analysis that was initiated.
The following is the analysis result of the crash information of WinDBD.
KEY_VALUES_STRING: 1
FILE_IN_CAB: crash_2026_01_24_11_01_33.5467046.dmp
NTGLOBALFLAG: 0
CONTEXT: (.ecxr)
rax=00007ff63c367e20 rbx=00000016eb17f878 rcx=0000000000000000
rdx=000000000000020c rsi=00007ff636bbae50 rdi=00000016eb17f878
rip=00007ff638617cb9 rsp=00000016eb17f490 rbp=00000016eb17f749
r8=0000000000000083 r9=000000007ffe7000 r10=0000000000000001
r11=fffffffff93723c8 r12=00000191d6ccf900 r13=00000000ffffffff
r14=00007ff63dc940c0 r15=00007ff63dc93d98
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x1494709:
00007ff6
38617cb9 488b01 mov rax,qword ptr [rcx] ds:0000000000000000=????????????????Resetting default scope
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ff638617cb9 (PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x0000000001494709)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
PROCESS_NAME: PalServer-Win64-Shipping-Cmd.exe
READ_ADDRESS: 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p %s
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
STACK_TEXT:
00000016
eb17f490 00007ff63861229e : 00000191f444b150 00000191f444b140 0000000000000008 00000016eb17f510 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x149470900000016
eb17f4e0 00007ff63869ed59 : 00000191d6403d30 000000003317c3fd 00000191fd6b7c20 000000006feb9350 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x148ecee00000016
eb17f510 00007ff63868f1e1 : 00007ff63dc607f0 000000006feb9350 0000000100000000 00000191fa70cbf8 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x151b7a900000016
eb17f540 00007ff63868d1a4 : 00000191f759e4c0 0000000000000000 00007ff63dc93d98 00007ff63dc940c0 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x150bc3100000016
eb17f590 00007ff63869a16d : 00000016eb17f6f0 0000000000000000 00000008ac62d297 00000191d6ccf900 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x1509bf400000016
eb17f5c0 00007ff6371fdb49 : 00000191fa70cb80 00000191f759e4c0 00000191f759e4c0 0000000000000000 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x1516bbd00000016
eb17f5f0 00007ff6386b26c2 : 00007ff63dbc58e8 0000000000023fe4 00000191f759cca8 0000000000000000 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x7a59900000016
eb17f6d0 00007ff6386b2358 : 00007ff63dc93d98 0000000000023fe4 00000016eb17f701 00000016eb17f830 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x152f11200000016
eb17f7b0 00007ff63720c58b : 0000000000023fe4 00000191e9976220 0000001800000014 00000191f42bc8f0 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x152eda800000016
eb17f800 00007ff63721efb0 : 0000000000023fe4 00000016eb17f8c0 00007ffdef575de0 00000016eb17d940 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x88fdb00000016
eb17f830 00007ff6388155bc : 0000000000000000 00007ff6386a4b25 00000191d6cc0000 00007ff600007228 : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x9ba0000000016
eb17f8a0 00007ff6361a7bd7 : 0000eb623d336de6 00007ff6386a4bdc 0000000000000000 00007ff6361a886a : PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+0x169200c00000016
eb17f8d0 00007ff6361a5db9 : 00007ff63dd64250 0000000000000000 00007ff600000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x29aff700000016
eb17f900 00007ff6361a94c6 : 0000000000000001 0000000000000000 0000000000000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x2991d900000016
eb17f930 00007ff6361af7e4 : 000000000000000a 0000000000000000 0000000000000000 00007ffdef6970b0 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x29c8e600000016
eb17f970 00007ff63b12be3a : 000000000000000a 0000000000000000 0000000000000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!png_get_io_chunk_name+0x2a2c0400000016
eb17f9b0 00007ffdf003e8d7 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : PalServer_Win64_Shipping_Cmd!agsCheckDriverVersion+0x1872a00000016
eb17f9f0 00007ffdf1f0c53c : 0000000000000000 0000000000000000 000004f0fffffb30 000004d0fffffb30 : kernel32!BaseThreadInitThunk+0x1700000016
eb17fa20 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : ntdll!RtlUserThreadStart+0x2cSTACK_COMMAND: ~0s; .ecxr ; kb
IP_IN_PAGED_CODE:
PalServer_Win64_Shipping_Cmd!ImPlot::TagYV+1494709
00007ff6`38617cb9 488b01 mov rax,qword ptr [rcx]
SYMBOL_NAME: PalServer_Win64_Shipping_Cmd+2f87cb9
MODULE_NAME: PalServer_Win64_Shipping_Cmd
IMAGE_NAME: PalServer-Win64-Shipping-Cmd.exe
FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_PalServer-Win64-Shipping-Cmd.exe!Unknown
OS_VERSION: 10.0.26100.1
BUILDLAB_STR: ge_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
IMAGE_VERSION: 5.1.1.0
FAILURE_ID_HASH: {659556df-f6a7-db21-80a3-9a009be10f9e}
Followup: MachineOwner
UE4SS.log