SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8058e1fe20d, Address of the instruction which caused the bugcheck
Arg3: ffff800238969380, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 119636
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8058e1fe20d
BUGCHECK_P3: ffff800238969380
BUGCHECK_P4: 0
CONTEXT: ffff800238969380 -- (.cxr 0xffff800238969380)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffad8c128d6244
rdx=00ffffad8c128d62 rsi=0000000000000001 rdi=ffff80023896a1b8
rip=fffff8058e1fe20d rsp=ffff800238969d80 rbp=0000000000000001
r8=ffffad8c128d6244 r9=ffffad8c128d6244 r10=ffffad8c128d6244
r11=ffffb2ff85200000 r12=ffff80023896ad90 r13=ffff80023896ae60
r14=ffff80023896ad60 r15=ffffad8c0a5a4660
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
amdkmdag+0x1e5e20d:
fffff805`8e1fe20d f30f598c82401b0000 mulss xmm1,dword ptr [rdx+rax*4+1B40h] ds:002b:00ffffad`8c12a8a2=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
ffff8002`38969d80 44a00000`42913eea : 00000001`41000000 00000000`3f800000 47200000`4699999a 00000000`43c80f2c : amdkmdag+0x1e5e20d
ffff8002`38969d88 00000001`41000000 : 00000000`3f800000 47200000`4699999a 00000000`43c80f2c ffffad8c`00000000 : 0x44a00000`42913eea
ffff8002`38969d90 00000000`3f800000 : 47200000`4699999a 00000000`43c80f2c ffffad8c`00000000 47a80000`00000000 : 0x00000001`41000000
ffff8002`38969d98 47200000`4699999a : 00000000`43c80f2c ffffad8c`00000000 47a80000`00000000 3f000000`80000000 : 0x3f800000
ffff8002`38969da0 00000000`43c80f2c : ffffad8c`00000000 47a80000`00000000 3f000000`80000000 00000003`00000000 : 0x47200000`4699999a
ffff8002`38969da8 ffffad8c`00000000 : 47a80000`00000000 3f000000`80000000 00000003`00000000 00000002`00000000 : 0x43c80f2c
ffff8002`38969db0 47a80000`00000000 : 3f000000`80000000 00000003`00000000 00000002`00000000 46960000`46960000 : 0xffffad8c`00000000
ffff8002`38969db8 3f000000`80000000 : 00000003`00000000 00000002`00000000 46960000`46960000 45a00000`44a00000 : 0x47a80000`00000000
ffff8002`38969dc0 00000003`00000000 : 00000002`00000000 46960000`46960000 45a00000`44a00000 00000003`48a00000 : 0x3f000000`80000000
ffff8002`38969dc8 00000002`00000000 : 46960000`46960000 45a00000`44a00000 00000003`48a00000 3e381bab`3f40e737 : 0x00000003`00000000
ffff8002`38969dd0 46960000`46960000 : 45a00000`44a00000 00000003`48a00000 3e381bab`3f40e737 00000003`417d2f78 : 0x00000002`00000000
ffff8002`38969dd8 45a00000`44a00000 : 00000003`48a00000 3e381bab`3f40e737 00000003`417d2f78 00000000`3ece2cac : 0x46960000`46960000
ffff8002`38969de0 00000003`48a00000 : 3e381bab`3f40e737 00000003`417d2f78 00000000`3ece2cac 00000000`32effffe : 0x45a00000`44a00000
ffff8002`38969de8 3e381bab`3f40e737 : 00000003`417d2f78 00000000`3ece2cac 00000000`32effffe fffff805`43ccbd45 : 0x00000003`48a00000
ffff8002`38969df0 00000003`417d2f78 : 00000000`3ece2cac 00000000`32effffe fffff805`43ccbd45 40100000`00000000 : 0x3e381bab`3f40e737
ffff8002`38969df8 00000000`3ece2cac : 00000000`32effffe fffff805`43ccbd45 40100000`00000000 40940000`00000000 : 0x00000003`417d2f78
ffff8002`38969e00 00000000`32effffe : fffff805`43ccbd45 40100000`00000000 40940000`00000000 ffff8002`3896ad60 : 0x3ece2cac
ffff8002`38969e08 fffff805`43ccbd45 : 40100000`00000000 40940000`00000000 ffff8002`3896ad60 3fc55555`55555555 : 0x32effffe
ffff8002`38969e10 40100000`00000000 : 40940000`00000000 ffff8002`3896ad60 3fc55555`55555555 00000000`00000000 : 0xfffff805`43ccbd45
ffff8002`38969e18 40940000`00000000 : ffff8002`3896ad60 3fc55555`55555555 00000000`00000000 3fc55555`55555555 : 0x40100000`00000000
ffff8002`38969e20 ffff8002`3896ad60 : 3fc55555`55555555 00000000`00000000 3fc55555`55555555 00000000`00000000 : 0x40940000`00000000
ffff8002`38969e28 3fc55555`55555555 : 00000000`00000000 3fc55555`55555555 00000000`00000000 fffff805`8d51a250 : 0xffff8002`3896ad60
ffff8002`38969e30 00000000`00000000 : 3fc55555`55555555 00000000`00000000 fffff805`8d51a250 00000000`00000000 : 0x3fc55555`55555555
SYMBOL_NAME: amdkmdag+1e5e20d
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .cxr 0xffff800238969380 ; kb
BUCKET_ID_FUNC_OFFSET: 1e5e20d
FAILURE_BUCKET_ID: 0x3B_c0000005_amdkmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e4accedc-b212-8e29-0a5e-7ca244f457be}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807634d3d40, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4764
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11343
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 38
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807634d3d40
READ_ADDRESS: fffff80763efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80763e0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80763e0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000038
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: League of Legends.exe
DPC_STACK_BASE: FFFFC50E81C4CFB0
TRAP_FRAME: ffffc50e81c4c920 -- (.trap 0xffffc50e81c4c920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=00000009d2823532
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807634d3d40 rsp=ffffc50e81c4cab0 rbp=0000000000000001
r8=ffffc50e81c4cb00 r9=0000000000000000 r10=ffffffffffffffff
r11=ffffbb7b74600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiInsertTimer2WithCollectionLockHeld+0xc0:
fffff807`634d3d40 483b4a30 cmp rcx,qword ptr [rdx+30h] ds:00000000`00000038=????????????????
Resetting default scope
STACK_TEXT:
ffffc50e`81c4c7d8 fffff807`635efe29 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc50e`81c4c7e0 fffff807`635ec129 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50e`81c4c920 fffff807`634d3d40 : 00000000`00000000 00000000`00000005 00000009`d2823532 fffff807`634d3c5a : nt!KiPageFault+0x469
ffffc50e`81c4cab0 fffff807`634d1af2 : fffff807`63e31c80 00000000`00000001 ffffc50e`81c4cb00 00000000`00000001 : nt!KiInsertTimer2WithCollectionLockHeld+0xc0
ffffc50e`81c4cb00 fffff807`6353faf1 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeSetTimer2+0x172
ffffc50e`81c4cb70 fffff807`6343a6be : 00000000`00000001 ffffcb81`f93d5180 00000000`00000000 ffff960d`8a0ed040 : nt!KiTriggerForegroundBoostDpc+0x31
ffffc50e`81c4cbb0 fffff807`634399a4 : ffffcb81`f93d5180 eb08578b`00000000 00000000`00000008 00000000`000274b7 : nt!KiExecuteAllDpcs+0x30e
ffffc50e`81c4cd20 fffff807`635e4f85 : 56415541`54415756 ffffcb81`f93d5180 00000000`00000000 00000000`042bfa34 : nt!KiRetireDpcList+0x1f4
ffffc50e`81c4cfb0 fffff807`635e4d70 : 00000000`00000000 ffff960d`8bed3c60 00000000`d5277460 fffff807`635e4625 : nt!KxRetireDpcList+0x5
ffffc50e`83102ad0 fffff807`635e443e : 00000000`d5277460 00000000`3c329570 00000000`00000000 ffffffff`ffffd801 : nt!KiDispatchInterruptContinue
ffffc50e`83102b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee
SYMBOL_NAME: nt!KiInsertTimer2WithCollectionLockHeld+c0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c0
FAILURE_BUCKET_ID: AV_nt!KiInsertTimer2WithCollectionLockHeld
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {35283413-80f1-82dc-dde8-198f2504df22}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 52268
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 0
BUGCHECK_P3: 8
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: League of Legends.exe
TRAP_FRAME: ffffbc87b93c6300 -- (.trap 0xffffbc87b93c6300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8841b621080 rbx=0000000000000000 rcx=ffffc8841b621080
rdx=ffffc884160c8db8 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffbc87b93c6490 rbp=0000000000000000
r8=ffffbc87b93c5bb0 r9=00000000ffffffff r10=fffff8067ec22930
r11=ffff717c11600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
STACK_TEXT:
ffffbc87`b93c5a58 fffff806`7ee2efc5 : 00000000`0000001e ffffffff`c0000005 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
ffffbc87`b93c5a60 fffff806`7edeff6c : ffffbc87`b93c6380 00000000`00001000 ffffbc87`b93c6300 ffff8000`00000000 : nt!KiDispatchException+0x1b4955
ffffbc87`b93c6120 fffff806`7edec103 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffbc87`b93c6300 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
SYMBOL_NAME: nt!KiDispatchException+1b4955
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b4955
FAILURE_BUCKET_ID: 0x1E_nt!KiDispatchException
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4c003660-11e1-3fb7-2474-3522eb7ee67b}
Followup: MachineOwner
---------