0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80551efb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7822
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 6880
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 050723-6203-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80551efb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff80556282d80 -- (.trap 0xfffff80556282d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffff8b08d89fef50
rdx=0000571d00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805515405bc rsp=fffff80556282f10 rbp=ffff8b08d89fef50
r8=0000000000000000 r9=ffff8b08dc337580 r10=0000000000000001
r11=0000000020004000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KxWaitForSpinLockAndAcquire+0x2c:
fffff805`515405bc 488b07 mov rax,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff805`56282f10 fffff805`5153eb66 : ffffa100`94cfe3c0 ffffa100`94cfe470 fffff805`4ddea180 fffff805`56282fc0 : nt!KxWaitForSpinLockAndAcquire+0x2c
fffff805`56282f40 fffff805`515fd92f : ffffcc8a`d8e7c6c0 ffffa100`94cfe3c0 00000000`00000000 fffff805`515fdbaa : nt!KiCallInterruptServiceRoutine+0x2a6
fffff805`56282f90 fffff805`515fdbf7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatch+0x11f
ffffcc8a`d8e7c640 fffff805`703168d0 : ffff8b08`df5fd630 ffff8b08`df9c8860 ffff8b08`df6141cc fffff805`706984c7 : nt!KiInterruptDispatch+0x37
ffffcc8a`d8e7c7d0 ffff8b08`df5fd630 : ffff8b08`df9c8860 ffff8b08`df6141cc fffff805`706984c7 fffff805`70933fe0 : amdkmdag+0xc68d0
ffffcc8a`d8e7c7d8 ffff8b08`df9c8860 : ffff8b08`df6141cc fffff805`706984c7 fffff805`70933fe0 ffffcc8a`d8e75b78 : 0xffff8b08`df5fd630
ffffcc8a`d8e7c7e0 ffff8b08`df6141cc : fffff805`706984c7 fffff805`70933fe0 ffffcc8a`d8e75b78 ffff8b08`df5fd638 : 0xffff8b08`df9c8860
ffffcc8a`d8e7c7e8 fffff805`706984c7 : fffff805`70933fe0 ffffcc8a`d8e75b78 ffff8b08`df5fd638 00000000`00000000 : 0xffff8b08`df6141cc
ffffcc8a`d8e7c7f0 fffff805`70933fe0 : ffffcc8a`d8e75b78 ffff8b08`df5fd638 00000000`00000000 000009f0`00000001 : amdkmdag+0x4484c7
ffffcc8a`d8e7c7f8 ffffcc8a`d8e75b78 : ffff8b08`df5fd638 00000000`00000000 000009f0`00000001 00000000`00000000 : amdkmdag+0x6e3fe0
ffffcc8a`d8e7c800 ffff8b08`df5fd638 : 00000000`00000000 000009f0`00000001 00000000`00000000 ffff8b08`df9b9000 : 0xffffcc8a`d8e75b78
ffffcc8a`d8e7c808 00000000`00000000 : 000009f0`00000001 00000000`00000000 ffff8b08`df9b9000 fffff805`705afe62 : 0xffff8b08`df5fd638
STACK_COMMAND: .trap 0xfffff80556282d80 ; kb
SYMBOL_NAME: amdkmdag+c68d0
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
BUCKET_ID_FUNC_OFFSET: c68d0
FAILURE_BUCKET_ID: 0x133_ISR_amdkmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ce335412-b260-6bc1-3af9-ea5584f041c4}
Followup: MachineOwner
---------
0: kd> lmvm amdkmdag
Browse full module list
start end module name
fffff805`70250000 fffff805`7622e000 amdkmdag T (no symbols)
Loaded symbol image file: amdkmdag.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\u0390319.inf_amd64_32d8157dec983dab\B389920\amdkmdag.sys
Image name: amdkmdag.sys
Browse all global symbols functions data
Timestamp: Mon Mar 27 07:11:09 2023 (6421175D)
CheckSum: 05FAC25F
ImageSize: 05FDE000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
0: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2163]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2006
BiosReleaseDate = 11/13/2019
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B450M-K
BaseBoardVersion = Rev X.0x
0: kd> !sysinfo smbios
[SMBIOS Data Tables v2.8]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 2163 bytes]
[BIOS Information (Type 0) - Length 26 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version 2006
BIOS Starting Address Segment f000
BIOS Release Date 11/13/2019
BIOS ROM Size 1000000
BIOS Characteristics
07: - PCI Supported
10: - APM Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
08: - BIOS Boot Specification Supported
10: - Enable Targeted Content Distribution
11: - UEFI Specification Supported
BIOS Major Revision 5
BIOS Minor Revision 13
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
Extended BIOS ROM Size 16 MB
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer System manufacturer
Product Name System Product Name
Version System Version
Serial Number System Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber SKU
Family To be filled by O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer ASUSTeK COMPUTER INC.
Product PRIME B450M-K
Version Rev X.0x
Serial Number 200366277302322
Asset Tag
Feature Flags 09h
00: - Motherboard
03: - Replaceable
Location Default string
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 22 - Handle 0003h]
Manufacturer Default string
Chassis Type Desktop
Version Default string
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 0
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 3
[Onboard Devices Information (Type 10) - Length 6 - Handle 001ch]
Note: The On Board Device Information (Type 10) struct is obsolete as of SMBIOs spec v2.6 Number of Devices 1
01: Type Video [enabled]
01: Description To Be Filled By O.E.M.
[OEM Strings (Type 11) - Length 5 - Handle 001dh]
Number of Strings 8
1 Default string
2 Default string
3 ORIGINS
4 Default string
5 FFFFFFFFFFFFF
6 FFFFFFFFFFFFF
7 FFFFFFFFFFFFF
8 Default string
[System Configuration Options (Type 12) - Length 5 - Handle 001eh]
[ (Type 256) - Length 11 - Handle 0021h]
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 0022h]
[Physical Memory Array (Type 16) - Length 23 - Handle 0023h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 134217728KB
Memory Error Inf Handle 0022h
Number of Memory Devices 2
[Memory Array Mapped Address (Type 19) - Length 31 - Handle 0024h]
Starting Address 00000000h
Ending Address 0037ffffh
Memory Array Handle 0023h
Partition Width 02
Extended Starting Address 0000000000000000h
Extended Ending Address 0000000000000000h
[Memory Array Mapped Address (Type 19) - Length 31 - Handle 0025h]
Starting Address 00400000h
Ending Address 0107ffffh
Memory Array Handle 0023h
Partition Width 02
Extended Starting Address 0000000000000000h
Extended Ending Address 0000000000000000h
[Cache Information (Type 7) - Length 19 - Handle 0026h]
Socket Designation L1 - Cache
Cache Configuration 0180h - WBEnabled Int NonSocketed L1
Maximum Cache Size 0180h - 384K
Installed Size 0180h - 384K
Supported SRAM Type 0010h - Pipeline-Burst
Current SRAM Type 0010h - Pipeline-Burst
Cache Speed 1ns
Error Correction Type Specification Reserved
System Cache Type Unified
Associativity 8-way Set-Associative
Maximum Cache Size 2 2d20314c - 757084492l Kb
[Cache Information (Type 7) - Length 19 - Handle 0027h]
Socket Designation L2 - Cache
Cache Configuration 0181h - WBEnabled Int NonSocketed L2
Maximum Cache Size 0c00h - 3072K
Installed Size 0c00h - 3072K
Supported SRAM Type 0010h - Pipeline-Burst
Current SRAM Type 0010h - Pipeline-Burst
Cache Speed 1ns
Error Correction Type Specification Reserved
System Cache Type Unified
Associativity 8-way Set-Associative
Maximum Cache Size 2 2d20324c - 757084748l Kb
[Cache Information (Type 7) - Length 19 - Handle 0028h]
Socket Designation L3 - Cache
Cache Configuration 0182h - WBEnabled Int NonSocketed L3
Maximum Cache Size 8200h - 32768K
Installed Size 8200h - 32768K
Supported SRAM Type 0010h - Pipeline-Burst
Current SRAM Type 0010h - Pipeline-Burst
Cache Speed 1ns
Error Correction Type Specification Reserved
System Cache Type Unified
Associativity 16-way Set-Associative
Maximum Cache Size 2 2d20334c - 757085004l Kb
[Processor Information (Type 4) - Length 48 - Handle 0029h]
Socket Designation AM4
Processor Type Central Processor
Processor Family 6bh - AMD Zen Processor Family
Processor Manufacturer Advanced Micro Devices, Inc.
Processor ID 100f8700fffb8b17
Processor Version AMD Ryzen 5 3600X 6-Core Processor
Processor Voltage 8bh - 1.1V
External Clock 100MHz
Max Speed 4400MHz
Current Speed 3800MHz
Status Enabled Populated
Processor Upgrade Socket AM4
L1 Cache Handle 0026h
L2 Cache Handle 0027h
L3 Cache Handle 0028h
Serial Number
Asset Tag Number
Part Number Unknown
Core Count 6
Core Enabled 6
Thread Count 12
Processor Characteristics fc
Enabled Characteristics:
0x 2: 64-bit Capable
0x 3: Multi-Core
0x 4: Hardware Thread
0x 5: Execute Protection
0x 6: Enhanced Virtualization
0x 7: Power/Performance Control
Processor Family_2 6bh - AMD Zen Processor Family
Core Count 2 6
Core Enabled 2 6
Thread Count 2 12
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 002ah]
[Memory Device (Type 17) - Length 40 - Handle 002bh]
Memory Error Info Handle 002ah
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM_A1
Bank Locator BANK 0
Memory Type 1ah - DDR4
Type Detail 4080h - Synchronous Unbuffered (Unregistered)
Speed 3200MHz
Manufacturer Corsair
Serial Number
Asset Tag Number [String Not Specified]
Part Number CMK8GX4M1E3200C16
Attributes 1
Extended Size 0
Configured Memory Speed 3200
Minimum Voltage 1200
Maximum Voltage 1200
Configured Voltage 1200
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 002ch]
Starting Address 00000000h
Ending Address 00ffffffh
Memory Device Handle 002bh
Mem Array Mapped Adr Handle 0025h
Partition Row Position [Unknown]
Interleave Position [Unknown]
Interleave Data Depth [Unknown]
Extended Starting Address 0000000000000000h
Extended Ending Address 0000000000000000h
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 002dh]
[Memory Device (Type 17) - Length 40 - Handle 002eh]
Memory Error Info Handle 002dh
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM_B1
Bank Locator BANK 1
Memory Type 1ah - DDR4
Type Detail 4080h - Synchronous Unbuffered (Unregistered)
Speed 3200MHz
Manufacturer Corsair
Serial Number
Asset Tag Number [String Not Specified]
Part Number CMK8GX4M1E3200C16
Attributes 1
Extended Size 0
Configured Memory Speed 3200
Minimum Voltage 1200
Maximum Voltage 1200
Configured Voltage 1200
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 002fh]
Starting Address 00000000h
Ending Address 00ffffffh
Memory Device Handle 002eh
Mem Array Mapped Adr Handle 0025h
Partition Row Position [Unknown]
Interleave Position [Unknown]
Interleave Data Depth [Unknown]
Extended Starting Address 0000000000000000h
Extended Ending Address 0000000000000000h
[ (Type 256) - Length 4 - Handle 0034h]
-----------
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8047dafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 45814
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 436
Key : Analysis.Init.Elapsed.mSec
Value: 2608
Key : Analysis.Memory.CommitPeak.Mb
Value: 110
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 041823-6000-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8047dafb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffff87891f25a780 -- (.trap 0xffff87891f25a780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffd98e300fedf0
rdx=fffff804830cd3a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047d1405bf rsp=ffff87891f25a910 rbp=fffff804830cd3a0
r8=ffff87891f25aa58 r9=ffffd98e307f96e0 r10=fffff8047d1fd1f0
r11=0000000000000009 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForSpinLockAndAcquire+0x2f:
fffff804`7d1405bf 4885c0 test rax,rax
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff9b81`76377e18 fffff804`7d243714 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`7dafb320 : nt!KeBugCheckEx
ffff9b81`76377e20 fffff804`7d0813c3 : 0000232d`ec380ada ffff9b81`76380180 00000000`00000000 ffff9b81`76380180 : nt!KeAccumulateTicks+0x1bfaf4
ffff9b81`76377e80 fffff804`7d080eaa : ffffd98e`2b2aa040 ffff8789`1f25a800 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff9b81`76377f30 fffff804`7d13e965 : ffffd98e`2b2aa040 fffff804`7d122fb7 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9b81`76377f60 fffff804`7d1fdbaa : ffff8789`1f25a800 ffffd98e`2b2aa040 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9b81`76377fb0 fffff804`7d1fe377 : 00000000`cad7c110 00000000`00000000 00000000`0002f6b6 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8789`1f25a780 fffff804`7d1405bf : fffff804`830cd3a0 fffff804`830cd3e3 00000000`00989680 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8789`1f25a910 fffff804`7d01e6dc : ffffd98e`300fedf0 ffffd98e`300fedf0 00000000`00000000 00000000`00000000 : nt!KxWaitForSpinLockAndAcquire+0x2f
ffff8789`1f25a940 fffff804`7d1fd226 : 00000000`00000000 ffffd98e`34448b60 00000001`00000100 ffffd98e`33f846b0 : nt!KeAcquireSpinLockAtDpcLevel+0x5c
ffff8789`1f25a970 fffff804`829dd75c : ffffd98e`302d7cd0 fffff804`830cd3a0 ffff8789`1f25aa58 ffffd98e`341c4210 : nt!KeSynchronizeExecution+0x36
ffff8789`1f25a9b0 fffff804`830ca2f3 : ffffd98e`00000000 ffffd98e`341c4000 ffffd98e`3447e000 00000000`00000001 : dxgkrnl!DpSynchronizeExecution+0xac
ffff8789`1f25aa00 fffff804`830c9f59 : ffffd98e`341c4000 00000000`00000000 00000000`00989680 00000000`00989680 : dxgmms2!VidSchiSelectContext+0x163
ffff8789`1f25aac0 fffff804`8314d405 : ffffd98e`3d524a00 ffffd98e`341c4000 ffffd98e`3d524a60 ffffd98e`3442e620 : dxgmms2!VidSchiScheduleCommandToRun+0x109
ffff8789`1f25ab80 fffff804`8314d3ba : ffffd98e`341c4400 fffff804`8314d2f0 ffffd98e`341c4000 ffff9b81`76380100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff8789`1f25abd0 fffff804`7d1265f5 : ffffd98e`34198280 fffff804`00000001 ffffd98e`341c4000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff8789`1f25ac10 fffff804`7d204848 : ffff9b81`76380180 ffffd98e`34198280 fffff804`7d1265a0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8789`1f25ac60 00000000`00000000 : ffff8789`1f25b000 ffff8789`1f255000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgkrnl!DpSynchronizeExecution+ac
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.2311
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: ac
FAILURE_BUCKET_ID: 0x133_ISR_dxgkrnl!DpSynchronizeExecution
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {558c278d-5c04-0e1d-c3fd-1cbb6a5abeff}
Followup: MachineOwner