DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000008, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8065bb3ab76, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 75640
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 8
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8065bb3ab76
READ_ADDRESS: fffff806496fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064960f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8064960f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8064f61ca20 -- (.trap 0xfffff8064f61ca20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8065bf49b01 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000deb0dff6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8065bb3ab76 rsp=fffff8064f61cbb0 rbp=00000000deb0dff6
r8=0000000000000007 r9=0000000000000000 r10=0000000000000003
r11=ffffd38de806b020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
amdkmdag+0x4ab76:
fffff806`5bb3ab76 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff806`4f61c8d8 fffff806`48defa29 : 00000000`0000000a 00000000`00000000 00000000`00000008 00000000`00000000 : nt!KeBugCheckEx
fffff806`4f61c8e0 fffff806`48debd29 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`4f61ca20 fffff806`5bb3ab76 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff806`4f61cbb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`def4fef5 : amdkmdag+0x4ab76
SYMBOL_NAME: amdkmdag+4ab76
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4ab76
FAILURE_BUCKET_ID: AV_amdkmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c753a2f9-94a6-448f-1d0e-e079b3442215}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff933fff600950, Virtual address for the attempted write.
Arg2: 1a0000008d971025, PTE contents.
Arg3: ffffcb8da3a374f0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4359
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7848
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: be
BUGCHECK_P1: ffff933fff600950
BUGCHECK_P2: 1a0000008d971025
BUGCHECK_P3: ffffcb8da3a374f0
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: spoolsv.exe
TRAP_FRAME: ffffcb8da3a374f0 -- (.trap 0xffffcb8da3a374f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff933fff600950
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070a8b542b rsp=ffffcb8da3a37680 rbp=ffffcb8da3a37780
r8=ffffa5077dc74080 r9=ffff9349a4cfffd8 r10=ffff9349a4d267f8
r11=00007ffffffeffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiResolveSharedZeroFault+0x27b:
fffff807`0a8b542b 48893e mov qword ptr [rsi],rdi ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffcb8d`a3a372f8 fffff807`0aa87340 : 00000000`000000be ffff933f`ff600950 1a000000`8d971025 ffffcb8d`a3a374f0 : nt!KeBugCheckEx
ffffcb8d`a3a37300 fffff807`0a812dcf : 1a000000`8d971025 00000000`00000003 ffffcb8d`a3a37570 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffffcb8d`a3a37350 fffff807`0a9ebb1e : 00000000`00000000 00000000`00000000 ffffcb8d`a3a37610 ffffa507`7f04f080 : nt!MmAccessFault+0x4ef
ffffcb8d`a3a374f0 fffff807`0a8b542b : 00000000`00000000 ffffa507`7dc74700 ffffcb8d`a3a377d8 ffffa507`7dc74700 : nt!KiPageFault+0x35e
ffffcb8d`a3a37680 fffff807`0a821826 : ffffa507`00000000 ffffcb8d`00000000 00000000`00000100 00000000`00000005 : nt!MiResolveSharedZeroFault+0x27b
ffffcb8d`a3a377e0 fffff807`0a813382 : ffffcb8d`a3a37a20 ffffcb8d`a3a37960 ffffcb8d`a3a37970 ffffcb8d`a3a37908 : nt!MiZeroFault+0x316
ffffcb8d`a3a378d0 fffff807`0a812a4a : 00000000`00000100 00000000`00000000 00000000`00000100 fffff807`00000018 : nt!MiUserFault+0x3c2
ffffcb8d`a3a37960 fffff807`0a9ebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x16a
ffffcb8d`a3a37b00 00007ffe`c012adf0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0049f198 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c012adf0
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffcd8e6b082160-ffffcd8e6b082179 26 bytes - win32kbase!CitpCleanupGlobalImpactContext+40
[ cc cc cc cc 48 89 5c 24:48 8b 02 49 3b 00 77 09 ]
ffffcd8e6b082186-ffffcd8e6b08219a 21 bytes - win32kbase!CitpContextCleanup+22 (+0x26)
[ 84 c0 0f 84 ca 00 00 00:45 88 01 85 d2 0f 84 8d ]
ffffcd8e6b0821a7-ffffcd8e6b0821ca 36 bytes - win32kbase!CitpContextCleanup+43 (+0x21)
[ 4c 8b 4f 60 bb 2f cb 04:01 74 44 83 ea 02 75 2c ]
ffffcd8e6b0821cc-ffffcd8e6b082246 123 bytes - win32kbase!CitpContextCleanup+68 (+0x25)
[ b6 01 48 6b cb 25 48 03:11 12 41 09 42 10 41 c6 ]
ffffcd8e6b082248-ffffcd8e6b082254 13 bytes - win32kbase!CitpContextCleanup+e4 (+0x7c)
[ 03 d8 49 ff c1 41 0f b6:81 ec 00 01 00 00 48 8b ]
ffffcd8e6b082256-ffffcd8e6b08225f 10 bytes - win32kbase!CitpContextCleanup+f2 (+0x0e)
[ 03 d8 45 33 c9 45 33 c0:33 c4 48 89 45 27 44 8b ]
ffffcd8e6b08fd30-ffffcd8e6b08fd53 36 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+24 (+0xdada)
[ d8 85 c0 78 17 48 8d 4f:48 83 ec 28 48 8b ca e8 ]
ffffcd8e6b08fd55-ffffcd8e6b08fd8c 56 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+49 (+0x25)
[ 5c 24 30 48 8b 74 24 40:d1 4d 85 c9 0f 95 c2 41 ]
ffffcd8e6b08fd93-ffffcd8e6b08fda0 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+27 (+0x3e)
[ 89 47 04 48 8b 4b 38 48:01 0f 84 e3 ec 06 00 41 ]
ffffcd8e6b08fda7-ffffcd8e6b08fdb4 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+3b (+0x14)
[ 89 47 08 48 8b 4b 40 48:48 01 00 00 74 44 48 8b ]
ffffcd8e6b08fdbb-ffffcd8e6b08fdc8 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+4f (+0x14)
[ 89 47 0c 48 8b 4b 48 48:01 0f ba 69 10 09 eb 2e ]
ffffcd8e6b08fdcf-ffffcd8e6b08fddc 14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+63 (+0x14)
[ 89 47 10 48 8b 4b 50 48:01 3a c2 74 1d c0 e2 03 ]
ffffcd8e6b08fde3-ffffcd8e6b08fdf4 18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+77 (+0x14)
[ 48 8b 5c 24 30 89 47 14:92 4c 01 00 00 c6 00 01 ]
ffffcd8e6b08fdf6-ffffcd8e6b08fe2f 58 bytes - win32kbase!CInputSink::QueryInputQueueTypes+8a (+0x13)
[ cc cc cc cc cc cc cc cc:8a 89 4c 01 00 00 8a c1 ]
ffffcd8e6b090c10-ffffcd8e6b090c22 19 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+d0 (+0xe1a)
[ 10 0d 8b 43 10 48 89 5d:48 83 ec 28 8b ca 45 33 ]
ffffcd8e6b090c24-ffffcd8e6b090c7e 91 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+e4 (+0x14)
[ 8b d6 48 8b cb e8 de 06:83 c4 28 c3 cc cc cc cc ]
ffffcd8e6b090c80-ffffcd8e6b090c8f 16 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+140 (+0x5c)
[ 89 5d 20 0f ba e0 12 73:3b 08 77 2c 49 8b 00 48 ]
ffffcd8e6b090c91-ffffcd8e6b090cd0 64 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+151 (+0x11)
[ 8b cb e8 f8 05 00 00 84:3b ca 72 0c 48 8b 05 8c ]
ffffcd8e6b090cd3 - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+193 (+0x42)
[ 5c:7c ]
ffffcd8e6b090cd5-ffffcd8e6b090cfd 41 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+195 (+0x02)
[ 30 40 8a c7 48 8b 7c 24:50 85 db 78 3f 48 8d 54 ]
ffffcd8e6b090cff-ffffcd8e6b090d0f 17 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_5a7aae95d2af49f4475e794f2d9a8b36> >+f (+0x2a)
[ 00 48 8b c2 49 8b d8 48:8d 54 24 20 e8 34 23 00 ]
702 errors : !win32kbase (ffffcd8e6b082160-ffffcd8e6b090d0f)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffe6c81c81000
Arg3: 0000000000000010
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6357
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffffe6c81c81000
BUGCHECK_P3: 10
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff303`85e5ddc8 fffff802`04254286 : 00000000`0000001a 00000000`00041792 fffffe6c`81c81000 00000000`00000010 : nt!KeBugCheckEx
fffff303`85e5ddd0 fffff802`040119f1 : 00000000`00000003 fffffe6c`81c81000 fffff303`85e5e2a0 00000000`00000003 : nt!MiDeleteVa+0x191f46
fffff303`85e5dec0 fffff802`04011d10 : 00000000`00000000 ffffb50b`932ed700 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
fffff303`85e5df50 fffff802`04011d10 : 00000000`00000000 ffffb50b`932ed700 fffffe7f`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
fffff303`85e5dfe0 fffff802`04011d10 : fffff303`85e5e2a0 ffffb50b`932ed700 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
fffff303`85e5e070 fffff802`0400e61b : 00000000`00000000 ffffb50b`932ed700 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
fffff303`85e5e100 fffff802`040c22f1 : fffff303`85e5e2a0 ffffb50b`00000001 ffffa06f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff303`85e5e200 fffff802`044c0a00 : 00000000`00000282 fffff802`0400c95e fffff303`00000000 ffffb50b`84093040 : nt!MiDeletePagablePteRange+0x491
fffff303`85e5e680 fffff802`040f4548 : ffffb50b`932ed080 00000000`019e7080 00000000`00000002 fffff802`00000000 : nt!MiDeleteVadBitmap+0x8c
fffff303`85e5e710 fffff802`044c087c : ffffb50b`932ed080 ffffb50b`932ed7c0 ffffb50b`932ed700 ffffb50b`908e7080 : nt!MiDeleteFinalPageTables+0xc8
fffff303`85e5e7d0 fffff802`044bf06f : ffffb50b`932ed080 fffff303`85e5e890 ffffb50b`908e7080 ffffb50b`932ed4c8 : nt!MmDeleteProcessAddressSpace+0x64
fffff303`85e5e820 fffff802`0440c4f0 : ffffb50b`932ed050 ffffb50b`932ed050 00000000`00000000 ffffb50b`84082640 : nt!PspProcessDelete+0x13f
fffff303`85e5e8b0 fffff802`04024eb7 : 00000000`00000000 00000000`00000000 fffff303`85e5ea39 ffffb50b`932ed080 : nt!ObpRemoveObjectRoutine+0x80
fffff303`85e5e910 fffff802`043f4bbe : ffffb50b`84082640 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc7
fffff303`85e5e950 fffff802`043fb11c : 00000000`000018e0 00000000`00000000 00000000`00000000 00000060`7f3fec48 : nt!ObCloseHandleTableEntry+0x29e
fffff303`85e5ea90 fffff802`041ef478 : ffffb50b`908e7000 000001c1`a27ac330 fffff303`85e5eb80 ffffb50b`00000000 : nt!NtClose+0xec
fffff303`85e5eb00 00007ff9`d004af74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`7f3fece8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`d004af74
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8011dafa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6702
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 40963
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8011dafa318
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff80122a1ccd0 -- (.trap 0xfffff80122a1ccd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8012e7a8930 rbx=0000000000000000 rcx=ffffd58d42802000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012e7b3188 rsp=fffff80122a1ce60 rbp=ffffd58d3c6f9ad0
r8=0000000000000000 r9=ffffd58d44db8360 r10=0000fffff8012e7a
r11=ffffa178b4a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
amdkmdag+0xb3188:
fffff801`2e7b3188 48897c2440 mov qword ptr [rsp+40h],rdi ss:fffff801`22a1cea0=ffffd58d3bef4c10
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
fffff801`22a1c958 fffff801`1d259472 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`1dafa318 : nt!KeBugCheckEx
fffff801`22a1c960 fffff801`1d0cef5d : 000008cf`be12b738 fffff801`19c54180 00000000`00000246 00000000`0004fb87 : nt!KeAccumulateTicks+0x18bff2
fffff801`22a1c9c0 fffff801`1d0c8651 : ffffd58d`00000006 00000000`0002f846 fffff801`19c54180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff801`22a1ca10 fffff801`1d0ca4eb : 00000000`00000000 fffff801`22a1cd00 fffff801`1da31820 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff801`22a1cb50 fffff801`1d0c7722 : fffff801`22a1ccd0 fffff801`22a1cd50 fffff801`22a1cd50 00000000`00000000 : nt!KeClockInterruptNotify+0x2bb
fffff801`22a1cc00 fffff801`1d008705 : 0000000b`e12fc979 fffff801`1daf38e0 fffff801`1daf3990 00000000`00000002 : nt!HalpTimerClockInterrupt+0xe2
fffff801`22a1cc30 fffff801`1d1df4ca : fffff801`22a1cd50 fffff801`1daf38e0 000008cf`be1282d2 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`22a1cc80 fffff801`1d1dfa37 : fffff801`2eb3e370 ffffd58d`deadbeef ffffd58d`42790000 00000000`0000ef00 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff801`22a1ccd0 fffff801`2e7b3188 : ffffd58d`461ee000 00000000`00000000 fffff801`22a1ced0 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff801`22a1ce60 ffffd58d`461ee000 : 00000000`00000000 fffff801`22a1ced0 00000000`00000002 00000000`00000000 : amdkmdag+0xb3188
fffff801`22a1ce68 00000000`00000000 : fffff801`22a1ced0 00000000`00000002 00000000`00000000 fffff801`2e7a894c : 0xffffd58d`461ee000
SYMBOL_NAME: amdkmdag+b3188
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b3188
FAILURE_BUCKET_ID: 0x133_ISR_amdkmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ce335412-b260-6bc1-3af9-ea5584f041c4}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805096fa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5093
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 64146
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff805096fa318
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8050f81ccd0 -- (.trap 0xfffff8050f81ccd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8050f81cf58
rdx=ffff9b0820cc6000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80508c3a8c4 rsp=fffff8050f81ce60 rbp=fffff8050f81ced0
r8=0000000000000002 r9=0000000000000002 r10=0000fffff8051c95
r11=fffff8050f81cd30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!EtwpLogKernelEvent+0x34:
fffff805`08c3a8c4 418bf1 mov esi,r9d
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
fffff805`0f81cae8 fffff805`08e5956a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`096fa318 : nt!KeBugCheckEx
fffff805`0f81caf0 fffff805`08cca30d : 00001b24`e44470eb 00000000`00000000 fffff805`0f81cd00 fffff805`06a15180 : nt!KeAccumulateTicks+0x18c0ca
fffff805`0f81cb50 fffff805`08cca18a : fffff805`096f3840 fffff805`0f81cd50 fffff805`000f5e60 fffff805`00000000 : nt!KeClockInterruptNotify+0xbd
fffff805`0f81cc00 fffff805`08c08725 : fffff805`096f3840 00000000`00000286 fffff805`0f81cc58 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
fffff805`0f81cc30 fffff805`08ddf60a : fffff805`0f81cd50 fffff805`096f3840 00000000`00000010 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`0f81cc80 fffff805`08ddfb77 : fffff805`1ccf2690 ffff9b08`deadbeef ffff9b08`27a2c000 00000000`0000ef00 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff805`0f81ccd0 fffff805`08c3a8c4 : ffff9b08`2b380000 00000000`00000000 fffff805`0f81ced0 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff805`0f81ce60 fffff805`08c377ff : 00000000`00000000 ffff9b08`20cc6000 00000000`00000001 00000000`00000002 : nt!EtwpLogKernelEvent+0x34
fffff805`0f81cf10 fffff805`08ddf3ab : fffff805`06a15180 ffffc20d`98d728b0 ffffc700`44300780 fffff805`08ddf60a : nt!PerfInfoLogInterrupt+0xef
fffff805`0f81cf90 fffff805`08ddf657 : fffff805`06a15180 fffff805`08cec475 00000000`00000000 00001f80`00000200 : nt!KiInterruptSubDispatch+0x13b
ffffc20d`98d72830 fffff805`08cd31e0 : 4173c15f`17d19200 57577e12`ea805a9f 1acce8da`9e3d6800 ffffc20d`98d729e0 : nt!KiInterruptDispatch+0x37
ffffc20d`98d729c0 fffff805`08de49a6 : ffffffff`ffffff00 fffff805`08de4231 00000000`01000010 00000000`00000286 : nt!KiQuantumEnd+0xc0
ffffc20d`98d72ac0 fffff805`08de4245 : 00000000`00000001 fffff805`08ddf6d1 00000000`00000001 00000000`00797931 : nt!KiDispatchInterruptContinue+0x16
ffffc20d`98d72af0 fffff805`08ddf6d1 : 00000000`00000001 00000000`00797931 ffffc20d`00000000 ffff9b08`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc20d`98d72b00 00007ffb`6a9ab8e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000008a`2a37d5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6a9ab8e4
SYMBOL_NAME: nt!KeAccumulateTicks+18c0ca
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18c0ca
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------