*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80283f1c340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1750
Key : Analysis.Elapsed.mSec
Value: 2807
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 14991
Key : Analysis.Memory.CommitPeak.Mb
Value: 142
Key : Bugcheck.Code.LegacyAPI
Value: 0x133
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x133_ISR_nt!KeAccumulateTicks
Key : Failure.Hash
Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1497cf94
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80283f1c340
BUGCHECK_P4: 0
FILE_IN_CAB: 052623-10218-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff802`7f8e29a8 fffff802`834bb8ff : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`83f1c340 : nt!KeBugCheckEx
fffff802`7f8e29b0 fffff802`834ba744 : 0000024b`656df0f8 00000000`00000000 00000000`00009fb3 00000000`00000000 : nt!KeAccumulateTicks+0x23f
fffff802`7f8e2a10 fffff802`834ba623 : 00000000`0000000c 00000000`00000000 fffff802`7db57180 00000001`7cc22400 : nt!KiUpdateRunTime+0xf4
fffff802`7f8e2bd0 fffff802`834b884e : 00000000`00000000 fffff802`7db57180 ffffffff`ffffffff 00000000`00000002 : nt!KiUpdateTime+0x13e3
fffff802`7f8e2e90 fffff802`834b805a : fffff802`83e5ff78 fffff802`83f0dfa0 fffff802`83f0dfa0 00000000`00000000 : nt!KeClockInterruptNotify+0x3de
fffff802`7f8e2f40 fffff802`8354b3be : 00000001`7cc62457 fffff802`83f0def0 fffff802`7db57180 fffff802`8362d7eb : nt!HalpTimerClockInterrupt+0x10a
fffff802`7f8e2f70 fffff802`8362da4a : fffff802`7f8d41e0 fffff802`83f0def0 fffff802`7f8d4350 ffffc106`4f4bc080 : nt!KiCallInterruptServiceRoutine+0x19e
fffff802`7f8e2fb0 fffff802`8362e2b7 : fffff802`7db57180 00000000`00000000 ffffad01`c7311180 fffff802`8362e2c4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`7f8d4160 fffff802`834b699c : ffffffff`ffffffd1 fffff802`834b772e 00000000`00000010 00000000`00000282 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`7f8d42f0 fffff802`834b772a : fffff802`8320efc4 fffff802`00000001 ffff0ed6`00000003 00000000`00000001 : nt!KeYieldProcessorEx+0x1c
fffff802`7f8d4320 fffff802`8376673e : ffffad01`c7311180 00000000`bbe26051 00000000`00000008 00000000`00000000 : nt!KiAcquirePrcbLocksForIsolationUnit+0x8a
fffff802`7f8d4350 fffff802`83665892 : ffffad01`c7311180 fffff802`7f8d43f0 fffff802`7f8d44f8 fffff802`7f8d44f8 : nt!KiAcquirePrcbLocksForPreemptionAttempt+0x32
fffff802`7f8d4380 fffff802`8342fae6 : fffff802`7db57180 ffffad01`c7311180 00000000`00000fff fffff802`7db57180 : nt!KiHeteroChooseTargetProcessor+0x274
fffff802`7f8d4430 fffff802`8342717b : 00000000`00000000 ffffc106`4ffd0158 00000000`00000000 ffffc106`4f4bc1f0 : nt!KiDeferredReadySingleThread+0x7f6
fffff802`7f8d4800 fffff802`834282b3 : ffffc106`00000020 ffffc106`00000001 fffff802`00000000 ffffc106`00000002 : nt!KiProcessThreadWaitList+0x12b
fffff802`7f8d4880 fffff802`834295a6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00004d4f : nt!KiProcessExpiredTimerList+0x343
fffff802`7f8d49b0 fffff802`836306ee : 00000000`00000000 fffff802`7db57180 fffff802`83f4c6c0 ffffc106`4c8d9080 : nt!KiRetireDpcList+0xba6
fffff802`7f8d4c40 00000000`00000000 : fffff802`7f8d5000 fffff802`7f8cf000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KeAccumulateTicks+23f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1702
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 23f
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff91083688553c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80119e34f2b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2124
Key : Analysis.Elapsed.mSec
Value: 4426
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 3019
Key : Analysis.Memory.CommitPeak.Mb
Value: 140
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!SwapContext
Key : Failure.Hash
Value: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff91083688553c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80119e34f2b
FILE_IN_CAB: 052623-46859-01.dmp
READ_ADDRESS: fffff8011a71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff91083688553c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
TRAP_FRAME: ffffbe006c83ea70 -- (.trap 0xffffbe006c83ea70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffc080f8459430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80119e34f2b rsp=ffffbe006c83ec00 rbp=000f807fbcbbbdff
r8=0000000000000000 r9=ffffbe006c83e901 r10=0000000000000000
r11=0000000000000098 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!SwapContext+0xcb:
fffff801`19e34f2b 488b9750020000 mov rdx,qword ptr [rdi+250h] ds:00000000`00000250=????????????????
Resetting default scope
STACK_TEXT:
ffffbe00`6c83e928 fffff801`19e40fa9 : 00000000`0000000a ffff9108`3688553c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbe00`6c83e930 fffff801`19e3c634 : fffff801`19e27810 fffff801`19d5014a 0000006c`c1771c57 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbe00`6c83ea70 fffff801`19e34f2b : ffffc080`f8451180 00000000`00000000 ffff800f`eb7f9080 fffff801`19e306aa : nt!KiPageFault+0x474
ffffbe00`6c83ec00 fffff801`19e307c6 : 00000000`00000000 ffff800f`d84c2040 ffff800f`eb7f9080 ffff800f`eb6f1080 : nt!SwapContext+0xcb
ffffbe00`6c83ec40 00000000`00000000 : ffffbe00`6c83f000 ffffbe00`6c839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176
SYMBOL_NAME: nt!SwapContext+cb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1702
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: cb
FAILURE_BUCKET_ID: AV_nt!SwapContext
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff91083688553c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80119e34f2b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1952
Key : Analysis.Elapsed.mSec
Value: 1972
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 3718
Key : Analysis.Init.Elapsed.mSec
Value: 8881
Key : Analysis.Memory.CommitPeak.Mb
Value: 140
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!SwapContext
Key : Failure.Hash
Value: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff91083688553c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80119e34f2b
FILE_IN_CAB: 052623-46859-01.dmp
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff91083688553c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
TRAP_FRAME: ffffbe006c83ea70 -- (.trap 0xffffbe006c83ea70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffc080f8459430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80119e34f2b rsp=ffffbe006c83ec00 rbp=000f807fbcbbbdff
r8=0000000000000000 r9=ffffbe006c83e901 r10=0000000000000000
r11=0000000000000098 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!SwapContext+0xcb:
fffff801`19e34f2b 488b9750020000 mov rdx,qword ptr [rdi+250h] ds:00000000`00000250=????????????????
Resetting default scope
STACK_TEXT:
ffffbe00`6c83e928 fffff801`19e40fa9 : 00000000`0000000a ffff9108`3688553c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbe00`6c83e930 fffff801`19e3c634 : fffff801`19e27810 fffff801`19d5014a 0000006c`c1771c57 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbe00`6c83ea70 fffff801`19e34f2b : ffffc080`f8451180 00000000`00000000 ffff800f`eb7f9080 fffff801`19e306aa : nt!KiPageFault+0x474
ffffbe00`6c83ec00 fffff801`19e307c6 : 00000000`00000000 ffff800f`d84c2040 ffff800f`eb7f9080 ffff800f`eb6f1080 : nt!SwapContext+0xcb
ffffbe00`6c83ec40 00000000`00000000 : ffffbe00`6c83f000 ffffbe00`6c839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176
SYMBOL_NAME: nt!SwapContext+cb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1702
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: cb
FAILURE_BUCKET_ID: AV_nt!SwapContext
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000017, Unexpected system command failure.
Arg2: ffffffffc000000d
Arg3: ffffcb867acdf000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1749
Key : Analysis.Elapsed.mSec
Value: 4529
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 182551
Key : Analysis.Memory.CommitPeak.Mb
Value: 153
Key : Bugcheck.Code.LegacyAPI
Value: 0x10e
Key : Failure.Bucket
Value: 0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
Key : Failure.Hash
Value: {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 10e
BUGCHECK_P1: 17
BUGCHECK_P2: ffffffffc000000d
BUGCHECK_P3: ffffcb867acdf000
BUGCHECK_P4: 0
FILE_IN_CAB: 052223-34296-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffe585`22d17758 fffff807`68885685 : 00000000`0000010e 00000000`00000017 ffffffff`c000000d ffffcb86`7acdf000 : nt!KeBugCheckEx
ffffe585`22d17760 fffff807`86f1dade : ffff838c`db0d8100 ffffcb86`77788fe0 ffffcb86`77788fe8 ffffcb86`77788ff0 : watchdog!WdLogSingleEntry5+0x3b45
ffffe585`22d17810 fffff807`86f1dfbd : ffff838c`d9ee9b00 00000000`00000000 ffff838c`d9ee9b38 ffffcb86`7ace8c68 : dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+0x12a
ffffe585`22d17860 fffff807`86f1d96a : ffffcb86`7ace8c68 ffffcb86`8cc86600 ffff838c`db0d80a0 ffffcb86`7ace8c68 : dxgmms2!VIDMM_WORKER_THREAD::ProcessEvictQueues+0xc9
ffffe585`22d17890 fffff807`86f1dd59 : ffffe585`22d17900 00000000`00000000 ffffcb86`8cc86650 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::FlushDeferredEvictions+0x10a
ffffe585`22d17900 fffff807`86f0d1f9 : 00000000`00000000 ffffe585`22d17a70 ffffcb86`77068680 ffffcb86`8a143a10 : dxgmms2!VIDMM_WORKER_THREAD::HandleRecoverablePageInFailure+0x29
ffffe585`22d17970 fffff807`86ee2839 : ffff838c`db0d80a0 00000000`00050201 ffffe585`22d17b01 00000000`00000001 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x2a9a9
ffffe585`22d17bc0 fffff807`59e0dc67 : ffffcb86`7ac19100 fffff807`86ee2830 ffff838c`db0d80a0 000f807f`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffe585`22d17bf0 fffff807`5a030854 : ffffa581`191b4180 ffffcb86`7ac19100 fffff807`59e0dc10 0001686c`fffffff0 : nt!PspSystemThreadStartup+0x57
ffffe585`22d17c40 00000000`00000000 : ffffe585`22d18000 ffffe585`22d12000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+12a
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.22621.1702
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 12a
FAILURE_BUCKET_ID: 0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000017, Unexpected system command failure.
Arg2: ffffffffc000000d
Arg3: ffffbb8cddc36000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1515
Key : Analysis.Elapsed.mSec
Value: 1573
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 156
Key : Analysis.Init.Elapsed.mSec
Value: 189242
Key : Analysis.Memory.CommitPeak.Mb
Value: 152
Key : Bugcheck.Code.LegacyAPI
Value: 0x10e
Key : Failure.Bucket
Value: 0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
Key : Failure.Hash
Value: {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 10e
BUGCHECK_P1: 17
BUGCHECK_P2: ffffffffc000000d
BUGCHECK_P3: ffffbb8cddc36000
BUGCHECK_P4: 0
FILE_IN_CAB: 052223-23093-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffb884`99405758 fffff800`83095685 : 00000000`0000010e 00000000`00000017 ffffffff`c000000d ffffbb8c`ddc36000 : nt!KeBugCheckEx
ffffb884`99405760 fffff800`954edade : ffffa80d`5172c000 ffffbb8c`db1f5720 ffffbb8c`db1f5728 ffffbb8c`db1f5730 : watchdog!WdLogSingleEntry5+0x3b45
ffffb884`99405810 fffff800`954edfbd : ffffa80d`51317100 00000000`00000000 ffffa80d`513171f8 ffffbb8c`ddc3fc68 : dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+0x12a
ffffb884`99405860 fffff800`954ed96a : ffffbb8c`ddc3fc68 ffffbb8c`e5e02200 ffffa80d`5172c050 ffffbb8c`ddc3fc68 : dxgmms2!VIDMM_WORKER_THREAD::ProcessEvictQueues+0xc9
ffffb884`99405890 fffff800`954edd59 : ffffb884`99405900 00000000`00000000 ffffbb8c`e5e022e0 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::FlushDeferredEvictions+0x10a
ffffb884`99405900 fffff800`954dd1f9 : 00000000`00000000 ffffb884`99405a70 ffffbb8c`db218100 ffffbb8c`e6c27610 : dxgmms2!VIDMM_WORKER_THREAD::HandleRecoverablePageInFailure+0x29
ffffb884`99405970 fffff800`954b2839 : ffffa80d`5172c050 00000000`00050201 ffffb884`99405b01 00000000`00000001 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x2a9a9
ffffb884`99405bc0 fffff800`7540dc67 : ffffbb8c`db998280 fffff800`954b2830 ffffa80d`5172c050 000f807f`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffb884`99405bf0 fffff800`75630854 : ffffdc80`a1311180 ffffbb8c`db998280 fffff800`7540dc10 00041222`000000d8 : nt!PspSystemThreadStartup+0x57
ffffb884`99405c40 00000000`00000000 : ffffb884`99406000 ffffb884`99400000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+12a
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.22621.1702
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 12a
FAILURE_BUCKET_ID: 0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and BugCheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 0000000000000000, Actual security check cookie from the stack
Arg2: 0000eed3895a8f6c, Expected security check cookie
Arg3: ffff112c76a57093, Complement of the expected security check cookie
Arg4: 0000000000000000, zero
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1843
Key : Analysis.Elapsed.mSec
Value: 5928
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 198762
Key : Analysis.Memory.CommitPeak.Mb
Value: 143
Key : Bugcheck.Code.LegacyAPI
Value: 0xf7
Key : Failure.Bucket
Value: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
Key : Failure.Hash
Value: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: f7
BUGCHECK_P1: 0
BUGCHECK_P2: eed3895a8f6c
BUGCHECK_P3: ffff112c76a57093
BUGCHECK_P4: 0
FILE_IN_CAB: 052123-16984-01.dmp
SECURITY_COOKIE: Expected 0000eed3895a8f6c found 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Adobe Premiere Pro.exe
STACK_TEXT:
ffffb38a`43068658 fffff807`0b6f2405 : 00000000`000000f7 00000000`00000000 0000eed3`895a8f6c ffff112c`76a57093 : nt!KeBugCheckEx
ffffb38a`43068660 fffff807`0b43b358 : 00000000`00000000 00000000`00000000 00000000`00000053 00000031`714e50b3 : nt!_report_gsfailure+0x25
ffffb38a`430686a0 fffff807`0b8a0c2c : ffff8003`c26aa180 ffff8003`ba074260 00000000`00000000 ffffb38a`43068b01 : nt!KeWaitForSingleObject+0x318
ffffb38a`43068a40 fffff807`0b8a0b4b : ffff8003`b95e3080 00000000`9c3cfc78 00000000`00000000 fffff807`0b640549 : nt!ObWaitForSingleObject+0xcc
ffffb38a`43068aa0 fffff807`0b6406e8 : 00000000`31bc9120 00000000`00000000 ffffb38a`43068af8 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x6b
ffffb38a`43068ae0 00007fff`53e8ecd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`9c3cfc48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`53e8ecd4
SYMBOL_NAME: nt!_report_gsfailure+25
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1702
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 25
FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff898e3880045c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8067dd0b980, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1530
Key : Analysis.Elapsed.mSec
Value: 3859
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 205511
Key : Analysis.Memory.CommitPeak.Mb
Value: 154
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_Npfs!NpWriteDataQueue
Key : Failure.Hash
Value: {460f143d-7892-e61d-c145-2a74b8eb0d99}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff898e3880045c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8067dd0b980
FILE_IN_CAB: 052123-15390-01.dmp
READ_ADDRESS: fffff8067e71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff898e3880045c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GoogleDriveFS.exe
TRAP_FRAME: fffff406abcc3100 -- (.trap 0xfffff406abcc3100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff898e38800440 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff898e3d200d80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067dd0b980 rsp=fffff406abcc3290 rbp=0000000000000001
r8=ffff898e290101a0 r9=0000000000001000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlpHpSegPageRangeAllocate+0x170:
fffff806`7dd0b980 3b5e1c cmp ebx,dword ptr [rsi+1Ch] ds:00000000`0000001c=????????
Resetting default scope
STACK_TEXT:
fffff406`abcc2fb8 fffff806`7de40fa9 : 00000000`0000000a ffff898e`3880045c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff406`abcc2fc0 fffff806`7de3c634 : 00000000`00000000 fffff806`7df66eec ffffde00`6ffcf180 ffff898e`346f7080 : nt!KiBugCheckDispatch+0x69
fffff406`abcc3100 fffff806`7dd0b980 : fffff806`7df0dda0 fffff806`7dd4dcee 00000000`00000000 00000400`00000000 : nt!KiPageFault+0x474
fffff406`abcc3290 fffff806`7dd0b6ba : fffff406`00000000 00000000`00000001 ffffde00`00000000 00000000`00000002 : nt!RtlpHpSegPageRangeAllocate+0x170
fffff406`abcc32f0 fffff806`7dc42b13 : 00000000`00000002 00000000`00001000 00000000`00000000 00000000`00000000 : nt!RtlpHpSegAlloc+0x5a
fffff406`abcc3350 fffff806`7dc4231f : 00000000`00000000 00000000`00000000 00000000`5246704e 00000000`00000000 : nt!ExAllocateHeapPool+0x7c3
fffff406`abcc3460 fffff806`7e49e68d : 00000000`00000040 00000000`00000001 00000000`00000600 00000000`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
fffff406`abcc34b0 fffff806`9231be09 : ffffbf02`3043f878 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAllocatePool2+0xdd
fffff406`abcc3560 fffff806`9231bb70 : 00000000`00000000 00000000`00000000 00000418`003d7000 ffffbf02`00002700 : Npfs!NpWriteDataQueue+0x119
fffff406`abcc35d0 fffff806`9231b9ad : 00000000`00002700 00000418`003d7000 ffff898e`3360db60 ffff898e`34ab6080 : Npfs!NpCommonWrite+0x140
fffff406`abcc3660 fffff806`7dc3c275 : ffff898e`2e0a9670 ffff898e`3514f9e0 00000418`003d7000 ffff898e`3360db60 : Npfs!NpFsdWrite+0x6d
fffff406`abcc36d0 fffff806`82d27bd6 : ffff898e`346f7080 00000000`00000006 00000000`00000004 ffff898e`00000000 : nt!IofCallDriver+0x55
fffff406`abcc3710 fffff806`7dc3c275 : ffff898e`3360db60 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
fffff406`abcc3770 fffff806`7e0a4a90 : ffff898e`3360db60 00000000`00000001 fffff406`abcc3811 00000000`00000000 : nt!IofCallDriver+0x55
fffff406`abcc37b0 fffff806`7e19d6c8 : ffff898e`3360db60 fffff406`abcc3990 fffff406`abcc38d0 00000000`00000000 : nt!IopSynchronousServiceTail+0x1d0
fffff406`abcc3860 fffff806`7e19d2e3 : ffff898e`3514f9e0 00000000`001a019f ffff898e`3360db60 00000000`00000000 : nt!IopWriteFile+0x288
fffff406`abcc3980 fffff806`7de406e8 : 00000000`00000001 00000000`00000000 00000000`00000000 00000418`0027e118 : nt!NtWriteFile+0x263
fffff406`abcc3a70 00007ff9`6fbaed54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000025`becfdcf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6fbaed54
SYMBOL_NAME: Npfs!NpWriteDataQueue+119
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.22621.1690
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 119
FAILURE_BUCKET_ID: AV_Npfs!NpWriteDataQueue
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {460f143d-7892-e61d-c145-2a74b8eb0d99}
Followup: MachineOwner
---------