Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21833\102520-11281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`2b200000 PsLoadedModuleList = 0xfffff801`2be2a310
Debug session time: Sun Oct 25 13:30:47.458 2020 (UTC + 3:00)
System Uptime: 1 days 13:59:16.111
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`2b5f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdb06`ef3158b0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8012b4c971b, Address of the instruction which caused the bugcheck
Arg3: ffffdb06ef3161b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18360
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8012b4c971b
BUGCHECK_P3: ffffdb06ef3161b0
BUGCHECK_P4: 0
CONTEXT: ffffdb06ef3161b0 -- (.cxr 0xffffdb06ef3161b0)
rax=6c9940aa68e4006a rbx=ffffb488a4600290 rcx=ffffb488a9370d38
rdx=ffffb488a4e5dd88 rsi=0000000000000000 rdi=6c9940aa68e4006a
rip=fffff8012b4c971b rsp=ffffdb06ef316bb8 rbp=ffffdb06ef316c48
r8=ffffb488ad315ba8 r9=ffffb488ad315ba8 r10=0000000000000000
r11=ffffb488c10918c8 r12=0000000000000000 r13=ffffb488a4e53000
r14=0000000000000000 r15=0000000000000026
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x39b:
fffff801`2b4c971b 488b07 mov rax,qword ptr [rdi] ds:002b:6c9940aa`68e4006a=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: lsass.exe
STACK_TEXT:
ffffdb06`ef316bb8 fffff801`2b4c7ce5 : ffffdb06`ef316c48 00000000`00000022 ffffb488`a4e5dd80 00000000`00000026 : nt!RtlRbRemoveNode+0x39b
ffffdb06`ef316bd0 fffff801`2b4c7aca : ffff2765`00000002 ffffc78d`c88e91a0 ffffc78d`d3937b20 00000000`00000250 : nt!RtlpHpVsChunkSplit+0x45
ffffdb06`ef316c90 fffff801`2b4cb048 : 00000000`00000000 ffffdb06`00000210 ffffdb06`ef316dd1 00000000`00000210 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffdb06`ef316cf0 fffff801`2b4ca78f : ffffdb06`00000000 00000000`00000005 00000000`74536d4d fffff801`2b80ba0a : nt!ExAllocateHeapPool+0x888
ffffdb06`ef316e30 fffff801`2b54ff76 : 00000000`80000000 00000000`00000200 00000000`74536d4d ffffc78d`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffdb06`ef316e80 fffff801`2b513107 : 00000000`00000000 ffffdb06`ef316f40 00000000`00000040 ffffdb06`08000000 : nt!MiAllocatePool+0x86
ffffdb06`ef316ed0 fffff801`2b550fc2 : ffffffff`ffffffff ffffffff`ffffffff ffffc78d`d563cad0 fffff801`00000000 : nt!MiCreatePrototypePtes+0x53
ffffdb06`ef316f80 fffff801`2b507f34 : 00000000`00000001 00000000`00000040 00000000`00000000 fffff801`00000040 : nt!MiAddViewsForSection+0x3c2
ffffdb06`ef317080 fffff801`2b5093fe : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapViewInSystemCache+0xc4
ffffdb06`ef317200 fffff801`2b53767a : 00000000`00000000 fffff801`00000000 ffffc78d`00000000 ffffdb06`00000000 : nt!CcGetVacbMiss+0xce
ffffdb06`ef317290 fffff801`2b900890 : ffffc78d`00000000 00000000`00000000 ffffdb06`ef3173d0 ffffdb06`ef3173e0 : nt!CcGetVirtualAddress+0x33a
ffffdb06`ef317330 fffff801`2b536c89 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`2b48dd01 : nt!CcMapAndCopyFromCache+0x80
ffffdb06`ef3173d0 fffff801`2e3c36bf : ffffb488`00000000 ffffb488`00000000 ffffb488`0000000c ffffb488`00000000 : nt!CcCopyReadEx+0x139
ffffdb06`ef317480 fffff801`2e3c511f : ffffb488`ae4c18f0 ffffdb06`ef317720 00000000`00000003 ffffb488`ae4c1700 : Ntfs!NtfsCachedRead+0x177
ffffdb06`ef3174f0 fffff801`2e3c40cc : ffffc78d`d44c0cc8 ffffc78d`d5357010 ffffc78d`00000001 ffffc78d`0000000c : Ntfs!NtfsCommonRead+0xe1f
ffffdb06`ef3176f0 fffff801`2b4cd805 : ffffc78d`d519d010 ffffc78d`d5357010 ffffc78d`d5357010 ffffc78d`c876ed60 : Ntfs!NtfsFsdRead+0x1fc
ffffdb06`ef3177c0 fffff801`28376ccf : ffffc78d`d528b010 00000000`00000000 00000000`00000000 ffffc78d`d528b010 : nt!IofCallDriver+0x55
ffffdb06`ef317800 fffff801`283748d3 : ffffdb06`ef317890 00000000`00000000 ffffdb06`ef3178b8 fffff801`2b8efe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffdb06`ef317870 fffff801`2b4cd805 : ffffc78d`d5357010 00000000`00000000 ffffdb06`ef317b80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffdb06`ef3178d0 fffff801`2b8c2528 : 00000000`00000000 ffffc78d`d6e0b4c0 00000000`00000001 ffffc78d`c2aff201 : nt!IofCallDriver+0x55
ffffdb06`ef317910 fffff801`2b8b99d9 : ffffc78d`00000000 ffffdb06`ef317b80 00000000`00000000 ffffdb06`ef317b80 : nt!IopSynchronousServiceTail+0x1a8
ffffdb06`ef3179b0 fffff801`2b605fb8 : 00000000`00001af8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
ffffdb06`ef317a90 00007fff`6b5ebe54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008b`ec4fe318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6b5ebe54
SYMBOL_NAME: nt!RtlRbRemoveNode+39b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffdb06ef3161b0 ; kb
BUCKET_ID_FUNC_OFFSET: 39b
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!RtlRbRemoveNode
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dcc50c37-502a-06f7-586d-2cded5d3c812}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21194\102720-6437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`1d200000 PsLoadedModuleList = 0xfffff804`1de2a310
Debug session time: Tue Oct 27 21:22:31.325 2020 (UTC + 3:00)
System Uptime: 0 days 23:06:56.643
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`1d5f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb784`850d8a00=0000000000000116
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 30995
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffffba092ce7a010
BUGCHECK_P2: fffff80431902230
BUGCHECK_P3: ffffffffc0000001
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffb784`850d89f8 fffff804`2ac814be : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffb784`850d8a00 fffff804`2ac298db : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffb784`850d8a40 fffff804`2ac2a6ae : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffb784`850d8a90 fffff804`2ac80be5 : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffb784`850d8b10 fffff804`2ac80d57 : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15
ffffb784`850d8b40 fffff804`1d5035f5 : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffb784`850d8b70 fffff804`1d4a2ae5 : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105
ffffb784`850d8c10 fffff804`1d5fbbf8 : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55
ffffb784`850d8c60 00000000`00000000 : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: amdkmdag+b2230
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x116_IMAGE_amdkmdag.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10921
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffffba092ce7a010
BUGCHECK_P2: fffff80431902230
BUGCHECK_P3: ffffffffc0000001
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffb784`850d89f8 fffff804`2ac814be : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffb784`850d8a00 fffff804`2ac298db : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffb784`850d8a40 fffff804`2ac2a6ae : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffb784`850d8a90 fffff804`2ac80be5 : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffb784`850d8b10 fffff804`2ac80d57 : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15
ffffb784`850d8b40 fffff804`1d5035f5 : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffb784`850d8b70 fffff804`1d4a2ae5 : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105
ffffb784`850d8c10 fffff804`1d5fbbf8 : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55
ffffb784`850d8c60 00000000`00000000 : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: amdkmdag+b2230
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x116_IMAGE_amdkmdag.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.20527\103120-7484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`6dc00000 PsLoadedModuleList = 0xfffff800`6e82a310
Debug session time: Sat Oct 31 15:44:32.828 2020 (UTC + 3:00)
System Uptime: 1 days 6:42:07.479
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`6dff45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe203`f443ea00=0000000000000116
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffa60567fc5010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff800826d2230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22521
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffffa60567fc5010
BUGCHECK_P2: fffff800826d2230
BUGCHECK_P3: ffffffffc0000001
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffe203`f443e9f8 fffff800`7c3014be : 00000000`00000116 ffffa605`67fc5010 fffff800`826d2230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffe203`f443ea00 fffff800`7c2a98db : fffff800`826d2230 ffffa605`5f76b000 ffffa605`5f76b0f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffe203`f443ea40 fffff800`7c2aa6ae : ffffa605`00000101 00000000`00002000 ffffa605`5f76b000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffe203`f443ea90 fffff800`7c300be5 : 00000000`00000100 ffffa605`5f76ba58 00000000`00000000 00000000`00000000 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffe203`f443eb10 fffff800`7c300d57 : fffff800`6e925440 ffffa605`618aeed0 00000000`00000000 00000000`00000700 : dxgkrnl!TdrResetFromTimeout+0x15
ffffe203`f443eb40 fffff800`6df035f5 : ffffa605`6fff9040 fffff800`7c300d30 ffffa605`5249b430 ffffa605`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffe203`f443eb70 fffff800`6dea2ae5 : ffffa605`6fff9040 00000000`00000080 ffffa605`5248f040 3c928000`3c840000 : nt!ExpWorkerThread+0x105
ffffe203`f443ec10 fffff800`6dffbbf8 : fffff800`693ab180 ffffa605`6fff9040 fffff800`6dea2a90 bb8c0000`bbb80000 : nt!PspSystemThreadStartup+0x55
ffffe203`f443ec60 00000000`00000000 : ffffe203`f443f000 ffffe203`f4439000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: amdkmdag+b2230
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x116_IMAGE_amdkmdag.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}
Followup: MachineOwner
---------