Advertisement
Proudyy

amd rx 6800 gpu error LoL

Dec 5th, 2024 (edited)
72
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
VIM 21.01 KB | None | 0 0
  1. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  2.    ExtensionRepository : Implicit
  3.    UseExperimentalFeatureForNugetShare : true
  4.    AllowNugetExeUpdate : true
  5.    NonInteractiveNuget : true
  6.    AllowNugetMSCredentialProviderInstall : true
  7.    AllowParallelInitializationOfLocalRepositories : true
  8.    EnableRedirectToChakraJsProvider : false
  9.  
  10.    -- Configuring repositories
  11.       ----> Repository : LocalInstalled, Enabled: true
  12.       ----> Repository : UserExtensions, Enabled: true
  13.  
  14. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.015 seconds
  15.  
  16. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  17.  
  18. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.172 seconds
  19.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  20.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
  21.  
  22. Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
  23. Copyright (c) Microsoft Corporation. All rights reserved.
  24.  
  25.  
  26. Loading Dump File [C:\Windows\Minidump\120524-22421-01.dmp]
  27. Mini Kernel Dump File: Only registers and stack trace are available
  28.  
  29.  
  30. ************* Path validation summary **************
  31. Response                         Time (ms)     Location
  32. Deferred                                       srv*
  33. Symbol search path is: srv*
  34. Executable search path is:
  35. Windows 10 Kernel Version 26100 MP (16 procs) Free x64
  36. Product: WinNt, suite: TerminalServer SingleUserTS
  37. Kernel base = 0xfffff804`9a600000 PsLoadedModuleList = 0xfffff804`9b4f4830
  38. Debug session time: Thu Dec  5 18:28:13.415 2024 (UTC + 1:00)
  39. System Uptime: 1 days 22:19:38.755
  40. Loading Kernel Symbols
  41. ...............................................................
  42. ................................................................
  43. ................................................................
  44. ....................................................
  45. Loading User Symbols
  46. PEB is paged out (Peb.Ldr = 0000004b`f5716018).  Type ".hh dbgerr001" for details
  47. Loading unloaded module list
  48. ..................................................
  49. For analysis of this file, run !analyze -v
  50. nt!KeBugCheckEx:
  51. fffff804`9aab8550 48894c2408      mov     qword ptr [rsp+8],rcx ss:fffff804`2cddc960=000000000000000a
  52. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  53. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  54. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  55. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  56. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
  57. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  58. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
  59. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  60. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  61. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  62. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  63. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  64. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2410.11001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  65.  
  66. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  67.    ExtensionRepository : Implicit
  68.    UseExperimentalFeatureForNugetShare : true
  69.    AllowNugetExeUpdate : true
  70.    NonInteractiveNuget : true
  71.    AllowNugetMSCredentialProviderInstall : true
  72.    AllowParallelInitializationOfLocalRepositories : true
  73.    EnableRedirectToChakraJsProvider : false
  74.  
  75.    -- Configuring repositories
  76.       ----> Repository : LocalInstalled, Enabled: true
  77.       ----> Repository : UserExtensions, Enabled: true
  78.  
  79. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  80.  
  81. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  82.  
  83. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
  84.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  85.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
  86.  
  87. Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
  88. Copyright (c) Microsoft Corporation. All rights reserved.
  89.  
  90.  
  91. Loading Dump File [C:\Windows\Minidump\120524-21765-01.dmp]
  92. Mini Kernel Dump File: Only registers and stack trace are available
  93.  
  94.  
  95. ************* Path validation summary **************
  96. Response                         Time (ms)     Location
  97. Deferred                                       srv*
  98. Symbol search path is: srv*
  99. Executable search path is:
  100. Windows 10 Kernel Version 26100 MP (16 procs) Free x64
  101. Product: WinNt, suite: TerminalServer SingleUserTS
  102. Kernel base = 0xfffff801`90e00000 PsLoadedModuleList = 0xfffff801`91cf4830
  103. Debug session time: Thu Dec  5 22:09:30.695 2024 (UTC + 1:00)
  104. System Uptime: 0 days 0:29:19.560
  105. Loading Kernel Symbols
  106. ...............................................................
  107. ................................................................
  108. ................................................................
  109. ...........................................
  110. Loading User Symbols
  111.  
  112. Loading unloaded module list
  113. .................
  114. For analysis of this file, run !analyze -v
  115. nt!KeBugCheckEx:
  116. fffff801`912b8550 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff801`234bc960=000000000000000a
  117. 0: kd> !analyze -v
  118. *******************************************************************************
  119. *                                                                             *
  120. *                        Bugcheck Analysis                                    *
  121. *                                                                             *
  122. *******************************************************************************
  123.  
  124. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  125. An attempt was made to access a pageable (or completely invalid) address at an
  126. interrupt request level (IRQL) that is too high.  This is usually
  127. caused by drivers using improper addresses.
  128. If kernel debugger is available get stack backtrace.
  129. Arguments:
  130. Arg1: ffff970504dd0128, memory referenced
  131. Arg2: 0000000000000007, IRQL
  132. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  133. Arg4: fffff8016dc646c0, address which referenced memory
  134.  
  135. Debugging Details:
  136. ------------------
  137.  
  138.  
  139. KEY_VALUES_STRING: 1
  140.  
  141.     Key  : Analysis.CPU.mSec
  142.     Value: 1156
  143.  
  144.     Key  : Analysis.Elapsed.mSec
  145.     Value: 5935
  146.  
  147.     Key  : Analysis.IO.Other.Mb
  148.     Value: 0
  149.  
  150.     Key  : Analysis.IO.Read.Mb
  151.     Value: 1
  152.  
  153.     Key  : Analysis.IO.Write.Mb
  154.     Value: 0
  155.  
  156.     Key  : Analysis.Init.CPU.mSec
  157.     Value: 265
  158.  
  159.     Key  : Analysis.Init.Elapsed.mSec
  160.     Value: 4577
  161.  
  162.     Key  : Analysis.Memory.CommitPeak.Mb
  163.     Value: 88
  164.  
  165.     Key  : Analysis.Version.DbgEng
  166.     Value: 10.0.27725.1000
  167.  
  168.     Key  : Analysis.Version.Description
  169.     Value: 10.2408.27.01 amd64fre
  170.  
  171.     Key  : Analysis.Version.Ext
  172.     Value: 1.2408.27.1
  173.  
  174.     Key  : Bugcheck.Code.LegacyAPI
  175.     Value: 0xd1
  176.  
  177.     Key  : Bugcheck.Code.TargetModel
  178.     Value: 0xd1
  179.  
  180.     Key  : Dump.Attributes.AsUlong
  181.     Value: 21808
  182.  
  183.     Key  : Dump.Attributes.DiagDataWrittenToHeader
  184.     Value: 1
  185.  
  186.     Key  : Dump.Attributes.ErrorCode
  187.     Value: 0
  188.  
  189.     Key  : Dump.Attributes.KernelGeneratedTriageDump
  190.     Value: 1
  191.  
  192.     Key  : Dump.Attributes.LastLine
  193.     Value: Dump completed successfully.
  194.  
  195.     Key  : Dump.Attributes.ProgressPercentage
  196.     Value: 0
  197.  
  198.     Key  : Failure.Bucket
  199.     Value: AV_amdkmdag!unknown_function
  200.  
  201.     Key  : Failure.Hash
  202.     Value: {c753a2f9-94a6-448f-1d0e-e079b3442215}
  203.  
  204.     Key  : Hypervisor.Enlightenments.ValueHex
  205.     Value: 7497cf94
  206.  
  207.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  208.     Value: 1
  209.  
  210.     Key  : Hypervisor.Flags.ApicEnlightened
  211.     Value: 1
  212.  
  213.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  214.     Value: 0
  215.  
  216.     Key  : Hypervisor.Flags.AsyncMemoryHint
  217.     Value: 0
  218.  
  219.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  220.     Value: 0
  221.  
  222.     Key  : Hypervisor.Flags.CpuManager
  223.     Value: 1
  224.  
  225.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  226.     Value: 0
  227.  
  228.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  229.     Value: 1
  230.  
  231.     Key  : Hypervisor.Flags.Epf
  232.     Value: 0
  233.  
  234.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  235.     Value: 1
  236.  
  237.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  238.     Value: 1
  239.  
  240.     Key  : Hypervisor.Flags.MaxBankNumber
  241.     Value: 0
  242.  
  243.     Key  : Hypervisor.Flags.MemoryZeroingControl
  244.     Value: 0
  245.  
  246.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  247.     Value: 0
  248.  
  249.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  250.     Value: 1
  251.  
  252.     Key  : Hypervisor.Flags.Phase0InitDone
  253.     Value: 1
  254.  
  255.     Key  : Hypervisor.Flags.PowerSchedulerQos
  256.     Value: 0
  257.  
  258.     Key  : Hypervisor.Flags.RootScheduler
  259.     Value: 0
  260.  
  261.     Key  : Hypervisor.Flags.SynicAvailable
  262.     Value: 1
  263.  
  264.     Key  : Hypervisor.Flags.UseQpcBias
  265.     Value: 0
  266.  
  267.     Key  : Hypervisor.Flags.Value
  268.     Value: 38408431
  269.  
  270.     Key  : Hypervisor.Flags.ValueHex
  271.     Value: 24a10ef
  272.  
  273.     Key  : Hypervisor.Flags.VpAssistPage
  274.     Value: 1
  275.  
  276.     Key  : Hypervisor.Flags.VsmAvailable
  277.     Value: 1
  278.  
  279.     Key  : Hypervisor.RootFlags.AccessStats
  280.     Value: 1
  281.  
  282.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  283.     Value: 1
  284.  
  285.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  286.     Value: 1
  287.  
  288.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  289.     Value: 0
  290.  
  291.     Key  : Hypervisor.RootFlags.HostTimelineSync
  292.     Value: 1
  293.  
  294.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  295.     Value: 0
  296.  
  297.     Key  : Hypervisor.RootFlags.IsHyperV
  298.     Value: 1
  299.  
  300.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  301.     Value: 1
  302.  
  303.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  304.     Value: 1
  305.  
  306.     Key  : Hypervisor.RootFlags.MceEnlightened
  307.     Value: 1
  308.  
  309.     Key  : Hypervisor.RootFlags.Nested
  310.     Value: 0
  311.  
  312.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  313.     Value: 1
  314.  
  315.     Key  : Hypervisor.RootFlags.Value
  316.     Value: 1015
  317.  
  318.     Key  : Hypervisor.RootFlags.ValueHex
  319.     Value: 3f7
  320.  
  321.     Key  : Stack.Pointer
  322.     Value: ISR
  323.  
  324.  
  325. BUGCHECK_CODE:  d1
  326.  
  327. BUGCHECK_P1: ffff970504dd0128
  328.  
  329. BUGCHECK_P2: 7
  330.  
  331. BUGCHECK_P3: 0
  332.  
  333. BUGCHECK_P4: fffff8016dc646c0
  334.  
  335. FILE_IN_CAB:  120524-21765-01.dmp
  336.  
  337. TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
  338.  
  339.  
  340. DUMP_FILE_ATTRIBUTES: 0x21808
  341.   Kernel Generated Triage Dump
  342.  
  343. FAULTING_THREAD:  fffff80191dd0640
  344.  
  345. READ_ADDRESS: fffff80191dc34b0: Unable to get MiVisibleState
  346. Unable to get NonPagedPoolStart
  347. Unable to get NonPagedPoolEnd
  348. Unable to get PagedPoolStart
  349. Unable to get PagedPoolEnd
  350. unable to get nt!MmSpecialPagesInUse
  351.  ffff970504dd0128
  352.  
  353. BLACKBOXBSD: 1 (!blackboxbsd)
  354.  
  355.  
  356. BLACKBOXNTFS: 1 (!blackboxntfs)
  357.  
  358.  
  359. BLACKBOXPNP: 1 (!blackboxpnp)
  360.  
  361.  
  362. BLACKBOXWINLOGON: 1
  363.  
  364. CUSTOMER_CRASH_COUNT:  1
  365.  
  366. PROCESS_NAME:  System
  367.  
  368. TRAP_FRAME:  fffff801234bcaa0 -- (.trap 0xfffff801234bcaa0)
  369. NOTE: The trap frame does not contain all registers.
  370. Some register values may be zeroed or incorrect.
  371. rax=ffff9704dedfcbd0 rbx=0000000000000000 rcx=ffff9704b2f67200
  372. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  373. rip=fffff8016dc646c0 rsp=fffff801234bcc38 rbp=fffff801234bcd40
  374.  r8=ffff970504dd012c  r9=000068fafb22fed4 r10=ffff9704b2f67200
  375. r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
  376. r14=0000000000000000 r15=0000000000000000
  377. iopl=0         nv up ei pl nz na po nc
  378. amdkmdag+0x18646c0:
  379. fffff801`6dc646c0 418b40fc        mov     eax,dword ptr [r8-4] ds:ffff9705`04dd0128=????????
  380. Resetting default scope
  381.  
  382. STACK_TEXT:  
  383. fffff801`234bc958 fffff801`9148dae9     : 00000000`0000000a ffff9705`04dd0128 00000000`00000007 00000000`00000000 : nt!KeBugCheckEx
  384. fffff801`234bc960 fffff801`91488da8     : 00000001`00000003 00000000`00000010 00000000`00000000 fffff801`6dbfedef : nt!KiBugCheckDispatch+0x69
  385. fffff801`234bcaa0 fffff801`6dc646c0     : fffff801`6dc28238 ffff9704`b2f67200 00000000`00000000 ffff9704`b2f60000 : nt!KiPageFault+0x468
  386. fffff801`234bcc38 fffff801`6dc28238     : ffff9704`b2f67200 00000000`00000000 ffff9704`b2f60000 00000000`00000001 : amdkmdag+0x18646c0
  387. fffff801`234bcc40 ffff9704`b2f67200     : 00000000`00000000 ffff9704`b2f60000 00000000`00000001 fffff801`234bd301 : amdkmdag+0x1828238
  388. fffff801`234bcc48 00000000`00000000     : ffff9704`b2f60000 00000000`00000001 fffff801`234bd301 00000000`00000000 : 0xffff9704`b2f67200
  389.  
  390.  
  391. SYMBOL_NAME:  amdkmdag+18646c0
  392.  
  393. MODULE_NAME: amdkmdag
  394.  
  395. IMAGE_NAME:  amdkmdag.sys
  396.  
  397. STACK_COMMAND:  .process /r /p 0xfffff80191dcdf80; .thread 0xfffff80191dd0640 ; kb
  398.  
  399. BUCKET_ID_FUNC_OFFSET:  18646c0
  400.  
  401. FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function
  402.  
  403. OSPLATFORM_TYPE:  x64
  404.  
  405. OSNAME:  Windows 10
  406.  
  407. FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}
  408.  
  409. Followup:     MachineOwner
  410. ---------
  411.  
  412. 0: kd> !analyze -v
  413. *******************************************************************************
  414. *                                                                             *
  415. *                        Bugcheck Analysis                                    *
  416. *                                                                             *
  417. *******************************************************************************
  418.  
  419. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  420. An attempt was made to access a pageable (or completely invalid) address at an
  421. interrupt request level (IRQL) that is too high.  This is usually
  422. caused by drivers using improper addresses.
  423. If kernel debugger is available get stack backtrace.
  424. Arguments:
  425. Arg1: ffff970504dd0128, memory referenced
  426. Arg2: 0000000000000007, IRQL
  427. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  428. Arg4: fffff8016dc646c0, address which referenced memory
  429.  
  430. Debugging Details:
  431. ------------------
  432.  
  433.  
  434. KEY_VALUES_STRING: 1
  435.  
  436.     Key  : Analysis.CPU.mSec
  437.     Value: 1109
  438.  
  439.     Key  : Analysis.Elapsed.mSec
  440.     Value: 1122
  441.  
  442.     Key  : Analysis.IO.Other.Mb
  443.     Value: 0
  444.  
  445.     Key  : Analysis.IO.Read.Mb
  446.     Value: 1
  447.  
  448.     Key  : Analysis.IO.Write.Mb
  449.     Value: 0
  450.  
  451.     Key  : Analysis.Init.CPU.mSec
  452.     Value: 2265
  453.  
  454.     Key  : Analysis.Init.Elapsed.mSec
  455.     Value: 43961
  456.  
  457.     Key  : Analysis.Memory.CommitPeak.Mb
  458.     Value: 88
  459.  
  460.     Key  : Analysis.Version.DbgEng
  461.     Value: 10.0.27725.1000
  462.  
  463.     Key  : Analysis.Version.Description
  464.     Value: 10.2408.27.01 amd64fre
  465.  
  466.     Key  : Analysis.Version.Ext
  467.     Value: 1.2408.27.1
  468.  
  469.     Key  : Bugcheck.Code.LegacyAPI
  470.     Value: 0xd1
  471.  
  472.     Key  : Bugcheck.Code.TargetModel
  473.     Value: 0xd1
  474.  
  475.     Key  : Dump.Attributes.AsUlong
  476.     Value: 21808
  477.  
  478.     Key  : Dump.Attributes.DiagDataWrittenToHeader
  479.     Value: 1
  480.  
  481.     Key  : Dump.Attributes.ErrorCode
  482.     Value: 0
  483.  
  484.     Key  : Dump.Attributes.KernelGeneratedTriageDump
  485.     Value: 1
  486.  
  487.     Key  : Dump.Attributes.LastLine
  488.     Value: Dump completed successfully.
  489.  
  490.     Key  : Dump.Attributes.ProgressPercentage
  491.     Value: 0
  492.  
  493.     Key  : Failure.Bucket
  494.     Value: AV_amdkmdag!unknown_function
  495.  
  496.     Key  : Failure.Hash
  497.     Value: {c753a2f9-94a6-448f-1d0e-e079b3442215}
  498.  
  499.     Key  : Hypervisor.Enlightenments.ValueHex
  500.     Value: 7497cf94
  501.  
  502.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  503.     Value: 1
  504.  
  505.     Key  : Hypervisor.Flags.ApicEnlightened
  506.     Value: 1
  507.  
  508.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  509.     Value: 0
  510.  
  511.     Key  : Hypervisor.Flags.AsyncMemoryHint
  512.     Value: 0
  513.  
  514.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  515.     Value: 0
  516.  
  517.     Key  : Hypervisor.Flags.CpuManager
  518.     Value: 1
  519.  
  520.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  521.     Value: 0
  522.  
  523.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  524.     Value: 1
  525.  
  526.     Key  : Hypervisor.Flags.Epf
  527.     Value: 0
  528.  
  529.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  530.     Value: 1
  531.  
  532.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  533.     Value: 1
  534.  
  535.     Key  : Hypervisor.Flags.MaxBankNumber
  536.     Value: 0
  537.  
  538.     Key  : Hypervisor.Flags.MemoryZeroingControl
  539.     Value: 0
  540.  
  541.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  542.     Value: 0
  543.  
  544.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  545.     Value: 1
  546.  
  547.     Key  : Hypervisor.Flags.Phase0InitDone
  548.     Value: 1
  549.  
  550.     Key  : Hypervisor.Flags.PowerSchedulerQos
  551.     Value: 0
  552.  
  553.     Key  : Hypervisor.Flags.RootScheduler
  554.     Value: 0
  555.  
  556.     Key  : Hypervisor.Flags.SynicAvailable
  557.     Value: 1
  558.  
  559.     Key  : Hypervisor.Flags.UseQpcBias
  560.     Value: 0
  561.  
  562.     Key  : Hypervisor.Flags.Value
  563.     Value: 38408431
  564.  
  565.     Key  : Hypervisor.Flags.ValueHex
  566.     Value: 24a10ef
  567.  
  568.     Key  : Hypervisor.Flags.VpAssistPage
  569.     Value: 1
  570.  
  571.     Key  : Hypervisor.Flags.VsmAvailable
  572.     Value: 1
  573.  
  574.     Key  : Hypervisor.RootFlags.AccessStats
  575.     Value: 1
  576.  
  577.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  578.     Value: 1
  579.  
  580.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  581.     Value: 1
  582.  
  583.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  584.     Value: 0
  585.  
  586.     Key  : Hypervisor.RootFlags.HostTimelineSync
  587.     Value: 1
  588.  
  589.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  590.     Value: 0
  591.  
  592.     Key  : Hypervisor.RootFlags.IsHyperV
  593.     Value: 1
  594.  
  595.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  596.     Value: 1
  597.  
  598.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  599.     Value: 1
  600.  
  601.     Key  : Hypervisor.RootFlags.MceEnlightened
  602.     Value: 1
  603.  
  604.     Key  : Hypervisor.RootFlags.Nested
  605.     Value: 0
  606.  
  607.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  608.     Value: 1
  609.  
  610.     Key  : Hypervisor.RootFlags.Value
  611.     Value: 1015
  612.  
  613.     Key  : Hypervisor.RootFlags.ValueHex
  614.     Value: 3f7
  615.  
  616.     Key  : Stack.Pointer
  617.     Value: ISR
  618.  
  619.  
  620. BUGCHECK_CODE:  d1
  621.  
  622. BUGCHECK_P1: ffff970504dd0128
  623.  
  624. BUGCHECK_P2: 7
  625.  
  626. BUGCHECK_P3: 0
  627.  
  628. BUGCHECK_P4: fffff8016dc646c0
  629.  
  630. FILE_IN_CAB:  120524-21765-01.dmp
  631.  
  632. TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
  633.  
  634.  
  635. DUMP_FILE_ATTRIBUTES: 0x21808
  636.   Kernel Generated Triage Dump
  637.  
  638. FAULTING_THREAD:  fffff80191dd0640
  639.  
  640. READ_ADDRESS: Unable to get NonPagedPoolStart
  641. Unable to get NonPagedPoolEnd
  642. Unable to get PagedPoolStart
  643. Unable to get PagedPoolEnd
  644.  ffff970504dd0128
  645.  
  646. BLACKBOXBSD: 1 (!blackboxbsd)
  647.  
  648.  
  649. BLACKBOXNTFS: 1 (!blackboxntfs)
  650.  
  651.  
  652. BLACKBOXPNP: 1 (!blackboxpnp)
  653.  
  654.  
  655. BLACKBOXWINLOGON: 1
  656.  
  657. CUSTOMER_CRASH_COUNT:  1
  658.  
  659. PROCESS_NAME:  System
  660.  
  661. TRAP_FRAME:  fffff801234bcaa0 -- (.trap 0xfffff801234bcaa0)
  662. NOTE: The trap frame does not contain all registers.
  663. Some register values may be zeroed or incorrect.
  664. rax=ffff9704dedfcbd0 rbx=0000000000000000 rcx=ffff9704b2f67200
  665. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  666. rip=fffff8016dc646c0 rsp=fffff801234bcc38 rbp=fffff801234bcd40
  667.  r8=ffff970504dd012c  r9=000068fafb22fed4 r10=ffff9704b2f67200
  668. r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
  669. r14=0000000000000000 r15=0000000000000000
  670. iopl=0         nv up ei pl nz na po nc
  671. amdkmdag+0x18646c0:
  672. fffff801`6dc646c0 418b40fc        mov     eax,dword ptr [r8-4] ds:ffff9705`04dd0128=????????
  673. Resetting default scope
  674.  
  675. STACK_TEXT:  
  676. fffff801`234bc958 fffff801`9148dae9     : 00000000`0000000a ffff9705`04dd0128 00000000`00000007 00000000`00000000 : nt!KeBugCheckEx
  677. fffff801`234bc960 fffff801`91488da8     : 00000001`00000003 00000000`00000010 00000000`00000000 fffff801`6dbfedef : nt!KiBugCheckDispatch+0x69
  678. fffff801`234bcaa0 fffff801`6dc646c0     : fffff801`6dc28238 ffff9704`b2f67200 00000000`00000000 ffff9704`b2f60000 : nt!KiPageFault+0x468
  679. fffff801`234bcc38 fffff801`6dc28238     : ffff9704`b2f67200 00000000`00000000 ffff9704`b2f60000 00000000`00000001 : amdkmdag+0x18646c0
  680. fffff801`234bcc40 ffff9704`b2f67200     : 00000000`00000000 ffff9704`b2f60000 00000000`00000001 fffff801`234bd301 : amdkmdag+0x1828238
  681. fffff801`234bcc48 00000000`00000000     : ffff9704`b2f60000 00000000`00000001 fffff801`234bd301 00000000`00000000 : 0xffff9704`b2f67200
  682.  
  683.  
  684. SYMBOL_NAME:  amdkmdag+18646c0
  685.  
  686. MODULE_NAME: amdkmdag
  687.  
  688. IMAGE_NAME:  amdkmdag.sys
  689.  
  690. STACK_COMMAND:  .process /r /p 0xfffff80191dcdf80; .thread 0xfffff80191dd0640 ; kb
  691.  
  692. BUCKET_ID_FUNC_OFFSET:  18646c0
  693.  
  694. FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function
  695.  
  696. OSPLATFORM_TYPE:  x64
  697.  
  698. OSNAME:  Windows 10
  699.  
  700. FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}
  701.  
  702. Followup:     MachineOwner
  703. ---------
Tags: Hexdump
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement