PC crashing when playing games, Mostly need for speed heat, Forza Horizon 4 and Dirt rally 2.0

  • Thread starter Thread starter JerryJack1
  • Start date Start date
J

JerryJack1

Guest
PC Specs

  • AMD Ryzen 7 3700X CPU
  • MSI GeForce RTX 2060 Super (8GB)
  • MSI B450 Gaming Pro Carbon AC
  • 16GB of RAM (G-Skill Trident Z RGB)
  • 250GB SSD (Samsung Evo)
  • Cooler Master Masterwatt 750 80+ Bronze PSU
  • Cooler Master MB511 RGB Case


Need for speed heat crash dump analyze:



Loading Dump File [C:\Users\Jerry Jack\Documents\Need for Speed Heat\CrashDumps\CrashDump_2020.08.10_16.20.44.230.mdmp]
Comment: 'Frostbite MiniDump. Address: 7ffe4daed339 (In Windbg type: .ecxr)
[EOF]'
User Mini Dump File: Only registers, stack and portions of memory are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 18363 MP (16 procs) Free x64
Product: WinNt, suite: SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Debug session time: Mon Aug 10 16:20:44.000 2020 (UTC + 5:30)
System Uptime: not available
Process Uptime: 0 days 0:02:39.000
................................................................
................................................................
....
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(4e9c.31c0): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run
!analyze -v
ntdll!NtGetContextThread+0x14:
00007ffe`ba0fde04 c3 ret
0:017> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************

*** WARNING: Unable to verify timestamp for igo64.dll
*** WARNING: Unable to verify timestamp for legacy_forcefeedback_x64.dll

KEY_VALUES_STRING: 1

Key : AV.Dereference
Value: NullPtr

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 10531

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SOI9BNE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 120181

Key : Analysis.Memory.CommitPeak.Mb
Value: 703

Key : Analysis.System
Value: CreateObject

Key : Timeline.Process.Start.DeltaSec
Value: 159

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1

Key : WER.Process.Version
Value: 1.0.60.7040


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

COMMENT: Frostbite MiniDump. Address: 7ffe4daed339 (In Windbg type: .ecxr)
[EOF]

NTGLOBALFLAG: 0

PROCESS_BAM_CURRENT_THROTTLED: 0

PROCESS_BAM_PREVIOUS_THROTTLED: 0

CONTEXT:
(.ecxr)
rax=0000000000000000 rbx=000000006c8eda00 rcx=00000000041072a0
rdx=000000004a49f3e0 rsi=00000000beae3a78 rdi=000000000000001f
rip=00007ffe4daed339 rsp=000000004a49f3a0 rbp=000000004a49f409
r8=0000000000000014 r9=0000000000000013 r10=00007ffe4dd13200
r11=000000006c8eda60 r12=000000014492b300 r13=00000000460fac3c
r14=00000000041072a0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
sdk_legacy_steering_wheel_x64+0xed339:
00007ffe`4daed339 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????
Resetting default scope

EXCEPTION_RECORD:
(.exr -1)
ExceptionAddress: 00007ffe4daed339 (sdk_legacy_steering_wheel_x64+0x00000000000ed339)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

PROCESS_NAME: NeedForSpeedHeat.exe

READ_ADDRESS: 0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000000

STACK_TEXT:
00000000`4a49f3a0 00000000`00000002 : 00000000`041072a0 00000000`00000000 00000000`04107290 00000000`6c8eda60 : sdk_legacy_steering_wheel_x64+0xed339
00000000`4a49f3a8 00000000`041072a0 : 00000000`00000000 00000000`04107290 00000000`6c8eda60 00000000`00000014 : 0x2
00000000`4a49f3b0 00000000`00000000 : 00000000`04107290 00000000`6c8eda60 00000000`00000014 00000000`6c8eda60 : 0x41072a0


SYMBOL_NAME: sdk_legacy_steering_wheel_x64+ed339

MODULE_NAME:
sdk_legacy_steering_wheel_x64

IMAGE_NAME: sdk_legacy_steering_wheel_x64.dll

STACK_COMMAND: ~17s ; .ecxr ; kb

FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_sdk_legacy_steering_wheel_x64.dll!Unknown

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

IMAGE_VERSION: 2020.6.58918.0

FAILURE_ID_HASH: {315b66a5-7cab-545a-28e0-15184ae3de6d}

Followup: MachineOwner
---------

0:017> lmvm sdk_legacy_steering_wheel_x64
Browse full module list
start end module name
00007ffe`4da00000 00007ffe`4de80000
sdk_legacy_steering_wheel_x64 T (no symbols)
Loaded symbol image file: sdk_legacy_steering_wheel_x64.dll
Image path: C:\Program Files\LGHUB\sdk_legacy_steering_wheel_x64.dll
Image name: sdk_legacy_steering_wheel_x64.dll
Browse all global symbols functions data
Timestamp: Wed Aug 5 10:17:50 2020 (5F2A39F6)
CheckSum: 0047B127
ImageSize: 00480000
File version: 2020.6.58918.0
Product version: 2020.6.58918.0
File flags: 0 (Mask 3F)
File OS: 4 Unknown Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:



Memory Dump analyze:



Loading Dump File [E:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`36800000 PsLoadedModuleList = 0xfffff802`3742a2f0
Debug session time: Wed Aug 19 00:32:32.356 2020 (UTC + 5:30)
System Uptime: 0 days 0:14:58.984
Loading Kernel Symbols
...............................................................
...Page 401dc4 not present in the dump file. Type ".hh dbgerr004" for details
.............................................................
................................................................
................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00378018). Type ".hh dbgerr001" for details
Loading unloaded module list
..........
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff802`36bddf40 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff802`3a879c90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802374fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2343

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SOI9BNE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 11604

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff802374fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8023a8726e0 --
(.trap 0xfffff8023a8726e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd78c4edf9e02
rdx=fffff8023a872a02 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80236b0e2bb rsp=fffff8023a872870 rbp=fffff8023a872a00
r8=fffff80247b30640 r9=fffff8023a872a50 r10=fffff80247b30640
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KzLowerIrql+0x1b:
fffff802`36b0e2bb 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: NeedForSpeedHeat.exe

DPC_STACK_BASE: FFFFF8023A872FB0

STACK_TEXT:
fffff802`3a879c88 fffff802`36c5963e : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`374fa320 : nt!KeBugCheckEx
fffff802`3a879c90 fffff802`36ace52d : 000002ff`31910e84 fffff802`320e4180 00000000`00000246 00000000`0000e0bf : nt!KeAccumulateTicks+0x18cbee
fffff802`3a879cf0 fffff802`36ac7c21 : 00000000`0000e0be 00000000`000085f5 fffff802`320e4180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff802`3a879d40 fffff802`36ac9abb : 00000000`00000000 fffff802`3a872700 fffff802`374318c0 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff802`3a879e80 fffff802`36ac6cf2 : fffff802`3a8726e0 fffff802`3a872760 fffff802`3a872760 00000000`00000000 : nt!KeClockInterruptNotify+0x2bb
fffff802`3a879f30 fffff802`36a08725 : 00000002`17f77c39 fffff802`374f38e0 fffff802`374f3990 ffffa1cf`b1e95924 : nt!HalpTimerClockInterrupt+0xe2
fffff802`3a879f60 fffff802`36bdf9ea : fffff802`3a872760 fffff802`374f38e0 fffff802`3a8729e0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`3a879fb0 fffff802`36bdff57 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`3a8726e0 fffff802`36b0e2bb : 00000000`000001f4 00000000`00000000 ffffd78c`55131010 ffffd78c`551dd000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`3a872870 fffff802`472bd1ef : fffff802`3a872a38 fffff802`3a872a00 ffffd78c`55131010 fffff802`3a8729e0 : nt!KzLowerIrql+0x1b
fffff802`3a8728a0 fffff802`472be995 : fffff802`3a872a30 00000000`00000000 ffff9b43`b3240404 ffffd78c`55131010 : nvlddmkm+0x11d1ef
fffff802`3a8728d0 fffff802`472afc55 : ffffd78c`551dd000 ffffd78c`55131010 000002ff`2a438a48 000002ff`2a4390e4 : nvlddmkm+0x11e995
fffff802`3a872900 fffff802`36a3a6be : fffff802`320e7240 ffffd78c`4d2da000 fffff802`3a872f10 fffff802`320e4180 : nvlddmkm+0x10fc55
fffff802`3a872bb0 fffff802`36a399a4 : fffff802`320e4180 00000000`00000000 00000000`00000029 00000000`0000742b : nt!KiExecuteAllDpcs+0x30e
fffff802`3a872d20 fffff802`36be4f85 : 00000000`00000000 fffff802`320e4180 ffffa701`3edff500 00000000`00000009 : nt!KiRetireDpcList+0x1f4
fffff802`3a872fb0 fffff802`36be4d70 : fffff802`36bda030 fffff802`36b160da 00000000`00000000 00000000`4a97fb20 : nt!KxRetireDpcList+0x5
fffff888`96805ac0 fffff802`36be4625 : 00000000`00000009 fffff802`36bdfab1 00000000`00000005 00000000`00000000 : nt!KiDispatchInterruptContinue
fffff888`96805af0 fffff802`36bdfab1 : 00000000`00000005 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffff888`96805b00 00000001`41229a10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`4a97fa28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`41229a10


SYMBOL_NAME: nvlddmkm+11d1ef

MODULE_NAME:
nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 11d1ef

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802374fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2031

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SOI9BNE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 4375

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff802374fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8023a8726e0 --
(.trap 0xfffff8023a8726e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd78c4edf9e02
rdx=fffff8023a872a02 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80236b0e2bb rsp=fffff8023a872870 rbp=fffff8023a872a00
r8=fffff80247b30640 r9=fffff8023a872a50 r10=fffff80247b30640
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KzLowerIrql+0x1b:
fffff802`36b0e2bb 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: NeedForSpeedHeat.exe

DPC_STACK_BASE: FFFFF8023A872FB0

STACK_TEXT:
fffff802`3a879c88 fffff802`36c5963e : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`374fa320 : nt!KeBugCheckEx
fffff802`3a879c90 fffff802`36ace52d : 000002ff`31910e84 fffff802`320e4180 00000000`00000246 00000000`0000e0bf : nt!KeAccumulateTicks+0x18cbee
fffff802`3a879cf0 fffff802`36ac7c21 : 00000000`0000e0be 00000000`000085f5 fffff802`320e4180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff802`3a879d40 fffff802`36ac9abb : 00000000`00000000 fffff802`3a872700 fffff802`374318c0 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff802`3a879e80 fffff802`36ac6cf2 : fffff802`3a8726e0 fffff802`3a872760 fffff802`3a872760 00000000`00000000 : nt!KeClockInterruptNotify+0x2bb
fffff802`3a879f30 fffff802`36a08725 : 00000002`17f77c39 fffff802`374f38e0 fffff802`374f3990 ffffa1cf`b1e95924 : nt!HalpTimerClockInterrupt+0xe2
fffff802`3a879f60 fffff802`36bdf9ea : fffff802`3a872760 fffff802`374f38e0 fffff802`3a8729e0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`3a879fb0 fffff802`36bdff57 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`3a8726e0 fffff802`36b0e2bb : 00000000`000001f4 00000000`00000000 ffffd78c`55131010 ffffd78c`551dd000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`3a872870 fffff802`472bd1ef : fffff802`3a872a38 fffff802`3a872a00 ffffd78c`55131010 fffff802`3a8729e0 : nt!KzLowerIrql+0x1b
fffff802`3a8728a0 fffff802`472be995 : fffff802`3a872a30 00000000`00000000 ffff9b43`b3240404 ffffd78c`55131010 : nvlddmkm+0x11d1ef
fffff802`3a8728d0 fffff802`472afc55 : ffffd78c`551dd000 ffffd78c`55131010 000002ff`2a438a48 000002ff`2a4390e4 : nvlddmkm+0x11e995
fffff802`3a872900 fffff802`36a3a6be : fffff802`320e7240 ffffd78c`4d2da000 fffff802`3a872f10 fffff802`320e4180 : nvlddmkm+0x10fc55
fffff802`3a872bb0 fffff802`36a399a4 : fffff802`320e4180 00000000`00000000 00000000`00000029 00000000`0000742b : nt!KiExecuteAllDpcs+0x30e
fffff802`3a872d20 fffff802`36be4f85 : 00000000`00000000 fffff802`320e4180 ffffa701`3edff500 00000000`00000009 : nt!KiRetireDpcList+0x1f4
fffff802`3a872fb0 fffff802`36be4d70 : fffff802`36bda030 fffff802`36b160da 00000000`00000000 00000000`4a97fb20 : nt!KxRetireDpcList+0x5
fffff888`96805ac0 fffff802`36be4625 : 00000000`00000009 fffff802`36bdfab1 00000000`00000005 00000000`00000000 : nt!KiDispatchInterruptContinue
fffff888`96805af0 fffff802`36bdfab1 : 00000000`00000005 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffff888`96805b00 00000001`41229a10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`4a97fa28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`41229a10


SYMBOL_NAME: nvlddmkm+11d1ef

MODULE_NAME:
nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 11d1ef

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner



MinDump Analyze

Loading Dump File [C:\Users\Jerry Jack\Desktop\081820-7578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`026b4000 PsLoadedModuleList = 0xfffff803`02afc0f0
Debug session time: Tue Aug 18 16:11:00.076 2020 (UTC + 5:30)
System Uptime: 0 days 0:01:59.802
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff803`028763c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb905`ff67c180=000000000000007e
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80303019cc5, The address that the exception occurred at
Arg3: ffffb905ff67d198, Exception Record Address
Arg4: ffffb905ff67c9e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 5093

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SOI9BNE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 16349

Key : Analysis.Memory.CommitPeak.Mb
Value: 79

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80303019cc5

BUGCHECK_P3: ffffb905ff67d198

BUGCHECK_P4: ffffb905ff67c9e0

EXCEPTION_RECORD: ffffb905ff67d198 --
(.exr 0xffffb905ff67d198)
ExceptionAddress: fffff80303019cc5 (nt!IovpValidateDeviceObject+0x0000000000000005)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000046dc232
Attempt to read from address 00000000046dc232

CONTEXT: ffffb905ff67c9e0 --
(.cxr 0xffffb905ff67c9e0)
rax=ffffe10f500ace10 rbx=ffffe10f500ace10 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffe10f3a09dc90
rip=fffff80303019cc5 rsp=ffffb905ff67d3d8 rbp=fffff803028337aa
r8=0000000000000000 r9=0000000000000000 r10=fffff8030307f840
r11=ffff827a03400000 r12=ffffe10f5a1c3000 r13=fffff80fd5114000
r14=0000000000000000 r15=0000000000400000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!IovpValidateDeviceObject+0x5:
fffff803`03019cc5 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
Resetting default scope

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff80302c273b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80302ade3b8: Unable to get Flags value from nt!KdVersionBlock
fffff80302ade3b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000046dc232

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 00000000046dc232

EXCEPTION_STR: 0xc0000005

LOCK_ADDRESS: fffff80302b168e0 -- (!locks fffff80302b168e0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff80302b168e0) Available
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff80302b168e0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

STACK_TEXT:
ffffb905`ff67d3d8 fffff803`03018f9e : ffffe10f`500ace10 ffffb905`ff67d3f8 ffffe10f`500acf70 ffffe10f`5639c150 : nt!IovpValidateDeviceObject+0x5
ffffb905`ff67d3e0 fffff803`03026af8 : ffffe10f`500ace10 00000000`00000000 ffffe10f`5af93c90 ffffe10f`3a09dc90 : nt!IovCallDriver+0x16a
ffffb905`ff67d420 fffff803`028337aa : 00000000`00000000 fffff803`03024a5c ffffe10f`00000000 ffffe10f`00000000 : nt!VerifierIofCallDriver+0x18
ffffb905`ff67d450 fffff803`030190a9 : ffffe10f`500ace10 ffffe10f`5af93c90 00000000`c00000bb 00000000`00000000 : nt!IopfCallDriver+0x56
ffffb905`ff67d490 fffff803`03026af8 : ffffe10f`500ace10 00000000`00000017 ffffe10f`433a7060 ffffe10f`42fa1880 : nt!IovCallDriver+0x275
ffffb905`ff67d4d0 fffff80f`d50f3939 : fffff803`03a66010 00000000`00000000 00000000`00000000 00000000`00000000 : nt!VerifierIofCallDriver+0x18
ffffb905`ff67d500 fffff80f`d5103d81 : 00000000`00000000 ffffe10f`433a71d0 ffffe10f`500ace10 00000000`00000000 : HIDCLASS!HidpCallDriver+0xb9
ffffb905`ff67d570 fffff80f`d5120f1d : ffffe10f`433a71b0 00000000`00050286 ffffb905`ff67d5f8 00000000`00000018 : HIDCLASS!HidpIrpMajorDefault+0x129
ffffb905`ff67d5d0 fffff80f`d50f269b : ffffe10f`00000002 ffffe10f`433a71b0 ffffe10f`5639c1c8 00000000`00000017 : HIDCLASS!HidpIrpMajorSystemControl+0x5e5
ffffb905`ff67d600 fffff803`028337aa : 00000000`00000000 ffffe10f`500ace10 ffffe10f`433a7060 ffffe10f`00000001 : HIDCLASS!HidpMajorHandler+0x26b
ffffb905`ff67d690 fffff803`030190a9 : ffffe10f`500ace10 ffffe10f`433a7060 00000000`00000000 fffff803`03024f69 : nt!IopfCallDriver+0x56
ffffb905`ff67d6d0 fffff803`028d2b75 : ffffe10f`500ace10 ffffe10f`433a7060 00000000`00000000 ffffe10f`329c33e0 : nt!IovCallDriver+0x275
ffffb905`ff67d710 fffff803`03024ec5 : ffffe10f`5af93c90 00000000`00000000 ffffb905`00000002 00000000`000000c0 : nt!IofCallDriver+0x184cf5
ffffb905`ff67d750 fffff803`0303687a : ffffe10f`5af93c90 ffffb905`ff67d939 00000000`00000001 ffffe10f`5af93c90 : nt!VfIrpSendSynchronousIrp+0x115
ffffb905`ff67d7c0 fffff803`0302b234 : 00000000`00000000 ffffb905`ff67d939 00000000`00000001 ffffe10f`5af93c90 : nt!VfWmiTestStartedPdoStack+0x5a
ffffb905`ff67d860 fffff803`0280f6eb : 00000000`00000000 ffffb905`ff67d939 00000000`00000001 ffffe10f`11753c40 : nt!VfMajorTestStartedPdoStack+0x58
ffffb905`ff67d890 fffff803`02dbcf17 : 00000000`00000000 ffffb905`ff67d939 00000000`00000001 ffffb905`ff67d939 : nt!PpvUtilTestStartedPdoStack+0x17
ffffb905`ff67d8c0 fffff803`02db6b7d : ffffe10f`5634dc40 ffffb905`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xbf
ffffb905`ff67d9a0 fffff803`02dd3fdc : ffffe10f`33c3c900 fffff803`02755b01 ffffb905`ff67dab0 fffff803`00000002 : nt!PipProcessDevNodeTree+0x375
ffffb905`ff67da60 fffff803`02810747 : 00000001`00000003 ffffe10f`11ae5bd0 ffffe10f`33c3c9d0 ffffe10f`33c3c9d0 : nt!PiProcessReenumeration+0x88
ffffb905`ff67dab0 fffff803`02737965 : ffffe10f`5a01c040 ffffe10f`11686cd0 fffff803`02b151a0 ffffe10f`11686cd0 : nt!PnpDeviceActionWorker+0x207
ffffb905`ff67db70 fffff803`027d2155 : ffffe10f`5a01c040 00000000`00000080 ffffe10f`11691300 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffb905`ff67dc10 fffff803`0287d9c8 : ffff9281`1e879180 ffffe10f`5a01c040 fffff803`027d2100 55555555`55555555 : nt!PspSystemThreadStartup+0x55
ffffb905`ff67dc60 00000000`00000000 : ffffb905`ff67e000 ffffb905`ff678000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: HIDCLASS!HidpCallDriver+b9

MODULE_NAME:
HIDCLASS

IMAGE_NAME: HIDCLASS.SYS

IMAGE_VERSION: 10.0.18362.175

STACK_COMMAND: .cxr 0xffffb905ff67c9e0 ; kb

BUCKET_ID_FUNC_OFFSET: b9

FAILURE_BUCKET_ID: AV_VRF_HIDCLASS!HidpCallDriver

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}

Followup: MachineOwner
---------

15: kd> lmvm HIDCLASS
Browse full module list
start end module name
fffff80f`d50f0000 fffff80f`d512b000
HIDCLASS (pdb symbols) C:\ProgramData\Dbg\sym\hidclass.pdb\531804ABD6B8D5A93CC8BAF11E47940E1\hidclass.pdb
Loaded symbol image file: HIDCLASS.SYS
Mapped memory image file: C:\ProgramData\Dbg\sym\HIDCLASS.SYS\D4D0DEE63b000\HIDCLASS.SYS
Image path: \SystemRoot\System32\drivers\HIDCLASS.SYS
Image name: HIDCLASS.SYS
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: D4D0DEE6 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000369B1
ImageSize: 0003B000
File version: 10.0.18362.175
Product version: 10.0.18362.175
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: hidclass.sys
OriginalFilename: hidclass.sys
ProductVersion: 10.0.18362.175
FileVersion: 10.0.18362.175 (WinBuild.160101.0800)
FileDescription: Hid Class Library
LegalCopyright: © Microsoft Corporation. All rights reserved.


Continue reading...
 
Back
Top