VMware Communities
YUAN_RUI
Contributor
Contributor

VMware Workstation 16.1.0 build-17198959 Unscheduled blue screen on AMD 3990X CPU

The minidump is already in the attachment.

 

41: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80da9534810, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80da9534810, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on NUMBER201724

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 16

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff80da9534810

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff80da9534810

READ_ADDRESS: fffff800172fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8001720f330: Unable to get Flags value from nt!KdVersionBlock
fffff8001720f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff80da9534810 

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  vmware-vmx.exe

DPC_STACK_BASE:  FFFFFB8C83E61FB0

TRAP_FRAME:  fffffb8c83e61850 -- (.trap 0xfffffb8c83e61850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80da9534810 rbx=0000000000000000 rcx=ffffa3035bbadcd0
rdx=0000000000000064 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80da9534810 rsp=fffffb8c83e619e8 rbp=fffffb8c83e61aa9
 r8=0000000000000013  r9=0000000000000064 r10=0000fffff80da953
r11=ffffb6faa5a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
fffff80d`a9534810 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS: 
+0
fffff80d`a9534810 ??              ???

STACK_TEXT:  
fffffb8c`83e61708 fffff800`16a07769 : 00000000`0000000a fffff80d`a9534810 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffffb8c`83e61710 fffff800`16a03a69 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff80d`c6532d6d : nt!KiBugCheckDispatch+0x69
fffffb8c`83e61850 fffff80d`a9534810 : fffff800`168e86c8 ffffa303`3e78e2ce fffff800`168e741e ffffa303`3e78e240 : nt!KiPageFault+0x469
fffffb8c`83e619e8 fffff800`168e86c8 : ffffa303`3e78e2ce fffff800`168e741e ffffa303`3e78e240 00000000`00000000 : 0xfffff80d`a9534810
fffffb8c`83e619f0 fffff800`168e843e : 00007397`474e9800 00000000`00000000 fffff800`172fb4e0 ffffa303`5bc2a010 : nt!PpmPerfSelectProcessorState+0x258
fffffb8c`83e61b10 fffff800`16878610 : ffffc701`98d43240 fffffb8c`83e61e80 fffffb8c`83e61cb0 fffffb8c`83e61e80 : nt!PpmPerfSelectProcessorStates+0x5e
fffffb8c`83e61b40 fffff800`1680781e : ffffc701`98d43240 ffffa303`367e1000 fffffb8c`83e61e80 ffffc701`00000002 : nt!PpmCheckRun+0x40
fffffb8c`83e61bb0 fffff800`16806b04 : ffffc701`98d40180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x30e
fffffb8c`83e61d20 fffff800`169fc7c5 : 00000000`00000000 ffffc701`98d40180 00000000`00000000 ffffc701`9df07000 : nt!KiRetireDpcList+0x1f4
fffffb8c`83e61fb0 fffff800`169fc5b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffffb8c`877412c0 fffff800`169fbc7e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
fffffb8c`877412f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

 

Reply
0 Kudos
0 Replies