R
R4ndomPerson
Hi, my computer encountered a bsod and i ran windbg and it apparently says steam.exe is causing the bsod. Am i interpreting it correctly? And if so how can i remedy it?
Specs:
Rog strix b350-F with ryzen 5 3500x
Gtx 1060 6gb
2x8 gb 3000mhz
I've ran chkdsk, sfc /scannow and memtest on my computer too
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8026ad02320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3061
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12506
Key : Analysis.Init.CPU.mSec
Value: 968
Key : Analysis.Init.Elapsed.mSec
Value: 211299
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8026ad02320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffd58db73c5f50 -- (.trap 0xffffd58db73c5f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8026ad04c80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026a2627c5 rsp=ffffd58db73c60e0 rbp=ffffc4812b3e0180
r8=000000000008bc7c r9=ffffd58db73c6470 r10=0000000000000000
r11=00000000000000ce r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x2b5:
fffff802`6a2627c5 0f82a4010000 jb nt!KeQueryValuesThread+0x45f (fffff802`6a26296f) [br=0]
Resetting default scope
PROCESS_NAME: steam.exe
STACK_TEXT:
ffffc481`2b13fc88 fffff802`6a441c52 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`6ad02320 : nt!KeBugCheckEx
ffffc481`2b13fc90 fffff802`6a27c41d : 00001e26`0d9d571d ffffc481`2afea180 00000000`00000246 00000000`0008fe9b : nt!KeAccumulateTicks+0x1c8a52
ffffc481`2b13fcf0 fffff802`6a27c9c1 : 00000000`0008e000 00000000`00055c75 ffffc481`2afea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffffc481`2b13fd40 fffff802`6a276833 : ffffc481`2afea180 00000000`00000000 fffff802`6ac38a28 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffffc481`2b13fe80 fffff802`6a27f1f2 : ffffd58d`b73c5f50 ffffd58d`b73c5fd0 ffffd58d`b73c5f00 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffffc481`2b13ff30 fffff802`6a32ef55 : 00000015`71f902d9 ffffa18e`7dd03200 ffffa18e`7dd032b0 ffff8c94`d3c049d4 : nt!HalpTimerClockInterrupt+0xe2
ffffc481`2b13ff60 fffff802`6a3fe6fa : ffffd58d`b73c5fd0 ffffa18e`7dd03200 00000000`0000096e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffc481`2b13ffb0 fffff802`6a3fec67 : ffffa18e`89555080 fffff802`6a0d0000 fffff802`6a007000 00067af4`01046000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd58d`b73c5f50 fffff802`6a2627c5 : 00000000`00000000 021000c0`6a9e1df6 ffffa18e`00000000 ffffa18e`8403d7a0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd58d`b73c60e0 fffff802`6a61d8d1 : ffffa18e`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x2b5
ffffd58d`b73c6160 fffff802`6a61d562 : ffffa18e`a2370660 ffffa18e`a23708e0 ffffa18e`a741b080 00000000`00000001 : nt!PsQueryStatisticsProcess+0x111
ffffd58d`b73c61e0 fffff802`6a631271 : 00000000`00000001 ffffa18e`a2370080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
ffffd58d`b73c6260 fffff802`6a5eda76 : 00000a00`00000000 00000000`00045fc8 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
ffffd58d`b73c68c0 fffff802`6a5ecc17 : 00000000`00000010 fffff802`6a5ecbe0 00000000`00000010 00000000`00050213 : nt!ExpQuerySystemInformation+0xd16
ffffd58d`b73c6ac0 fffff802`6a40e5b8 : 00000000`7ffe0000 00000000`00000000 ffffd58d`b73c6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
ffffd58d`b73c6b00 00007ffd`4f7cd2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`08efdeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4f7cd2d4
SYMBOL_NAME: nt!KeAccumulateTicks+1c8a52
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c8a52
FAILURE_BUCKET_ID: 0x133_VRF_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {97c10473-e1fe-86be-098e-36b30a3d924f}
Followup: MachineOwner
Thanks for your help!
Continue reading...
Specs:
Rog strix b350-F with ryzen 5 3500x
Gtx 1060 6gb
2x8 gb 3000mhz
I've ran chkdsk, sfc /scannow and memtest on my computer too
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8026ad02320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3061
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12506
Key : Analysis.Init.CPU.mSec
Value: 968
Key : Analysis.Init.Elapsed.mSec
Value: 211299
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8026ad02320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffd58db73c5f50 -- (.trap 0xffffd58db73c5f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8026ad04c80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026a2627c5 rsp=ffffd58db73c60e0 rbp=ffffc4812b3e0180
r8=000000000008bc7c r9=ffffd58db73c6470 r10=0000000000000000
r11=00000000000000ce r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x2b5:
fffff802`6a2627c5 0f82a4010000 jb nt!KeQueryValuesThread+0x45f (fffff802`6a26296f) [br=0]
Resetting default scope
PROCESS_NAME: steam.exe
STACK_TEXT:
ffffc481`2b13fc88 fffff802`6a441c52 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`6ad02320 : nt!KeBugCheckEx
ffffc481`2b13fc90 fffff802`6a27c41d : 00001e26`0d9d571d ffffc481`2afea180 00000000`00000246 00000000`0008fe9b : nt!KeAccumulateTicks+0x1c8a52
ffffc481`2b13fcf0 fffff802`6a27c9c1 : 00000000`0008e000 00000000`00055c75 ffffc481`2afea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffffc481`2b13fd40 fffff802`6a276833 : ffffc481`2afea180 00000000`00000000 fffff802`6ac38a28 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffffc481`2b13fe80 fffff802`6a27f1f2 : ffffd58d`b73c5f50 ffffd58d`b73c5fd0 ffffd58d`b73c5f00 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffffc481`2b13ff30 fffff802`6a32ef55 : 00000015`71f902d9 ffffa18e`7dd03200 ffffa18e`7dd032b0 ffff8c94`d3c049d4 : nt!HalpTimerClockInterrupt+0xe2
ffffc481`2b13ff60 fffff802`6a3fe6fa : ffffd58d`b73c5fd0 ffffa18e`7dd03200 00000000`0000096e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffc481`2b13ffb0 fffff802`6a3fec67 : ffffa18e`89555080 fffff802`6a0d0000 fffff802`6a007000 00067af4`01046000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd58d`b73c5f50 fffff802`6a2627c5 : 00000000`00000000 021000c0`6a9e1df6 ffffa18e`00000000 ffffa18e`8403d7a0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd58d`b73c60e0 fffff802`6a61d8d1 : ffffa18e`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x2b5
ffffd58d`b73c6160 fffff802`6a61d562 : ffffa18e`a2370660 ffffa18e`a23708e0 ffffa18e`a741b080 00000000`00000001 : nt!PsQueryStatisticsProcess+0x111
ffffd58d`b73c61e0 fffff802`6a631271 : 00000000`00000001 ffffa18e`a2370080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
ffffd58d`b73c6260 fffff802`6a5eda76 : 00000a00`00000000 00000000`00045fc8 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
ffffd58d`b73c68c0 fffff802`6a5ecc17 : 00000000`00000010 fffff802`6a5ecbe0 00000000`00000010 00000000`00050213 : nt!ExpQuerySystemInformation+0xd16
ffffd58d`b73c6ac0 fffff802`6a40e5b8 : 00000000`7ffe0000 00000000`00000000 ffffd58d`b73c6b18 ffffffff`ff676980 : nt!NtQuerySystemInformation+0x37
ffffd58d`b73c6b00 00007ffd`4f7cd2d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`08efdeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4f7cd2d4
SYMBOL_NAME: nt!KeAccumulateTicks+1c8a52
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c8a52
FAILURE_BUCKET_ID: 0x133_VRF_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {97c10473-e1fe-86be-098e-36b30a3d924f}
Followup: MachineOwner
Thanks for your help!
Continue reading...