Hi, this is my first time to post a question so please let me know if there is a format that I need to follow or information I need to add.
As the title says, I am experiencing annoying BSOD everytime I play videos in YT or playing games(low graphics games). I tried to research and used WinDbg to read the minidump. Can you please help me? This drives me crazy.
Let me know if I need to provide my PC specs
******************************************************************************** *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffd000206f8242, 2, 0, fffff800552a6028}
Probably caused by : win32k.sys ( win32k!EnterCritAvoidingDitHitTestHazard+13 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd000206f8242, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800552a6028, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: fffff800554b3340: Unable to get special pool info
fffff800554b3340: Unable to get special pool info
GetUlongFromAddress: unable to read from fffff8005554e208
ffffd000206f8242
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSearchForNewThread+178
fffff800`552a6028 f6410204 test byte ptr [rcx+2],4
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffd00023eda5a0 -- (.trap 0xffffd00023eda5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffd000206f8240
rdx=fffff800554a0100 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800552a6028 rsp=ffffd00023eda730 rbp=ffffd00023eda780
r8=0000000000007a5d r9=0000000000000091 r10=fffff80055201000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiSearchForNewThread+0x178:
fffff800`552a6028 f6410204 test byte ptr [rcx+2],4 ds:ffffd000`206f8242=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8005535a7e9 to fffff8005534eca0
STACK_TEXT:
ffffd000`23eda458 fffff800`5535a7e9 : 00000000`0000000a ffffd000`206f8242 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`23eda460 fffff800`5535903a : 00000000`00000000 ffffd000`206ac180 ffffe000`0569c000 ffffd000`23eda5a0 : nt!KiBugCheckDispatch+0x69
ffffd000`23eda5a0 fffff800`552a6028 : 00000001`00000005 ffffe000`000000fe ffffcbc0`b244ee65 001f0003`00000000 : nt!KiPageFault+0x23a
ffffd000`23eda730 fffff800`552a5892 : ffffd000`206ac180 ffffe000`04e09340 fffff800`fffffffe 00000000`fffffffe : nt!KiSearchForNewThread+0x178
ffffd000`23eda7c0 fffff800`552a53a7 : ffffe000`04e09340 ffffe000`014ce3f0 ffffd000`201e0180 00000000`00000000 : nt!KiSwapThread+0xd2
ffffd000`23eda860 fffff800`552a2af2 : ffffe000`02fe6b60 00000000`00000001 00000000`00000091 00000000`00000000 : nt!KiCommitThreadWait+0x127
ffffd000`23eda8c0 fffff800`5527399d : ffffe000`0277ec30 ffffe000`027859f0 00000000`7759c000 00000000`00000002 : nt!ExpWaitForResource+0x282
ffffd000`23eda980 fffff960`001b9443 : ffffe000`04e09302 ffffe000`04e09340 ffffd000`23edab00 00000000`7759c000 : nt!ExEnterPriorityRegionAndAcquireResourceExclusive+0x1ad
ffffd000`23edaa10 fffff960`000f3a89 : 00000000`0000002e 00000000`0000000a 00000000`00b90894 fffff800`55353e45 : win32k!EnterCritAvoidingDitHitTestHazard+0x13
ffffd000`23edaa50 fffff800`5535a4b3 : ffffe000`04e09340 00000000`000012f4 00000000`7759a130 00000000`00cfee20 : win32k!NtUserCallNoParam+0x11
ffffd000`23edaa80 00000000`775a5a1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00bfdeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775a5a1a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!EnterCritAvoidingDitHitTestHazard+13
fffff960`001b9443 488bd8 mov rbx,rax
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: win32k!EnterCritAvoidingDitHitTestHazard+13
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 52f9930a
BUCKET_ID_FUNC_OFFSET: 13
FAILURE_BUCKET_ID: AV_win32k!EnterCritAvoidingDitHitTestHazard
BUCKET_ID: AV_win32k!EnterCritAvoidingDitHitTestHazard
Followup: MachineOwner
---------