Hi all,
For the past week or so I've had some BSODs. The issue points to the nvlddmkm process. So far, I've:
Reinstalled the NVIDIA driver
manually uninstalled the NVIDIA driver, restarted, then installed an older NVIDIA driver from Dec 2021
run RAM checker (no issues)
verified the windows image (no issues)
The issue continues and occurs at random moments. I'm half expecting it to fail right now. Here's the crash report. I'd be grateful for any advice.
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\090922-10468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`7b600000 PsLoadedModuleList = 0xfffff801`7c22a250
Debug session time: Fri Sep 9 17:11:49.129 2022 (UTC - 4:00)
System Uptime: 0 days 4:26:17.756
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`7b9f88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff801`7960d480=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8017c2fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7183
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 2200
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Bugcheck.Code.DumpHeader
Value: 0x133
Key : Bugcheck.Code.Register
Value: 0x133
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 090922-10468-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8017c2fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8017960d7f0 -- (.trap 0xfffff8017960d7f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa50d8c0cf7e0 rbx=0000000000000000 rcx=ffffa50d86c17000
rdx=ffffa50d8c0cf7e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031c4a4150 rsp=fffff8017960d988 rbp=0000000000000000
r8=0000000000000018 r9=fffff8017960db20 r10=0000000000000003
r11=000000000000000c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x14150:
fffff803`1c4a4150 b801000000 mov eax,1
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
fffff801`7960d478 fffff801`7ba2a998 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`7c2fb320 : nt!KeBugCheckEx
fffff801`7960d480 fffff801`7b850fed : 000003ab`650231f8 fffff801`77df7180 00000000`00200246 00000000`000f9a70 : nt!KeAccumulateTicks+0x1dcbc8
fffff801`7960d4e0 fffff801`7b851591 : 00000000`00000003 00000000`00094cdf fffff801`77df7180 00000000`00001001 : nt!KiUpdateRunTime+0x5d
fffff801`7960d530 fffff801`7b84b403 : fffff801`77df7180 00000000`00000000 fffff801`7c231818 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff801`7960d670 fffff801`7b853e02 : fffff801`7960d7f0 fffff801`7960d870 fffff801`7960d800 00000000`00000005 : nt!KeClockInterruptNotify+0x2e3
fffff801`7960d720 fffff801`7b8d9405 : 00000025`33d1bad4 fffff801`7c2f3a20 fffff801`7c2f3ad0 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
fffff801`7960d750 fffff801`7b9fa36a : fffff801`7960d870 fffff801`7c2f3a20 fffff801`7960db20 fffff803`1c532bf5 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`7960d7a0 fffff801`7b9fa8d7 : 00000000`00b81010 fffff803`1c518763 00000000`00611c30 fffff803`1c5b076b : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff801`7960d7f0 fffff803`1c4a4150 : fffff803`1c84b6a0 ffffa50d`86c17000 fffff803`1c51971f fffff801`7960db20 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff801`7960d988 fffff803`1c84b6a0 : ffffa50d`86c17000 fffff803`1c51971f fffff801`7960db20 fffff803`1c8289c0 : nvlddmkm+0x14150
fffff801`7960d990 ffffa50d`86c17000 : fffff803`1c51971f fffff801`7960db20 fffff803`1c8289c0 fffff801`7960db20 : nvlddmkm+0x3bb6a0
fffff801`7960d998 fffff803`1c51971f : fffff801`7960db20 fffff803`1c8289c0 fffff801`7960db20 fffff803`1c52d170 : 0xffffa50d`86c17000
fffff801`7960d9a0 fffff801`7960db20 : fffff803`1c8289c0 fffff801`7960db20 fffff803`1c52d170 ffffa50d`86c17000 : nvlddmkm+0x8971f
fffff801`7960d9a8 fffff803`1c8289c0 : fffff801`7960db20 fffff803`1c52d170 ffffa50d`86c17000 ffffa50d`8be52010 : 0xfffff801`7960db20
fffff801`7960d9b0 fffff801`7960db20 : fffff803`1c52d170 ffffa50d`86c17000 ffffa50d`8be52010 ffffa50d`8be52010 : nvlddmkm+0x3989c0
fffff801`7960d9b8 fffff803`1c52d170 : ffffa50d`86c17000 ffffa50d`8be52010 ffffa50d`8be52010 ffffa50d`8ba4b000 : 0xfffff801`7960db20
fffff801`7960d9c0 ffffa50d`86c17000 : ffffa50d`8be52010 ffffa50d`8be52010 ffffa50d`8ba4b000 fffff801`7960db20 : nvlddmkm+0x9d170
fffff801`7960d9c8 ffffa50d`8be52010 : ffffa50d`8be52010 ffffa50d`8ba4b000 fffff801`7960db20 fffff801`7960dae3 : 0xffffa50d`86c17000
fffff801`7960d9d0 ffffa50d`8be52010 : ffffa50d`8ba4b000 fffff801`7960db20 fffff801`7960dae3 ffffa50d`8c0cf7e0 : 0xffffa50d`8be52010
fffff801`7960d9d8 ffffa50d`8ba4b000 : fffff801`7960db20 fffff801`7960dae3 ffffa50d`8c0cf7e0 ffffa50d`8b06f060 : 0xffffa50d`8be52010
fffff801`7960d9e0 fffff801`7960db20 : fffff801`7960dae3 ffffa50d`8c0cf7e0 ffffa50d`8b06f060 000003ab`65005100 : 0xffffa50d`8ba4b000
fffff801`7960d9e8 fffff801`7960dae3 : ffffa50d`8c0cf7e0 ffffa50d`8b06f060 000003ab`65005100 ffffa50d`86c17000 : 0xfffff801`7960db20
fffff801`7960d9f0 ffffa50d`8c0cf7e0 : ffffa50d`8b06f060 000003ab`65005100 ffffa50d`86c17000 ffffa50d`8be52010 : 0xfffff801`7960dae3
fffff801`7960d9f8 ffffa50d`8b06f060 : 000003ab`65005100 ffffa50d`86c17000 ffffa50d`8be52010 fffff801`7960db20 : 0xffffa50d`8c0cf7e0
fffff801`7960da00 000003ab`65005100 : ffffa50d`86c17000 ffffa50d`8be52010 fffff801`7960db20 00000000`00000050 : 0xffffa50d`8b06f060
fffff801`7960da08 ffffa50d`86c17000 : ffffa50d`8be52010 fffff801`7960db20 00000000`00000050 fffff803`1c5162b2 : 0x000003ab`65005100
fffff801`7960da10 ffffa50d`8be52010 : fffff801`7960db20 00000000`00000050 fffff803`1c5162b2 fffff801`7960db20 : 0xffffa50d`86c17000
fffff801`7960da18 fffff801`7960db20 : 00000000`00000050 fffff803`1c5162b2 fffff801`7960db20 ffffa50d`8c0cf7e0 : 0xffffa50d`8be52010
fffff801`7960da20 00000000`00000050 : fffff803`1c5162b2 fffff801`7960db20 ffffa50d`8c0cf7e0 00000000`00000000 : 0xfffff801`7960db20
fffff801`7960da28 fffff803`1c5162b2 : fffff801`7960db20 ffffa50d`8c0cf7e0 00000000`00000000 fffff801`7960db20 : 0x50
fffff801`7960da30 fffff801`7960db20 : ffffa50d`8c0cf7e0 00000000`00000000 fffff801`7960db20 00000000`00000000 : nvlddmkm+0x862b2
fffff801`7960da38 ffffa50d`8c0cf7e0 : 00000000`00000000 fffff801`7960db20 00000000`00000000 00000000`00000000 : 0xfffff801`7960db20
fffff801`7960da40 00000000`00000000 : fffff801`7960db20 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffa50d`8c0cf7e0
SYMBOL_NAME: nvlddmkm+14150
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 14150
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
0: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff803`1c490000 fffff803`1e90b000 nvlddmkm T (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispsi.inf_amd64_db8d3f1ff9f89487\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Mon Dec 6 18:30:13 2021 (61AE9D05)
CheckSum: 023D47E2
ImageSize: 0247B000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: