Windows 10 PC issues restart/freeze sound on but keyboard and monitor frozen

GuyPink

New Member
Joined
Dec 18, 2022
Hi ive been having issues with my pc randomly crashing when either waking it up or in a middle of the game after playing for like 1 hour my screen just freezes and all i hear is the ingame sounds then after a while my pc restarts ive logged one of the crash dumps and i cant figure out the issue ive got an rtx 2060 and a ryzen 3600 and 32gb of ram all updated and not overclocked



Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7981

Key : Analysis.IO.Other.Mb
Value: 15

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 20

Key : Analysis.Init.CPU.mSec
Value: 1312

Key : Analysis.Init.Elapsed.mSec
Value: 28872

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

0: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff804`22610000 fffff804`25e60000 nvlddmkm (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Tue Dec 6 01:36:52 2022 (638E8EA4)
CheckSum: 0375FB81
ImageSize: 03850000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
 
Hi ive been having issues with my pc randomly crashing when either waking it up or in a middle of the game after playing for like 1 hour my screen just freezes and all i hear is the ingame sounds then after a while my pc restarts ive logged one of the crash dumps and i cant figure out the issue ive got an rtx 2060 and a ryzen 3600 and 32gb of ram all updated and not overclocked



Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7981

Key : Analysis.IO.Other.Mb
Value: 15

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 20

Key : Analysis.Init.CPU.mSec
Value: 1312

Key : Analysis.Init.Elapsed.mSec
Value: 28872

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

0: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff804`22610000 fffff804`25e60000 nvlddmkm (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Tue Dec 6 01:36:52 2022 (638E8EA4)
CheckSum: 0375FB81
ImageSize: 03850000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Also This
DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3187

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7981

Key : Analysis.IO.Other.Mb
Value: 15

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 20

Key : Analysis.Init.CPU.mSec
Value: 1312

Key : Analysis.Init.Elapsed.mSec
Value: 28872

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

0: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff804`22610000 fffff804`25e60000 nvlddmkm (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nvmdig.inf_amd64_d3941bdb145580aa\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Tue Dec 6 01:36:52 2022 (638E8EA4)
CheckSum: 0375FB81
ImageSize: 03850000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols

Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3343

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 4420

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 1187

Key : Analysis.Init.Elapsed.mSec
Value: 11690

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.KiBugCheckData
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: MEMORY.DMP

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : nvlddmkm+0x91cca
fffff804`0cef0560 fffff804`226ab1a4 : ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 ffffc101`d926b000 : nvlddmkm+0xbf361
fffff804`0cef0590 fffff804`0aa348fe : fffff804`04990240 ffffc101`d0c31000 fffff804`0cef0ba0 fffff804`0498d180 : nvlddmkm+0x9b1a4
fffff804`0cef0860 fffff804`0aa33be4 : 00000000`00000000 fffff804`0aa7e855 00000000`0000002a 00000000`000694e8 : nt!KiExecuteAllDpcs+0x30e
fffff804`0cef09d0 fffff804`0abfdb9e : 00000000`00000000 fffff804`0498d180 fffff804`0b527a00 ffffc101`e5fec080 : nt!KiRetireDpcList+0x1f4
fffff804`0cef0c60 00000000`00000000 : fffff804`0cef1000 fffff804`0ceeb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\121922-24812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0a800000 PsLoadedModuleList = 0xfffff804`0b42a290
Debug session time: Mon Dec 19 03:19:27.853 2022 (UTC + 1:00)
System Uptime: 0 days 3:10:27.640
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0abf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`0cefec90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040b4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4077

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 48812

Key : Analysis.IO.Other.Mb
Value: 6

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 8

Key : Analysis.Init.CPU.mSec
Value: 359

Key : Analysis.Init.Elapsed.mSec
Value: 3933

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 121922-24812-01.dmp

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040b4fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff8040cef03a0 -- (.trap 0xfffff8040cef03a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000068
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804226a1cca rsp=fffff8040cef0530 rbp=fffff8040cef0690
r8=00000000000000a8 r9=000000000000000b r10=fffff8040cef05c0
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x91cca:
fffff804`226a1cca f3aa rep stos byte ptr [rdi]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff804`0cefec88 fffff804`0ac5be7a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`0b4fb320 : nt!KeBugCheckEx
fffff804`0cefec90 fffff804`0aad844d : 00002bb4`e59fa780 fffff804`0498d180 00000000`00000246 00000000`000b28e9 : nt!KeAccumulateTicks+0x186c4a
fffff804`0cefecf0 fffff804`0aad89f1 : 00000000`00000000 00000000`0006a6d9 fffff804`0498d180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff804`0cefed40 fffff804`0aad2863 : fffff804`0498d180 00000000`00000000 fffff804`0b431810 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff804`0cefee80 fffff804`0aadb222 : fffff804`0cef03a0 fffff804`0cef0420 fffff804`0cef0400 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff804`0cefef30 fffff804`0aa08aa5 : 0000001a`9b6ab02c fffff804`0b4f3a20 fffff804`0b4f3ad0 ffffb79f`61e30fa4 : nt!HalpTimerClockInterrupt+0xe2
fffff804`0cefef60 fffff804`0abfb23a : fffff804`0cef0420 fffff804`0b4f3a20 fffff804`0cef0690 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`0cefefb0 fffff804`0abfba07 : 00000000`00000000 ffffc101`d4290e02 fffff804`0cef06e0 fffff804`0abfba14 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`0cef03a0 fffff804`226a1cca : fffff804`0cef06e8 fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`0cef0530 fffff804`0cef06e8 : fffff804`0cef0690 ffffc101`d926b000 fffff804`0cef0690 ffffc101`d90e1000 : nvlddmkm+0x91cca
fffff804`0cef0538 fffff804`0cef0690 : ffffc101`d926b000 fffff804`0cef0690 ffffc101`d90e1000 fffff804`226cf361 : 0xfffff804`0cef06e8
fffff804`0cef0540 ffffc101`d926b000 : fffff804`0cef0690 ffffc101`d90e1000 fffff804`226cf361 fffff804`0cef05e0 : 0xfffff804`0cef0690
fffff804`0cef0548 fffff804`0cef0690 : ffffc101`d90e1000 fffff804`226cf361 fffff804`0cef05e0 ffffc101`d926b000 : 0xffffc101`d926b000
fffff804`0cef0550 ffffc101`d90e1000 : fffff804`226cf361 fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b : 0xfffff804`0cef0690
fffff804`0cef0558 fffff804`226cf361 : fffff804`0cef05e0 ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b : 0xffffc101`d90e1000
fffff804`0cef0560 fffff804`0cef05e0 : ffffc101`d926b000 ffffa83f`75916f0b ffffa83f`75916f0b 00000000`00000000 : nvlddmkm+0xbf361
fffff804`0cef0568 ffffc101`d926b000 : ffffa83f`75916f0b ffffa83f`75916f0b 00000000`00000000 fffff804`226ab1a4 : 0xfffff804`0cef05e0
fffff804`0cef0570 ffffa83f`75916f0b : ffffa83f`75916f0b 00000000`00000000 fffff804`226ab1a4 ffffc101`d90e1000 : 0xffffc101`d926b000
fffff804`0cef0578 ffffa83f`75916f0b : 00000000`00000000 fffff804`226ab1a4 ffffc101`d90e1000 ffffc101`d926b000 : 0xffffa83f`75916f0b
fffff804`0cef0580 00000000`00000000 : fffff804`226ab1a4 ffffc101`d90e1000 ffffc101`d926b000 ffffc101`d90e1000 : 0xffffa83f`75916f0b


SYMBOL_NAME: nvlddmkm+91cca

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 91cca

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner
---------
 
Back
Top Bottom