Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [D:\1\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred cache* Deferred SRV*https://msdl.microsoft.com/download/symbols Symbol search path is: cache*;SRV*https://msdl.microsoft.com/download/symbols Executable search path is: Windows 10 Kernel Version 16299 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 16299.15.amd64fre.rs3_release.170928-1534 Machine Name: Kernel base = 0xfffff801`dee0b000 PsLoadedModuleList = 0xfffff801`df171fd0 Debug session time: Thu Apr 19 07:42:53.760 2018 (UTC + 2:00) System Uptime: 5 days 17:19:58.734 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ...... Loading User Symbols PEB is paged out (Peb.Ldr = 0000008e`dd3f9018). Type ".hh dbgerr001" for details Loading unloaded module list ................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 133, {1, 1e00, fffff801df207370, 0} CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol. CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol. *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* Probably caused by : nvlddmkm.sys ( nvlddmkm+1c8b81 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff801df207370 Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1704 BIOS_DATE: 05/08/2015 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: P9X79-E WS BASEBOARD_VERSION: Rev 1.xx DUMP_TYPE: 1 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff801df207370 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED CPU_COUNT: c CPU_MHZ: d4a CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3e CPU_STEPPING: 4 CPU_MICROCODE: 6,3e,4,0 (F,M,S,R) SIG: 428'00000000 (cache) 428'00000000 (init) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x133 PROCESS_NAME: test_bsod_980ti.exe CURRENT_IRQL: d ANALYSIS_SESSION_HOST: SZOFT-KPACZARI ANALYSIS_SESSION_TIME: 04-19-2018 09:29:40.0747 ANALYSIS_VERSION: 10.0.14321.1024 amd64fre LAST_CONTROL_TRANSFER: from fffff801defbafd1 to fffff801def806e0 STACK_TEXT: fffff801`e101dbc8 fffff801`defbafd1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`df207370 : nt!KeBugCheckEx fffff801`e101dbd0 fffff801`deeba916 : 0005f9be`27d2d2fb fffff801`dd27a180 00000000`01e2cfaf 00000000`00000000 : nt!KeAccumulateTicks+0xfde11 fffff801`e101dc30 fffff801`df6e33c5 : 0005f9be`27d2c134 00000000`00000000 fffff801`df736450 ffff8800`f10b7470 : nt!KeClockInterruptNotify+0xc6 fffff801`e101df40 fffff801`dee854d5 : 00000000`00000000 fffff801`def81c10 ffff8800`f10b7508 ffff8800`f10b7500 : hal!HalpTimerClockIpiRoutine+0x15 fffff801`e101df70 fffff801`def81fca : fffff801`e1016780 fffff801`df736450 00000000`00000000 ffffe60b`b0416010 : nt!KiCallInterruptServiceRoutine+0xa5 fffff801`e101dfb0 fffff801`def824d7 : 00000000`00000000 fffff801`e30078ec ffffe60b`00000000 fffff801`e30682d3 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea fffff801`e1016700 fffff801`e2fe8b81 : fffff801`e300a347 ffffe60b`ae5a3000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffff801`e1016898 fffff801`e300a347 : ffffe60b`ae5a3000 00000000`00000000 00000000`00000000 ffffe60b`ae5a3000 : nvlddmkm+0x1c8b81 fffff801`e10168a0 fffff801`e300a23d : 00000000`00000000 00000000`00000000 ffffe60b`ae5a3000 00000000`00000000 : nvlddmkm+0x1ea347 fffff801`e1016910 fffff801`e3005f7e : ffffe60b`ae5a3000 00000000`00000002 00000000`00000000 fffff801`e3085ac5 : nvlddmkm+0x1ea23d fffff801`e1016950 fffff801`e301a415 : ffffe60b`ae5a3000 00000000`00000002 ffffe60b`ae5ae000 fffff801`e3086221 : nvlddmkm+0x1e5f7e fffff801`e1016990 fffff801`e301a86b : 00000000`00000002 ffffe60b`00000002 fffff801`e1016b60 00000000`00000002 : nvlddmkm+0x1fa415 fffff801`e10169c0 fffff801`e301af85 : 00000000`00000001 ffffe60b`00000000 00000000`00000000 fffff801`e2fe8fc2 : nvlddmkm+0x1fa86b fffff801`e1016a30 fffff801`e2fe8fc2 : 00000000`00000002 00000000`00000000 00000000`00000000 ffffe60b`ae5a3000 : nvlddmkm+0x1faf85 fffff801`e1016a60 fffff801`deeb9b72 : fffff801`dd27cf80 ffffe60b`ac2b3000 ffffe60b`b49c67a0 fffff801`dd27a180 : nvlddmkm+0x1c8fc2 fffff801`e1016c70 fffff801`deeb926f : fffff801`dd27a180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x1d2 fffff801`e1016db0 fffff801`def879d5 : 00000000`00000000 fffff801`dd27a180 ffffa20f`7b0149f0 ffff8800`f10b7500 : nt!KiRetireDpcList+0xdf fffff801`e1016fb0 fffff801`def877e0 : ffff8800`f10b7500 fffff801`df6e3356 ffffd109`8b8f99e0 fffff801`dee3c5b7 : nt!KxRetireDpcList+0x5 ffffa20f`7b014930 fffff801`def84ec5 : 0000022c`ce8f0850 fffff801`def818e1 ffffe60b`b515b700 fffff801`dee3c5b7 : nt!KiDispatchInterruptContinue ffffa20f`7b014960 fffff801`def818e1 : ffffe60b`b515b700 fffff801`dee3c5b7 ffffe60b`00000000 ffffe60b`00000000 : nt!KiDpcInterruptBypass+0x25 ffffa20f`7b014970 fffff801`def9306c : ffffe60b`b515b700 00000000`00000064 00000000`00000000 0000008e`dd4ff450 : nt!KiChainedDispatch+0xb1 ffffa20f`7b014b00 00007ff9`35754844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xe1 0000008e`dd4ff0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`35754844 STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 923b7af0f53501f7bc884a2c2351566b25075adc THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 31ec1fc05d88fcd2f1d4458a74c01c0667008a8e THREAD_SHA1_HASH_MOD: b9fa2d9a64117a39c2572e64b916ba3f6bc3f6ff FOLLOWUP_IP: nvlddmkm+1c8b81 fffff801`e2fe8b81 c3 ret FAULT_INSTR_CODE: 8accccc3 SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: nvlddmkm+1c8b81 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5ab5877e BUCKET_ID_FUNC_OFFSET: 1c8b81 FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function PRIMARY_PROBLEM_CLASS: 0x133_ISR_nvlddmkm!unknown_function TARGET_TIME: 2018-04-19T05:42:53.000Z OSBUILD: 16299 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-01-01 12:07:05 BUILDDATESTAMP_STR: 170928-1534 BUILDLAB_STR: rs3_release BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534 ANALYSIS_SESSION_ELAPSED_TIME: 1592 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x133_isr_nvlddmkm!unknown_function FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86} Followup: MachineOwner ---------