************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToV8JsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41 Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\craig\OneDrive\Documents\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Primary dump contents written successfully ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 22621.1.amd64fre.ni_release.220506-1250 Kernel base = 0xfffff802`64c00000 PsLoadedModuleList = 0xfffff802`65813530 Debug session time: Sat Apr 6 23:24:39.948 2024 (UTC - 4:00) System Uptime: 0 days 0:08:40.948 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................................. Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`00376018). Type ".hh dbgerr001" for details Loading unloaded module list .............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`650177f0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff802`63959c90=0000000000000133 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. Arg2: 0000000000001e00, The watchdog period (in ticks). Arg3: fffff8026591c340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2499 Key : Analysis.Elapsed.mSec Value: 2818 Key : Analysis.IO.Other.Mb Value: 3 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 23 Key : Analysis.Init.CPU.mSec Value: 437 Key : Analysis.Init.Elapsed.mSec Value: 39641 Key : Analysis.Memory.CommitPeak.Mb Value: 94 Key : Bugcheck.Code.KiBugCheckData Value: 0x133 Key : Bugcheck.Code.LegacyAPI Value: 0x133 Key : Bugcheck.Code.TargetModel Value: 0x133 Key : Dump.Attributes.AsUlong Value: 1800 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.LastLine Value: Dumping physical memory to disk: 100% Key : Dump.Attributes.ProgressPercentage Value: 100 Key : Failure.Bucket Value: 0x133_ISR_nvlddmkm!unknown_function Key : Failure.Hash Value: {f97493a5-ea2b-23ca-a808-8602773c2a86} Key : Hypervisor.Enlightenments.ValueHex Value: 1417df84 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 21631230 Key : Hypervisor.Flags.ValueHex Value: 14a10fe Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 Key : SecureKernel.HalpHvciEnabled Value: 1 Key : WER.OS.Branch Value: ni_release Key : WER.OS.Version Value: 10.0.22621.1 BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff8026591c340 BUGCHECK_P4: 0 FILE_IN_CAB: MEMORY.DMP TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1800 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff802639521d0 -- (.trap 0xfffff802639521d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000080000010 rbx=0000000000000000 rcx=0000000000000004 rdx=fffff802639525bc rsi=0000000000000000 rdi=0000000000000000 rip=fffff80293bd2a03 rsp=fffff80263952360 rbp=fffff802639524c0 r8=000000000000001e r9=fffff802639525bc r10=fffff80293bd2990 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nvlddmkm+0xd2a03: fffff802`93bd2a03 0fb3c8 btr eax,ecx Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: starwarsbattlefrontii.exe STACK_TEXT: fffff802`63959c88 fffff802`64e72579 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`6591c340 : nt!KeBugCheckEx fffff802`63959c90 fffff802`64e71de1 : 0000011b`b2b456fb 00000000`0000823c 00000000`0000823b 00000000`00000000 : nt!KeAccumulateTicks+0x239 fffff802`63959cf0 fffff802`64e6fe71 : 00000000`00000000 ffffcd81`fb3f3300 fffff802`635ec180 00000000`00000000 : nt!KiUpdateRunTime+0xd1 fffff802`63959ea0 fffff802`64e6f89a : fffff802`6585ffc8 ffffcd81`fb3f3330 ffffcd81`fb3f3330 00000000`00000002 : nt!KeClockInterruptNotify+0xc1 fffff802`63959f40 fffff802`64ef40ac : 00000001`36859f0c fffff802`6590d530 fffff802`6590d5e0 fffff802`6501979b : nt!HalpTimerClockInterrupt+0x10a fffff802`63959f70 fffff802`650199fa : fffff802`63952250 fffff802`6590d530 fffff802`639525a8 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x9c fffff802`63959fb0 fffff802`6501a2c7 : ffff8301`590de000 00000000`00000000 ffff8301`590de000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa fffff802`639521d0 fffff802`93bd2a03 : fffff802`635ec180 00000000`00000000 fffff802`639524c0 fffff802`64e732d1 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffff802`63952360 fffff802`93bd54f7 : fffff802`639525d0 fffff802`63952580 ffff8301`593a2000 fffffed9`59d86f9f : nvlddmkm+0xd2a03 fffff802`63952390 fffff802`93bbe595 : ffff8301`593a2000 00000000`00000000 00000000`00000000 00000000`00000001 : nvlddmkm+0xd54f7 fffff802`639523c0 fffff802`64e251bc : 00000000`00000000 ffffcd81`fb3f3330 ffffcd81`fb3f3330 fffff802`63952f50 : nvlddmkm+0xbe595 fffff802`639527c0 fffff802`64e26471 : 00000000`00000024 fffff802`63952e00 ffff8301`59096a10 00000000`0002c4a4 : nt!KiExecuteAllDpcs+0x42c fffff802`63952d00 fffff802`65020f75 : 00000000`00000000 00000000`00000000 fffff802`635ec180 00000001`04cc0c80 : nt!KiRetireDpcList+0x1b1 fffff802`63952fb0 fffff802`65020f1f : ffffdd86`53adf349 fffff802`64e29ef5 00000000`00000000 ffff8301`5ed41d60 : nt!KxSwapStacksAndRetireDpcList+0x5 ffffdd86`53adf2b0 fffff802`64e29ef5 : 00000000`00000000 ffff8301`5ed41d60 00000000`00000001 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn ffffdd86`53adf2c0 fffff802`650206cb : 00000000`00000000 ffff8301`5ed41d60 00000000`00000000 00000001`04cc0c80 : nt!KiDispatchInterrupt+0xd5 ffffdd86`53adf3b0 fffff802`65019ac1 : ffffdd86`53adf460 00000000`4508edd8 00000001`1d513f38 00000001`1d513310 : nt!KiDpcInterruptBypass+0x1b ffffdd86`53adf3e0 00000001`47f47820 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1 00000000`45084ba8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`47f47820 SYMBOL_NAME: nvlddmkm+d2a03 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: d2a03 FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86} Followup: MachineOwner ---------