New
#1
driver_irql_not_less_or_equal (d1) (nvlddmkm.sys)
Hi
When I play demanding games I can get a bsod, the latest game being Rise of the Tomb Raider. This is the first game that bsods within 10 minutes no matter what. And so far this is what I can read out of the .dmp files : "driver_irql_not_less_or_equal (d1)" - (nvlddmkm.sys).
What happens is: without warning or fps drop the screen goes black (disconnects). Then the sound goes on for a bit, before it's cut goes into a loop. Then the PC restarts, or I have to push the restart button.
I have used the Display Driver Uninstaller 15.7.4.0 and reinstalled the Nvidia driver. Daemon tools have also been removed. Have stopped the Nvidia streamer service through msconfig too, just to see if it helped. No luck with any of the "fixes". I have run Furmark test without any issues, and a "sfc/ scannow". I've been monitoring the CPU and GPU temp before the crash, but no spikes in temperature.
*Side note - If I run Intel extreme tuning utility CPU stress test, the CPU reach almost 100 C in about 3 min. But that's under 100% load. But I guess that's unrelated, since the CPU don't get that load or temp during games. Still a indicator that something is wrong. And the Intel Diagnostic tool tells me there is something wrong with CPU Freq (Module - CPUFreq.exe did not create a results file.) , and it does not pass the stress test there as well. But I can't find anything about that in the .dmp file.
I'm not experienced enough to understand the rest. But so far by comparing similar problems others have had, I understand that Rise of the Tomb Raider are sending an invalid call/path to the Nvidia driver and makes it crash. correct me if i'm wrong.
Any tips on what to do?
---
ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+4d5acf )
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000004e7d75, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800133d5acf, address which referenced memory
Last edited by Cancrum; 13 Feb 2016 at 19:27.