Is there a newer version of the Intel HD Graphics 630 driver for the HP ENVY All-in-One - 27-b110

S

Shreffey

Microsoft told me that the driver for the Intel HD Graphics 630 is causing my crashes. I cannot find a newer version than the 23.20.16.4973 Rev.A. Intel has a newer version, 27.20.100.9079, but Intel says that the driver on the HP ENVY was customized and so I can only get an update from HP.


How do I get a newer driver from HP?


But is that even my problem?


Prior to the Windows 10 May feature update 20H2 this desktop was rock solid.


Since then it has been very unstable.

Initially it was crashing consistently with DPC WATCHDOG violation

Microsoft Support identified my Video drive as the culprit so I updated the NVIDIA GeForce GTX 950M to version 27.21.14.5671

It seemed to be better but was still failing with DPC WATCHDOGs

Another dump identified problems with the network driver.

I updated my Realtek PCIe GbE Family Controller to version 10.45.928.2020 and the Intel(R) Dual Band Wireless-AC 3168 to version 19.51.31.1

Today I had 9 bugchecks as listed below. Everything runs fine as long as both network adapters are disabled. If I enable one or the other the system can work for an hour or more or die in minutes

The HP Support Assistant was no help. I had to get recent device drivers direct from the chip makers.

Below the 9 bugchecks is a partial analysis by WinDbg

Any ideas?


The computer has rebooted from a bugcheck. The bugcheck was: 0x00000133 (0x0000000000000001, 0x0000000000001e00, 0xfffff8005a0fa320, 0x0000000000000000). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: c38f84f1-7e3d-4c1b-8a32-0996291fb278.

The computer has rebooted from a bugcheck. The bugcheck was: 0x0000001a (0x0000000000005100, 0xffff98c3c081c180, 0x00000000000000d0, 0x0000000000000800). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: cf545719-97c1-4549-a4db-ab351cdb91de.

The computer has rebooted from a bugcheck. The bugcheck was: 0x00000133 (0x0000000000000001, 0x0000000000001e00, 0xfffff8004bafa320, 0x0000000000000000). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: a743e8a1-aa9a-415a-a997-d7d3ff76c5dc.

The computer has rebooted from a bugcheck. The bugcheck was: 0x00000139 (0x000000000000001d, 0xffffa10a3234d740, 0xffffa10a3234d698, 0x0000000000000000). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: 7667fc0b-1203-4bed-bbe3-e530199f419d.

The computer has rebooted from a bugcheck. The bugcheck was: 0x00000133 (0x0000000000000000, 0x0000000000000501, 0x0000000000000500, 0xfffff80503efa320). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: db3aa191-6e4a-42bd-99cf-0d37e735079f.

The computer has rebooted from a bugcheck. The bugcheck was: 0x00000133 (0x0000000000000001, 0x0000000000001e00, 0xfffff80750afa320, 0x0000000000000000). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: 1509e613-6ccb-43f2-9d01-d6198059bf00.

The computer has rebooted from a bugcheck. The bugcheck was: 0x00000133 (0x0000000000000001, 0x0000000000001e00, 0xfffff804558fa320, 0x0000000000000000). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: 35b93463-b30d-44e0-9589-194b84b8d557.

The computer has rebooted from a bugcheck. The bugcheck was: 0x0000001e (0xffffffffc0000005, 0xfffff803229fcb52, 0x0000000000000000, 0xffffffffffffffff). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: f319a77a-dd5b-4203-b39d-c41474b0253f.

The computer has rebooted from a bugcheck. The bugcheck was: 0x00000133 (0x0000000000000001, 0x0000000000001e00, 0xfffff80355afa320, 0x0000000000000000). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: d2dcaf61-e64c-42ce-9ca3-45e17ef53ae7.





Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY2021-01-04_20-57.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`59400000 PsLoadedModuleList = 0xfffff800`5a02a2b0
Debug session time: Mon Jan 4 20:57:16.956 2021 (UTC - 5:00)
System Uptime: 0 days 1:17:02.735
Loading Kernel Symbols
...............................................................
.......Page 3c5526 not present in the dump file. Type ".hh dbgerr004" for details
.........................................................
................................................................
.............
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000bb`1df51018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`597f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`bafa7e20=0000000000000133

Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Could not open dump file [C:\WINDOWS\MEMORY.DMP], Win32 error 0n2
"The system cannot find the file specified."
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8005a0fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3483

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BRUCE11

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3546

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8005a0fa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffffc78100f0ec70 -- (.trap 0xffffc78100f0ec70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000800 rbx=0000000000000000 rcx=ffffc3bffcf3eb80
rdx=ffffc3e1f0f87000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800596acd72 rsp=ffffc78100f0ee00 rbp=ffffc3bffcf3eb80
r8=0000000000000000 r9=0000000000000002 r10=0000000000000000
r11=ffffb086d042e0c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiLockTransitionLeafPage+0x2a:
fffff800`596acd72 488bd8 mov rbx,rax
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: WerFault.exe

STACK_TEXT:
ffffd001`bafa7e18 fffff800`5983aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`5a0fa320 : nt!KeBugCheckEx
ffffd001`bafa7e20 fffff800`5966f9a3 : 00000c3a`490e193d ffffd001`baf55180 00000000`00000000 ffffd001`baf55180 : nt!KeAccumulateTicks+0x1c880c
ffffd001`bafa7e80 fffff800`5966f48a : ffffb086`be6e40e0 ffffc781`00f0ecf0 00000000`00000000 ffffc3bf`fcf3eb80 : nt!KeClockInterruptNotify+0x453
ffffd001`bafa7f30 fffff800`59727ef5 : ffffb086`be6e40e0 fffff800`597146b7 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffd001`bafa7f60 fffff800`597f722a : ffffc781`00f0ecf0 ffffb086`be6e40e0 ffffb086`d042e740 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffd001`bafa7fb0 fffff800`597f7797 : 00000000`00000800 00000000`00000000 00000000`00000000 00001f80`00000200 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc781`00f0ec70 fffff800`596acd72 : ffffd001`baf55180 fffff800`596937b0 00000000`00000000 00000000`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc781`00f0ee00 fffff800`596ac87f : ffffc3bf`fcf3eb80 00000000`00000000 ffffc781`00f0ef80 00000001`00000001 : nt!MiLockTransitionLeafPage+0x2a
ffffc781`00f0ee50 fffff800`5969a37d : 00007ff9`e7d20000 ffffc3bf`fcf3e900 ffffc781`00f0f608 ffffc781`00f0efe0 : nt!MiTryDeleteTransitionPte+0x1f
ffffc781`00f0ee80 fffff800`5969ad6e : 00000000`00000000 ffffc781`00f0f590 ffffc3bf`fcf3f000 ffffc781`00f0f4e0 : nt!MiDeletePteRun+0x157d
ffffc781`00f0f090 fffff800`5960bedd : 00000000`00000000 ffffb086`d042e740 ffffc781`00f0f4e0 ffffc3bf`fcf3eff8 : nt!MiDeleteVaTail+0x6e
ffffc781`00f0f0c0 fffff800`5960bafb : ffffc3e1`00000000 ffffb086`d042e740 ffffc781`00000000 ffffc781`00f0f530 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc781`00f0f160 fffff800`5960bafb : ffffc3e1`f0efff38 ffffb086`d042e740 ffffc781`00000001 ffffc781`00f0f540 : nt!MiWalkPageTablesRecursively+0x88b
ffffc781`00f0f200 fffff800`5960bafb : ffffc3e1`f0eff000 ffffb086`d042e740 ffffc781`00000002 ffffc781`00f0f550 : nt!MiWalkPageTablesRecursively+0x88b
ffffc781`00f0f2a0 fffff800`5965de6b : 00000000`00000000 ffffb086`d042e740 00000000`00000003 ffffc781`00f0f560 : nt!MiWalkPageTablesRecursively+0x88b
ffffc781`00f0f340 fffff800`5969b991 : ffffc781`00f0f4e0 ffffb086`00000000 ffffc3bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc781`00f0f440 fffff800`5966baf0 : 00000000`00000001 ffffc781`00000000 ffffb086`d042e590 ffffb086`c9ddf080 : nt!MiDeletePagablePteRange+0x4f1
ffffc781`00f0f750 fffff800`59a35c99 : ffffb086`d02d7140 00000000`00000000 ffffb086`00000000 ffffb086`00000000 : nt!MiDeleteVad+0x360
ffffc781`00f0f860 fffff800`59a35330 : ffffb086`d02d7140 ffffb086`cb196270 ffffb086`c9ddf080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc781`00f0f890 fffff800`59a335ff : ffffb086`d02d1a60 ffffb086`d02d1a60 ffffb086`d02d7140 ffffb086`d042e0c0 : nt!MiCleanVad+0x30
ffffc781`00f0f8c0 fffff800`59a5d6e4 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb086`d042e0c0 : nt!MmCleanProcessAddressSpace+0x137
ffffc781`00f0f940 fffff800`59b06596 : ffffb086`d042e0c0 ffffe68a`1ff71730 ffffc781`00f0fb90 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffc781`00f0f9d0 fffff800`59ad22e8 : 00000000`c000041d 00000000`00000001 00000000`00000000 000000bb`1df52000 : nt!PspExitThread+0x5f6
ffffc781`00f0fad0 fffff800`59667fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffc781`00f0fb10 fffff800`597f9d20 : 00007ff9`e7d20000 ffffc781`00f0fbc0 ffffc781`00f0fd00 ffffc781`00000000 : nt!KiDeliverApc+0x487
ffffc781`00f0fbc0 fffff800`597f62bf : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffc781`00f0fd00 fffff800`598071b5 : 00000e8c`40000a00 00000000`00000000 ffffc781`00f0fec0 ffffc781`00000000 : nt!NtRaiseException+0x13f
ffffc781`00f0fe40 00007ff9`e8497d12 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000bb`1ddbdc20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e8497d12


SYMBOL_NAME: nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1c880c

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner
---------

Continue reading...
 
Back
Top Bottom