cancel
Showing results for 
Search instead for 
Did you mean: 

PC Drivers & Software

lbzqq6688
Journeyman III

Crash after opening COD19

Please help me solve this problem. Below are the dmp files parsed by Windbg and the error data from AMD phones

 

https://pan.baidu.com/s/1sz1uMDa8MMPVRGl0hhqf5Q?pwd=1234  

Extraction code: 1234

 


Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\041323-7921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7f200000 PsLoadedModuleList = 0xfffff805`7fe2a210
Debug session time: Thu Apr 13 22:52:19.904 2023 (UTC + 8:00)
System Uptime: 0 days 0:15:26.578
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`7f5fa090 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9601`b63eee20=0000000000000133
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8057fefa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2593

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7611

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 312

Key : Analysis.Init.Elapsed.mSec
Value: 4218

Key : Analysis.Memory.CommitPeak.Mb
Value: 95

Key : Bugcheck.Code.DumpHeader
Value: 0x133

Key : Bugcheck.Code.Register
Value: 0x133

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 041323-7921-01.dmp

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8057fefa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffff840209d80150 -- (.trap 0xffff840209d80150)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000b0c208d6 rbx=0000000000000000 rcx=ffff840209d80340
rdx=ffff84020a8bf098 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057f486e07 rsp=ffff840209d802e0 rbp=0000000000000391
r8=fffff805adaf3fe0 r9=0000000000000391 r10=ffff8582cbd83000
r11=ffff8582cbd83448 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff805`7f486e07 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff9601`b63eee18 fffff805`7f694bf4 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`7fefa320 : nt!KeBugCheckEx
ffff9601`b63eee20 fffff805`7f528333 : 00000323`a0c215c4 ffff9601`b63d5180 00000000`00000000 ffff9601`b63d5180 : nt!KeAccumulateTicks+0x16a064
ffff9601`b63eee80 fffff805`7f527e1a : ffff8582`b7d140e0 ffff8402`09d801d0 00000000`0011ec00 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff9601`b63eef30 fffff805`7f473e05 : ffff8582`b7d140e0 00000000`00000000 00000000`00000000 ffff3487`8f1bb258 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9601`b63eef60 fffff805`7f5fc02a : ffff8402`09d801d0 ffff8582`b7d140e0 00000000`00000100 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9601`b63eefb0 fffff805`7f5fc7f7 : ffff8402`09d80340 ffff8402`09d80398 ffff8582`b7d140e0 ffff8402`09d80398 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8402`09d80150 fffff805`7f486e07 : ffffffff`ffffffd2 fffff805`7f4c70f0 00000000`00000010 00000000`00040202 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8402`09d802e0 fffff805`7f4c70fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffff8402`09d80310 fffff805`7f4c4703 : 00000000`b0c208d6 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0x2a
ffff8402`09d80340 fffff805`ad4d68a4 : ffff8582`ca75a930 ffff8582`cbf75860 00000000`0011ec00 ffff8582`cbf75860 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x73
ffff8402`09d80370 ffff8582`ca75a930 : ffff8582`cbf75860 00000000`0011ec00 ffff8582`cbf75860 fffff805`adaf3fe0 : amdkmdag+0xc68a4
ffff8402`09d80378 ffff8582`cbf75860 : 00000000`0011ec00 ffff8582`cbf75860 fffff805`adaf3fe0 00000000`00000000 : 0xffff8582`ca75a930
ffff8402`09d80380 00000000`0011ec00 : ffff8582`cbf75860 fffff805`adaf3fe0 00000000`00000000 ffff8582`ca75a939 : 0xffff8582`cbf75860
ffff8402`09d80388 ffff8582`cbf75860 : fffff805`adaf3fe0 00000000`00000000 ffff8582`ca75a939 00000000`00000000 : 0x11ec00
ffff8402`09d80390 fffff805`adaf3fe0 : 00000000`00000000 ffff8582`ca75a939 00000000`00000000 ffff8582`ca75a901 : 0xffff8582`cbf75860
ffff8402`09d80398 00000000`00000000 : ffff8582`ca75a939 00000000`00000000 ffff8582`ca75a901 00000000`00000000 : amdkmdag+0x6e3fe0


SYMBOL_NAME: amdkmdag+c68a4

MODULE_NAME: amdkmdag

IMAGE_NAME: amdkmdag.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: c68a4

FAILURE_BUCKET_ID: 0x133_ISR_amdkmdag!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ce335412-b260-6bc1-3af9-ea5584f041c4}

Followup: MachineOwner
---------

 

 

 

 

0 Likes
0 Replies