Recently i installed gtx1650, it BSOD happended ramdomly when i watch youtube, doesn't hanppend when i play games, it's very wired,
and i used intel cpu graphic for many years never happended before....
is there anyone have same issues? thx
Loading Dump File [C:\Windows\Minidump\092824-7375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff803`6d800000 PsLoadedModuleList = 0xfffff803`6e42a730
Debug session time: Sat Sep 28 17:01:38.035 2024 (UTC + 8:00)
System Uptime: 0 days 6:39:03.968
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000038`11ef1018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`6dbfe2c0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff803`6b575e20=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8036e4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rt640x64.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4890
Key : Analysis.Elapsed.mSec
Value: 36877
Key : Analysis.IO.Other.Mb
Value: 22
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 35
Key : Analysis.Init.CPU.mSec
Value: 1000
Key : Analysis.Init.Elapsed.mSec
Value: 80628
Key : Analysis.Memory.CommitPeak.Mb
Value: 118
Key : Analysis.Version.DbgEng
Value: 10.0.27704.1001
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x133
Key : Bugcheck.Code.TargetModel
Value: 0x133
Key : Failure.Bucket
Value: 0x133_ISR_fwpkclnt!FwppNetBufferListEventNotify
Key : Failure.Hash
Value: {4b5c25c3-2a6a-5ca6-5836-5e1a420c6246}
Key : Hypervisor.Enlightenments.Value
Value: 68669340
Key : Hypervisor.Enlightenments.ValueHex
Value: 417cf9c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : Stack.Pointer
Value: ISR
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8036e4fb320
BUGCHECK_P4: 0
FILE_IN_CAB: 092824-7375-01.dmp
FAULTING_THREAD: ffffaa8f2d7b5080
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8036b56dae0 -- (.trap 0xfffff8036b56dae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8036b9934d0 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffaa8f23e4fc60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036b9934d0 rsp=fffff8036b56dc78 rbp=fffff8036b56dcf9
r8=0000000000000000 r9=0000000000000050 r10=fffff80372034640
r11=ffffaa8f2114eaf0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Ndu!NduNblNotifyCallback:
fffff803`6b9934d0 4053 push rbx
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff803`6b575e18 fffff803`6dc4124a : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`6e4fb320 : nt!KeBugCheckEx
fffff803`6b575e20 fffff803`6da689f3 : 00003a16`fb98a974 fffff803`695cc180 00000000`00000000 fffff803`695cc180 : nt!KeAccumulateTicks+0x1d5fda
fffff803`6b575e80 fffff803`6da684da : fffff803`6e4f3b00 fffff803`6b56db60 00000000`00000000 fffff803`6b575f20 : nt!KeClockInterruptNotify+0x453
fffff803`6b575f30 fffff803`6dad3735 : fffff803`6e4f3b00 fffff803`6dbfff10 ffffbb00`bf7af008 ffffbb00`bf7af000 : nt!HalpTimerClockIpiRoutine+0x1a
fffff803`6b575f60 fffff803`6dc002fa : fffff803`6b56db60 fffff803`6e4f3b00 ffffaa8f`23e4fc60 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`6b575fb0 fffff803`6dc00b27 : 00000000`00000000 fffff803`6dbff9d4 ffffaa8f`2114eaf0 00000000`00000246 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff803`6b56dae0 fffff803`6b9934d0 : fffff803`72401117 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff803`6b56dc78 fffff803`72401117 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ndu!NduNblNotifyCallback
fffff803`6b56dc80 fffff803`7219186e : ffffaa8f`23e4fc60 00000000`00000000 00000000`01000010 00000000`00000000 : fwpkclnt!FwppNetBufferListEventNotify+0xd7
fffff803`6b56dd60 fffff803`72035d07 : 00000000`01000010 00000000`00000282 fffff803`6b56ddb0 00000000`00000000 : tcpip!WfppTaggedContextFree+0x1e
fffff803`6b56dd90 fffff803`721916c5 : ffffaa8f`23711050 00000000`00000001 ffffaa8f`23e4ec60 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x267
fffff803`6b56de10 fffff803`7219af16 : ffffaa8f`23e6dc60 00000000`00000000 fffff803`6b56dfc1 00000000`00000000 : tcpip!Fl48pReceiveArpPackets+0x175
fffff803`6b56df20 fffff803`7219a47c : fffff803`6b56e101 ffffaa8f`23711000 fffff803`72188280 fffff803`6b56e2fc : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x306
fffff803`6b56e020 fffff803`6da914a8 : ffffaa8f`211833c0 00000000`00000002 ffffaa8f`2d7b5080 fffff803`6b56e318 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff803`6b56e170 fffff803`6da9141d : fffff803`7219a300 fffff803`6b56e318 ffffaa8f`1ee93600 fffff803`6b56e380 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff803`6b56e1e0 fffff803`72170d7d : fffff803`6b56e230 00000000`00000000 ffffaa8f`23711050 fffff803`6b56e380 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff803`6b56e220 fffff803`7217045d : 00000000`00000001 fffff803`6b56e380 ffffaa8f`23711050 fffff803`6b56e390 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff803`6b56e280 fffff803`71eb1eb1 : 00000000`00003a58 01640000`00000610 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff803`6b56e530 fffff803`71eb1ccb : ffffaa8f`23d0e8a0 00000000`00000601 ffffaa8f`00000000 00000000`0000001c : ndis!ndisMIndicateNetBufferListsToOpen+0x141
fffff803`6b56e610 fffff803`71eb7de1 : ffffaa8f`23c531a0 ffffaa8f`23e4d701 ffffaa8f`23c531a0 fffff803`6b56e761 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff803`6b56e690 fffff803`71eeea9f : ffffaa8f`23e4d780 fffff803`6b56e761 00000000`00000000 fffff803`71f7b801 : ndis!ndisCallReceiveHandler+0x61
fffff803`6b56e6e0 fffff803`71eb4984 : 00000000`00175f75 00000000`00000001 ffffaa8f`23c531a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff803`6b56e7b0 fffff803`9615ad77 : ffffaa8f`00000000 ffffaa8f`23d32000 ffffaa8f`23e4d780 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff803`6b56e840 ffffaa8f`00000000 : ffffaa8f`23d32000 ffffaa8f`23e4d780 00000000`00000000 ffffbb00`00000001 : rt640x64+0x1ad77
fffff803`6b56e848 ffffaa8f`23d32000 : ffffaa8f`23e4d780 00000000`00000000 ffffbb00`00000001 fffff803`6dafc2ca : 0xffffaa8f`00000000
fffff803`6b56e850 ffffaa8f`23e4d780 : 00000000`00000000 ffffbb00`00000001 fffff803`6dafc2ca 00000020`00000001 : 0xffffaa8f`23d32000
fffff803`6b56e858 00000000`00000000 : ffffbb00`00000001 fffff803`6dafc2ca 00000020`00000001 ffff3401`0000a501 : 0xffffaa8f`23e4d780
SYMBOL_NAME: fwpkclnt!FwppNetBufferListEventNotify+d7
MODULE_NAME: fwpkclnt
IMAGE_NAME: fwpkclnt.sys
IMAGE_VERSION: 10.0.19041.5000
STACK_COMMAND: .process /r /p 0xffffaa8f2c3ac0c0; .thread 0xffffaa8f2d7b5080 ; kb
BUCKET_ID_FUNC_OFFSET: d7
FAILURE_BUCKET_ID: 0x133_ISR_fwpkclnt!FwppNetBufferListEventNotify
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4b5c25c3-2a6a-5ca6-5836-5e1a420c6246}
Followup: MachineOwner
---------