cr4ck
80+ Bronze
- Katılım
- 12 Aralık 2020
- Mesajlar
- 1,849
Dahası
062924-12953-01.7z
drive.google.com
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\doguk\Desktop\minidump\062924-12953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff800`21600000 PsLoadedModuleList = 0xfffff800`22213150
Debug session time: Sat Jun 29 07:23:25.317 2024 (UTC + 3:00)
System Uptime: 2 days 9:51:30.715
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
...................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`21a1a240 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaf0e`47537650=0000000000000119
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_SCHEDULER_INTERNAL_ERROR (119)
The video scheduler has detected that fatal violation has occurred. This resulted
in a condition that video scheduler can no longer progress. Any other values after
parameter 1 must be individually examined according to the subtype.
Arguments:
Arg1: 000000000000a000, The subtype of the BugCheck:
Arg2: ffffde87afbca000
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1733
Key : Analysis.Elapsed.mSec
Value: 3678
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 5998
Key : Analysis.Memory.CommitPeak.Mb
Value: 113
Key : Bugcheck.Code.LegacyAPI
Value: 0x119
Key : Bugcheck.Code.TargetModel
Value: 0x119
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x119_a000_VIDSCH_RESET_HW_ENGINE_SUSPEND_dxgmms2!VidSchiResetHwEngine
Key : Failure.Hash
Value: {95884248-9389-91d4-05c4-d0b1411f9702}
BUGCHECK_CODE: 119
BUGCHECK_P1: a000
BUGCHECK_P2: ffffde87afbca000
BUGCHECK_P3: 0
BUGCHECK_P4: 1
FILE_IN_CAB: 062924-12953-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffaf0e`47537648 fffff800`37495745 : 00000000`00000119 00000000`0000a000 ffffde87`afbca000 00000000`00000000 : nt!KeBugCheckEx
ffffaf0e`47537650 fffff800`31e96418 : ffffde87`afbcc002 ffffde87`a34f9300 ffffde87`a34f9308 ffffde87`a34f9310 : watchdog!WdLogSingleEntry5+0x3c05
ffffaf0e`47537700 fffff800`31f56552 : ffffde87`b0ace001 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiResetHwEngine+0x3b8
ffffaf0e`475378b0 fffff800`31f23a8d : ffffde87`afbcc000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiResetEngines+0xaa
ffffaf0e`47537900 fffff800`31ef58a9 : 00000000`00000000 00000000`00000001 00000000`00cb67dc 00000000`00989680 : dxgmms2!VidSchiCheckHwProgress+0x2e1bd
ffffaf0e`47537980 fffff800`31e56ae1 : 00000000`00000000 ffffde87`afbcc000 ffffaf0e`47537ab9 00000000`00000000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x389
ffffaf0e`47537a50 fffff800`31f0a395 : ffffde87`bf622200 ffffde87`afbcc000 ffffde87`bf6222b0 ffffde87`b0ac97e0 : dxgmms2!VidSchiScheduleCommandToRun+0x291
ffffaf0e`47537b20 fffff800`31f0a30a : 00000000`00000000 fffff800`31f0a240 ffffde87`afbcc000 ffffde87`9c339040 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffaf0e`47537b70 fffff800`2180e957 : ffffde87`b0acd480 fffff800`00000001 ffffde87`afbcc000 004fe07f`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffaf0e`47537bb0 fffff800`21a1f3b4 : ffffce81`da5c3180 ffffde87`b0acd480 fffff800`2180e900 fffff800`218054dd : nt!PspSystemThreadStartup+0x57
ffffaf0e`47537c00 00000000`00000000 : ffffaf0e`47538000 ffffaf0e`47531000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: dxgmms2!VidSchiResetHwEngine+3b8
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.22621.3790
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 3b8
FAILURE_BUCKET_ID: 0x119_a000_VIDSCH_RESET_HW_ENGINE_SUSPEND_dxgmms2!VidSchiResetHwEngine
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {95884248-9389-91d4-05c4-d0b1411f9702}
Followup: MachineOwner
---------
9: kd> lmvm dxgmms2
Browse full module list
start end module name
fffff800`31e50000 fffff800`31f67000 dxgmms2 # (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\47B7EB84D294AA5A1CE99D24B64C72171\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\ED8E5FCA117000\dxgmms2.sys
Image path: dxgmms2.sys
Image name: dxgmms2.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: ED8E5FCA (This is a reproducible build file hash, not a timestamp)
CheckSum: 00129201
ImageSize: 00117000
File version: 10.0.22621.3790
Product version: 10.0.22621.3790
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgmms2.sys
OriginalFilename: dxgmms2.sys
ProductVersion: 10.0.22621.3790
FileVersion: 10.0.22621.3790 (WinBuild.160101.0800)
FileDescription: DirectX Graphics MMS
LegalCopyright: © Microsoft Corporation. All rights reserved.
Son düzenleme: