Plugged

Untitled

Feb 15th, 2024
153
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.42 KB | None | 0 0
  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3. ExtensionRepository : Implicit
  4. UseExperimentalFeatureForNugetShare : false
  5. AllowNugetExeUpdate : false
  6. AllowNugetMSCredentialProviderInstall : false
  7. AllowParallelInitializationOfLocalRepositories : true
  8.  
  9. -- Configuring repositories
  10. ----> Repository : LocalInstalled, Enabled: true
  11. ----> Repository : UserExtensions, Enabled: true
  12.  
  13. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  14.  
  15. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  16.  
  17. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
  18. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  19. ----> Repository : LocalInstalled, Enabled: true, Packages count: 36
  20.  
  21. Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
  22. Copyright (c) Microsoft Corporation. All rights reserved.
  23.  
  24.  
  25. Loading Dump File [C:\Windows\Minidump\021424-12031-01.dmp]
  26. Mini Kernel Dump File: Only registers and stack trace are available
  27.  
  28.  
  29. ************* Path validation summary **************
  30. Response Time (ms) Location
  31. Deferred srv*
  32. Symbol search path is: srv*
  33. Executable search path is:
  34. Windows 10 Kernel Version 22621 MP (16 procs) Free x64
  35. Product: WinNt, suite: TerminalServer SingleUserTS
  36. Kernel base = 0xfffff800`44e00000 PsLoadedModuleList = 0xfffff800`45a134a0
  37. Debug session time: Wed Feb 14 15:40:15.911 2024 (UTC + 8:00)
  38. System Uptime: 1 days 22:47:21.263
  39. Loading Kernel Symbols
  40. ...............................................................
  41. ................................................................
  42. ................................................................
  43. ................................
  44. Loading User Symbols
  45.  
  46. Loading unloaded module list
  47. .......................................
  48. For analysis of this file, run !analyze -v
  49. nt!KeBugCheckEx:
  50. fffff800`45216b00 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8883`5b5df140=0000000000000119
  51. 2: kd> !analyze -v
  52. *******************************************************************************
  53. * *
  54. * Bugcheck Analysis *
  55. * *
  56. *******************************************************************************
  57.  
  58. VIDEO_SCHEDULER_INTERNAL_ERROR (119)
  59. The video scheduler has detected that fatal violation has occurred. This resulted
  60. in a condition that video scheduler can no longer progress. Any other values after
  61. parameter 1 must be individually examined according to the subtype.
  62. Arguments:
  63. Arg1: 0000000000000002, The driver failed upon the submission of a command.
  64. Arg2: ffffffffc000000d
  65. Arg3: ffff88835b5df2a0
  66. Arg4: ffffbe0d85dcd860
  67.  
  68. Debugging Details:
  69. ------------------
  70.  
  71.  
  72. KEY_VALUES_STRING: 1
  73.  
  74. Key : Analysis.CPU.mSec
  75. Value: 2031
  76.  
  77. Key : Analysis.Elapsed.mSec
  78. Value: 14796
  79.  
  80. Key : Analysis.IO.Other.Mb
  81. Value: 0
  82.  
  83. Key : Analysis.IO.Read.Mb
  84. Value: 0
  85.  
  86. Key : Analysis.IO.Write.Mb
  87. Value: 1
  88.  
  89. Key : Analysis.Init.CPU.mSec
  90. Value: 125
  91.  
  92. Key : Analysis.Init.Elapsed.mSec
  93. Value: 6635
  94.  
  95. Key : Analysis.Memory.CommitPeak.Mb
  96. Value: 107
  97.  
  98. Key : Bugcheck.Code.LegacyAPI
  99. Value: 0x119
  100.  
  101. Key : Dump.Attributes.AsUlong
  102. Value: 808
  103.  
  104. Key : Dump.Attributes.KernelGeneratedTriageDump
  105. Value: 1
  106.  
  107. Key : Failure.Bucket
  108. Value: 0x119_2_DRIVER_FAILED_SUBMIT_COMMAND_dxgmms2!VidSchiSendToExecutionQueue
  109.  
  110. Key : Failure.Hash
  111. Value: {9a11bf9c-270e-962e-7a82-3efdab93c10e}
  112.  
  113. Key : Hypervisor.Enlightenments.ValueHex
  114. Value: 1497cf94
  115.  
  116. Key : Hypervisor.Flags.AnyHypervisorPresent
  117. Value: 1
  118.  
  119. Key : Hypervisor.Flags.ApicEnlightened
  120. Value: 1
  121.  
  122. Key : Hypervisor.Flags.ApicVirtualizationAvailable
  123. Value: 0
  124.  
  125. Key : Hypervisor.Flags.AsyncMemoryHint
  126. Value: 0
  127.  
  128. Key : Hypervisor.Flags.CoreSchedulerRequested
  129. Value: 0
  130.  
  131. Key : Hypervisor.Flags.CpuManager
  132. Value: 1
  133.  
  134. Key : Hypervisor.Flags.DeprecateAutoEoi
  135. Value: 0
  136.  
  137. Key : Hypervisor.Flags.DynamicCpuDisabled
  138. Value: 1
  139.  
  140. Key : Hypervisor.Flags.Epf
  141. Value: 0
  142.  
  143. Key : Hypervisor.Flags.ExtendedProcessorMasks
  144. Value: 1
  145.  
  146. Key : Hypervisor.Flags.HardwareMbecAvailable
  147. Value: 1
  148.  
  149. Key : Hypervisor.Flags.MaxBankNumber
  150. Value: 0
  151.  
  152. Key : Hypervisor.Flags.MemoryZeroingControl
  153. Value: 0
  154.  
  155. Key : Hypervisor.Flags.NoExtendedRangeFlush
  156. Value: 0
  157.  
  158. Key : Hypervisor.Flags.NoNonArchCoreSharing
  159. Value: 1
  160.  
  161. Key : Hypervisor.Flags.Phase0InitDone
  162. Value: 1
  163.  
  164. Key : Hypervisor.Flags.PowerSchedulerQos
  165. Value: 0
  166.  
  167. Key : Hypervisor.Flags.RootScheduler
  168. Value: 0
  169.  
  170. Key : Hypervisor.Flags.SynicAvailable
  171. Value: 1
  172.  
  173. Key : Hypervisor.Flags.UseQpcBias
  174. Value: 0
  175.  
  176. Key : Hypervisor.Flags.Value
  177. Value: 4853999
  178.  
  179. Key : Hypervisor.Flags.ValueHex
  180. Value: 4a10ef
  181.  
  182. Key : Hypervisor.Flags.VpAssistPage
  183. Value: 1
  184.  
  185. Key : Hypervisor.Flags.VsmAvailable
  186. Value: 1
  187.  
  188. Key : Hypervisor.RootFlags.AccessStats
  189. Value: 1
  190.  
  191. Key : Hypervisor.RootFlags.CrashdumpEnlightened
  192. Value: 1
  193.  
  194. Key : Hypervisor.RootFlags.CreateVirtualProcessor
  195. Value: 1
  196.  
  197. Key : Hypervisor.RootFlags.DisableHyperthreading
  198. Value: 0
  199.  
  200. Key : Hypervisor.RootFlags.HostTimelineSync
  201. Value: 1
  202.  
  203. Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  204. Value: 0
  205.  
  206. Key : Hypervisor.RootFlags.IsHyperV
  207. Value: 1
  208.  
  209. Key : Hypervisor.RootFlags.LivedumpEnlightened
  210. Value: 1
  211.  
  212. Key : Hypervisor.RootFlags.MapDeviceInterrupt
  213. Value: 1
  214.  
  215. Key : Hypervisor.RootFlags.MceEnlightened
  216. Value: 1
  217.  
  218. Key : Hypervisor.RootFlags.Nested
  219. Value: 0
  220.  
  221. Key : Hypervisor.RootFlags.StartLogicalProcessor
  222. Value: 1
  223.  
  224. Key : Hypervisor.RootFlags.Value
  225. Value: 1015
  226.  
  227. Key : Hypervisor.RootFlags.ValueHex
  228. Value: 3f7
  229.  
  230.  
  231. BUGCHECK_CODE: 119
  232.  
  233. BUGCHECK_P1: 2
  234.  
  235. BUGCHECK_P2: ffffffffc000000d
  236.  
  237. BUGCHECK_P3: ffff88835b5df2a0
  238.  
  239. BUGCHECK_P4: ffffbe0d85dcd860
  240.  
  241. FILE_IN_CAB: 021424-12031-01.dmp
  242.  
  243. TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
  244.  
  245.  
  246. DUMP_FILE_ATTRIBUTES: 0x808
  247. Kernel Generated Triage Dump
  248.  
  249. CUSTOMER_CRASH_COUNT: 1
  250.  
  251. PROCESS_NAME: System
  252.  
  253. STACK_TEXT:
  254. ffff8883`5b5df138 fffff800`8ae85685 : 00000000`00000119 00000000`00000002 ffffffff`c000000d ffff8883`5b5df2a0 : nt!KeBugCheckEx
  255. ffff8883`5b5df140 fffff800`a3b353ba : 00000000`00000000 ffffbe0d`7e8fac30 ffffbe0d`7e8fac38 ffffbe0d`7e8fac40 : watchdog!WdLogSingleEntry5+0x3b45
  256. ffff8883`5b5df1f0 fffff800`a3bb9caa : ffffbe0d`00000000 ffffbe0d`85dcd800 ffffbe0d`862e2000 ffffbe0d`85dcd860 : dxgmms2!VidSchiSendToExecutionQueue+0x1bf4a
  257. ffff8883`5b5df3c0 fffff800`a3c156ec : ffffbe0d`85dcd860 ffff8883`5b5df479 ffffbe0d`862e2000 fffff800`a3b17bbc : dxgmms2!VidSchiSendToExecutionQueueWithWait+0x5a
  258. ffff8883`5b5df3f0 fffff800`a3becbb8 : fffff800`d4050000 ffffbe0d`8964e810 ffffbe0d`8ac15010 fffff800`a3bc6af0 : dxgmms2!VidSchiSubmitPagingCommand+0x358
  259. ffff8883`5b5df4e0 fffff800`a3bc6bba : 00000011`00000000 fffff800`a3bc6af0 ffffbe0d`862e2000 ffffbe0d`913e6080 : dxgmms2!VidSchiRun_PriorityTable+0x25fa8
  260. ffff8883`5b5df530 fffff800`45107167 : ffffbe0d`94bac040 fffff800`00000001 ffffbe0d`862e2000 00000000`00000000 : dxgmms2!VidSchiWorkerThread+0xca
  261. ffff8883`5b5df570 fffff800`4521bb94 : ffffd301`6a791180 ffffbe0d`94bac040 fffff800`45107110 00000000`00000246 : nt!PspSystemThreadStartup+0x57
  262. ffff8883`5b5df5c0 00000000`00000000 : ffff8883`5b5e0000 ffff8883`5b5d9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
  263.  
  264.  
  265. SYMBOL_NAME: dxgmms2!VidSchiSendToExecutionQueue+1bf4a
  266.  
  267. MODULE_NAME: dxgmms2
  268.  
  269. IMAGE_NAME: dxgmms2.sys
  270.  
  271. IMAGE_VERSION: 10.0.22621.1258
  272.  
  273. STACK_COMMAND: .cxr; .ecxr ; kb
  274.  
  275. BUCKET_ID_FUNC_OFFSET: 1bf4a
  276.  
  277. FAILURE_BUCKET_ID: 0x119_2_DRIVER_FAILED_SUBMIT_COMMAND_dxgmms2!VidSchiSendToExecutionQueue
  278.  
  279. OSPLATFORM_TYPE: x64
  280.  
  281. OSNAME: Windows 10
  282.  
  283. FAILURE_ID_HASH: {9a11bf9c-270e-962e-7a82-3efdab93c10e}
  284.  
  285. Followup: MachineOwner
  286. ---------
  287.  
  288.  
Advertisement
Add Comment
Please, Sign In to add comment