Skopro_PL Posted December 17, 2016 Posted December 17, 2016 In every mission. Running the latest AMD drivers as well. Problem signature: Problem Event Name: APPCRASH Application Name: DCS.exe Application Version: 1.5.5.60338 Application Timestamp: 58541621 Fault Module Name: GraphicsVista.dll Fault Module Version: 1.5.5.60338 Fault Module Timestamp: 5849d5a6 Exception Code: c0000005 Exception Offset: 00000000000243c9 OS Version: 6.1.7601.2.1.0.256.1 Locale ID: 1033 Additional Information 1: 766a Additional Information 2: 766a7b97369744ba10cb5428f84ad63e Additional Information 3: a955 Additional Information 4: a9556fb18e77676b3285098d6edd9829 | 8700k @4.9 | Gigabyte Gaming 7 | 32gb Tridentz @3000 | EVGA 1080 TI SC2 | CV1 | VKB MCG PRO [sigpic]https://drive.google.com/file/d/1FeLGqKyJ3K08k3z-7XaegWgRuGRGkKUs/view?usp=sharing[/sigpic]
Matrix9 Posted August 4, 2021 Posted August 4, 2021 I've had a frustrating number of BSOD crashes caused by GraphicsVista.dll access violations. Here's a typical crash dump: Microsoft (R) Windows Debugger Version 10.0.19041.685 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Steve_DCS\Saved Games\DCS.openbeta\Logs\dcs.20210803-202020.dmp] User Mini Dump File: Only registers, stack and portions of memory are available Symbol search path is: srv* Executable search path is: Windows 10 Version 19043 MP (16 procs) Free x64 Product: WinNt, suite: SingleUserTS 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Debug session time: Tue Aug 3 21:20:21.000 2021 (UTC + 1:00) System Uptime: not available Process Uptime: 0 days 1:03:36.000 ................... This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (2b30.4848): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v ntdll!NtGetContextThread+0x14: 00007ffd`5e28ec54 c3 ret 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** WARNING: Unable to verify checksum for CockpitBase.dll KEY_VALUES_STRING: 1 Key : AV.Fault Value: Write Key : Analysis.CPU.Sec Value: 0 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on TITAN Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 3 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : Analysis.System Value: CreateObject Key : Timeline.Process.Start.DeltaSec Value: 3816 CONTEXT: (.ecxr) rax=00000000ffffffff rbx=0000000000000001 rcx=000001f6954d4f08 rdx=000001f6c84a9748 rsi=00007ffcf0b3b8a8 rdi=000001f6c84a9720 rip=00007ffd1d2e3c2b rsp=000000b071cff3e8 rbp=000001d8364ee340 r8=0000000000000000 r9=0000000000000001 r10=0000000000008000 r11=000000b071cff360 r12=00007ffcf0a1815c r13=0000000000000000 r14=000000b071cff588 r15=000001d8364ed770 iopl=0 nv up ei pl nz na pe nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202 GraphicsVista!Graphics::ModelPtr::release+0x1b: 00007ffd`1d2e3c2b f00fc101 lock xadd dword ptr [rcx],eax ds:000001f6`954d4f08=???????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ffd1d2e3c2b (GraphicsVista!Graphics::ModelPtr::release+0x000000000000001b) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: 000001f6954d4f08 Attempt to write to address 000001f6954d4f08 PROCESS_NAME: DCS.exe WRITE_ADDRESS: 000001f6954d4f08 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 000001f6954d4f08 STACK_TEXT: 000000b0`71cff3e8 00007ffc`f09c09c9 : 000001f6`c84a9720 00007ffc`f09c4217 000001f6`c84a9720 000001d8`00000000 : GraphicsVista!Graphics::ModelPtr::release+0x1b 000000b0`71cff3f0 00007ffc`f09c6179 : 00000000`00000001 00000000`00000000 00000000`00000000 00007ffd`5e2147b1 : CockpitBase!cockpit::ceFont::~ceFont+0x39 000000b0`71cff430 00007ffc`f0872ee2 : 000001f7`49e7a7c0 000001d8`364ed770 000001d8`364ed770 00007ffc`f0a2ba53 : CockpitBase!cockpit::ceFont::construct+0x5789 000000b0`71cff460 00007ffc`f09981ce : 000001d8`364e7270 000000b0`00000000 ffffffff`fffffffe 000001d8`364ed770 : CockpitBase!UID_base::~UID_base+0x252 000000b0`71cff490 00007ffd`5b9442d6 : 000001d8`364edea8 000001d8`364ed770 ffffffff`ffffffff 00007ffc`f0865f80 : CockpitBase!cockpit::ccDrawable::ccDrawable+0x9e 000000b0`71cff4c0 00007ffd`5b9441fb : 00000000`00000000 000000b0`71cff588 000000b0`71cff840 00007ffd`5ba20e40 : ucrtbase!<lambda_f03950bc5685219e0bcd2087efbe011e>::operator()+0xa6 000000b0`71cff510 00007ffd`5b9441b4 : 00000000`00000000 00000000`00000001 00000000`00000001 000000b0`71cff578 : ucrtbase!__crt_seh_guarded_call<int>::operator()<<lambda_7777bce6b2f8c936911f934f8298dc43>,<lambda_f03950bc5685219e0bcd2087efbe011e> &,<lambda_3883c3dff614d5e0c5f61bb1ac94921c> >+0x3b 000000b0`71cff540 00007ffc`f0a17fea : 00007ffc`f0b3e1f8 000000b0`00000002 00000000`00000002 000000b0`71cff570 : ucrtbase!execute_onexit_table+0x34 000000b0`71cff570 00007ffc`f0a18110 : 00000000`00000001 000000b0`71cff800 00000000`00000001 00000000`00000000 : CockpitBase!cockpit::VR_capture_holder::update_capture+0xe68a 000000b0`71cff5a0 00007ffd`5e209a1d : 00007ffc`f06f0000 00000000`00000000 00000000`00000001 00000000`7ffe0385 : CockpitBase!cockpit::VR_capture_holder::update_capture+0xe7b0 000000b0`71cff600 00007ffd`5e24db91 : 000001d8`24682770 00007ffc`f06f0000 00007ffc`00000000 000001d8`24682790 : ntdll!LdrpCallInitRoutine+0x61 000000b0`71cff670 00007ffd`5e24da2d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrShutdownProcess+0x141 000000b0`71cff770 00007ffd`5c27e0ab : 00000000`00000000 00000000`00000000 00007ffd`5b9ed3a0 000000b0`71cff840 : ntdll!RtlExitUserProcess+0xad 000000b0`71cff7a0 00007ffd`5b9505bc : 00000000`00000000 00000000`00000000 000000b0`71cff828 00007ffd`5ba20e40 : kernel32!ExitProcessImplementation+0xb 000000b0`71cff7d0 00007ffd`5b95045f : 00000000`00000000 00000000`00000000 00000000`00000000 000000b0`71cff820 : ucrtbase!exit_or_terminate_process+0x44 000000b0`71cff800 00007ff6`be78a2b0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : ucrtbase!common_exit+0x6f 000000b0`71cff850 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : DCS!SW+0x7197b0 SYMBOL_NAME: GraphicsVista!Graphics::ModelPtr::release+1b MODULE_NAME: GraphicsVista IMAGE_NAME: GraphicsVista.dll STACK_COMMAND: ~0s ; .ecxr ; kb FAILURE_BUCKET_ID: INVALID_POINTER_WRITE_c0000005_GraphicsVista.dll!Graphics::ModelPtr::release OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {120850a8-1ccc-7b76-933e-fe2f168d2911} Followup: MachineOwner --------- 0:000> .exr -1 ExceptionAddress: 00007ffd1d2e3c2b (GraphicsVista!Graphics::ModelPtr::release+0x000000000000001b) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: 000001f6954d4f08 Attempt to write to address 000001f6954d4f08 dcs.20210803-202020.dmp
Recommended Posts