Blue Screen SYSTEM_SERVICE_EXCEPTION

Mar 18, 2024
1
0
10
Visit site
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true

EnableRedirectToV8JsProvider : false

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\volka\Desktop\031824-10031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff802`23000000 PsLoadedModuleList = 0xfffff802`23c13530
Debug session time: Mon Mar 18 05:52:00.700 2024 (UTC + 3:00)
System Uptime: 1 days 5:00:10.295
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`010a1018). Type ".hh dbgerr001" for details
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`234177f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa686`74ef6030=000000000000003b
2: kd> !analyze -v
*******************************************************************************
  • *
  • Bugcheck Analysis *
  • *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8022322c74c, Address of the instruction which caused the BugCheck
Arg3: ffffa68674ef6980, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1125

Key : Analysis.Elapsed.mSec
Value: 11056

Key : Analysis.IO.Other.Mb
Value: 28

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 34

Key : Analysis.Init.CPU.mSec
Value: 281

Key : Analysis.Init.Elapsed.mSec
Value: 490312

Key : Analysis.Memory.CommitPeak.Mb
Value: 100

Key : Bugcheck.Code.LegacyAPI
Value: 0x3b

Key : Bugcheck.Code.TargetModel
Value: 0x3b

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: AV_dxgkrnl!operator_new

Key : Failure.Hash
Value: {c60f340f-4f53-1790-5405-773a900f1a75}


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8022322c74c

BUGCHECK_P3: ffffa68674ef6980

BUGCHECK_P4: 0

FILE_IN_CAB: 031824-10031-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

CONTEXT: ffffa68674ef6980 -- (.cxr 0xffffa68674ef6980)
rax=fff7e28bcb79e888 rbx=0000000000000008 rcx=0000000000000000
rdx=ffffe28bd1b55888 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022322c74c rsp=ffffa68674ef73a0 rbp=0000000000000000
r8=ffffe28bd1b55888 r9=ffffe28bd1b55898 r10=ffffe28bbe6002d0
r11=ffffe28bc79d1888 r12=ffffe28bc79d1888 r13=ffffe28bc225a000
r14=ffffe28bc2324038 r15=ffffe28bc8a80fe8
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x50c:
fffff802`2322c74c f6401001 test byte ptr [rax+10h],1 ds:002b:fff7e28b`cb79e898=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

STACK_TEXT:
ffffa686`74ef73a0 fffff802`2322add1 : 00000000`00000000 ffffa686`74ef75a1 00000000`0000004d 00000000`00000000 : nt!RtlRbRemoveNode+0x50c
ffffa686`74ef73d0 fffff802`2322abe7 : ffffa686`74ef7bc8 00000000`00000000 00000000`00000000 fffff802`23c143e0 : nt!RtlpHpVsChunkSplit+0x41
ffffa686`74ef7470 fffff802`2325735e : 00000000`0000004d 00000000`000004c0 ffffce81`0000004e 00000010`23210519 : nt!RtlpHpVsContextAllocateInternal+0x227
ffffa686`74ef74e0 fffff802`23256c1f : 00000000`00000000 ffffe28b`cbc7d9a0 00000000`4b677844 00000000`000000ff : nt!ExAllocateHeapPool+0x70e
ffffa686`74ef7600 fffff802`23aad68d : 00000000`00000102 00000000`00000001 00000000`00000001 00000001`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffa686`74ef7650 fffff802`3c8174f2 : ffffa686`74ef7c5c 00000000`00000000 00000000`00000000 00000000`00020000 : nt!ExAllocatePool2+0xdd
ffffa686`74ef7700 fffff802`3c99d329 : 80000002`2042c867 00000000`00000000 ffffa686`74ef77d0 ffffe28b`cca0a820 : dxgkrnl!operator new+0x32
ffffa686`74ef7730 fffff802`3c99c5a0 : ffff868d`09a2fd00 ffffa686`74ef7ea0 00000000`00000000 ffffffff`ffffffff : dxgkrnl!DXGDEVICE::CreateAllocation+0xb49
ffffa686`74ef7b50 fffff802`3c9dd4bb : 00007ffb`05a30000 00000000`00000010 ffff868d`10e84080 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0x5e0
ffffa686`74ef7df0 fffff802`2342c9e8 : ffff868d`10e84080 00000000`00000000 00000000`0c33e440 ffff868d`00000000 : dxgkrnl!DxgkCreateAllocation+0xb
ffffa686`74ef7e20 00007ffb`02f34c34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`04265c58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`02f34c34


STACK_COMMAND: .process /r /p 0x3f800000; .cxr 0xffffa68674ef6980 ; kb

SYMBOL_NAME: dxgkrnl!operator new+32

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.22621.3296

BUCKET_ID_FUNC_OFFSET: 32

FAILURE_BUCKET_ID: AV_dxgkrnl!operator_new

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c60f340f-4f53-1790-5405-773a900f1a75}

Followup: MachineOwner
 
Welcome to the forum :)

Did you have a comment or question about the above?

If you're hoping for some kind of help, please follow this guide:

 
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true

EnableRedirectToV8JsProvider : false

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true



************* Waiting for Debugger Extensions Gallery to Initialize **************


----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\volka\Desktop\031824-10031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff802`23000000 PsLoadedModuleList = 0xfffff802`23c13530
Debug session time: Mon Mar 18 05:52:00.700 2024 (UTC + 3:00)
System Uptime: 1 days 5:00:10.295
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`010a1018). Type ".hh dbgerr001" for details
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`234177f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa686`74ef6030=000000000000003b
2: kd> !analyze -v
*******************************************************************************
  • *
  • Bugcheck Analysis *
  • *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8022322c74c, Address of the instruction which caused the BugCheck
Arg3: ffffa68674ef6980, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1125

Key : Analysis.Elapsed.mSec
Value: 11056

Key : Analysis.IO.Other.Mb
Value: 28

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 34

Key : Analysis.Init.CPU.mSec
Value: 281

Key : Analysis.Init.Elapsed.mSec
Value: 490312

Key : Analysis.Memory.CommitPeak.Mb
Value: 100

Key : Bugcheck.Code.LegacyAPI
Value: 0x3b

Key : Bugcheck.Code.TargetModel
Value: 0x3b

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: AV_dxgkrnl!operator_new

Key : Failure.Hash
Value: {c60f340f-4f53-1790-5405-773a900f1a75}


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8022322c74c

BUGCHECK_P3: ffffa68674ef6980

BUGCHECK_P4: 0

FILE_IN_CAB: 031824-10031-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

CONTEXT: ffffa68674ef6980 -- (.cxr 0xffffa68674ef6980)
rax=fff7e28bcb79e888 rbx=0000000000000008 rcx=0000000000000000
rdx=ffffe28bd1b55888 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022322c74c rsp=ffffa68674ef73a0 rbp=0000000000000000
r8=ffffe28bd1b55888 r9=ffffe28bd1b55898 r10=ffffe28bbe6002d0
r11=ffffe28bc79d1888 r12=ffffe28bc79d1888 r13=ffffe28bc225a000
r14=ffffe28bc2324038 r15=ffffe28bc8a80fe8
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x50c:
fffff802`2322c74c f6401001 test byte ptr [rax+10h],1 ds:002b:fff7e28b`cb79e898=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

STACK_TEXT:
ffffa686`74ef73a0 fffff802`2322add1 : 00000000`00000000 ffffa686`74ef75a1 00000000`0000004d 00000000`00000000 : nt!RtlRbRemoveNode+0x50c
ffffa686`74ef73d0 fffff802`2322abe7 : ffffa686`74ef7bc8 00000000`00000000 00000000`00000000 fffff802`23c143e0 : nt!RtlpHpVsChunkSplit+0x41
ffffa686`74ef7470 fffff802`2325735e : 00000000`0000004d 00000000`000004c0 ffffce81`0000004e 00000010`23210519 : nt!RtlpHpVsContextAllocateInternal+0x227
ffffa686`74ef74e0 fffff802`23256c1f : 00000000`00000000 ffffe28b`cbc7d9a0 00000000`4b677844 00000000`000000ff : nt!ExAllocateHeapPool+0x70e
ffffa686`74ef7600 fffff802`23aad68d : 00000000`00000102 00000000`00000001 00000000`00000001 00000001`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffa686`74ef7650 fffff802`3c8174f2 : ffffa686`74ef7c5c 00000000`00000000 00000000`00000000 00000000`00020000 : nt!ExAllocatePool2+0xdd
ffffa686`74ef7700 fffff802`3c99d329 : 80000002`2042c867 00000000`00000000 ffffa686`74ef77d0 ffffe28b`cca0a820 : dxgkrnl!operator new+0x32
ffffa686`74ef7730 fffff802`3c99c5a0 : ffff868d`09a2fd00 ffffa686`74ef7ea0 00000000`00000000 ffffffff`ffffffff : dxgkrnl!DXGDEVICE::CreateAllocation+0xb49
ffffa686`74ef7b50 fffff802`3c9dd4bb : 00007ffb`05a30000 00000000`00000010 ffff868d`10e84080 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0x5e0
ffffa686`74ef7df0 fffff802`2342c9e8 : ffff868d`10e84080 00000000`00000000 00000000`0c33e440 ffff868d`00000000 : dxgkrnl!DxgkCreateAllocation+0xb
ffffa686`74ef7e20 00007ffb`02f34c34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`04265c58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`02f34c34


STACK_COMMAND: .process /r /p 0x3f800000; .cxr 0xffffa68674ef6980 ; kb

SYMBOL_NAME: dxgkrnl!operator new+32

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.22621.3296

BUCKET_ID_FUNC_OFFSET: 32

FAILURE_BUCKET_ID: AV_dxgkrnl!operator_new

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c60f340f-4f53-1790-5405-773a900f1a75}

Followup: MachineOwner
This doesn't really tell us anything except that you had a critical system error that caused a crash. What were you doing when this happened?
 
  • Like
Reactions: Brian Boru

TRENDING THREADS

Latest posts