************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
************* Waiting for Debugger Extensions Gallery to Initialize **************
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\volka\Desktop\031824-10031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff802`23000000 PsLoadedModuleList = 0xfffff802`23c13530
Debug session time: Mon Mar 18 05:52:00.700 2024 (UTC + 3:00)
System Uptime: 1 days 5:00:10.295
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`010a1018). Type ".hh dbgerr001" for details
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`234177f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa686`74ef6030=000000000000003b
2: kd> !analyze -v
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8022322c74c, Address of the instruction which caused the BugCheck
Arg3: ffffa68674ef6980, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1125
Key : Analysis.Elapsed.mSec
Value: 11056
Key : Analysis.IO.Other.Mb
Value: 28
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 34
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 490312
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_dxgkrnl!operator_new
Key : Failure.Hash
Value: {c60f340f-4f53-1790-5405-773a900f1a75}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8022322c74c
BUGCHECK_P3: ffffa68674ef6980
BUGCHECK_P4: 0
FILE_IN_CAB: 031824-10031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
CONTEXT: ffffa68674ef6980 -- (.cxr 0xffffa68674ef6980)
rax=fff7e28bcb79e888 rbx=0000000000000008 rcx=0000000000000000
rdx=ffffe28bd1b55888 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022322c74c rsp=ffffa68674ef73a0 rbp=0000000000000000
r8=ffffe28bd1b55888 r9=ffffe28bd1b55898 r10=ffffe28bbe6002d0
r11=ffffe28bc79d1888 r12=ffffe28bc79d1888 r13=ffffe28bc225a000
r14=ffffe28bc2324038 r15=ffffe28bc8a80fe8
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x50c:
fffff802`2322c74c f6401001 test byte ptr [rax+10h],1 ds:002b:fff7e28b`cb79e898=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
ffffa686`74ef73a0 fffff802`2322add1 : 00000000`00000000 ffffa686`74ef75a1 00000000`0000004d 00000000`00000000 : nt!RtlRbRemoveNode+0x50c
ffffa686`74ef73d0 fffff802`2322abe7 : ffffa686`74ef7bc8 00000000`00000000 00000000`00000000 fffff802`23c143e0 : nt!RtlpHpVsChunkSplit+0x41
ffffa686`74ef7470 fffff802`2325735e : 00000000`0000004d 00000000`000004c0 ffffce81`0000004e 00000010`23210519 : nt!RtlpHpVsContextAllocateInternal+0x227
ffffa686`74ef74e0 fffff802`23256c1f : 00000000`00000000 ffffe28b`cbc7d9a0 00000000`4b677844 00000000`000000ff : nt!ExAllocateHeapPool+0x70e
ffffa686`74ef7600 fffff802`23aad68d : 00000000`00000102 00000000`00000001 00000000`00000001 00000001`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffa686`74ef7650 fffff802`3c8174f2 : ffffa686`74ef7c5c 00000000`00000000 00000000`00000000 00000000`00020000 : nt!ExAllocatePool2+0xdd
ffffa686`74ef7700 fffff802`3c99d329 : 80000002`2042c867 00000000`00000000 ffffa686`74ef77d0 ffffe28b`cca0a820 : dxgkrnl!operator new+0x32
ffffa686`74ef7730 fffff802`3c99c5a0 : ffff868d`09a2fd00 ffffa686`74ef7ea0 00000000`00000000 ffffffff`ffffffff : dxgkrnl!DXGDEVICE::CreateAllocation+0xb49
ffffa686`74ef7b50 fffff802`3c9dd4bb : 00007ffb`05a30000 00000000`00000010 ffff868d`10e84080 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0x5e0
ffffa686`74ef7df0 fffff802`2342c9e8 : ffff868d`10e84080 00000000`00000000 00000000`0c33e440 ffff868d`00000000 : dxgkrnl!DxgkCreateAllocation+0xb
ffffa686`74ef7e20 00007ffb`02f34c34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`04265c58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`02f34c34
STACK_COMMAND: .process /r /p 0x3f800000; .cxr 0xffffa68674ef6980 ; kb
SYMBOL_NAME: dxgkrnl!operator new+32
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.22621.3296
BUCKET_ID_FUNC_OFFSET: 32
FAILURE_BUCKET_ID: AV_dxgkrnl!operator_new
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c60f340f-4f53-1790-5405-773a900f1a75}
Followup: MachineOwner
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
----> Repository : UserExtensions, Enabled: true, Packages count: 0>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\volka\Desktop\031824-10031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff802`23000000 PsLoadedModuleList = 0xfffff802`23c13530
Debug session time: Mon Mar 18 05:52:00.700 2024 (UTC + 3:00)
System Uptime: 1 days 5:00:10.295
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`010a1018). Type ".hh dbgerr001" for details
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`234177f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa686`74ef6030=000000000000003b
2: kd> !analyze -v
*******************************************************************************
- *
- Bugcheck Analysis *
- *
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8022322c74c, Address of the instruction which caused the BugCheck
Arg3: ffffa68674ef6980, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1125
Key : Analysis.Elapsed.mSec
Value: 11056
Key : Analysis.IO.Other.Mb
Value: 28
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 34
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 490312
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_dxgkrnl!operator_new
Key : Failure.Hash
Value: {c60f340f-4f53-1790-5405-773a900f1a75}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8022322c74c
BUGCHECK_P3: ffffa68674ef6980
BUGCHECK_P4: 0
FILE_IN_CAB: 031824-10031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
CONTEXT: ffffa68674ef6980 -- (.cxr 0xffffa68674ef6980)
rax=fff7e28bcb79e888 rbx=0000000000000008 rcx=0000000000000000
rdx=ffffe28bd1b55888 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022322c74c rsp=ffffa68674ef73a0 rbp=0000000000000000
r8=ffffe28bd1b55888 r9=ffffe28bd1b55898 r10=ffffe28bbe6002d0
r11=ffffe28bc79d1888 r12=ffffe28bc79d1888 r13=ffffe28bc225a000
r14=ffffe28bc2324038 r15=ffffe28bc8a80fe8
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x50c:
fffff802`2322c74c f6401001 test byte ptr [rax+10h],1 ds:002b:fff7e28b`cb79e898=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
ffffa686`74ef73a0 fffff802`2322add1 : 00000000`00000000 ffffa686`74ef75a1 00000000`0000004d 00000000`00000000 : nt!RtlRbRemoveNode+0x50c
ffffa686`74ef73d0 fffff802`2322abe7 : ffffa686`74ef7bc8 00000000`00000000 00000000`00000000 fffff802`23c143e0 : nt!RtlpHpVsChunkSplit+0x41
ffffa686`74ef7470 fffff802`2325735e : 00000000`0000004d 00000000`000004c0 ffffce81`0000004e 00000010`23210519 : nt!RtlpHpVsContextAllocateInternal+0x227
ffffa686`74ef74e0 fffff802`23256c1f : 00000000`00000000 ffffe28b`cbc7d9a0 00000000`4b677844 00000000`000000ff : nt!ExAllocateHeapPool+0x70e
ffffa686`74ef7600 fffff802`23aad68d : 00000000`00000102 00000000`00000001 00000000`00000001 00000001`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffa686`74ef7650 fffff802`3c8174f2 : ffffa686`74ef7c5c 00000000`00000000 00000000`00000000 00000000`00020000 : nt!ExAllocatePool2+0xdd
ffffa686`74ef7700 fffff802`3c99d329 : 80000002`2042c867 00000000`00000000 ffffa686`74ef77d0 ffffe28b`cca0a820 : dxgkrnl!operator new+0x32
ffffa686`74ef7730 fffff802`3c99c5a0 : ffff868d`09a2fd00 ffffa686`74ef7ea0 00000000`00000000 ffffffff`ffffffff : dxgkrnl!DXGDEVICE::CreateAllocation+0xb49
ffffa686`74ef7b50 fffff802`3c9dd4bb : 00007ffb`05a30000 00000000`00000010 ffff868d`10e84080 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0x5e0
ffffa686`74ef7df0 fffff802`2342c9e8 : ffff868d`10e84080 00000000`00000000 00000000`0c33e440 ffff868d`00000000 : dxgkrnl!DxgkCreateAllocation+0xb
ffffa686`74ef7e20 00007ffb`02f34c34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`04265c58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`02f34c34
STACK_COMMAND: .process /r /p 0x3f800000; .cxr 0xffffa68674ef6980 ; kb
SYMBOL_NAME: dxgkrnl!operator new+32
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.22621.3296
BUCKET_ID_FUNC_OFFSET: 32
FAILURE_BUCKET_ID: AV_dxgkrnl!operator_new
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c60f340f-4f53-1790-5405-773a900f1a75}
Followup: MachineOwner