SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff803677fd85f, Address of the instruction which caused the bugcheck
Arg3: ffff9e84a59017c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff803677fd85f
BUGCHECK_P3: ffff9e84a59017c0
BUGCHECK_P4: 0
CONTEXT: ffff9e84a59017c0 -- (.cxr 0xffff9e84a59017c0)
rax=8000000000000000 rbx=ffffa282e7d97d00 rcx=8000000000000002
rdx=ff83a282ea797a30 rsi=000000000000129a rdi=0000000000000000
rip=fffff803677fd85f rsp=ffff9e84a59021b0 rbp=ffff9e84a5902b80
r8=0f505d8b7f39a54d r9=0000000000000080 r10=ffffa282f0db8cb0
r11=ffffa282e7d97d30 r12=0000000000003000 r13=0000000000003001
r14=000000fffe4fc608 r15=00000000000003a8
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!PopEtEnergyTrackerQuery+0x253:
fffff803`677fd85f 0fb7424e movzx eax,word ptr [rdx+4Eh] ds:002b:ff83a282`ea797a7e=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff9e84`a59021b0 fffff803`677e672b : 00000000`0000005d 00000000`00000001 ffffe38d`1c730080 ffffa283`13fa0801 : nt!PopEtEnergyTrackerQuery+0x253
ffff9e84`a5902340 fffff803`673d3c18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtPowerInformation+0x1b0b
ffff9e84`a5902a90 00007ff8`35f9cc44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ff`fe4fc5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`35f9cc44
SYMBOL_NAME: nt!PopEtEnergyTrackerQuery+253
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.815
STACK_COMMAND: .cxr 0xffff9e84a59017c0 ; kb
BUCKET_ID_FUNC_OFFSET: 253
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PopEtEnergyTrackerQuery
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803141e73cc, The address that the exception occurred at
Arg3: ffff8907d8cc9988, Exception Record Address
Arg4: ffff8907d8cc91d0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 18
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803141e73cc
BUGCHECK_P3: ffff8907d8cc9988
BUGCHECK_P4: ffff8907d8cc91d0
EXCEPTION_RECORD: ffff8907d8cc9988 -- (.exr 0xffff8907d8cc9988)
ExceptionAddress: fffff803141e73cc (dxgmms2!VIDMM_RECYCLE_RANGE::Decommit+0x0000000000000060)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffff8907d8cc91d0 -- (.cxr 0xffff8907d8cc91d0)
rax=ff2d940fa0b777f0 rbx=0000000000000001 rcx=0000000000000000
rdx=fffffffffffff000 rsi=ffff940f759ccab0 rdi=ffff940f95833060
rip=fffff803141e73cc rsp=ffff8907d8cc9bc0 rbp=ffffd50a2fb69001
r8=ffff940f7a7e05a0 r9=ffff8907d8cc9c08 r10=fffff8030407ff50
r11=ffffd6fe3c600000 r12=000000000051f400 r13=ffff940f6db8e3f0
r14=ffff940f7a7e05a0 r15=ffffd50a2fb69000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
dxgmms2!VIDMM_RECYCLE_RANGE::Decommit+0x60:
fffff803`141e73cc 488b4820 mov rcx,qword ptr [rax+20h] ds:002b:ff2d940f`a0b77810=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ModernWarfare.exe
READ_ADDRESS: fffff803045733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030442a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030442a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff8907`d8cc9bc0 fffff803`141e72c2 : ffff940f`9667b810 ffff8907`00000000 00000000`00000005 ffff940f`759ccab0 : dxgmms2!VIDMM_RECYCLE_RANGE::Decommit+0x60
ffff8907`d8cc9bf0 fffff803`141e7270 : ffffd50a`307eb260 ffff940f`759ccab0 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Decommit+0x1e
ffff8907`d8cc9c20 fffff803`141f0d92 : ffff940f`971b0790 ffff8907`d8cc9c70 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x50
ffff8907`d8cc9c60 fffff803`141f0f31 : ffffd50a`32774650 ffffd50a`00000000 ffff940f`971b0790 ffff940f`759ccab0 : dxgmms2!VIDMM_GLOBAL::UncommitLocalBackingStore+0xa2
ffff8907`d8cc9cf0 fffff803`141f141c : ffffd50a`32d70410 00000000`00000001 ffff940f`759ccab0 ffff940f`759ccab0 : dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x61
ffff8907`d8cc9d20 fffff803`141e036b : 00000000`000028fa 00000000`00000000 00000000`00000000 ffff8907`d8cca013 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x21c
ffff8907`d8cc9e70 fffff803`14203721 : 00000000`00000000 00000000`00000000 ffff940f`6939cfd0 00000000`000028fa : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x7f
ffff8907`d8cc9ef0 fffff803`14203692 : 00000000`000051f4 00000000`0051f400 00000000`00000000 00000000`0000001a : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49
ffff8907`d8cc9f20 fffff803`141ef03a : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8907`d8cca1b0 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0x96
ffff8907`d8cc9f80 fffff803`141ee08c : ffff940f`6939cfd0 ffff940f`96835e10 ffff8907`d8cca1b0 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xeca
ffff8907`d8cca120 fffff803`141ec1a1 : 00000000`00000000 00000000`00000000 ffff8907`d8cca550 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0x10c
ffff8907`d8cca250 fffff803`141dafbf : ffffd50a`00000003 00000000`10000000 ffff940f`971a3c48 ffff940f`908b8630 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x16d
ffff8907`d8cca6e0 fffff803`141dae9e : ffff940f`908b8450 ffff8907`d8cca800 ffff940f`908b8578 ffffd50a`2ece1760 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0x7f
ffff8907`d8cca720 fffff803`141f7ae3 : ffff940f`971a3c10 ffff8907`d8cca870 ffffd50a`2fb69000 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23e
ffff8907`d8cca770 fffff803`14209710 : ffffd50a`2fb72c00 fffff803`141c2000 ffffd50a`2fb69000 ffffd50a`2fb72c00 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x493
ffff8907`d8cca9e0 fffff803`14207029 : ffff940f`6db06810 ffffe700`f23d6300 ffffd50a`2e0e2000 00000000`00000300 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x26d0
ffff8907`d8ccabe0 fffff803`0406bcd5 : ffffd50a`2e0e2040 fffff803`14207020 ffff940f`6db06810 00000067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8907`d8ccac10 fffff803`041c9998 : ffffe700`f23c5180 ffffd50a`2e0e2040 fffff803`0406bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8907`d8ccac60 00000000`00000000 : ffff8907`d8ccb000 ffff8907`d8cc5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_RANGE::Decommit+60
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.18362.1059
STACK_COMMAND: .cxr 0xffff8907d8cc91d0 ; kb
BUCKET_ID_FUNC_OFFSET: 60
FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_RECYCLE_RANGE::Decommit
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1fcf9bd6-344f-8797-18a3-21e5286deede}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801472370ec, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801472370ec
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff801477733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8014762a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8014762a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff602`ac4b4468 fffff801`4742fd3f : 00000000`0000001e ffffffff`c0000005 fffff801`472370ec 00000000`00000000 : nt!KeBugCheckEx
fffff602`ac4b4470 fffff801`473d321d : ffff8a89`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16859f
fffff602`ac4b4b20 fffff801`473cefa2 : 00000000`00000008 ffffbb8f`e0b7eba0 00000000`00000000 ffffbb8f`d7b4cda0 : nt!KiExceptionDispatch+0x11d
fffff602`ac4b4d00 fffff801`472370ec : ffffbb8f`d7c7a180 fffff602`ac4b506c ffff8a89`b92045a0 fffff602`ac4b5660 : nt!KiGeneralProtectionFault+0x322
fffff602`ac4b4e90 fffff801`4b716dce : 00000000`00000000 00000000`00000001 fffff602`ac4b53c0 ffff8a89`b92045a0 : nt!ExAcquireResourceExclusiveLite+0x1c
fffff602`ac4b4f20 fffff801`4b716b7c : ffffbb8f`dc7a4c08 ffff8a89`b92045a0 ffffbb8f`dc7a4c40 00000000`00000000 : Ntfs!NtfsAcquireExclusiveFcb+0x7e
fffff602`ac4b4f90 fffff801`4b828b96 : ffff8a89`b92045a0 fffff602`ac4b5660 00000000`00000000 00000000`00000001 : Ntfs!NtfsAcquireFcbWithPaging+0xac
fffff602`ac4b5000 fffff801`4b7f9f23 : ffffbb8f`dc7a4c08 ffffbb8f`dfac8010 00000000`00000000 00010000`00008f8a : Ntfs!NtfsOpenFcbById+0x24e
fffff602`ac4b5100 fffff801`4b7fbcde : ffffbb8f`dc7a4c08 fffff602`ac4b53c0 ffffbb8f`dc7a4c08 ffffbb8f`dfac8010 : Ntfs!NtfsCommonCreate+0x1a93
fffff602`ac4b52f0 fffff801`47231f39 : ffffbb8f`d7c7a030 ffffbb8f`dfac8010 ffffbb8f`d7855700 ffffbb8f`d7c5c090 : Ntfs!NtfsFsdCreate+0x1fe
fffff602`ac4b5520 fffff801`4ace55de : ffffbb8f`dfac8010 ffffbb8f`dfac8300 ffffbb8f`dfac8010 ffffbb8f`e105e5f0 : nt!IofCallDriver+0x59
fffff602`ac4b5560 fffff801`4ad1cd27 : fffff602`ac4b5620 00000000`00000050 00000000`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
fffff602`ac4b55e0 fffff801`47231f39 : 00000000`00000000 ffffbb8f`de9bea04 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x307
fffff602`ac4b5690 fffff801`47230fe4 : 00000000`00000003 00000000`00000000 00000000`00000000 fffff801`472317a3 : nt!IofCallDriver+0x59
fffff602`ac4b56d0 fffff801`477e5ffb : fffff602`ac4b5a00 ffffbb8f`de9bea04 fffff602`ac4b5970 ffffbb8f`de9bea80 : nt!IoCallDriverWithTracing+0x34
fffff602`ac4b5720 fffff801`478bccc7 : ffffbb8f`d7b4cda0 fffff602`00000004 ffffbb8f`dae7a860 00000000`00100000 : nt!IopParseDevice+0x62b
fffff602`ac4b5890 fffff801`477ecfcf : fffff801`478bcc00 fffff602`ac4b5a00 ffffbb8f`e105e170 00000000`000000e1 : nt!IopParseFile+0xc7
fffff602`ac4b5900 fffff801`477eb431 : ffffbb8f`dae7a800 fffff602`ac4b5b48 ffffbb8f`000002c0 ffffbb8f`d50f4d20 : nt!ObpLookupObjectName+0x78f
fffff602`ac4b5ac0 fffff801`47830300 : 00000000`00000001 fffff602`ac524700 00000000`00000000 ffffde01`24879180 : nt!ObOpenObjectByNameEx+0x201
fffff602`ac4b5c00 fffff801`4782fa38 : fffff602`ac5246e0 00000000`80000000 fffff602`ac524700 fffff602`ac524738 : nt!IopCreateFile+0x820
fffff602`ac4b5ca0 fffff801`473d2b18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
fffff602`ac4b5d30 fffff801`473c5060 : fffff801`4ae42e01 00000000`00000000 fffff801`4b7230dc 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffff602`ac4b5f38 fffff801`4ae42e01 : 00000000`00000000 fffff801`4b7230dc 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff602`ac4b5f40 fffff801`473c4aee : 00000044`015ea7a9 00000009`003e5880 00000000`00000000 00000000`00000000 : CI!CipOpenFileOnCleanStackCallout+0x31
fffff602`ac4b5f80 fffff801`473c4aac : fffff602`ac4b5fd0 ffffbb8f`dd311080 fffff602`ac4b6000 fffff801`4726a15e : nt!KxSwitchKernelStackCallout+0x2e
fffff602`ac524440 fffff801`4726a15e : fffff602`ac4b5fd0 fffff602`ac4b6000 00000000`00000000 ffff8a89`b9205700 : nt!KiSwitchKernelStackContinue
fffff602`ac524460 fffff801`47269f5c : fffff801`4ae42dd0 fffff602`ac524650 00000000`00000002 00000000`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x18e
fffff602`ac524500 fffff801`47269dd3 : fffff602`ac524790 fffff602`ac524848 00000000`00000020 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xdc
fffff602`ac524570 fffff801`47269d8d : fffff801`4ae42dd0 fffff602`ac524650 00000000`00002000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x33
fffff602`ac5245e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
SYMBOL_NAME: nt!ExAcquireResourceExclusiveLite+1c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!ExAcquireResourceExclusiveLite
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b71912b7-b1a5-196d-e468-4c01963db433}
Followup: MachineOwner
---------