csrss.exe causing BugCheck with dxgkrnl.sys module

  • Thread starter Thread starter CorruptComputer
  • Start date Start date
C

CorruptComputer

Guest
Anyone know what would cause a BSOD with error code 0x0000003b on startup?

It happens right after the dots stop spinning, but it doesn't happen every time nor can I seem to pin down what is the cause when it does happen.

I've debugged the latest dmp I got and posted it below:


15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff8055c1b7a72, Address of the instruction which caused the bugcheck
Arg3: fffff903213da6e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8202

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on ANDROMEDA

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 19631

Key : Analysis.Init.CPU.mSec
Value: 12483

Key : Analysis.Init.Elapsed.mSec
Value: 121434

Key : Analysis.Memory.CommitPeak.Mb
Value: 118

Key : Analysis.System
Value: CreateObject

Key : Dump.Attributes.FilterDumpFile
Value: 1

Key : WER.OS.Branch
Value: rs_prerelease

Key : WER.OS.Timestamp
Value: 2020-12-07T14:43:00Z

Key : WER.OS.Version
Value: 10.0.21277.1000


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x1840
Filter Dump

BUGCHECK_CODE: 3b

BUGCHECK_P1: 80000003

BUGCHECK_P2: fffff8055c1b7a72

BUGCHECK_P3: fffff903213da6e0

BUGCHECK_P4: 0

CONTEXT: fffff903213da6e0 -- (.cxr 0xfffff903213da6e0)
rax=0000000000000001 rbx=ffffe18ff9d99da8 rcx=6c06ee800e830000
rdx=00000000000000b6 rsi=0000000000000000 rdi=ffffe18ff9d99da0
rip=fffff8055c1b7a72 rsp=fffff903213db100 rbp=0000000000000001
r8=0000000000000065 r9=0000000000000000 r10=0000000000000010
r11=0000000000000000 r12=fffff8055c036220 r13=ffffe18ffe38d0c0
r14=0000000000000038 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040282
dxgkrnl!DXGMMS_EXPORT::Initialize+0x7d3a2:
fffff805`5c1b7a72 cc int 3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


PROCESS_NAME: csrss.exe

STACK_TEXT:
fffff903`213db100 fffff805`5c13a5a6 : ffffe18f`f9d99da0 ffffe18f`f7002000 00000000`00000001 00000000`00000000 : dxgkrnl!DXGMMS_EXPORT::Initialize+0x7d3a2
fffff903`213db170 fffff805`5c114c95 : 00000000`00000000 fffff903`213db300 ffffe18f`f95ec000 00000000`00000001 : dxgkrnl!DXGGLOBAL::DeferredInitialize+0x7e
fffff903`213db200 fffff805`5c11725e : 00000000`00000000 ffffe18f`f7002000 ffffe18f`fe38c030 ffffe18f`f7002000 : dxgkrnl!DXGADAPTER::Initialize+0x19d9
fffff903`213db390 fffff805`5c1188b7 : ffffe18f`fe38d0c0 ffffe18f`f3fe9940 fffff903`213db560 ffff9a8c`4be2bbd0 : dxgkrnl!DXGGLOBAL::CreateAdapter+0x76
fffff903`213db500 fffff805`5c11960c : 00000000`00000000 ffffe18f`fe38d0c0 ffff9a8c`4be2bbd0 ffffe18f`fe38c180 : dxgkrnl!DxgkAddAdapter+0x63
fffff903`213db560 fffff805`5c135139 : 00000000`00000000 fffff903`213db800 ffffe18f`fe38c030 ffff9a8c`4be2bb01 : dxgkrnl!DpiFdoStartAdapter+0xb10
fffff903`213db700 fffff805`5c134e10 : 00000000`00000000 fffff903`213dbb60 ffffe18f`fe38c180 00000000`00000001 : dxgkrnl!DpiFdoStartNonLdaAdapter+0x69
fffff903`213db750 fffff805`5c134ac0 : 00000000`00000010 00000000`00050246 fffff903`213db928 00000000`00000018 : dxgkrnl!DpiFdoStartAdapterThreadImpl+0x30c
fffff903`213db900 fffff805`5c06331a : fffff805`5c035b00 00000000`00000000 fffff903`213dbb60 ffffe18f`f1dff0a0 : dxgkrnl!DpiFdoStartAdapterThread+0x30
fffff903`213db930 fffff805`5c063210 : 00000000`00000000 fffff903`213dbb60 ffffe18f`f1dff0a0 00000000`00050217 : dxgkrnl!DpiSessionCreateCallback+0x52
fffff903`213db970 fffff805`5c370ae2 : 00000000`00000000 fffff903`213dbb60 ffffffff`fffffffd 00000000`000000c8 : dxgkrnl!DxgkNotifySessionStateChange+0x50
fffff903`213db9b0 ffff82a7`1c3812d7 : 00000000`00000000 00000000`0000000a 00000000`00000000 00000000`000000c4 : watchdog!SMgrNotifySessionChange+0x52
fffff903`213db9e0 ffff82a7`1ba1fcb1 : 00000000`00000040 fffff903`213dbb60 00000000`00000000 00000000`00000000 : win32k!SysEntrySMgrNotifySessionChange+0x17
fffff903`213dba10 ffff82a7`1ba1f70e : 00000000`00000010 00000000`00050246 fffff903`213dba68 00000000`00000018 : win32kbase!DrvNotifySessionStateChange+0x51
fffff903`213dba40 ffff82a7`1ba5ecaa : ffffe18f`f3f61140 00000000`000000c8 00000000`000000c4 ffffe18f`f9f62d60 : win32kbase!InitializeGreCSRSS+0x16
fffff903`213dba70 ffff82a7`1c381455 : ffffe18f`f9d0d080 00000000`00000001 00000000`00000020 00000000`001f0003 : win32kbase!Win32kBaseUserInitialize+0x11a
fffff903`213dbab0 fffff805`5702b2f8 : ffffe18f`f9d0d080 00000181`dc60eb01 ffffe18f`00000001 ffffe18f`00000000 : win32k!NtUserInitialize+0x15
fffff903`213dbae0 00007ffa`9651a4c4 : 00007ffa`95b917b2 00000181`dc5a0a78 00000000`00000030 00000068`ea65f2e9 : nt!KiSystemServiceCopyEnd+0x28
00000068`ea65f268 00007ffa`95b917b2 : 00000181`dc5a0a78 00000000`00000030 00000068`ea65f2e9 00000000`00000001 : win32u!NtUserInitialize+0x14
00000068`ea65f270 00007ffa`95c06ad4 : 00000181`dc605ee0 00000181`dc605ee0 00007ffa`95c13620 00000000`00000000 : winsrvext!UserServerDllInitialization+0x402
00000068`ea65f350 00007ffa`95c064e4 : 00000181`dc605d58 00000181`dc605bd0 00000000`00100000 00007ffa`95bc0000 : CSRSRV!CsrLoadServerDll+0x1e4
00000068`ea65f400 00007ffa`95c0503b : 00000000`0000000a 00000000`00000000 00000181`dc605ba0 00007ffa`95c0b6a0 : CSRSRV!CsrParseServerCommandLine+0x204
00000068`ea65f650 00007ff6`adea143c : 00000181`dc605ba0 00000181`dc605d95 00000000`00000080 00000181`dc605d95 : CSRSRV!CsrServerInitialization+0x11b
00000068`ea65f6a0 00007ff6`adea1327 : 00000181`dc605d95 00000000`0000000b 00000000`00000001 00000000`0000000d : csrss!main+0xcc
00000068`ea65f6e0 00007ff6`adea1026 : 00000000`00000000 00000000`0000000a 00000000`00000000 00000000`00000000 : csrss!NtProcessStartup_AfterSecurityCookieInitialized+0x2f7
00000068`ea65f770 00007ffa`98675bd3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : csrss!NtProcessStartup+0x16
00000068`ea65f7a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x43


SYMBOL_NAME: dxgkrnl!DXGMMS_EXPORT::Initialize+7d3a2

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

STACK_COMMAND: .cxr 0xfffff903213da6e0 ; kb

BUCKET_ID_FUNC_OFFSET: 7d3a2

FAILURE_BUCKET_ID: 0x3B_80000003_dxgkrnl!DXGMMS_EXPORT::Initialize

OS_VERSION: 10.0.21277.1000

BUILDLAB_STR: rs_prerelease

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3d38abf3-6eca-e927-c8a0-37bd23c40323}

Followup: MachineOwner
---------





15: kd> lmvm dxgkrnl
Browse full module list
start end module name
fffff805`5bf10000 fffff805`5c35d000 dxgkrnl (pdb symbols) c:\windowsdebugsymbols\dxgkrnl.pdb\C157AA9527840C2473AE9D2D5050C74D1\dxgkrnl.pdb
Loaded symbol image file: dxgkrnl.sys
Mapped memory image file: c:\windowsdebugsymbols\dxgkrnl.sys\3CBBF74544d000\dxgkrnl.sys
Image path: \SystemRoot\System32\drivers\dxgkrnl.sys
Image name: dxgkrnl.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 3CBBF745 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0044D986
ImageSize: 0044D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:





15: kd> .cxr 0xfffff903213da6e0
rax=0000000000000001 rbx=ffffe18ff9d99da8 rcx=6c06ee800e830000
rdx=00000000000000b6 rsi=0000000000000000 rdi=ffffe18ff9d99da0
rip=fffff8055c1b7a72 rsp=fffff903213db100 rbp=0000000000000001
r8=0000000000000065 r9=0000000000000000 r10=0000000000000010
r11=0000000000000000 r12=fffff8055c036220 r13=ffffe18ffe38d0c0
r14=0000000000000038 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040282
dxgkrnl!DXGMMS_EXPORT::Initialize+0x7d3a2:
fffff805`5c1b7a72 cc int 3





Running `sfc /scannow` shows that no system files are corrupted, so I think it may either be driver or hardware related.

I know that someone may say that it is because I am running an Insider build here, but I was having this BugCheck pop up for me occasionally even before I installed the Insider builds.

Any suggestions?

Continue reading...
 

Similar threads

C
Replies
0
Views
18
CorruptComputer
C
C
Replies
0
Views
5
ChristopherScroggins1
C
S
Replies
0
Views
39
Simon ElfvingKristensen
S
Back
Top