We had the same blue screen on a Windows 2022 server running in IBM cloud. All windows updates applied.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 20348 MP (8 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Edition build lab: 20348.1.amd64fre.fe_release.210507-1500
Machine Name:
Kernel base = 0xfffff80057800000 PsLoadedModuleList = 0xfffff800
58433950
Debug session time: Thu Aug 4 14:50:38.262 2022 (UTC + 2:00)
System Uptime: 1 days 4:56:12.058
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff80057c17df0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb806
623e5710=000000000000003b
5: kd> !analyze -v
**
Bugcheck Analysis
**
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8005f4aaf6f, Address of the instruction which caused the BugCheck
Arg3: ffffb806623e6040, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 29526
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 50648
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: fe_release
Key : WER.OS.Timestamp
Value: 2021-05-07T15:00:00Z
Key : WER.OS.Version
Value: 10.0.20348.1
FILE_IN_CAB: 080422-5656-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8005f4aaf6f
BUGCHECK_P3: ffffb806623e6040
BUGCHECK_P4: 0
CONTEXT: ffffb806623e6040 -- (.cxr 0xffffb806623e6040)
rax=0000000000000000 rbx=00000000c0000184 rcx=ffff800be9fd0910
rdx=00000000c0000184 rsi=ffff800bc9b06000 rdi=ffff800bd1ae9aa0
rip=fffff8005f4aaf6f rsp=ffffb806623e6a60 rbp=ffffb806623e6b69
r8=0000000000000000 r9=ffff800be9fd0910 r10=ffff800bca59a380
r11=ffff800be9fd0910 r12=fffff8005f4aaf60 r13=ffff800be9fd0910
r14=0000000000000004 r15=ffff800bc96bfe88
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
HTTP!UxpTpRestartBufferSend+0xf:
fffff8005f4aaf6f 488b5008 mov rdx,qword ptr [rax+8] ds:002b:00000000
00000008=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: w3wp.exe
STACK_TEXT:
ffffb806623e6a60 fffff800
5f4831f2 : ffff800bc96bfe88 00000000
00000004 ffff800be9fd0910 fffff800
5f4aaf60 : HTTP!UxpTpRestartBufferSend+0xf
ffffb806623e6aa0 fffff800
5f542796 : ffff800bd14898a0 00000000
c0000184 ffffb806623e6b69 ffff800b
d1ae9aa0 : HTTP!UlInvokeCompletionRoutine+0x1a
ffffb806623e6ad0 fffff800
5f45acf8 : ffff800bc9cd4b01 ffff800b
d1ae9a00 ffff800b0001a5ce ffff800b
00000000 : HTTP!UxpTpFlushMdlRuns+0x31cd6
ffffb806623e6bd0 fffff800
5f45a5ad : ffff800bd1ae9aa0 ffff800b
c96bfe88 0000000000000000 00000000
00000000 : HTTP!UxpTpProcessMdlRuns+0x3c8
ffffb806623e6ca0 fffff800
5f51b790 : ffff800bc9b06000 00000000
0000001b ffff800bc9cd4310 04000000
00002401 : HTTP!UxpTpEnqueueTransmitPacket+0x13d
ffffb806623e6cf0 fffff800
5f45a3c9 : ffff800bf6776050 ffff800b
c96bfb10 0000000000000000 00000000
00000000 : HTTP!UxTpTransmitPacket+0x200
ffffb806623e6dc0 fffff800
5f51bb40 : ffff800bc9cd4000 00000000
00000006 000000000000000c ffff800b
c96bfb10 : HTTP!UlSendData+0x129
ffffb806623e6e80 fffff800
5f459ece : ffff800bc9cd4000 ffff800b
f6776000 ffff800bc9cd4200 ffff800b
c9cd4270 : HTTP!UlpSendHttpResponseWorker+0x1e0
ffffb806623e6f60 fffff800
5f51362f : 0000000000000002 00000000
00000002 0000000000000000 ffff800b
c91d0030 : HTTP!UlSendHttpResponse+0x30e
ffffb806623e7060 fffff800
5f452fe4 : ffff800bc4503d20 fffff800
57a672c9 ffff800bc91d0030 00000000
00000168 : HTTP!UlSendHttpResponseIoctl+0x1adf
ffffb806623e76b0 fffff800
57b74aa5 : ffff800bc91d0030 00000000
00000002 0000000000000000 00000000
00000000 : HTTP!UxDeviceControl+0x84
ffffb806623e76f0 fffff800
57fb7b19 : ffff800bc91d0030 00000000
00000000 ffff800bc91d0030 00000000
00000000 : nt!IofCallDriver+0x55
ffffb806623e7730 fffff800
57e9aed1 : 0000000000000000 ffffb806
623e7a60 000000000012403f ffffb806
623e7a60 : nt!IopSynchronousServiceTail+0x189
ffffb806623e77d0 fffff800
57e9b236 : 0000000100000000 00000000
00000000 0000000000000000 000001ee
18e1f938 : nt!IopXxxControlFile+0xc61
ffffb806623e7900 fffff800
57c2a335 : ffff800bca9b1080 000000c3
0c43f9c8 ffffb806623e7988 000001ee
15ae34e0 : nt!NtDeviceIoControlFile+0x56
ffffb806623e7970 00007ff9
9ea3f854 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25
000000c30c43e638 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ff9`9ea3f854
SYMBOL_NAME: HTTP!UxpTpRestartBufferSend+f
MODULE_NAME: HTTP
IMAGE_NAME: HTTP.sys
IMAGE_VERSION: 10.0.20348.1511
STACK_COMMAND: .cxr 0xffffb806623e6040 ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: AV_HTTP!UxpTpRestartBufferSend
OS_VERSION: 10.0.20348.1
BUILDLAB_STR: fe_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {edb15224-7b43-c41e-e441-3f2974ff82b7}
Followup: MachineOwner
---------