Version Windows 11 Pro Insider Preview
Version number 23H2
Installation date 1/5/2024
OS version 26020.1000
Experience Windows Feature Experience Pack 1000.26020.1000.0
In most cases, I can enter the desktop normally, and then it may run stably, or it may restart immediately within 1 minute, and occasionally flash the green screen; If there is no problem within 1 minute, it will randomly restart at the next time
Microsoft (R) Windows Debugger Version 10.0.22621.2428 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\011724-6859-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26020 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff807`7fa00000 PsLoadedModuleList = 0xfffff807`806f37f0
Debug session time: Wed Jan 17 15:29:08.975 2024 (UTC + 8:00)
System Uptime: 0 days 0:00:17.981
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077fd13c69, Address of the instruction which caused the BugCheck
Arg3: ffffab0ee12f1b10, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 781
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 799
Key : Analysis.Init.CPU.mSec
Value: 2139
Key : Analysis.Init.Elapsed.mSec
Value: 56179
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
FILE_IN_CAB: 011724-6859-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8077fd13c69
BUGCHECK_P3: ffffab0ee12f1b10
BUGCHECK_P4: 0
CONTEXT: ffffab0ee12f1b10 -- (.cxr 0xffffab0ee12f1b10)
rax=0000000000000000 rbx=0000026ea88010f0 rcx=0000000000000000
rdx=ffffe2059c772dc8 rsi=0000000000000001 rdi=00000000000000c9
rip=fffff8077fd13c69 rsp=ffffab0ee12f2590 rbp=0000000000000001
r8=ffffe2059c110dc8 r9=ffffe2059c73fdc8 r10=ffffe2058f8002d0
r11=ffffe2059c110dc8 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=00000000000000e8
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!RtlRbInsertNodeEx+0xe9:
fffff807`7fd13c69 f6431001 test byte ptr [rbx+10h],1 ds:002b:0000026e`a8801100=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dllhost.exe
STACK_TEXT:
ffffab0e`e12f2590 fffff807`7fca372c : 00000000`00000000 ffffe205`9c110dc8 ffffffff`ffffffff 00000000`00000001 : nt!RtlRbInsertNodeEx+0xe9
ffffab0e`e12f25d0 fffff807`7fca2579 : ffffe205`9cd2ebe0 ffffe205`00000000 00000000`9c724000 ffffe205`00000000 : nt!RtlpHpVsContextFreeList+0x1cc
ffffab0e`e12f2680 fffff807`7fc0d231 : ffffe205`9cd2ebd0 00000000`00000000 ffffe205`9cd2ebe0 ffffe205`9cd2ebd0 : nt!RtlpHpSegFree+0x299
ffffab0e`e12f26e0 fffff807`804e311b : 00000000`00000000 ffffab0e`e12f27b9 00000000`00000102 00000000`00000000 : nt!RtlpHpFreeHeapInternal+0xb5
ffffab0e`e12f2720 fffff807`7fe49fd0 : ffffe205`9e327010 ffffe205`9e30a378 ffffe205`8f800000 ffffe205`9e30a060 : nt!ExFreePoolWithTag+0x53b
ffffab0e`e12f2820 fffff807`8022f428 : ffffe205`9cd2ebe0 ffffe205`9e30a030 ffffe205`8f800000 00000000`00000000 : nt!SepFreeTokenCapabilities+0x20
ffffab0e`e12f2850 fffff807`80230417 : 00000000`00000000 ffffe205`9e30a030 00000000`00000000 fffff807`00000000 : nt!SepTokenDeleteMethod+0x208
ffffab0e`e12f2890 fffff807`7fc10735 : 00000000`00000000 ffffe205`9e30a030 ffffe205`9e30a030 ffffe205`9e30a060 : nt!ObpRemoveObjectRoutine+0x107
ffffab0e`e12f28f0 fffff807`8024a516 : 00000000`00000001 00000000`00000000 ffffbe87`d9b73910 00000000`000003fc : nt!ObfDereferenceObjectWithTag+0xe5
ffffab0e`e12f2930 fffff807`800805d5 : ffffbe87`d9b730c0 ffffbe87`d9b730c0 ffffab0e`e12f2aa0 00000000`00000000 : nt!NtClose+0x3f6
ffffab0e`e12f2a20 00007ff8`39948c04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000068`5e5fdde8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`39948c04
SYMBOL_NAME: nt!RtlRbInsertNodeEx+e9
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26020.1000
STACK_COMMAND: .cxr 0xffffab0ee12f1b10 ; kb
BUCKET_ID_FUNC_OFFSET: e9
FAILURE_BUCKET_ID: AV_nt!RtlRbInsertNodeEx
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {397a8882-da53-7c7b-53a2-3c65d4285a8e}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.22621.2428 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\011724-7609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26020 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802`4e600000 PsLoadedModuleList = 0xfffff802`4f2f37f0
Debug session time: Wed Jan 17 15:28:33.124 2024 (UTC + 8:00)
System Uptime: 0 days 0:00:57.131
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8024e98b653, Address of the instruction which caused the BugCheck
Arg3: fffffc05e962e3d0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 754
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 10734
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
FILE_IN_CAB: 011724-7609-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8024e98b653
BUGCHECK_P3: fffffc05e962e3d0
BUGCHECK_P4: 0
CONTEXT: fffffc05e962e3d0 -- (.cxr 0xfffffc05e962e3d0)
rax=0000000000000000 rbx=ffffa80e93817060 rcx=ffffa80e93817060
rdx=ffffa80e90a292e0 rsi=ffffa80e93817148 rdi=00046b76ffffffe0
rip=fffff8024e98b653 rsp=fffffc05e962ee50 rbp=fffffc05e962efd0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=ffffa80e90a292e0
r14=fffffc05e962f780 r15=0000000000001000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!SepTokenIsOwner+0x53:
fffff802`4e98b653 0fb64701 movzx eax,byte ptr [rdi+1] ds:002b:00046b76`ffffffe1=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffffc05`e962ee50 fffff802`4e92ce00 : 00000000`00001000 00000000`ffffffff fffffc05`e962ef00 fffffc05`e962efd0 : nt!SepTokenIsOwner+0x53
fffffc05`e962eeb0 fffff802`4e92c5d2 : 00000000`96a020ff fffffc05`e962f760 00000000`00003440 ffffa80e`886003b9 : nt!SeAccessCheckWithHint+0x820
fffffc05`e962f080 fffff802`4ee410f1 : 00000000`00000000 ffffa80e`886039c0 ffffa80e`886003e8 ffffa80e`88600380 : nt!SeAccessCheck+0x62
fffffc05`e962f0f0 fffff802`4ee3f2de : fffffc05`e962f760 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCreateHandle+0x251
fffffc05`e962f3e0 fffff802`4ee3d6c2 : ffffa80e`93817060 ffffa80e`93817060 00000000`00000000 ffffa80e`938175e0 : nt!ObOpenObjectByPointer+0x1be
fffffc05`e962f640 fffff802`4ee3d243 : 00000204`4e6fc940 00000204`00001000 00000204`4f442710 00000204`4f463000 : nt!PsOpenProcess+0x472
fffffc05`e962f9e0 fffff802`4ec805d5 : 00000000`221173e0 00000204`4e6d8918 ffff9787`e040b080 00000204`4f45c5e0 : nt!NtOpenProcess+0x23
fffffc05`e962fa20 00007ffb`62968ee4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002c`a20fce18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`62968ee4
SYMBOL_NAME: nt!SepTokenIsOwner+53
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26020.1000
STACK_COMMAND: .cxr 0xfffffc05e962e3d0 ; kb
BUCKET_ID_FUNC_OFFSET: 53
FAILURE_BUCKET_ID: AV_nt!SepTokenIsOwner
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f53836b7-9e32-b8b8-a494-f80344c52319}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.22621.2428 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\011724-7828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26020 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`68e00000 PsLoadedModuleList = 0xfffff801`69af37f0
Debug session time: Wed Jan 17 19:10:08.622 2024 (UTC + 8:00)
System Uptime: 0 days 3:06:19.629
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
16: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff801696414b6, Address of the instruction which caused the BugCheck
Arg3: ffffb38f136798c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 765
Key : Analysis.Init.CPU.mSec
Value: 655
Key : Analysis.Init.Elapsed.mSec
Value: 21753
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
FILE_IN_CAB: 011724-7828-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff801696414b6
BUGCHECK_P3: ffffb38f136798c0
BUGCHECK_P4: 0
CONTEXT: ffffb38f136798c0 -- (.cxr 0xffffb38f136798c0)
rax=ffff928f6c684910 rbx=ffff928f6cfe4650 rcx=7ffffffffffffffc
rdx=0000000000000000 rsi=0000000000020019 rdi=ffffe40c9a9be4c0
rip=fffff801696414b6 rsp=ffffb38f1367a340 rbp=ffffb38f1367a460
r8=0000000000000000 r9=ffffe40c9a9be040 r10=7ffffffffffffffc
r11=ffff928f6d341fc0 r12=fffff80168e00000 r13=ffffe40ccfb271b0
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!ObpCreateHandle+0x616:
fffff801`696414b6 488b4608 mov rax,qword ptr [rsi+8] ds:002b:00000000`00020021=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffb38f`1367a340 fffff801`6966f874 : 00000000`00000001 ffffb38f`1367a6b8 ffff928f`00000040 ffff928f`3aff4900 : nt!ObpCreateHandle+0x616
ffffb38f`1367a630 fffff801`6966ecf9 : ffffb38f`00000000 ffff928f`3aff4900 00000032`8017d1e8 00000000`00000000 : nt!ObOpenObjectByNameEx+0x3e4
ffffb38f`1367a780 fffff801`6966ea28 : 00000032`8017d1b8 00000000`00000000 00000000`00000000 fffff801`69481985 : nt!CmOpenKey+0x2a9
ffffb38f`1367a9d0 fffff801`694805d5 : ffff928f`6c6840c0 00000000`00000000 ffff928f`6c6840c0 00000032`8017d520 : nt!NtOpenKeyEx+0x48
ffffb38f`1367aa20 00007ffc`b496af74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000032`8017d198 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b496af74
SYMBOL_NAME: nt!ObpCreateHandle+616
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26020.1000
STACK_COMMAND: .cxr 0xffffb38f136798c0 ; kb
BUCKET_ID_FUNC_OFFSET: 616
FAILURE_BUCKET_ID: AV_nt!ObpCreateHandle
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6445ac53-9c98-18b9-3bfd-02841264dd5b}
Followup: MachineOwner
---------