Full PC freeze - SYMBOL_NAME: nt!RtlpHpVsChunkSplit+590

English support forum

Moderators: white, Hacker, petermad, Stefan2

Post Reply
carouselcarousel
Junior Member
Junior Member
Posts: 6
Joined: 2022-04-21, 14:04 UTC

Full PC freeze - SYMBOL_NAME: nt!RtlpHpVsChunkSplit+590

Post by *carouselcarousel »

WinDBG output of my PC freeze:

Code: Select all

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8033ba250e0, Address of the instruction which caused the BugCheck
Arg3: ffffbd0922cae0c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1577

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1585

    Key  : Analysis.Init.CPU.mSec
    Value: 2499

    Key  : Analysis.Init.Elapsed.mSec
    Value: 46352

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: c

    Key  : Dump.Attributes.InsufficientDumpfileSize
    Value: 1

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.RequiredDumpfileSize
    Value: 0x5944aa2ef


FILE_IN_CAB:  092622-11015-01.dmp

DUMP_FILE_ATTRIBUTES: 0xc
  Insufficient Dumpfile Size
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8033ba250e0

BUGCHECK_P3: ffffbd0922cae0c0

BUGCHECK_P4: 0

CONTEXT:  ffffbd0922cae0c0 -- (.cxr 0xffffbd0922cae0c0)
rax=39ffad0996842888 rbx=39ffad0996842888 rcx=0000000000760000
rdx=0000000000760000 rsi=000000000000008a rdi=ffffad0996847880
rip=fffff8033ba250e0 rsp=ffffbd0922caeac0 rbp=ffffbd0922caeb38
 r8=32308a3460d98bf9  r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000e78 r13=ffffad0996846000
r14=ffffad07f1e00280 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!RtlpHpVsChunkSplit+0x590:
fffff803`3ba250e0 8b4bf8          mov     ecx,dword ptr [rbx-8] ds:002b:39ffad09`96842880=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TOTALCMD64.EXE

STACK_TEXT:  
ffffbd09`22caeac0 fffff803`3ba2497a     : 0001008a`00000e78 ffffad09`96846fe0 ffffd501`00000e78 fffff803`00000000 : nt!RtlpHpVsChunkSplit+0x590
ffffbd09`22caeb80 fffff803`3ba27ef8     : 00000000`00000000 fffff803`00000880 ffffbd09`22caecc1 00000000`00000880 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbd09`22caebe0 fffff803`3ba2763f     : ffffd501`00000000 00000000`00000005 00000000`74536d4d ffffbd09`0000a885 : nt!ExAllocateHeapPool+0x888
ffffbd09`22caed20 fffff803`3bac9e66     : 00000000`80000000 00000000`00000800 00000000`74536d4d fffff803`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffbd09`22caed70 fffff803`3baf7763     : 00000000`00000000 ffffbd09`22caee30 00000000`00000100 ffffd501`00000000 : nt!MiAllocatePool+0x86
ffffbd09`22caedc0 fffff803`3bacb002     : ffffffff`ffffffff ffffffff`ffffffff ffffd501`74b44b10 fffff803`00000000 : nt!MiCreatePrototypePtes+0x53
ffffbd09`22caee70 fffff803`3ba574b4     : 00000000`00000001 00000000`00000040 00000000`00000000 ffffad07`00000100 : nt!MiAddViewsForSection+0x3c2
ffffbd09`22caef70 fffff803`3ba5897e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapViewInSystemCache+0xc4
ffffbd09`22caf0f0 fffff803`3bab0d5a     : 00000000`00000000 fffff803`00000000 00000000`00000000 ffffd501`00000000 : nt!CcGetVacbMiss+0xce
ffffbd09`22caf180 fffff803`3badef48     : 00000000`00000000 00000000`00000000 ffffbd09`22caf290 ffffbd09`22caf274 : nt!CcGetVirtualAddress+0x33a
ffffbd09`22caf220 fffff803`3bade1da     : ffffd501`21a96050 00000000`1a146040 ffffbd09`22caf418 00000000`00001704 : nt!CcMapAndCopyInToCache+0x2f8
ffffbd09`22caf3c0 fffff803`3e61f4ed     : 00000000`00000000 ffffbd09`22caf6c0 ffffd501`128f0048 00000000`00000000 : nt!CcCopyWriteEx+0xea
ffffbd09`22caf440 fffff803`3e61b103     : ffffd501`128f0048 ffffd501`24ed7ba0 ffffbd09`22caf700 00000000`00000000 : Ntfs!NtfsCommonWrite+0x3f7d
ffffbd09`22caf690 fffff803`3ba2a6b5     : ffffd501`1e8150a0 ffffd501`24ed7ba0 ffffd501`24ed7ba0 ffffd501`0f67cd20 : Ntfs!NtfsFsdWrite+0x1d3
ffffbd09`22caf760 fffff803`383e70cf     : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffbd09`22caf7a0 fffff803`383e4a03     : ffffbd09`22caf830 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltIsCallbackDataDirty+0x42f
ffffbd09`22caf810 fffff803`3ba2a6b5     : ffffd501`24ed7ba0 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltDecodeParameters+0x683
ffffbd09`22caf870 fffff803`3be14848     : 00000000`00000001 ffffd501`74b134e0 00000000`00000001 ffffd501`24ed7f88 : nt!IofCallDriver+0x55
ffffbd09`22caf8b0 fffff803`3bded7ef     : ffffd501`00000000 ffffbd09`22cafb40 00000000`00000000 ffffbd09`22cafb40 : nt!IopSynchronousServiceTail+0x1a8
ffffbd09`22caf950 fffff803`3bc0aab8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x66f
ffffbd09`22cafa50 00007fff`80b6d284     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`01dc7218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`80b6d284


SYMBOL_NAME:  nt!RtlpHpVsChunkSplit+590

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2075

STACK_COMMAND:  .cxr 0xffffbd0922cae0c0 ; kb

BUCKET_ID_FUNC_OFFSET:  590

FAILURE_BUCKET_ID:  AV_nt!RtlpHpVsChunkSplit

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ca555611-f3f8-03bc-0392-475d779c0672}

Followup:     MachineOwner
Vasilich
Junior Member
Junior Member
Posts: 43
Joined: 2009-08-05, 08:26 UTC
Location: Mayence, Germany

Re: Full PC freeze - SYMBOL_NAME: nt!RtlpHpVsChunkSplit+590

Post by *Vasilich »

Steps to reproduce?
User avatar
ghisler(Author)
Site Admin
Site Admin
Posts: 48021
Joined: 2003-02-04, 09:46 UTC
Location: Switzerland
Contact:

Re: Full PC freeze - SYMBOL_NAME: nt!RtlpHpVsChunkSplit+590

Post by *ghisler(Author) »

According to your WinDBG dump, it happens in the Windows kernel ntkrnlmp.exe, Total Commander was probably just copying some file or saving some data (NtWriteFile call). User mode programs can't cause a full PC freeze, there must be something wrong with a device driver, or a hardware fault.
Author of Total Commander
https://www.ghisler.com
carouselcarousel
Junior Member
Junior Member
Posts: 6
Joined: 2022-04-21, 14:04 UTC

Re: Full PC freeze - SYMBOL_NAME: nt!RtlpHpVsChunkSplit+590

Post by *carouselcarousel »

ghisler(Author) wrote: 2022-09-26, 13:48 UTC According to your WinDBG dump, it happens in the Windows kernel ntkrnlmp.exe, Total Commander was probably just copying some file or saving some data (NtWriteFile call). User mode programs can't cause a full PC freeze, there must be something wrong with a device driver, or a hardware fault.
you're right! I ran a memtest and one of the 4 memory sticks is fauly. and this caused the crash. Topic can be closed. Thank you! :)
User avatar
Hacker
Moderator
Moderator
Posts: 13052
Joined: 2003-02-06, 14:56 UTC
Location: Bratislava, Slovakia

Re: Full PC freeze - SYMBOL_NAME: nt!RtlpHpVsChunkSplit+590

Post by *Hacker »

Moderator message from: Hacker

Moved to the English forum.
Mal angenommen, du drückst Strg+F, wählst die FTP-Verbindung (mit gespeichertem Passwort), klickst aber nicht auf Verbinden, sondern fällst tot um.
Post Reply