SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8033fcc92bc, Address of the instruction which caused the bugcheck
Arg3: ffffa000c4cff920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3034
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8033fcc92bc
BUGCHECK_P3: ffffa000c4cff920
BUGCHECK_P4: 0
CONTEXT: ffffa000c4cff920 -- (.cxr 0xffffa000c4cff920)
rax=0000000000000000 rbx=ffffd881b9010290 rcx=0000000000000000
rdx=ffffd881c71d1488 rsi=ffffd881c71d1fe0 rdi=ffffd881c71d1488
rip=fffff8033fcc92bc rsp=ffff8003042064e8 rbp=00000000000004e7
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fff7d881c2983488 r12=0000000000000000 r13=ffffd881c71c7000
r14=0000000000000000 r15=ffffd881c71d1480
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!RtlRbRemoveNode+0x7c:
fffff803`3fcc92bc 498b4308 mov rax,qword ptr [r11+8] ds:002b:fff7d881`c2983490=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
BAD_STACK_POINTER: ffffa000c4cff018
STACK_TEXT:
ffff8003`042064e8 fffff803`3fcc9000 : 00000000`000004e7 ffffd881`c71d1fe0 00000000`00000000 ffffd881`c71d1480 : nt!RtlRbRemoveNode+0x7c
ffff8003`04206500 fffff803`3fcc8a48 : ffffd881`b9010280 ffffd881`c71c7000 00000000`00000000 ffff8003`04206608 : nt!RtlpHpVsChunkCoalesce+0xb0
ffff8003`04206560 fffff803`3fcc73d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffff8003`04206600 fffff803`403b1019 : 00000000`00004e60 ffffd881`b9010100 00000000`c6400000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffff8003`042066e0 fffff803`4e87e2d6 : 00000000`00000000 fffff803`3fcdb023 00000000`00000000 ffffd881`c7b7ea10 : nt!ExFreePool+0x9
ffff8003`04206710 fffff803`4e87d2f9 : ffff8003`042067e0 ffffb689`b8ecfe78 ffffd881`00000000 ffffd881`c7b7e900 : Npfs!NpReadDataQueue+0x246
ffff8003`04206780 fffff803`3fccd6c5 : ffffd881`bd881db0 ffffd881`00003e18 000001a4`76d1e128 ffffd881`c7bbeac0 : Npfs!NpFsdRead+0x259
ffff8003`04206830 fffff803`3ecc4906 : 000001a4`678edd40 00000000`00000001 ffffd881`c67dc080 fffff803`400efe11 : nt!IofCallDriver+0x55
ffff8003`04206870 fffff803`3fccd6c5 : ffffd881`c7bbeac0 000001a4`678edd40 ffff8003`04206b80 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffff8003`042068d0 fffff803`400c2528 : ffffd881`c7bbeac0 00000000`00000000 ffffd881`c7bbeac0 00000000`00000000 : nt!IofCallDriver+0x55
ffff8003`04206910 fffff803`400b99d9 : ffffd881`00000000 ffff8003`04206b80 00000000`00000000 ffff8003`04206b80 : nt!IopSynchronousServiceTail+0x1a8
ffff8003`042069b0 fffff803`3fe06bb8 : ffffd881`c4176080 00000000`00000000 00000000`00000000 000001a4`678edd40 : nt!NtReadFile+0x599
ffff8003`04206a90 00007ffd`d618be64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000058`b164f928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d618be64
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.630
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xffffa000c4cff920 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {755ca313-2d8d-461b-fb53-3761269f22fe}
Followup: Pool_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80532553620, Address of the instruction which caused the bugcheck
Arg3: fffffc02bc259c50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15374
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff80532553620
BUGCHECK_P3: fffffc02bc259c50
BUGCHECK_P4: 0
CONTEXT: fffffc02bc259c50 -- (.cxr 0xfffffc02bc259c50)
rax=0000000000000005 rbx=ffffe304ec22c140 rcx=fffff80532e4f888
rdx=0000000000000000 rsi=ffffe304ed437f10 rdi=ffffe304ec438080
rip=fffff80532553620 rsp=fffffc02bc25a650 rbp=ffffffffffffffff
r8=fffffc02bc25a680 r9=00000000ffffffff r10=7ffffffffffffffc
r11=0000000000000012 r12=ffffe304ec438080 r13=0000000000000000
r14=ffffe304ec438080 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!MiFinishVadDeletion+0x3d0:
fffff805`32553620 ff ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
MISALIGNED_IP:
nt!MiFinishVadDeletion+3d0
fffff805`32553620 ff ???
STACK_TEXT:
fffffc02`bc25a650 fffff805`32523124 : 00000000`00000002 ffffa587`00000001 ffffe304`00000001 ffffe304`00000000 : nt!MiFinishVadDeletion+0x3d0
fffffc02`bc25a6f0 fffff805`32904aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0xae4
fffffc02`bc25a800 fffff805`32904882 : ffffe304`ed437f10 00000000`00000000 ffffe304`ec22c140 00000000`00000000 : nt!MiUnmapVad+0x49
fffffc02`bc25a830 fffff805`32881f6f : 00000000`00000000 00000000`00000000 fffff658`4280bd28 fffff658`440eb3c0 : nt!MiUnmapViewOfSection+0x152
fffffc02`bc25a910 fffff628`03465ddf : ffffa587`a17d2ba0 fffff805`328cf3be fffffc02`bc25ab80 00000084`905efa48 : nt!MmUnmapViewOfSection+0xf
fffffc02`bc25a940 fffff628`03465da5 : 00000000`00000001 fffff805`324dc3d9 ffffe304`ec5d3e10 ffffe304`ec438080 : win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView+0x2b
fffffc02`bc25a970 fffff628`03465b8a : ffffe304`ec2b7e10 fffff805`324dbc59 00000000`00000000 ffffe304`ec5d3e70 : win32kbase!DirectComposition::CBatchSharedMemoryPool::Reset+0x19
fffffc02`bc25a9a0 fffff628`0346593c : fffff658`4280bad0 fffff658`4280bb90 00000000`00000000 fffff658`46f52cf0 : win32kbase!DirectComposition::CBatch::Clear+0xd6
fffffc02`bc25a9e0 fffff628`0346550f : 00000000`00000000 fffff628`03465c01 fffff658`4280bad0 0000027f`19d74820 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x1a0
fffffc02`bc25aa50 fffff628`034654b5 : 00000000`00000000 fffff658`4280bad0 fffff658`4280bad0 00007ffa`f0bef8f8 : win32kbase!DirectComposition::CDwmChannel::SubmitDwmBatch+0x23
fffffc02`bc25aa90 fffff628`03fdf019 : ffffe304`ec438080 fffffc02`bc25ab80 0000027f`0b697210 00000000`00000000 : win32kbase!NtDCompositionSubmitDWMBatch+0x55
fffffc02`bc25aad0 fffff805`32606bb8 : ffffe304`ec438080 ffffe304`ec5d33e0 fffffc02`bc25ab80 fffffc02`bc25ab80 : win32k!NtDCompositionSubmitDWMBatch+0x15
fffffc02`bc25ab00 00007ffa`f48638a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000084`905ef6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`f48638a4
SYMBOL_NAME: win32kbase!DirectComposition::CBatchSharedMemoryPool::UnmapUserModeView+2b
MODULE_NAME: hardware
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.629
STACK_COMMAND: .cxr 0xfffffc02bc259c50 ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------