*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff807145d91a2, Address of the instruction which caused the BugCheck
Arg3: ffffdb0cac96e5c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 17468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 36383
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 3018
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff807145d91a2
BUGCHECK_P3: ffffdb0cac96e5c0
BUGCHECK_P4: 0
CONTEXT: ffffdb0cac96e5c0 -- (.cxr 0xffffdb0cac96e5c0)
rax=ffffde025b424050 rbx=ffffde025b424050 rcx=1e1e1e1e701e1dce
rdx=1e1e1e1e701e1e1e rsi=ffffde023f0a3eb8 rdi=000000000000011c
rip=fffff807145d91a2 rsp=ffffdb0cac96efc0 rbp=0000000000000000
r8=fffff807140072c0 r9=0000000000000842 r10=000000005a706e50
r11=0000000000001001 r12=ffffdb0cac96f030 r13=fffff8071466e950
r14=0000000000000000 r15=ffffde023f0a3e90
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!PiDmListEnumObjectsWithCallback+0xa2:
fffff807`145d91a2 f0ff4108 lock inc dword ptr [rcx+8] ds:002b:1e1e1e1e`701e1dd6=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
LOCK_ADDRESS: fffff80714c449e0 -- (!locks fffff80714c449e0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80714c449e0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80714c449e0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
ffffdb0c`ac96efc0 fffff807`14670ddf : ffffdb0c`ac96f300 00000000`00000000 ffffdb0c`ac96f050 ffffde02`3fe67000 : nt!PiDmListEnumObjectsWithCallback+0xa2
ffffdb0c`ac96f010 fffff807`14670d22 : ffffdb0c`ac96f360 00000000`c0000002 ffffde02`3f0a3e90 00000000`00000400 : nt!PiDmGetObjectConstraintList+0x9f
ffffdb0c`ac96f080 fffff807`14670c2f : ffffdb0c`ac96f428 ffffdb0c`ac96f490 00000000`00000004 ffffde02`3dd17d30 : nt!PiDmGetCmObjectConstraintListFromCache+0x76
ffffdb0c`ac96f0f0 fffff807`145d93fc : 00000000`00000000 ffffdb0c`ac96f360 ffffde02`3fe67000 00000000`00000002 : nt!PiPnpRtlGetFilteredDeviceInterfaceList+0xa3
ffffdb0c`ac96f190 fffff807`1466c505 : 00000000`00000103 00000000`00000000 00000000`00000000 ffffdb0c`ac96f4f8 : nt!PiPnpRtlCmActionCallback+0x1ac
ffffdb0c`ac96f300 fffff807`14669596 : 00000000`c0000023 ffffdb0c`ac96f520 00000000`00000000 ffffdb0c`00000000 : nt!_CmGetMatchingFilteredDeviceInterfaceList+0xdd
ffffdb0c`ac96f420 fffff807`14668d45 : ffffaf04`98d05001 ffffdb0c`ac96f868 00000000`00000000 ffffdb0c`ac96f668 : nt!IopGetDeviceInterfaces+0x28a
ffffdb0c`ac96f5f0 fffff807`145d8315 : af0498b7`09908a67 00000000`00120089 00000000`00000000 00000000`00000000 : nt!PiCMGetDeviceInterfaceList+0x10d
ffffdb0c`ac96f6f0 fffff807`145d8163 : ffffdb0c`ac96f840 00000000`00008014 00000000`00470807 fffff807`145f5bee : nt!PiCMHandleIoctl+0x195
ffffdb0c`ac96f730 fffff807`1469f5ba : 00000000`00470807 fffff807`1469f550 ffffdb0c`ac96fa00 fffff807`1420afca : nt!PiCMFastIoDeviceDispatch+0x53
ffffdb0c`ac96f780 fffff807`146e1db2 : 00000000`00470807 00000000`00000000 00000000`00000000 ffffaf04`98b709c0 : nt!PiDaFastIoDispatch+0x6a
ffffdb0c`ac96f7e0 fffff807`146e1a16 : 00000253`bb34f0b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
ffffdb0c`ac96f920 fffff807`144085b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffdb0c`ac96f990 00007ff8`23a4cf04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000eb`0ac7eb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`23a4cf04
SYMBOL_NAME: nt!PiDmListEnumObjectsWithCallback+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .cxr 0xffffdb0cac96e5c0 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PiDmListEnumObjectsWithCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {76bd19c0-f1a9-d0fb-468b-727418aeb0f9}
Followup: MachineOwner
---------