KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffba8c4b756f10, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffba8c4b756e68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7978
SYSTEM_SKU: Default string
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: B.C0
BIOS_DATE: 07/05/2018
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: B150 GAMING M3 (MS-7978)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffba8c4b756f10
BUGCHECK_P3: ffffba8c4b756e68
BUGCHECK_P4: 0
TRAP_FRAME: ffffba8c4b756f10 -- (.trap 0xffffba8c4b756f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc98d717d6248 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc98d71c95dd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027bcad5ed rsp=ffffba8c4b7570a0 rbp=ffff8009eb68c000
r8=0000000001005000 r9=00000000ffffffff r10=fffff80264435470
r11=0000000000000325 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x2c71d:
fffff802`7bcad5ed cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffba8c4b756e68 -- (.exr 0xffffba8c4b756e68)
ExceptionAddress: fffff8027bcad5ed (dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x000000000002c71d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: c78
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: LogonUI.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-26-2020 21:20:23.0557
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff802645d33e9 to fffff802645c1510
STACK_TEXT:
ffffba8c`4b756be8 fffff802`645d33e9 : 00000000`00000139 00000000`00000003 ffffba8c`4b756f10 ffffba8c`4b756e68 : nt!KeBugCheckEx
ffffba8c`4b756bf0 fffff802`645d3810 : 00000000`00000103 00000000`00000001 00000000`fffffffd 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffba8c`4b756d30 fffff802`645d1ba5 : fffff802`60408000 ffffc98d`7212a120 ffffc98d`729982d8 ffffc98d`729982d8 : nt!KiFastFailDispatch+0xd0
ffffba8c`4b756f10 fffff802`7bcad5ed : ffff8009`ed9ad490 ffff8009`00000000 ffffc98d`717d6210 ffffc98d`71c95cb0 : nt!KiRaiseSecurityCheckFailure+0x325
ffffba8c`4b7570a0 fffff802`7bc8141c : ffff8009`ee115b10 00000000`00000001 ffffc98d`71c95cb0 ffffc98d`71c95cb0 : dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x2c71d
ffffba8c`4b7570d0 fffff802`7bc7036b : 00000000`00000083 00000000`00000000 ffff8009`00000000 ffffba8c`4b7573c3 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x21c
ffffba8c`4b757220 fffff802`7bc935e1 : ffffc98d`7245e6b0 fffff802`7bc703c4 ffffc98d`721c7550 00000000`00000083 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x7f
ffffba8c`4b7572a0 fffff802`7bc93552 : 00000000`00000106 00000000`00010600 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49
ffffba8c`4b7572d0 fffff802`7bc7f03a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffba8c`4b757560 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0x96
ffffba8c`4b757330 fffff802`7bc7e08c : ffffc98d`721c7550 ffffc98d`72124400 ffffba8c`4b757560 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xeca
ffffba8c`4b7574d0 fffff802`7bc7317f : 00000000`00000000 00000000`00000000 ffffc98d`72124400 ffffc98d`71679480 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0x10c
ffffba8c`4b757600 fffff802`7bc73119 : 00000000`00000000 ffffc98d`71679480 ffffc98d`71679401 ffffc98d`729565b0 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3b
ffffba8c`4b757630 fffff802`7bc7be27 : ffffc98d`71679498 ffffc98d`729565b0 ffffc98d`71679498 ffff8009`ee114810 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x6d
ffffba8c`4b7576c0 fffff802`7bc7b890 : 00000000`00000000 ffffba8c`4b757870 ffff8009`eb68c000 00000000`00000001 : dxgmms2!CVirtualAddressAllocator::FreeAllocMappedVaRangeList+0x117
ffffba8c`4b757770 fffff802`7bc981a7 : ffffc98d`6e00c510 fffff802`00000000 00000000`00000001 ffffc98d`6e00c570 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0xf0
ffffba8c`4b7578e0 fffff802`7bc96ee9 : ffffc98d`6e00c510 ffffe181`a9691101 ffff8009`eb61c600 00000000`00000100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x12a7
ffffba8c`4b757ae0 fffff802`6452a7b5 : ffff8009`eb61c680 fffff802`7bc96ee0 ffffc98d`6e00c510 000024ef`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba8c`4b757b10 fffff802`645c8b5a : ffffe181`a9680180 ffff8009`eb61c680 fffff802`6452a760 455275c0`8500000b : nt!PspSystemThreadStartup+0x55
ffffba8c`4b757b60 00000000`00000000 : ffffba8c`4b758000 ffffba8c`4b751000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 07138b927afd5815e1aca4406d5146ef276b3ad0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8cf0e6a2c6f1c1a2552fae1a4c4714c68b69cb8b
THREAD_SHA1_HASH_MOD: 14914db7342ad42db0d5026fc42fca92a942ebd9
FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+2c71d
fffff802`7bcad5ed cd29 int 29h
FAULT_INSTR_CODE: 48cc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+2c71d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c71d
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation
TARGET_TIME: 2020-02-20T13:28:11.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2cf1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_dxgmms2!vidmm_global::closelocalallocation
FAILURE_ID_HASH: {e1c37518-8534-579d-dba4-630a870df059}
Followup: MachineOwner
---------