INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 000000000000b5e7, Incorrect checksum
Arg4: 0000000000007d05, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5559
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: b5e7
BUGCHECK_P4: 7d05
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff8a01`5f22f548 fffff806`0a5b149c : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`0000b5e7 : nt!KeBugCheckEx
ffff8a01`5f22f550 fffff806`0a5bedf1 : 00000000`00000001 ffffdc0d`37366b90 00000003`71c62000 ffffdc0d`48053000 : nt!PopHiberChecksumHiberFileData+0x1083c
ffff8a01`5f22f5b0 fffff806`0a5b0a75 : 00000000`00000000 ffff920d`c3137e58 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x7d
ffff8a01`5f22f620 fffff806`0a59fdf0 : 00004c58`c63d2d52 ffff920d`c3137e58 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x10b2d
ffff8a01`5f22f6b0 fffff806`0a59fb2e : fffff806`0a8503f0 ffff8a01`5f22f830 fffff806`0a8503f0 00000000`00000100 : nt!PopHandleNextState+0x210
ffff8a01`5f22f700 fffff806`0a59f8ab : 00000000`00000100 fffff806`0a8503f0 000001bf`3ab5841f 00000000`00989680 : nt!PopIssueNextState+0x1a
ffff8a01`5f22f730 fffff806`0a5a2ac9 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff806`09e4bae5 : nt!PopInvokeSystemStateHandler+0x33b
ffff8a01`5f22f930 fffff806`0a5a1cdd : ffffffff`00000000 ffffffff`ffffffff ffff8a01`5f22fab0 00000000`00000000 : nt!PopEndMirroring+0x1e9
ffff8a01`5f22f9f0 fffff806`0a5a1a25 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x261
ffff8a01`5f22fa80 fffff806`09f46745 : ffffdc0d`3db4f000 ffffdc0d`3db4f040 fffff806`0a5a18f0 00000000`00000001 : nt!PopTransitionToSleep+0x135
ffff8a01`5f22fb10 fffff806`09fe5598 : fffff806`077f2180 ffffdc0d`3db4f040 fffff806`09f466f0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff8a01`5f22fb60 00000000`00000000 : ffff8a01`5f230000 ffff8a01`5f229000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+1083c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1083c
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff820a475fa450, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff820a475fa3a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 27072
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff820a475fa450
BUGCHECK_P3: ffff820a475fa3a8
BUGCHECK_P4: 0
TRAP_FRAME: ffff820a475fa450 -- (.trap 0xffff820a475fa450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa309fb0b61a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa30a0131f3a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037920db2f rsp=ffff820a475fa5e0 rbp=0000000000000dc0
r8=0000000000000001 r9=000000000000005e r10=0000000000000000
r11=fffff80378e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiCancelTimer+0x1e468f:
fffff803`7920db2f cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff820a475fa3a8 -- (.exr 0xffff820a475fa3a8)
ExceptionAddress: fffff8037920db2f (nt!KiCancelTimer+0x00000000001e468f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff820a`475fa128 fffff803`791efe29 : 00000000`00000139 00000000`00000003 ffff820a`475fa450 ffff820a`475fa3a8 : nt!KeBugCheckEx
ffff820a`475fa130 fffff803`791f0250 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffff6`00000000 : nt!KiBugCheckDispatch+0x69
ffff820a`475fa270 fffff803`791ee5e3 : ffff820a`475fa4b0 ffffc981`41b48180 00000002`00000005 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff820a`475fa450 fffff803`7920db2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff820a`475fa5e0 fffff803`79027f6c : fffff803`76c7b180 00000000`00000000 fffff803`8b634028 00000000`00000000 : nt!KiCancelTimer+0x1e468f
ffff820a`475fa690 fffff803`790272cf : ffffa30a`00000000 ffffa30a`00000007 ffff820a`475fa880 fffff803`00000000 : nt!KiSwapThread+0x6cc
ffff820a`475fa740 fffff803`79031e6e : 00000000`0000005e ffff820a`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff820a`475fa7e0 fffff803`7776f21d : ffff820a`475fa901 00000000`00989680 00000000`78f73b90 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff820a`475fa8f0 fffff803`776fb0ca : 00000000`00000000 ffffa30a`0131c000 ffff820a`475faa19 ffffa30a`0131c000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff820a`475fa9c0 fffff803`7777a585 : ffffa30a`01e61500 ffffa30a`0131c000 ffffa30a`01e61520 ffffa30a`03c04620 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff820a`475faa80 fffff803`7777a53a : ffffa30a`0131c400 fffff803`7777a470 ffffa30a`0131c000 ffffc981`41f60100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff820a`475faad0 fffff803`79146745 : ffffa30a`0131f280 fffff803`00000001 ffffa30a`0131c000 000fa4ef`b59bbfff : dxgmms2!VidSchiWorkerThread+0xca
ffff820a`475fab10 fffff803`791e5598 : ffffc981`41f60180 ffffa30a`0131f280 fffff803`791466f0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`475fab60 00000000`00000000 : ffff820a`475fb000 ffff820a`475f4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiCancelTimer+1e468f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1e468f
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCancelTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0a906956-eabe-15a9-fdee-848f8aa430ba}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffe18102f52010, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe18102f51f68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15779
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffe18102f52010
BUGCHECK_P3: ffffe18102f51f68
BUGCHECK_P4: 0
TRAP_FRAME: 83482824448948c0 -- (.trap 0x83482824448948c0)
Unable to read trap frame at 83482824`448948c0
EXCEPTION_RECORD: ffffe18102f51f68 -- (.exr 0xffffe18102f51f68)
ExceptionAddress: fffff8060cc88355 (nt!RtlpGetStackLimitsEx+0x000000000014b185)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: firefox.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffe18102f51ce8
STACK_TEXT:
ffffe181`02f51ce8 fffff806`0cbefe29 : 00000000`00000139 00000000`00000004 ffffe181`02f52010 ffffe181`02f51f68 : nt!KeBugCheckEx
ffffe181`02f51cf0 fffff806`0cbf0250 : 43110f41`8043110f 49642474`89f63390 b489ffff`ff20b389 ee8b4400`00008c24 : nt!KiBugCheckDispatch+0x69
ffffe181`02f51e30 fffff806`0cbee5e3 : ffffe181`02f527c0 00000000`00000000 ffffe181`02f51a60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe181`02f52010 fffff806`0cc88355 : 00000000`00d7c320 00000000`5c5e51cc ffffe181`02f52710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe181`02f521a0 fffff806`0cc123c1 : ffffe181`02f52710 00000000`00000000 fffff48b`bd5e2a00 fffff806`00000003 : nt!RtlpGetStackLimitsEx+0x14b185
ffffe181`02f521d0 fffff806`0ca7a7f6 : fffff48b`bd5e1f88 ffffe181`02f52e20 fffff48b`bd5e1f88 00000000`00000000 : nt!RtlDispatchException+0x1df681
ffffe181`02f528f0 fffff806`0cbdedd2 : c7000006`99058d48 570f0000`0030d045 83482824`448948c0 33c93345`00202464 : nt!KiDispatchException+0x186
ffffe181`02f52fb0 fffff806`0cbdeda0 : fffff806`0cbeff65 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff48b`bd5e1e48 fffff806`0cbeff65 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff48b`bd5e1e50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffffb014b8cf1f0
Arg3: 8000000176e28867
Arg4: fffffb011a311660
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4133
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: fffffb014b8cf1f0
BUGCHECK_P3: 8000000176e28867
BUGCHECK_P4: fffffb011a311660
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff8001`2ac2ed18 fffff802`5a2464a4 : 00000000`0000001a 00000000`00000403 fffffb01`4b8cf1f0 80000001`76e28867 : nt!KeBugCheckEx
ffff8001`2ac2ed20 fffff802`5a0c1588 : ffff8001`2ac2f020 fffffb7d`80a5c678 ffff8001`2ac2f0d0 00000000`00000000 : nt!MiDeletePteRun+0x19b6a4
ffff8001`2ac2ef50 fffff802`5a0c219b : ffff8001`2ac2f080 ffffd38f`15c52740 fffffb01`4b8cfff8 ffff8001`2ac2f080 : nt!MiDeleteVaTail+0x78
ffff8001`2ac2ef80 fffff802`5a0a789f : 00000000`00000000 00000000`00000060 ffffd38f`15c52800 ffffd38f`15c60080 : nt!MiDeletePagablePteRange+0x33b
ffff8001`2ac2f400 fffff802`5a466dd3 : ffffd38f`15c520c0 00000000`00000000 ffffd38f`00000000 ffffd38f`00000001 : nt!MiDeleteVad+0x41f
ffff8001`2ac2f530 fffff802`5a467c73 : ffffd38f`16023760 ffffd38f`16023760 ffffd38f`16023e90 ffffd38f`15c520c0 : nt!MiCleanVad+0x43
ffff8001`2ac2f560 fffff802`5a4ba247 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd38f`15c520c0 : nt!MmCleanProcessAddressSpace+0x137
ffff8001`2ac2f5e0 fffff802`5a3e8e32 : ffffd38f`15c520c0 ffffbd84`b9083730 ffff8001`2ac2f820 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8001`2ac2f660 fffff802`5a4f5298 : 00000000`000000ff 00000000`00000001 00000000`00000000 000000a2`40478000 : nt!PspExitThread+0x5f6
ffff8001`2ac2f760 fffff802`5a02a507 : ffff8001`79510101 00000000`00000000 ffffd38f`153ee010 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8001`2ac2f7a0 fffff802`5a1e2100 : 00000297`18a04960 ffff8001`2ac2f850 000000a2`406ff888 ffffd38f`00000000 : nt!KiDeliverApc+0x487
ffff8001`2ac2f850 fffff802`5a1ef51f : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38f`153ee010 : nt!KiInitiateUserApc+0x70
ffff8001`2ac2f990 00007ffe`0c60e7e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a2`406ff838 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0c60e7e4
SYMBOL_NAME: nt!MiDeletePteRun+19b6a4
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 19b6a4
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffba8805e16f80, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffba8805e16ed8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 40362
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffba8805e16f80
BUGCHECK_P3: ffffba8805e16ed8
BUGCHECK_P4: 0
TRAP_FRAME: ffffba8805e16f80 -- (.trap 0xffffba8805e16f80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa486ef5d54d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807551d7c0a rsp=ffffba8805e17110 rbp=0000000000000468
r8=ffffa486ee82d6e8 r9=0000000000000001 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x7a:
fffff807`551d7c0a cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffba8805e16ed8 -- (.exr 0xffffba8805e16ed8)
ExceptionAddress: fffff807551d7c0a (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x000000000000007a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffba88`05e16c58 fffff807`46defe29 : 00000000`00000139 00000000`00000003 ffffba88`05e16f80 ffffba88`05e16ed8 : nt!KeBugCheckEx
ffffba88`05e16c60 fffff807`46df0250 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffba88`05e16da0 fffff807`46dee5e3 : ffffba88`05e17051 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffba88`05e16f80 fffff807`551d7c0a : 00000000`00000000 fffff807`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffba88`05e17110 fffff807`5524ed12 : 00000000`00000000 ffffa486`ee703000 00000000`00000000 00000000`00000005 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x7a
ffffba88`05e17160 fffff807`551d7ecd : 00000000`00000000 00000000`00000001 00000000`00000001 ffffba88`05e17350 : dxgmms2!VidSchiAllocateQueuePacket+0x82
ffffba88`05e17250 fffff807`5523d0f4 : 00000000`00000000 00000000`00000000 ffffa486`00000000 ffffa486`eda89310 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x2ad
ffffba88`05e17490 fffff807`5523dcaf : ffff9401`328e0d00 ffff9401`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::FlushPagingBufferInternal+0x3f4
ffffba88`05e175a0 fffff807`5523c8ce : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9401`3bafad70 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1ff
ffffba88`05e176c0 fffff807`5525980e : 00000000`00000002 00000000`00989680 ffff9401`283ff190 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x86e
ffffba88`05e17900 fffff807`552636c9 : ffff9401`283ff0c0 ffffa486`ee6d4001 ffffba88`05dc7000 00000000`03d2c500 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
ffffba88`05e17ae0 fffff807`46d46745 : ffffa486`ee6d4080 fffff807`552636c0 ffff9401`283ff0c0 000fa4ef`b59bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba88`05e17b10 fffff807`46de5598 : ffff8000`02d60180 ffffa486`ee6d4080 fffff807`46d466f0 00000588`00000b10 : nt!PspSystemThreadStartup+0x55
ffffba88`05e17b60 00000000`00000000 : ffffba88`05e18000 ffffba88`05e11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+7a
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.450
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7a
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {205f16eb-23f7-9cb6-6b18-dd9368af9984}
Followup: MachineOwner
---------
5: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.0, DMIVersion 0, Size=4183]
BiosMajorRelease = 5
BiosMinorRelease = 12
BiosVendor = American Megatrends Inc.
BiosVersion = 1205
BiosReleaseDate = 05/11/2018
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B250M-PLUS
BaseBoardVersion = Rev X.0x