Bundan 1.5 ay önce Ocak ayında konu açmıştım yine aynı hatayı aldığım için. O günden bugüne kadar olmamıştı fakat son üç gündür sık sık almaya başladım. DMP dosyasının linkini bırakıyorum.
MSI Türkiye'ye hoşgeldiniz. MSI Anakart, AIO, Grafik kartı, Dizüstü Bilgisayar, Netbook, Tablet PC, Tüketici elektroniği, iletişim, Barebone, Sunucu, endüstriyel bilgi işlem, Multimedya, Temiz Makine ve Araba Bilgi-Eğlence tasarlar ve üretir.
tr.msi.com
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff81897db8bae0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81897db8ba38, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME: MS-7B38
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.D0
BIOS_DATE: 12/21/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffff81897db8bae0
BUGCHECK_P3: ffff81897db8ba38
BUGCHECK_P4: 0
TRAP_FRAME: ffff81897db8bae0 -- (.trap 0xffff81897db8bae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08f221db4a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444d547a9 rsp=ffff81897db8bc70 rbp=ffffc08f2224c7f0
r8=ffffc08f2226c820 r9=7fff900582f78b60 r10=7ffffffffffffffc
r11=ffff81897db8be08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff804`44d547a9 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff81897db8ba38 -- (.exr 0xffff81897db8ba38)
ExceptionAddress: fffff80444d547a9 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-K01TCKK
ANALYSIS_SESSION_TIME: 03-03-2019 15:35:15.0381
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff80437c72c69 to fffff80437c61440
STACK_TEXT:
ffff8189`7db8b7b8 fffff804`37c72c69 : 00000000`00000139 00000000`00000003 ffff8189`7db8bae0 ffff8189`7db8ba38 : nt!KeBugCheckEx
ffff8189`7db8b7c0 fffff804`37c73010 : 00000000`00000000 00002b05`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8189`7db8b900 fffff804`37c71408 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8189`7db8bae0 fffff804`44d547a9 : 00000000`00000000 ffffe780`c9400000 00000000`00000000 ffffc08f`2224d010 : nt!KiRaiseSecurityCheckFailure+0x308
ffff8189`7db8bc70 fffff804`44dc6812 : ffffc08f`221e2970 ffffc08f`2226c550 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffff8189`7db8bcc0 fffff804`418885e2 : ffffc08f`1f2a7610 ffffc08f`221e2970 00000000`08000000 ffffc08f`2104f000 : dxgmms2!VidSchSubmitCommand+0xf2
ffff8189`7db8be10 fffff804`41888011 : ffffc08f`21020000 ffff8189`7db8cb80 ffff8189`7db8c8d0 ffff9005`83693790 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x442
ffff8189`7db8c5e0 fffff804`418887b1 : ffff8189`7db8cad8 00000000`00000001 ffff9005`82f78a90 000002c0`39542f50 : dxgkrnl!DxgkSubmitCommandInternal+0x4f1
ffff8189`7db8ca90 ffffba88`4e604eb1 : 00000000`00000102 ffffc08f`21bac080 000002c0`3b8ef9f0 00000000`00000820 : dxgkrnl!DxgkSubmitCommand+0x51
ffff8189`7db8cad0 fffff804`37c72685 : ffffc08f`21bac080 000000ce`c51fd908 ffff8189`7db8cad8 ffffc08f`22108ca0 : win32kbase!NtGdiDdDDISubmitCommand+0x11
ffff8189`7db8cb00 00007ffd`ea415a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ce`c51fc5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ea415a44
THREAD_SHA1_HASH_MOD_FUNC: 0fe0f3029cd17e32d571e8aecb94a381045b5a90
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5079661dfaa1992577e4ad767556abce4eaf95ae
THREAD_SHA1_HASH_MOD: 0a2432e5349934d33411ce17e0d5c315ef1f7af0
FOLLOWUP_IP:
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
fffff804`44d547a9 cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.55
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 79
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
TARGET_TIME: 2019-03-03T08:03:48.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 65f3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_dxgmms2!vidschiinterlockedremoveheadlistifexist
FAILURE_ID_HASH: {205f16eb-23f7-9cb6-6b18-dd9368af9984}
Followup: MachineOwner
---------
MSI Türkiye'ye hoşgeldiniz. MSI Anakart, AIO, Grafik kartı, Dizüstü Bilgisayar, Netbook, Tablet PC, Tüketici elektroniği, iletişim, Barebone, Sunucu, endüstriyel bilgi işlem, Multimedya, Temiz Makine ve Araba Bilgi-Eğlence tasarlar ve üretir.
tr.msi.com
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff81897db8bae0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81897db8ba38, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME: MS-7B38
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.D0
BIOS_DATE: 12/21/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffff81897db8bae0
BUGCHECK_P3: ffff81897db8ba38
BUGCHECK_P4: 0
TRAP_FRAME: ffff81897db8bae0 -- (.trap 0xffff81897db8bae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08f221db4a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444d547a9 rsp=ffff81897db8bc70 rbp=ffffc08f2224c7f0
r8=ffffc08f2226c820 r9=7fff900582f78b60 r10=7ffffffffffffffc
r11=ffff81897db8be08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff804`44d547a9 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff81897db8ba38 -- (.exr 0xffff81897db8ba38)
ExceptionAddress: fffff80444d547a9 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-K01TCKK
ANALYSIS_SESSION_TIME: 03-03-2019 15:35:15.0381
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff80437c72c69 to fffff80437c61440
STACK_TEXT:
ffff8189`7db8b7b8 fffff804`37c72c69 : 00000000`00000139 00000000`00000003 ffff8189`7db8bae0 ffff8189`7db8ba38 : nt!KeBugCheckEx
ffff8189`7db8b7c0 fffff804`37c73010 : 00000000`00000000 00002b05`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8189`7db8b900 fffff804`37c71408 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8189`7db8bae0 fffff804`44d547a9 : 00000000`00000000 ffffe780`c9400000 00000000`00000000 ffffc08f`2224d010 : nt!KiRaiseSecurityCheckFailure+0x308
ffff8189`7db8bc70 fffff804`44dc6812 : ffffc08f`221e2970 ffffc08f`2226c550 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffff8189`7db8bcc0 fffff804`418885e2 : ffffc08f`1f2a7610 ffffc08f`221e2970 00000000`08000000 ffffc08f`2104f000 : dxgmms2!VidSchSubmitCommand+0xf2
ffff8189`7db8be10 fffff804`41888011 : ffffc08f`21020000 ffff8189`7db8cb80 ffff8189`7db8c8d0 ffff9005`83693790 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x442
ffff8189`7db8c5e0 fffff804`418887b1 : ffff8189`7db8cad8 00000000`00000001 ffff9005`82f78a90 000002c0`39542f50 : dxgkrnl!DxgkSubmitCommandInternal+0x4f1
ffff8189`7db8ca90 ffffba88`4e604eb1 : 00000000`00000102 ffffc08f`21bac080 000002c0`3b8ef9f0 00000000`00000820 : dxgkrnl!DxgkSubmitCommand+0x51
ffff8189`7db8cad0 fffff804`37c72685 : ffffc08f`21bac080 000000ce`c51fd908 ffff8189`7db8cad8 ffffc08f`22108ca0 : win32kbase!NtGdiDdDDISubmitCommand+0x11
ffff8189`7db8cb00 00007ffd`ea415a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ce`c51fc5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ea415a44
THREAD_SHA1_HASH_MOD_FUNC: 0fe0f3029cd17e32d571e8aecb94a381045b5a90
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5079661dfaa1992577e4ad767556abce4eaf95ae
THREAD_SHA1_HASH_MOD: 0a2432e5349934d33411ce17e0d5c315ef1f7af0
FOLLOWUP_IP:
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
fffff804`44d547a9 cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.55
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 79
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
TARGET_TIME: 2019-03-03T08:03:48.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 65f3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_dxgmms2!vidschiinterlockedremoveheadlistifexist
FAILURE_ID_HASH: {205f16eb-23f7-9cb6-6b18-dd9368af9984}
Followup: MachineOwner
---------
MSI Türkiye'ye hoşgeldiniz. MSI Anakart, AIO, Grafik kartı, Dizüstü Bilgisayar, Netbook, Tablet PC, Tüketici elektroniği, iletişim, Barebone, Sunucu, endüstriyel bilgi işlem, Multimedya, Temiz Makine ve Araba Bilgi-Eğlence tasarlar ve üretir.
tr.msi.com
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff81897db8bae0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81897db8ba38, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME: MS-7B38
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.D0
BIOS_DATE: 12/21/2018
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffff81897db8bae0
BUGCHECK_P3: ffff81897db8ba38
BUGCHECK_P4: 0
TRAP_FRAME: ffff81897db8bae0 -- (.trap 0xffff81897db8bae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08f221db4a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444d547a9 rsp=ffff81897db8bc70 rbp=ffffc08f2224c7f0
r8=ffffc08f2226c820 r9=7fff900582f78b60 r10=7ffffffffffffffc
r11=ffff81897db8be08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff804`44d547a9 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff81897db8ba38 -- (.exr 0xffff81897db8ba38)
ExceptionAddress: fffff80444d547a9 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-K01TCKK
ANALYSIS_SESSION_TIME: 03-03-2019 15:35:15.0381
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
LAST_CONTROL_TRANSFER: from fffff80437c72c69 to fffff80437c61440
STACK_TEXT:
ffff8189`7db8b7b8 fffff804`37c72c69 : 00000000`00000139 00000000`00000003 ffff8189`7db8bae0 ffff8189`7db8ba38 : nt!KeBugCheckEx
ffff8189`7db8b7c0 fffff804`37c73010 : 00000000`00000000 00002b05`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8189`7db8b900 fffff804`37c71408 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8189`7db8bae0 fffff804`44d547a9 : 00000000`00000000 ffffe780`c9400000 00000000`00000000 ffffc08f`2224d010 : nt!KiRaiseSecurityCheckFailure+0x308
ffff8189`7db8bc70 fffff804`44dc6812 : ffffc08f`221e2970 ffffc08f`2226c550 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffff8189`7db8bcc0 fffff804`418885e2 : ffffc08f`1f2a7610 ffffc08f`221e2970 00000000`08000000 ffffc08f`2104f000 : dxgmms2!VidSchSubmitCommand+0xf2
ffff8189`7db8be10 fffff804`41888011 : ffffc08f`21020000 ffff8189`7db8cb80 ffff8189`7db8c8d0 ffff9005`83693790 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x442
ffff8189`7db8c5e0 fffff804`418887b1 : ffff8189`7db8cad8 00000000`00000001 ffff9005`82f78a90 000002c0`39542f50 : dxgkrnl!DxgkSubmitCommandInternal+0x4f1
ffff8189`7db8ca90 ffffba88`4e604eb1 : 00000000`00000102 ffffc08f`21bac080 000002c0`3b8ef9f0 00000000`00000820 : dxgkrnl!DxgkSubmitCommand+0x51
ffff8189`7db8cad0 fffff804`37c72685 : ffffc08f`21bac080 000000ce`c51fd908 ffff8189`7db8cad8 ffffc08f`22108ca0 : win32kbase!NtGdiDdDDISubmitCommand+0x11
ffff8189`7db8cb00 00007ffd`ea415a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ce`c51fc5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ea415a44
THREAD_SHA1_HASH_MOD_FUNC: 0fe0f3029cd17e32d571e8aecb94a381045b5a90
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5079661dfaa1992577e4ad767556abce4eaf95ae
THREAD_SHA1_HASH_MOD: 0a2432e5349934d33411ce17e0d5c315ef1f7af0
FOLLOWUP_IP:
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
fffff804`44d547a9 cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.55
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 79
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
TARGET_TIME: 2019-03-03T08:03:48.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 65f3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_dxgmms2!vidschiinterlockedremoveheadlistifexist
FAILURE_ID_HASH: {205f16eb-23f7-9cb6-6b18-dd9368af9984}
Followup: MachineOwner
---------