KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffee880548b0e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffee880548b038, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7750
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10124
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffee880548b0e0
BUGCHECK_P3: ffffee880548b038
BUGCHECK_P4: 0
TRAP_FRAME: ffffee880548b0e0 -- (.trap 0xffffee880548b0e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8927447f35f8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8f85337a6670 rsi=0000000000000000 rdi=0000000000000000
rip=ffff89548015721c rsp=ffffee880548b270 rbp=ffffee880548b2e9
r8=ffffee880548b258 r9=0000000000000000 r10=fffff80520b1fc60
r11=ffffb9fc46400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
cdd!CddBitmap::RemoveFromCddBitmapList+0x80:
ffff8954`8015721c cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffee880548b038 -- (.exr 0xffffee880548b038)
ExceptionAddress: ffff89548015721c (cdd!CddBitmap::RemoveFromCddBitmapList+0x0000000000000080)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffee88`0548adb8 fffff805`20befe29 : 00000000`00000139 00000000`00000003 ffffee88`0548b0e0 ffffee88`0548b038 : nt!KeBugCheckEx
ffffee88`0548adc0 fffff805`20bf0250 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffee88`0548af00 fffff805`20bee5e3 : ffffee88`0548b0f8 ffff8f85`32d69080 ffffee88`0548b250 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffee88`0548b0e0 ffff8954`8015721c : ffff8927`447f3570 00000000`00000000 ffff8927`44cddb00 fffff805`20b16eca : nt!KiRaiseSecurityCheckFailure+0x323
ffffee88`0548b270 ffff8954`801575f2 : ffff8927`447f3570 ffff8927`447df000 fffff805`20b16eb0 ffff8954`7fa2f770 : cdd!CddBitmap::RemoveFromCddBitmapList+0x80
ffffee88`0548b2a0 ffff8954`8015f84d : 00000000`050508c1 ffff8927`447f3570 00000000`00000003 00000000`00000003 : cdd!CddBitmapHw::Release+0x72
ffffee88`0548b350 ffff8954`7fa422e8 : ffff8927`40911000 ffff8927`44cddb00 00000000`00000001 ffff8927`000008c1 : cdd!DrvDeleteDeviceBitmapEx+0x7d
ffffee88`0548b380 ffff8954`7fa435fc : ffffee88`00000000 00000000`00000003 00000000`00000000 ffffee88`00000001 : win32kbase!SURFACE::bDeleteSurface+0x738
ffffee88`0548b550 ffff8954`7fad569d : 00000000`050508c1 ffffee88`0548b610 00000000`00000002 ffff8954`00000000 : win32kbase!SURFREF::bDeleteSurface+0x14
ffffee88`0548b580 ffff8954`7fa4d86f : 00000000`00000000 ffff8927`44cddb00 00000000`00000000 ffff8927`40a0d218 : win32kbase!vGarbageCollectObject<SURFREF>+0x9d
ffffee88`0548b5e0 ffff8954`7fa4d31d : 00000000`00002918 ffff8f85`342d1005 00000000`050508c1 ffff8954`7fa84c52 : win32kbase!NtGdiCloseProcess+0x1d3
ffffee88`0548b650 ffff8954`7fd1c817 : ffff8927`44fcf0a0 ffff8954`7fdd2d51 ffff8927`44fcf0a0 00000000`00000001 : win32kbase!GdiProcessCallout+0x6d
ffffee88`0548b6d0 ffff8954`7fa77be8 : 00000000`00000000 00000000`c000001c ffffee88`0548ba38 fffff805`20a25bdb : win32kfull!W32pProcessCallout+0x107
ffffee88`0548b710 ffff8954`802c10d0 : 00000000`c000001c ffffee88`0548b9d0 00000000`00000000 ffffee88`0548ba38 : win32kbase!W32CalloutDispatch+0x488
ffffee88`0548b920 fffff805`20e62d05 : 00000000`00000000 fffff805`2141deb0 ffff8f85`24e1a3a0 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffffee88`0548b960 fffff805`20de9174 : ffff8f85`2af21cf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffffee88`0548b990 fffff805`20e4f8de : ffff8f85`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x598
ffffee88`0548ba90 fffff805`20bef878 : ffff8f85`342d1080 ffff8f85`32d69080 ffffee88`0548bb80 ffff8f85`342d1080 : nt!NtTerminateProcess+0xde
ffffee88`0548bb00 00000000`76e71cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00d6edd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e71cfc
SYMBOL_NAME: cdd!CddBitmap::RemoveFromCddBitmapList+80
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
IMAGE_VERSION: 10.0.19041.443
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 80
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_cdd!CddBitmap::RemoveFromCddBitmapList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a1c0d964-903d-625e-6a5d-948bd2e59450}
Followup: MachineOwner
---------
0: kd> lmvm cdd
Browse full module list
start end module name
ffff8954`80150000 ffff8954`80198000 cdd # (pdb symbols) C:\ProgramData\Dbg\sym\cdd.pdb\8F5D845C77058271319682526AEF22DF1\cdd.pdb
Loaded symbol image file: cdd.dll
Mapped memory image file: C:\ProgramData\Dbg\sym\cdd.dll\5788914948000\cdd.dll
Image path: \SystemRoot\System32\cdd.dll
Image name: cdd.dll
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 57889149 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0004AAC2
ImageSize: 00048000
File version: 10.0.19041.443
Product version: 10.0.19041.443
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.4 Driver
File date: 00000000.00000000
Translations: 0000.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: cdd.dll
OriginalFilename: cdd.dll
ProductVersion: 10.0.19041.443
FileVersion: 10.0.19041.443 (WinBuild.160101.0800)
FileDescription: Canonical Display Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
0: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2467]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = TUF B450-PRO GAMING
BaseBoardVersion = Rev X.0x
0: kd> .trap 0xffffee880548b0e0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8927447f35f8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8f85337a6670 rsi=0000000000000000 rdi=0000000000000000
rip=ffff89548015721c rsp=ffffee880548b270 rbp=ffffee880548b2e9
r8=ffffee880548b258 r9=0000000000000000 r10=fffff80520b1fc60
r11=ffffb9fc46400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
cdd!CddBitmap::RemoveFromCddBitmapList+0x80:
ffff8954`8015721c cd29 int 29h
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe901734e60e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe901734e6038, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9405
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffe901734e60e0
BUGCHECK_P3: ffffe901734e6038
BUGCHECK_P4: 0
TRAP_FRAME: ffffe901734e60e0 -- (.trap 0xffffe901734e60e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffef18c697b0b8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc78adc856430 rsi=0000000000000000 rdi=0000000000000000
rip=ffffef63be3c721c rsp=ffffe901734e6270 rbp=ffffe901734e62e9
r8=ffffe901734e6258 r9=0000000000000000 r10=fffff8000cb1fc60
r11=ffff8d78aac00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
cdd!CddBitmap::RemoveFromCddBitmapList+0x80:
ffffef63`be3c721c cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffe901734e6038 -- (.exr 0xffffe901734e6038)
ExceptionAddress: ffffef63be3c721c (cdd!CddBitmap::RemoveFromCddBitmapList+0x0000000000000080)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffe901`734e5db8 fffff800`0cbefe29 : 00000000`00000139 00000000`00000003 ffffe901`734e60e0 ffffe901`734e6038 : nt!KeBugCheckEx
ffffe901`734e5dc0 fffff800`0cbf0250 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe901`734e5f00 fffff800`0cbee5e3 : ffffe901`734e60f8 ffffc78a`dafe5080 ffffe901`734e6250 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe901`734e60e0 ffffef63`be3c721c : ffffef18`c697b030 00000000`00000000 ffffef18`c45e0b00 fffff800`0cb16eca : nt!KiRaiseSecurityCheckFailure+0x323
ffffe901`734e6270 ffffef63`be3c75f2 : ffffef18`c697b030 ffffef18`c65cf000 fffff800`0cb16eb0 ffffef63`bed1f770 : cdd!CddBitmap::RemoveFromCddBitmapList+0x80
ffffe901`734e62a0 ffffef63`be3cf84d : 00000000`00051341 ffffef18`c697b030 00000000`00000003 00000000`00000003 : cdd!CddBitmapHw::Release+0x72
ffffe901`734e6350 ffffef63`bed322e8 : ffffef18`c0911000 ffffef18`c45e0b00 00000000`00000001 ffffef18`c45e0b00 : cdd!DrvDeleteDeviceBitmapEx+0x7d
ffffe901`734e6380 ffffef63`bed335fc : ffffe901`00000000 00000000`00000003 00000000`00000000 ffffe901`00000001 : win32kbase!SURFACE::bDeleteSurface+0x738
ffffe901`734e6550 ffffef63`bedc569d : 00000000`00051341 ffffe901`734e6610 00000000`00000002 ffffef63`00000000 : win32kbase!SURFREF::bDeleteSurface+0x14
ffffe901`734e6580 ffffef63`bed3d86f : 00000000`00000000 ffffef18`c45e0b00 00000000`00000000 ffffef18`c0a1ce18 : win32kbase!vGarbageCollectObject<SURFREF>+0x9d
ffffe901`734e65e0 ffffef63`bed3d31d : 00000000`00000708 ffffc78a`dbeda005 00000000`00051341 ffffef63`bed74c52 : win32kbase!NtGdiCloseProcess+0x1d3
ffffe901`734e6650 ffffef63`be02c817 : ffffef18`c076eb30 ffffef63`be0e2d51 ffffef18`c076eb30 00000000`00000001 : win32kbase!GdiProcessCallout+0x6d
ffffe901`734e66d0 ffffef63`bed67be8 : 00000000`00000000 00000000`c000001c ffffe901`734e6a38 fffff800`0ca25bdb : win32kfull!W32pProcessCallout+0x107
ffffe901`734e6710 ffffef63`bded10d0 : 00000000`c000001c ffffe901`734e69d0 00000000`00000000 ffffe901`734e6a38 : win32kbase!W32CalloutDispatch+0x488
ffffe901`734e6920 fffff800`0ce62d05 : 00000000`00000000 fffff800`0d41deb0 ffffc78a`cff887e0 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffffe901`734e6960 fffff800`0cde9174 : ffffc78a`cf3b7c90 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffffe901`734e6990 fffff800`0ce4f8de : ffffc78a`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x598
ffffe901`734e6a90 fffff800`0cbef878 : ffffc78a`dbeda080 ffffc78a`dafe5080 ffffe901`734e6b80 ffffc78a`dbeda080 : nt!NtTerminateProcess+0xde
ffffe901`734e6b00 00000000`778a1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`005ce7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778a1cfc
SYMBOL_NAME: cdd!CddBitmap::RemoveFromCddBitmapList+80
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
IMAGE_VERSION: 10.0.19041.443
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 80
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_cdd!CddBitmap::RemoveFromCddBitmapList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a1c0d964-903d-625e-6a5d-948bd2e59450}
Followup: MachineOwner
---------