*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff840e2fcaea80, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff840e2fcae9d8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1484
Key : Analysis.Elapsed.mSec
Value: 2390
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 2647
Key : Analysis.Memory.CommitPeak.Mb
Value: 143
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
Key : Failure.Hash
Value: {205f16eb-23f7-9cb6-6b18-dd9368af9984}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff840e2fcaea80
BUGCHECK_P3: ffff840e2fcae9d8
BUGCHECK_P4: 0
FILE_IN_CAB: 060223-4562-01.dmp
TRAP_FRAME: ffff840e2fcaea80 -- (.trap 0xffff840e2fcaea80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcd85d07a35e8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80395cb69ca rsp=ffff840e2fcaec10 rbp=ffffcd85ce771010
r8=ffffcd85ce11d778 r9=7fff9005f200deb0 r10=0000000000000000
r11=ffff840e2fcaedc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x7a:
fffff803`95cb69ca cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff840e2fcae9d8 -- (.exr 0xffff840e2fcae9d8)
ExceptionAddress: fffff80395cb69ca (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x000000000000007a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUxRender.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff840e`2fcae758 fffff803`71e0fd29 : 00000000`00000139 00000000`00000003 ffff840e`2fcaea80 ffff840e`2fcae9d8 : nt!KeBugCheckEx
ffff840e`2fcae760 fffff803`71e10290 : 00000000`0000000b 00000000`00000000 00000000`00000002 ffffde01`fd760180 : nt!KiBugCheckDispatch+0x69
ffff840e`2fcae8a0 fffff803`71e0e25d : ffffcd85`c57541f0 ffffcd85`ced52a60 00000000`00000000 ffffde01`fd080180 : nt!KiFastFailDispatch+0xd0
ffff840e`2fcaea80 fffff803`95cb69ca : 00000000`00000000 ffffcd85`c6d6a6b0 ffffcd85`d07ba600 fffff803`7ccf0000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffff840e`2fcaec10 fffff803`95d1752a : 00000000`00000000 ffffcd85`cb7b6a60 ffffcd85`ced52a60 ffffcd85`ce11d4a0 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x7a
ffff840e`2fcaec60 fffff803`7ccf256b : 00000000`00000000 ffffcd85`cb7b6a60 00000000`08000000 00000000`00000000 : dxgmms2!VidSchSubmitCommand+0xea
ffff840e`2fcaedd0 fffff803`7ccf1a93 : ffff9005`ecb18d30 ffff840e`2fcaf8c0 ffff840e`2fcaf8c0 00000000`00000000 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x80b
ffff840e`2fcaf590 fffff803`7ccf073d : 000000c7`6b7ff1a0 fffff803`72088150 ffff9005`f200dde0 000000c7`6b7fe280 : dxgkrnl!DxgkSubmitCommandInternal+0x1313
ffff840e`2fcafa80 fffff803`71e0f4f8 : ffffcd85`d05ec080 000001da`faca8340 00000000`00000000 ffff840e`2fcafb40 : dxgkrnl!DxgkSubmitCommand+0x5d
ffff840e`2fcafac0 00007ff9`76495ae4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c7`6b7fe1b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`76495ae4
SYMBOL_NAME: dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+7a
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 7a
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {205f16eb-23f7-9cb6-6b18-dd9368af9984}
Followup: MachineOwner
---------