KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0d54e2f750, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0d54e2f6a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: A320M-H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/28/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: A320M-H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffdf0d54e2f750
BUGCHECK_P3: ffffdf0d54e2f6a8
BUGCHECK_P4: 0
TRAP_FRAME: ffffdf0d54e2f750 -- (.trap 0xffffdf0d54e2f750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc859bacf158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcc85a0fe1158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ec89fc0 rsp=ffffdf0d54e2f8e0 rbp=0000000000000000
r8=0000000000000000 r9=ffffcc859bacf1c0 r10=ffffcc859db31700
r11=7fffcc859b089470 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiRemovePrcbWaitEntry+0xe8:
fffff801`1ec89fc0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 12:48:43.0940
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8011edaf729 to fffff8011ed9d860
STACK_TEXT:
ffffdf0d`54e2f428 fffff801`1edaf729 : 00000000`00000139 00000000`00000003 ffffdf0d`54e2f750 ffffdf0d`54e2f6a8 : nt!KeBugCheckEx
ffffdf0d`54e2f430 fffff801`1edafb50 : 00000000`00000272 00000000`00000001 00000000`00000001 fffff801`1ec3ddc4 : nt!KiBugCheckDispatch+0x69
ffffdf0d`54e2f570 fffff801`1edadee3 : ffffcc85`9db31080 ffffcc85`9be43578 00000000`00000001 fffff801`1ec69aef : nt!KiFastFailDispatch+0xd0
ffffdf0d`54e2f750 fffff801`1ec89fc0 : ffffa38b`ae9ae990 fffff801`1ec69abe ffffa38b`8e638c70 ffffdf0d`54e2fa80 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0d`54e2f8e0 fffff801`1ec89de9 : ffffdf0d`00000000 ffffcc85`9bacf080 ffffe380`4ad36180 ffffcc85`9b089310 : nt!KiRemovePrcbWaitEntry+0xe8
ffffdf0d`54e2f910 fffff801`1ec89d0b : ffffe380`4ad36180 ffffcc85`9bacf1c0 ffffa38b`ae9ae990 ffffcc85`9b089310 : nt!KiSignalThread+0x45
ffffdf0d`54e2f940 fffff801`1ec4ba14 : ffffcc85`9bacf508 00000000`00000000 00000000`00000000 fffff801`1efc7938 : nt!KiTryUnwaitThread+0x6b
ffffdf0d`54e2f990 fffff801`1ec4bd8a : ffffcc85`9bacf510 ffffa38b`00000001 00000000`00000000 00000000`00000001 : nt!KeReleaseSemaphoreEx+0xd0
ffffdf0d`54e2fa10 fffff801`1ec4bc70 : 00000000`00020002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpSignal+0x46
ffffdf0d`54e2fa50 fffff801`1efc702b : 00000000`00020002 ffffcc85`a05b82c0 ffffcc85`9b089310 ffffcc85`9db31508 : nt!AlpcpSignalAndWait+0x34
ffffdf0d`54e2fa90 fffff801`1efc6cf7 : ffffdf0d`54e2fb70 00000000`00020002 ffffcc85`a05b82c0 ffffdf0d`54e2fc90 : nt!AlpcpReceiveSynchronousReply+0x57
ffffdf0d`54e2faf0 fffff801`1f0746f9 : ffffcc85`9b089310 00000000`00020002 ffffdf0d`54e2ffa0 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x1a7
ffffdf0d`54e2fbf0 fffff801`1f20179f : 00000000`00000000 04d80000`00000000 022f0000`00000000 00000000`00000000 : nt!LpcSendWaitReceivePort+0x49
ffffdf0d`54e2fc50 fffff801`1f1a103d : ffffcc85`9b089310 ffffdf0d`54e30a58 ffffcc85`9b089310 ffffcc85`a05b82c0 : nt!DbgkpSendApiMessageLpc+0x7f
ffffdf0d`54e2ff70 fffff801`1ee05129 : ffffdf0d`54e30a58 ffffdf0d`54e30a58 ffffffff`ffffffff 00000234`7f005540 : nt!DbgkForwardException+0x10bd9d
ffffdf0d`54e300f0 fffff801`1edafb64 : 00000000`00000001 fffff801`1ec690db ffffcc85`9db31080 ffffcc85`9ba6e088 : nt!KiDispatchException+0x1384d9
ffffdf0d`54e30920 fffff801`1edadee3 : 00000234`0ac3ab70 ffffcc85`920cb3e0 ffffdf0d`54e30b18 ffffffff`ff355d00 : nt!KiFastFailDispatch+0xe4
ffffdf0d`54e30b00 00007ffc`10210db4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
0000007e`4e9fe180 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`10210db4
THREAD_SHA1_HASH_MOD_FUNC: d90eb29bdb338700c49678c510492c81f63e72a6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 059c61829a639b071d9dc6749cabb2741e714236
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801`1edafb50 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 31cf0885
IMAGE_VERSION: 10.0.19041.153
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
TARGET_TIME: 2020-04-04T01:56:00.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 2e7e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffe601b03b8000, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe601b03b7f58, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: A320M-H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/28/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: A320M-H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffffe601b03b8000
BUGCHECK_P3: ffffe601b03b7f58
BUGCHECK_P4: 0
TRAP_FRAME: ffb0ae38e838c183 -- (.trap 0xffb0ae38e838c183)
Unable to read trap frame at ffb0ae38`e838c183
EXCEPTION_RECORD: ccffe453b7e9e375 -- (.exr 0xccffe453b7e9e375)
Cannot read Exception record @ ccffe453b7e9e375
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: steam.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 12:48:46.0261
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffe601b03b7cd8
LAST_CONTROL_TRANSFER: from fffff804325af729 to fffff8043259d860
STACK_TEXT:
ffffe601`b03b7cd8 fffff804`325af729 : 00000000`00000139 00000000`00000004 ffffe601`b03b8000 ffffe601`b03b7f58 : nt!KeBugCheckEx
ffffe601`b03b7ce0 fffff804`325afb50 : 0000013c`00000000 00000000`00000fff 00000000`00000000 000001c6`b9000000 : nt!KiBugCheckDispatch+0x69
ffffe601`b03b7e20 fffff804`325adee3 : fffff804`324ffa74 fffff804`322a2430 ffffe601`b03b87c0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe601`b03b8000 fffff804`325d6073 : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a7a36e90 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe601`b03b8190 fffff804`325d61bc : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a832cf80 e9e88b4c`00000002 : nt!RtlpGetStackLimitsEx+0x18dd53
ffffe601`b03b81c0 fffff804`324ccdd6 : ffff8c81`a832be98 ffffe601`b03b8e20 ffff8c81`a832be98 ffffd60d`76afc020 : nt!RtlDispatchException+0x18de6c
ffffe601`b03b88f0 fffff804`3259e6f2 : ccffe453`b7e9e375 48000004`38898b48 ffb0ae38`e838c183 e9000004`50838b48 : nt!KiDispatchException+0x186
ffffe601`b03b8fb0 fffff804`3259e6c0 : fffff804`325af865 00000000`00040202 fffff804`324824c8 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8c81`a832bd58 fffff804`325af865 : 00000000`00040202 fffff804`324824c8 00000000`00000001 fffff804`3249ee9d : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8c81`a832bd60 fffff804`325ab5a0 : ffffd60d`7ec47ba0 ffffd60d`7ec47b70 ffffd60d`83f2db10 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffff8c81`a832bf40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
THREAD_SHA1_HASH_MOD_FUNC: e737fbae702fb97094ad39b47d3b15c19fae2b06
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 423c208199439684a135aeec2f53e246e0c541fd
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff804`325afb50 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 31cf0885
IMAGE_VERSION: 10.0.19041.153
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
TARGET_TIME: 2020-04-10T11:48:39.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: e58
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff888006309c30
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: A320M-H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/28/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: A320M-H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff888006309c30
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: DyingLightGame.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 12:48:49.0569
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8047e609187 to fffff8047e59d860
STACK_TEXT:
ffff8688`381fcef8 fffff804`7e609187 : 00000000`0000001a 00000000`00041790 ffff8880`06309c30 00000000`00000000 : nt!KeBugCheckEx
ffff8688`381fcf00 fffff804`7e46d279 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x131417
ffff8688`381fcf40 fffff804`7e46c437 : fffff880`00a79ff8 ffffe702`18ee0700 00000000`00000000 00000000`00000200 : nt!MiDeleteVa+0x389
ffff8688`381fcfd0 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`400053c8 0a000002`10341867 : nt!MiWalkPageTablesRecursively+0x207
ffff8688`381fd030 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e200028 0a000000`33132867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd090 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e3f1000 0a000000`49809867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd0f0 fffff804`7e45e065 : ffffe702`18ee0700 fffff804`7e46cef0 ffff8688`381fd270 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd150 fffff804`7e452aca : 00000001`50ffffff 00000000`00000000 ffff8688`381fd2e0 ffffe702`18ee0700 : nt!MiWalkPageTables+0x1e5
ffff8688`381fd1e0 fffff804`7e452710 : ffffe702`1c5de080 ffffe702`18ee0550 00000000`00000001 fffff804`7e45445c : nt!MiDeletePagablePteRange+0x392
ffff8688`381fd650 fffff804`7e453f97 : 00000000`00000000 ffffe702`00000000 ffff8688`381fd729 ffffe702`1c5de000 : nt!MiDeleteVirtualAddresses+0x48
ffff8688`381fd6a0 fffff804`7e4d686f : 00000000`00000000 00000000`00000000 ffffe702`00000000 ffffe702`18ee0700 : nt!MiDeleteVad+0x22f
ffff8688`381fd790 fffff804`7e7cdb05 : 00000000`00000000 00000000`00000000 ffff8688`381fd8d9 00000001`4f000000 : nt!MiFreeVadRange+0xa3
ffff8688`381fd7f0 fffff804`7e7cd74b : ffff6e7f`16e5187b 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x385
ffff8688`381fd930 fffff804`7e5af178 : ffffe702`1c5de080 fffff804`7e493431 00000000`00000100 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
ffff8688`381fd990 fffff804`7e5a16c0 : fffff804`9085204e ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 : nt!KiSystemServiceCopyEnd+0x28
ffff8688`381fdb28 fffff804`9085204e : ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 fffff804`7e4fbd49 : nt!KiServiceLinkage
ffff8688`381fdb30 fffff804`907e39ae : 00000000`02000000 ffffd289`16f2fd80 ffffe702`18b83010 fffff804`907f40b5 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0xb6
ffff8688`381fdb80 fffff804`90851f5d : ffffd289`1553cb10 fffff804`908481cf 00000000`00000001 ffffd289`0359df20 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe
ffff8688`381fdbb0 fffff804`9084696d : ffffd289`0359df20 ffffe702`18b83010 ffffe702`18b83010 00000000`00000004 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d
ffff8688`381fdbf0 fffff804`90846874 : ffffd289`16f2fd80 ffffd289`0359df20 ffff8688`381fdc98 00000000`00000008 : dxgmms2!VIDMM_RECYCLE_BLOCK::CleanupFreeBlock+0x69
ffff8688`381fdc20 fffff804`908442d8 : ffffd289`0359df20 ffff8688`381fdcf0 ffffd289`0359df20 ffff8688`381fdcf0 : dxgmms2!VIDMM_RECYCLE_BLOCK::ShrinkOnTailRangeFree+0x30
ffff8688`381fdc70 fffff804`9084781a : 00000000`02000000 ffffd289`09878548 ffffd289`0359df20 ffffe702`18b83010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x128
ffff8688`381fdcc0 fffff804`90892e58 : ffffe702`00000000 ffffe702`18b83648 00000000`00000001 ffffd289`155262d8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffff8688`381fdd30 fffff804`90848fe1 : ffffe702`18b83540 ffffd289`15526b10 ffffe702`1d0afb10 ffffd289`05b2ecf0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceListsGlobally+0xd0
ffff8688`381fddc0 fffff804`90839bbb : ffffe702`1b18a510 00000000`00000001 ffffd289`094d1990 ffff8688`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211
ffff8688`381fde00 fffff804`908397e5 : ffffd289`09417de0 00000000`00000000 00000000`00000000 ffff8688`381fe100 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x33b
ffff8688`381fdfa0 fffff804`907d16fa : 00000000`00000000 ffffd289`09417de0 ffff8688`381fe130 ffffd289`00fd2000 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5
ffff8688`381fdff0 fffff804`8ad1a7a1 : 00000000`00000000 ffff8688`381fe130 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCloseAllocation+0x1a
ffff8688`381fe030 fffff804`8ad2548b : 00000000`00000000 fffff804`8ad254ee ffffd289`00fd2010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5
ffff8688`381fe1d0 fffff804`8ad2516c : ffffd289`00fd2010 ffffd289`00fd2100 00000000`00000000 ffffd289`00fd21f0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f
ffff8688`381fe230 fffff804`8ad25740 : ffffd289`00fd2010 ffffd289`0df0aa20 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148
ffff8688`381fe270 fffff804`8ad002d0 : 00000000`00000000 ffff8688`381fe3a0 ffffd289`00fd2010 ffffd289`00fd2010 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffff8688`381fe2a0 fffff804`8acfd955 : ffffd289`09417de0 00000000`00002c98 ffffd289`09417de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x494
ffff8688`381fe510 fffff804`8ac08ac7 : 00000000`00000000 ffffd289`09417de0 ffffe702`116f9780 fffff804`821703f3 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8688`381fe660 fffff804`7e79a7bf : 00000000`00000000 ffffe702`18ee0080 00000000`0000ff00 ffffe702`1c4bf0b0 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8688`381fe6c0 fffff804`7e765c40 : ffffe702`18ee0000 ffffe702`18ee0080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8688`381fe790 fffff804`7e79f686 : ffffe702`1c5de4b8 00000000`00000000 ffff8688`381fe980 00000000`00000000 : nt!PspExitProcess+0x70
ffff8688`381fe7c0 fffff804`7e8698e8 : fffff804`c0000005 00000000`00000f01 00000000`00000000 00000000`004f4000 : nt!PspExitThread+0x5b2
ffff8688`381fe8c0 fffff804`7e4cc591 : ffff8688`381fe980 fffff804`7e4657ca ffffe702`00000000 ffffe702`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8688`381fe900 fffff804`7e5a1e00 : 00000000`00000000 ffff8688`381fe9c0 ffff8688`381feb00 ffffe702`18843590 : nt!KiDeliverApc+0x451
ffff8688`381fe9c0 fffff804`7e5af21f : 00000000`00000000 00000000`00000000 ffff8688`381feb18 ffffffff`ffb3b4c0 : nt!KiInitiateUserApc+0x70
ffff8688`381feb00 00007ffc`d692ae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`4234faa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d692ae54
THREAD_SHA1_HASH_MOD_FUNC: e85c7eda892443a805d1df51f9635857b01ee34c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1647b3bd2753078525fa9e47153febceb8f7b84b
THREAD_SHA1_HASH_MOD: 03bb7691005b7d6dc18a1b90bc2c2bb81c85dc92
FOLLOWUP_IP:
dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6
fffff804`9085204e 4863f8 movsxd rdi,eax
FAULT_INSTR_CODE: b8f86348
SYMBOL_STACK_INDEX: 10
SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.1025
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b6
FAILURE_BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
PRIMARY_PROBLEM_CLASS: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
TARGET_TIME: 2020-04-12T21:28:53.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 5482
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_dxgmms2!vidmm_recycle_block::_vidmm_recycle_block
FAILURE_ID_HASH: {80770e6d-f962-9e92-764d-b939dc653edf}
Followup: MachineOwner
---------