KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff810b5ddcd270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff810b5ddcd1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5750
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 29187
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff810b5ddcd270
BUGCHECK_P3: ffff810b5ddcd1c8
BUGCHECK_P4: 0
TRAP_FRAME: ffff810b5ddcd270 -- (.trap 0xffff810b5ddcd270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac0737b9cf58 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffac0732710248 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80330a50bca rsp=ffff810b5ddcd400 rbp=ffffac0737b9cea8
r8=ffffac0737b9cf00 r9=0000000000000068 r10=fffff80330a6b4a0
r11=fffff80330a40000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
FLTMGR!FltpPerformPostCallbacksWorker+0xb7ca:
fffff803`30a50bca cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff810b5ddcd1c8 -- (.exr 0xffff810b5ddcd1c8)
ExceptionAddress: fffff80330a50bca (FLTMGR!FltpPerformPostCallbacksWorker+0x000000000000b7ca)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: witcher3.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff810b`5ddccf48 fffff803`33c06569 : 00000000`00000139 00000000`00000003 ffff810b`5ddcd270 ffff810b`5ddcd1c8 : nt!KeBugCheckEx
ffff810b`5ddccf50 fffff803`33c06990 : ffff810b`5ddcd1d0 fffff803`33eedc5e 00000000`00000000 fffff803`36947690 : nt!KiBugCheckDispatch+0x69
ffff810b`5ddcd090 fffff803`33c04d23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff810b`5ddcd270 fffff803`30a50bca : ffffac07`37b9cdc0 fffff803`33ae606b 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff810b`5ddcd400 fffff803`30a45018 : ffffac07`37b9cd00 00000000`00000000 ffffac07`3bec4240 00000000`00000000 : FLTMGR!FltpPerformPostCallbacksWorker+0xb7ca
ffff810b`5ddcd4d0 fffff803`30a443bc : ffff810b`5ddc8000 ffff810b`5ddce000 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThroughCompletionWorker+0xf8
ffff810b`5ddcd570 fffff803`33ac310e : ffffac07`00000000 ffffac07`3c711d10 0003e4f8`d5dfffff 00000000`39fc59ff : FLTMGR!FltpPassThroughCompletion+0xc
ffff810b`5ddcd5a0 fffff803`33ac2fd7 : 00000000`00000001 00000000`00000002 ffffac07`3c711d10 ffffac07`3c711d10 : nt!IopfCompleteRequest+0x11e
ffff810b`5ddcd690 fffff803`4003c871 : ffffac07`2fa808f0 00000000`00000000 00000000`00000000 ffffac07`3c711e28 : nt!IofCompleteRequest+0x17
ffff810b`5ddcd6c0 fffff803`33acd805 : ffffac07`37b9cdc0 fffff803`30a44b46 ffff810b`5ddce000 ffff810b`5ddc8000 : Npfs!NpFsdFileSystemControl+0x51
ffff810b`5ddcd6f0 fffff803`30a46ccf : 00000000`3f800000 00000000`00000000 00000000`00000000 ffff810b`5ddcda78 : nt!IofCallDriver+0x55
ffff810b`5ddcd730 fffff803`30a7caf4 : ffff810b`5ddcd7c0 00000000`00000000 00000000`000000e0 fffff803`33eefe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff810b`5ddcd7a0 fffff803`33acd805 : ffffac07`0000000a ffffac07`3c711d10 00000000`00000002 00000000`00000001 : FLTMGR!FltpFsControl+0x104
ffff810b`5ddcd800 fffff803`33ec2528 : ffff810b`5ddcdb80 ffffac07`3c711d10 00000000`00000001 ffffac07`3bec4240 : nt!IofCallDriver+0x55
ffff810b`5ddcd840 fffff803`33ec1df5 : 00000000`0011400c ffff810b`5ddcdb80 00000000`00000005 ffff810b`5ddcdb80 : nt!IopSynchronousServiceTail+0x1a8
ffff810b`5ddcd8e0 fffff803`33e6c486 : 00000000`00000000 00000000`000012b0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff810b`5ddcda20 fffff803`33c05fb8 : ffffac07`373b6080 0000003f`6fbff868 ffff810b`5ddcdaa8 0000003f`6fbff978 : nt!NtFsControlFile+0x56
ffff810b`5ddcda90 00007fff`28dcc4b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003f`6fbff848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`28dcc4b4
SYMBOL_NAME: Npfs!NpFsdFileSystemControl+51
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_Npfs!NpFsdFileSystemControl
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d50e5470-2472-23d7-f7b0-8ee2529694de}
Followup: MachineOwner
---------
8: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=2376]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = F50
BiosReleaseDate = 11/27/2019
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = B450 AORUS M
SystemFamily = Default string
SystemVersion = Default string
SystemSKU = Default string
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = B450 AORUS M
BaseBoardVersion = x.x
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffce9c9e112938, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffffd023652de446, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 46822
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffce9c9e112938
BUGCHECK_P2: 0
BUGCHECK_P3: ffffd023652de446
BUGCHECK_P4: 2
READ_ADDRESS: fffff80078efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80078e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80078e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffce9c9e112938
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffef8155763fd0 -- (.trap 0xffffef8155763fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000049085b8949dc rbx=0000000000000000 rcx=ffffffff80003c70
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd023652de446 rsp=ffffef8155764160 rbp=ffffd0236522cc50
r8=0000000000000001 r9=0000000000000001 r10=49085b8949dc8b4c
r11=ffffc57b92a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
ffffd023`652de446 490fa303 bt qword ptr [r11],rax ds:ffffc57b`92a00000=????????????????
Resetting default scope
STACK_TEXT:
ffffef81`55763d28 fffff800`78679a57 : 00000000`00000050 ffffce9c`9e112938 00000000`00000000 ffffef81`55763fd0 : nt!KeBugCheckEx
ffffef81`55763d30 fffff800`784ea580 : ffff8000`00000000 00000000`00000000 ffffef81`55764050 00000000`00000000 : nt!MiSystemFault+0x171627
ffffef81`55763e30 fffff800`7860265e : ffffbe06`91254c40 ffffd023`6524c0c0 ffffbe06`90fe4108 fffff800`7860278c : nt!MmAccessFault+0x400
ffffef81`55763fd0 ffffd023`652de446 : 00000000`00000000 ffffbe06`90e66080 ffffef81`55764180 ffffd023`65182807 : nt!KiPageFault+0x35e
ffffef81`55764160 00000000`00000000 : ffffbe06`90e66080 ffffef81`55764180 ffffd023`65182807 ffffbe06`91254c40 : 0xffffd023`652de446
SYMBOL_NAME: nt!MiSystemFault+171627
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 171627
FAILURE_BUCKET_ID: AV_R_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {624e8a06-dc22-13e9-d8b0-4e137ca36c13}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 00000000001f0001, Address of the instruction which caused the bugcheck
Arg3: ffffc9842a908f30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8756
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: 1f0001
BUGCHECK_P3: ffffc9842a908f30
BUGCHECK_P4: 0
CONTEXT: ffffc9842a908f30 -- (.cxr 0xffffc9842a908f30)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8a8ed2d99ce0
rdx=ffff9b8cda3f09d0 rsi=0000000000000064 rdi=ffff8a8ed2d99ce0
rip=00000000001f0001 rsp=ffffc9842a909930 rbp=000000002d346e00
r8=ffff9b8cda3f09d0 r9=7fff9b8cdf194ad0 r10=fffff8077c6ebc00
r11=ffff9b8cdf194ab0 r12=0000000000001000 r13=ffff8a8e00000000
r14=ffff9b8cdf194ae0 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
00000000`001f0001 ?? ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: avp.exe
STACK_TEXT:
ffffc984`2a908628 fffff807`7be06469 : 00000000`0000003b 00000000`c0000005 00000000`001f0001 ffffc984`2a908f30 : nt!KeBugCheckEx
ffffc984`2a908630 fffff807`7be058bc : ffffc984`2a908dd0 fffff807`7bae3868 ffffc984`2a908820 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc984`2a908770 fffff807`7bdfd402 : fffff807`7be05840 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceHandler+0x7c
ffffc984`2a9087b0 fffff807`7bc52d97 : ffffc984`2a908d20 00000000`00000000 ffffc984`2a909a90 fffff807`7be05eb8 : nt!RtlpExecuteHandlerForException+0x12
ffffc984`2a9087e0 fffff807`7bc519a6 : ffffc984`2a9096f8 ffffc984`2a909430 ffffc984`2a9096f8 ffff8a8e`d2d99ce0 : nt!RtlDispatchException+0x297
ffffc984`2a908f00 fffff807`7be065ac : 00000000`00001000 ffffc984`2a9097a0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffc984`2a9095c0 fffff807`7be02743 : 00000000`00000600 fffff807`7bcd492c 00000000`00000000 00000000`00000011 : nt!KiExceptionDispatch+0x12c
ffffc984`2a9097a0 00000000`001f0001 : ffff8a8e`d2d99ce0 ffff9b8c`df194ae0 ffff9b8c`daa82ca0 00000000`00000000 : nt!KiPageFault+0x443
ffffc984`2a909930 ffff8a8e`d2d99ce0 : ffff9b8c`df194ae0 ffff9b8c`daa82ca0 00000000`00000000 ffff8a8e`d26a9aa0 : 0x1f0001
ffffc984`2a909938 ffff9b8c`df194ae0 : ffff9b8c`daa82ca0 00000000`00000000 ffff8a8e`d26a9aa0 00000000`00000000 : 0xffff8a8e`d2d99ce0
ffffc984`2a909940 ffff9b8c`daa82ca0 : 00000000`00000000 ffff8a8e`d26a9aa0 00000000`00000000 0001007c`c0020000 : 0xffff9b8c`df194ae0
ffffc984`2a909948 00000000`00000000 : ffff8a8e`d26a9aa0 00000000`00000000 0001007c`c0020000 00000000`00010000 : 0xffff9b8c`daa82ca0
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7c
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiSystemServiceHandler
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d011f1c6-81ea-e5f8-2759-49ec2e253107}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: ffffd3cd7e05ef82, Address of the instruction which caused the bugcheck
Arg3: ffff8208a4140f40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32kfull.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17447
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: ffffd3cd7e05ef82
BUGCHECK_P3: ffff8208a4140f40
BUGCHECK_P4: 0
CONTEXT: ffff8208a4140f40 -- (.cxr 0xffff8208a4140f40)
rax=0000000000000000 rbx=ffffd3cd7e216ea0 rcx=ffffd38501298860
rdx=000000004a01077a rsi=ffffd38506951c00 rdi=000000004a01077a
rip=ffffd3cd7e05ef82 rsp=ffff8208a4141940 rbp=0000000000000000
r8=000000000000501a r9=0000000000000000 r10=0000ffffd3cd7e2f
r11=ffffb0795ae00000 r12=000000c3d6bfe780 r13=ffffd38500605e68
r14=ffffd3cd7e216ec0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
win32kbase!ReleaseCacheDC+0x142:
ffffd3cd`7e05ef82 85c0 test eax,eax
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8208`a4141940 ffffd3cd`7e064721 : 00000000`00000020 00000000`00000000 00000000`4a01077a ffffd385`00605e68 : win32kbase!ReleaseCacheDC+0x142
ffff8208`a4141a00 ffffd3cd`7edde459 : 00000000`00cc0020 ffff990d`10d9e080 0000028c`baad93a0 00000000`00000020 : win32kbase!NtUserReleaseDC+0x161
ffff8208`a4141ad0 fffff801`4c4058b8 : 00000000`00000001 ffff8208`a4141b80 ffff8208`00000000 ffffd3cd`7eddd880 : win32k!NtUserReleaseDC+0x15
ffff8208`a4141b00 00007fff`4f0fa5c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c3`d6bfe718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`4f0fa5c4
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
ffffd3cd7e37f790-ffffd3cd7e37f7ac 29 bytes - win32kfull!DC::vClearRendering+70
[ 8b 46 74 a8 01 0f 84 68:48 81 c4 08 02 00 00 41 ]
ffffd3cd7e37f7b9-ffffd3cd7e37f7bc 4 bytes - win32kfull!DC::vClearRendering+99 (+0x29)
[ 48 8d 4e 18:fd ff ff 8b ]
ffffd3cd7e37f7c9-ffffd3cd7e37f7cd 5 bytes - win32kfull!DC::vClearRendering+a9 (+0x10)
[ 48 8d 8e 10 01:ff e9 a0 da 0f ]
ffffd3cd7e37f7cf - win32kfull!DC::vClearRendering+af (+0x06)
[ 00:41 ]
ffffd3cd7e37f7dc-ffffd3cd7e37f7fb 32 bytes - win32kfull!DC::vClearRendering+bc (+0x0d)
[ 83 ae 44 01 00 00 01 0f:00 41 8b 09 89 4b 4c 41 ]
ffffd3cd7e37f808-ffffd3cd7e37f812 11 bytes - win32kfull!DC::vClearRendering+e8 (+0x2c)
[ 84 c0 0f 85 e3 da 0f 00:00 e8 12 6c 32 00 48 8b ]
ffffd3cd7e37f81f-ffffd3cd7e37f82a 12 bytes - win32kfull!DC::vClearRendering+ff (+0x17)
[ 65 4c 8b 24 25 88 01 00:00 00 00 48 8b 12 4c 8b ]
ffffd3cd7e37f837-ffffd3cd7e37f841 11 bytes - win32kfull!DC::vClearRendering+117 (+0x18)
[ 84 c0 0f 85 f9 da 0f 00:00 e9 a9 fa ff ff 65 48 ]
ffffd3cd7e37f84e-ffffd3cd7e37f862 21 bytes - win32kfull!DC::vClearRendering+12e (+0x17)
[ 48 85 c0 0f 84 21 db 0f:74 12 39 70 68 0f 85 a1 ]
ffffd3cd7e37f864-ffffd3cd7e37f871 14 bytes - win32kfull!DC::vClearRendering+144 (+0x16)
[ 7d 68 44 8b 65 6c 4c 89:0d e7 6c 2d 00 48 8b 09 ]
ffffd3cd7e37f873-ffffd3cd7e37f884 18 bytes - win32kfull!DC::vClearRendering+153 (+0x0f)
[ 00 02 0f 85 0b db 0f 00:e8 a8 6b 32 00 48 8b 15 ]
ffffd3cd7e37f886-ffffd3cd7e37f88f 10 bytes - win32kfull!DC::vClearRendering+166 (+0x13)
[ 48 85 ed 74 07 89 7d 68:41 b8 05 00 00 00 48 8b ]
ffffd3cd7e38206f-ffffd3cd7e382097 41 bytes - win32kfull!RFONTOBJ::bInit+b7f (+0x27e9)
[ e0 1c 73 0c 0f ba e1 1c:48 81 c4 d8 02 00 00 5f ]
ffffd3cd7e382099-ffffd3cd7e3820bc 36 bytes - win32kfull!RFONTOBJ::bInit+ba9 (+0x2a)
[ ff ff e9 b5 c3 0f 00 48:03 00 00 0f 45 ca 49 8d ]
ffffd3cd7e3820c0-ffffd3cd7e3820e6 39 bytes - win32kfull!RFONTOBJ::bInit+bd0 (+0x27)
[ 41 0f ba e0 1c 73 10 0f:00 4c 89 6d 00 48 8d 4d ]
ffffd3cd7e3820e8-ffffd3cd7e3820e9 2 bytes - win32kfull!RFONTOBJ::bInit+bf8 (+0x28)
[ 75 99:33 d2 ]
ffffd3cd7e3820eb - win32kfull!RFONTOBJ::bInit+bfb (+0x03)
[ 8b:8d ]
ffffd3cd7e3820ed-ffffd3cd7e3820f1 5 bytes - win32kfull!RFONTOBJ::bInit+bfd (+0x02)
[ 78 48 2b 8a 88:50 41 b8 44 01 ]
ffffd3cd7e3820f4-ffffd3cd7e382102 15 bytes - win32kfull!RFONTOBJ::bInit+c04 (+0x07)
[ 00 75 0e 48 8b 8d 80 00:e8 47 59 0c 00 0f b6 45 ]
ffffd3cd7e382105-ffffd3cd7e382120 28 bytes - win32kfull!RFONTOBJ::bInit+c15 (+0x11)
[ 48 85 c9 0f 85 75 ff ff:0f 10 45 b4 0f 11 45 54 ]
ffffd3cd7e382124-ffffd3cd7e382127 4 bytes - win32kfull!RFONTOBJ::bInit+c34 (+0x1f)
[ 48 8d 4d c0:45 85 ed 0f ]
ffffd3cd7e382134-ffffd3cd7e38216e 59 bytes - win32kfull!RFONTOBJ::bInit+c44 (+0x10)
[ 85 c0 0f 84 47 ff ff ff:0f 86 fa 00 00 00 8b 45 ]
ffffd3cd7e3870b3-ffffd3cd7e3870d4 34 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+53 (+0x4f7f)
[ 00 00 48 89 8b 08 02 00:48 81 c4 d8 04 00 00 41 ]
ffffd3cd7e3870d6-ffffd3cd7e3870e8 19 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+76 (+0x23)
[ 00 89 8b a8 02 00 00 44:49 8d 5e 4c 41 bd 01 00 ]
ffffd3cd7e3870ea-ffffd3cd7e3870f5 12 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+8a (+0x14)
[ 00 48 89 8b 38 03 00 00:45 33 ff 66 44 39 2b 0f ]
ffffd3cd7e3870f7-ffffd3cd7e387138 66 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+97 (+0x0d)
[ 00 44 89 b3 68 03 00 00:41 8b 46 58 41 84 c5 0f ]
ffffd3cd7e38713b-ffffd3cd7e387184 74 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+db (+0x44)
[ 48 89 8b 10 01 00 00 48:8b 4d 00 48 83 65 98 00 ]
ffffd3cd7e387186-ffffd3cd7e38718e 9 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+126 (+0x4b)
[ 5d 41 5c 5f 5b 5d c3 cc:8b 4a 04 41 03 cc 89 4d ]
ffffd3cd7e387190-ffffd3cd7e38719c 13 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+130 (+0x0a)
[ 01 48 8d 51 28 89 45 07:85 70 04 00 00 4d 8b cf ]
ffffd3cd7e38719e-ffffd3cd7e3871a0 3 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+13e (+0x0e)
[ 41 04 89:ce 48 8b ]
ffffd3cd7e3871a2-ffffd3cd7e3871b2 17 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+142 (+0x04)
[ 0b 41 8b 41 08 89 45 0f:e8 48 89 54 24 48 48 8b ]
ffffd3cd7e389cae-ffffd3cd7e389cb3 6 bytes - win32kfull!NtGdiDrawStreamInternal+24e (+0x2b0c)
[ d7 45 03 b8 fc 03:48 81 c4 88 00 00 ]
ffffd3cd7e389cb5-ffffd3cd7e389d02 78 bytes - win32kfull!NtGdiDrawStreamInternal+255 (+0x07)
[ 00 44 89 7d d3 45 03 b0:41 5f 41 5e 41 5d 41 5c ]
ffffd3cd7e389d04-ffffd3cd7e389d38 53 bytes - win32kfull!NtGdiDrawStreamInternal+2a4 (+0x4f)
[ 3b cd 0f 87 21 02 00 00:34 00 00 e9 15 ff ff ff ]
ffffd3cd7e389d3a-ffffd3cd7e389d46 13 bytes - win32kfull!NtGdiDrawStreamInternal+2da (+0x36)
[ 80 49 63 cb 48 03 ca 49:00 e8 d8 c7 00 00 48 85 ]
ffffd3cd7e389d49-ffffd3cd7e389d50 8 bytes - win32kfull!NtGdiDrawStreamInternal+2e9 (+0x0f)
[ ff 49 3b c8 0f 87 da 01:65 48 8b 0c 25 88 01 00 ]
ffffd3cd7e389d52-ffffd3cd7e389d6b 26 bytes - win32kfull!NtGdiDrawStreamInternal+2f2 (+0x09)
[ 00 8b 4c 24 50 44 03 d1:e8 c1 c7 00 00 48 39 98 ]
ffffd3cd7e389d6d-ffffd3cd7e389d86 26 bytes - win32kfull!NtGdiDrawStreamInternal+30d (+0x1b)
[ 00 41 3b f8 0f 8c 7f 02:e8 a6 c7 00 00 39 58 68 ]
ffffd3cd7e389d89-ffffd3cd7e389d8d 5 bytes - win32kfull!NtGdiDrawStreamInternal+329 (+0x1c)
[ 8b 88 e8 03 00:48 8b 88 18 01 ]
ffffd3cd7e389d8f-ffffd3cd7e389dad 31 bytes - win32kfull!NtGdiDrawStreamInternal+32f (+0x06)
[ 41 3b ca 0f 8f 1b 02 00:00 44 85 79 14 0f 84 51 ]
ffffd3cd7e5d2b60-ffffd3cd7e5d2b61 2 bytes - win32kfull!CVisRgnTrackerProp::`vftable'
[ 00 e7:a0 df ]
ffffd3cd7e5d2b68-ffffd3cd7e5d2b69 2 bytes - win32kfull!CVisRgnTrackerProp::`vftable'+8 (+0x08)
[ 70 9e:50 93 ]
ffffd3cd7e5d2b70-ffffd3cd7e5d2b71 2 bytes - win32kfull!CoreWindowProp::`vftable' (+0x08)
[ 50 7e:30 73 ]
ffffd3cd7e5d2b78-ffffd3cd7e5d2b79 2 bytes - win32kfull!CoreWindowProp::`vftable'+8 (+0x08)
[ 90 9e:70 93 ]
ffffd3cd7e5d2b80-ffffd3cd7e5d2b81 2 bytes - win32kfull!CLegacyRotationMgr::`vftable' (+0x08)
[ f0 ac:d0 a1 ]
ffffd3cd7e5d2b88-ffffd3cd7e5d2b89 2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+8 (+0x08)
[ 40 6b:90 62 ]
ffffd3cd7e5d2b90-ffffd3cd7e5d2b91 2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+10 (+0x08)
[ a0 6c:f0 63 ]
ffffd3cd7e5d2b98-ffffd3cd7e5d2b99 2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+18 (+0x08)
[ 50 ac:30 a1 ]
ffffd3cd7e5d2ba0-ffffd3cd7e5d2ba1 2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+20 (+0x08)
[ f0 ab:d0 a0 ]
ffffd3cd7e5d2ba9 - win32kfull!CLegacyRotationMgr::`vftable'+29 (+0x09)
[ 23:24 ]
ffffd3cd7e5d2bb1 - win32kfull!CLegacyRotationMgr::`vftable'+31 (+0x08)
[ 22:23 ]
ffffd3cd7e5d2bb9 - win32kfull!CLegacyRotationMgr::`vftable'+39 (+0x08)
[ 1d:1e ]
ffffd3cd7e5d2bc1 - win32kfull!CLegacyRotationMgr::`vftable'+41 (+0x08)
[ 1b:1c ]
ffffd3cd7e5d2bc8-ffffd3cd7e5d2bc9 2 bytes - win32kfull!CPushLock::`vftable' (+0x07)
[ e0 9c:c0 91 ]
ffffd3cd7e5d2bd0-ffffd3cd7e5d2bd1 2 bytes - win32kfull!CSwapChainProp::`vftable' (+0x08)
[ c0 df:90 e0 ]
ffffd3cd7e5d2bd8-ffffd3cd7e5d2bd9 2 bytes - win32kfull!CSwapChainProp::`vftable'+8 (+0x08)
[ 80 9e:60 93 ]
ffffd3cd7e5d2be0 - win32kfull!InkDevice::`vftable' (+0x08)
[ 10:a0 ]
ffffd3cd7e5d2be8 - win32kfull!InkDevice::`vftable'+8 (+0x08)
[ 60:f0 ]
ffffd3cd7e5d2bf0-ffffd3cd7e5d2bf1 2 bytes - win32kfull!InkDevice::`vftable'+10 (+0x08)
[ c0 46:50 47 ]
ffffd3cd7e5d2bf8-ffffd3cd7e5d2bf9 2 bytes - win32kfull!InkDevice::`vftable'+18 (+0x08)
[ 10 80:f0 74 ]
ffffd3cd7e5d2c00-ffffd3cd7e5d2c01 2 bytes - win32kfull!InkDevice::`vftable'+20 (+0x08)
[ b0 85:30 7b ]
ffffd3cd7e5d2c08-ffffd3cd7e5d2c09 2 bytes - win32kfull!InkDevice::`vftable'+28 (+0x08)
[ f0 6d:80 6e ]
ffffd3cd7e5d2c10-ffffd3cd7e5d2c11 2 bytes - win32kfull!InkDevice::`vftable' (+0x08)
[ f0 fc:80 fd ]
ffffd3cd7e5d2c18-ffffd3cd7e5d2c19 2 bytes - win32kfull!InkDevice::`vftable'+8 (+0x08)
[ d0 5e:60 5f ]
ffffd3cd7e5d2c20 - win32kfull!InkDevice::`vftable'+10 (+0x08)
[ 60:f0 ]
ffffd3cd7e5d2c28 - win32kfull!InkDevice::`vftable'+18 (+0x08)
[ 20:f0 ]
ffffd3cd7e5d2c30-ffffd3cd7e5d2c31 2 bytes - win32kfull!InkDevice::`vftable'+20 (+0x08)
[ e0 42:b0 43 ]
ffffd3cd7e5d2c38-ffffd3cd7e5d2c39 2 bytes - win32kfull!InkDevice::`vftable'+28 (+0x08)
[ c0 56:50 57 ]
ffffd3cd7e5d2c40 - win32kfull!CPhysicalMonitorHandle::`vftable' (+0x08)
[ 40:d0 ]
ffffd3cd7e5d2c48-ffffd3cd7e5d2c49 2 bytes - win32kfull!CPhysicalMonitorHandle::`vftable'+8 (+0x08)
[ 80 22:10 23 ]
ffffd3cd7e5d2c50-ffffd3cd7e5d2c51 2 bytes - win32kfull!CPhysicalMonitorHandle::`vftable'+10 (+0x08)
[ 60 4b:40 40 ]
944 errors : !win32kfull (ffffd3cd7e37f790-ffffd3cd7e5d2c51)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffff8208a4140f40 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80517d28b44, Address of the instruction which caused the bugcheck
Arg3: ffffb3077beec920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 31402
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80517d28b44
BUGCHECK_P3: ffffb3077beec920
BUGCHECK_P4: 0
CONTEXT: ffffb3077beec920 -- (.cxr 0xffffb3077beec920)
rax=ffffcc02a9be5000 rbx=0000000000a3522c rcx=ffffa30045dc0180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffcc02b0aea5b0
rip=fffff80517d28b44 rsp=ffffb3077beed320 rbp=ffffb3077beed420
r8=000000000003ffff r9=ffffb705dbc68b70 r10=fffff8050875a7d0
r11=0000000000000011 r12=0000000000000001 r13=ffffcc02aea90000
r14=ffffcc02ad744010 r15=ffffcc02afb20970
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050293
dxgmms2!VidSchSignalSyncObjectsFromGpu+0x624:
fffff805`17d28b44 8390090000a820 adc dword ptr [rax-57FFFFF7h],20h ds:002b:ffffcc02`51be5009=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
MISALIGNED_IP:
dxgmms2!VidSchSignalSyncObjectsFromGpu+624
fffff805`17d28b44 8390090000a820 adc dword ptr [rax-57FFFFF7h],20h
STACK_TEXT:
ffffb307`7beed320 fffff805`15f2e821 : 00000000`00000000 ffffb307`7beed678 00000000`00000000 ffffb307`7beed6d8 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x624
ffffb307`7beed560 fffff805`15f2cd02 : 000000d3`9fb7f080 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!SignalSynchronizationObjectInternal+0xcf1
ffffb307`7beed990 fffff805`088058b8 : ffffcc02`ae15a080 ffffcc02`ae15a080 00000241`c1fde9a8 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObjectFromGpu2+0x652
ffffb307`7beedb00 00007fff`e46b5ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d3`9fb7eff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e46b5ac4
SYMBOL_NAME: dxgmms2!VidSchSignalSyncObjectsFromGpu+624
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffffb3077beec920 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_dxgmms2.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a65b547c-5865-921a-16f5-26d09f946d5e}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8066aa6b010, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8066aa6af68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 76301
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8066aa6b010
BUGCHECK_P3: fffff8066aa6af68
BUGCHECK_P4: 0
TRAP_FRAME: fffff8066aa6b010 -- (.trap 0xfffff8066aa6b010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa982b8fa8b90 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806754bc686 rsp=fffff8066aa6b1a0 rbp=fffff8066aa6b2a0
r8=ffffa982b0c45c40 r9=0000000000000000 r10=0000000000000002
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x11f66:
fffff806`754bc686 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8066aa6af68 -- (.exr 0xfffff8066aa6af68)
ExceptionAddress: fffff806754bc686 (dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x0000000000011f66)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff806`6aa6ace8 fffff806`66e06469 : 00000000`00000139 00000000`00000003 fffff806`6aa6b010 fffff806`6aa6af68 : nt!KeBugCheckEx
fffff806`6aa6acf0 fffff806`66e06890 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000007 : nt!KiBugCheckDispatch+0x69
fffff806`6aa6ae30 fffff806`66e04c23 : fffff806`6aa6b0a0 00000000`00000004 fffff806`6aa6b0a8 00000000`00000004 : nt!KiFastFailDispatch+0xd0
fffff806`6aa6b010 fffff806`754bc686 : 00000000`00000000 fffff806`6aa6b2a0 ffffa982`b6b18000 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
fffff806`6aa6b1a0 fffff806`754aa37c : ffffa982`b6a4f602 fffff806`00000000 ffffa982`00000000 ffffa982`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x11f66
fffff806`6aa6b340 fffff806`754a7635 : ffffa982`b6b1ad02 ffffa982`b6a4f6c0 fffff806`6aa6b501 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x70c
fffff806`6aa6b4a0 fffff806`744739e1 : fffff806`6aa6b599 00000000`00000000 fffff806`6aa6bb20 0000085b`dc78e0ee : dxgmms2!VidSchDdiNotifyDpc+0x225
fffff806`6aa6b550 fffff806`76eba02b : ffffa982`b09bc030 00000000`00000000 ffffa982`b09bc030 ffffa982`b0b7e000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff806`6aa6b600 ffffa982`b09bc030 : 00000000`00000000 ffffa982`b09bc030 ffffa982`b0b7e000 fffff806`76eb9fbe : nvlddmkm+0x9a02b
fffff806`6aa6b608 00000000`00000000 : ffffa982`b09bc030 ffffa982`b0b7e000 fffff806`76eb9fbe ffffa982`b0b7e000 : 0xffffa982`b09bc030
SYMBOL_NAME: dxgmms2!VidSchiProcessCompletedQueuePacketInternal+11f66
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1124
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 11f66
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiProcessCompletedQueuePacketInternal
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6f3692d4-31b7-23c3-ec9b-e0d590ce5987}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80670514402, Address of the instruction which caused the bugcheck
Arg3: fffff901a20ec4f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19641
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff80670514402
BUGCHECK_P3: fffff901a20ec4f0
BUGCHECK_P4: 0
CONTEXT: fffff901a20ec4f0 -- (.cxr 0xfffff901a20ec4f0)
rax=0000000000000001 rbx=0000000000000000 rcx=ffffa68107b28180
rdx=0000000000000000 rsi=0000000000000006 rdi=ffffdb80037b55e0
rip=fffff80670514402 rsp=fffff901a20ecef0 rbp=fffff901a20ecff0
r8=cfffffffffffffff r9=ffff9349a580bd40 r10=fffff80670e527c0
r11=ffff9349a4d26fff r12=7fffffffffffffff r13=0000000000000000
r14=fffff901a20ed200 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!MiMakeSystemCacheRangeValid+0x962:
fffff806`70514402 0f84ec000000 je nt!MiMakeSystemCacheRangeValid+0xa54 (fffff806`705144f4) [br=1]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffff901`a20ecef0 fffff806`705182ea : 00000000`003a9e64 00000000`00000000 00000000`0012aaf4 00000000`00000000 : nt!MiMakeSystemCacheRangeValid+0x962
fffff901`a20ed100 fffff806`705159cf : 00000000`00000000 00000000`00000000 00000000`00001000 ffff8281`11ea32a0 : nt!MmCheckCachedPageStates+0x1e4a
fffff901`a20ed2d0 fffff806`708e0c80 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff901`a20ed3e0 : nt!CcFetchDataForRead+0x8f
fffff901`a20ed330 fffff806`70515769 : ffff8281`0cb982e0 00000000`00000000 00000000`00040000 fffff806`70416501 : nt!CcMapAndCopyFromCache+0xe0
fffff901`a20ed3d0 fffff806`721936bf : ffffb80b`00000000 ffffb80b`00000000 ffffb80b`00000040 ffffb80b`00000000 : nt!CcCopyReadEx+0x139
fffff901`a20ed480 fffff806`7219511f : ffffb80b`44d39d90 fffff901`a20ed720 00000000`00000003 ffffb80b`44d39ba0 : Ntfs!NtfsCachedRead+0x177
fffff901`a20ed4f0 fffff806`721940cc : ffff8281`0947a798 ffff8281`0bdb42a0 ffff8281`00000001 ffff828f`00000040 : Ntfs!NtfsCommonRead+0xe1f
fffff901`a20ed6f0 fffff806`704d1f35 : ffff8281`0f8e1010 ffff8281`0bdb42a0 ffff8281`0bdb42a0 ffff828f`fc3c9d60 : Ntfs!NtfsFsdRead+0x1fc
fffff901`a20ed7c0 fffff806`6c0d6ccf : 00000000`00000001 00000000`6c655346 00000000`00000030 00000000`000009f4 : nt!IofCallDriver+0x55
fffff901`a20ed800 fffff806`6c0d48d3 : fffff901`a20ed890 00000000`00000000 8281126a`c9a00000 fffff806`708d4b41 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff901`a20ed870 fffff806`704d1f35 : ffff8281`0bdb42a0 00000000`00000000 fffff901`a20edb80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
fffff901`a20ed8d0 fffff806`708a6fb8 : 00000000`00000000 ffff8281`126ac9d0 00000000`00000001 ffff828f`faefee01 : nt!IofCallDriver+0x55
fffff901`a20ed910 fffff806`708aa1f9 : ffff8281`00000000 fffff901`a20edb80 00000000`00000000 fffff901`a20edb80 : nt!IopSynchronousServiceTail+0x1a8
fffff901`a20ed9b0 fffff806`706058b8 : 00000000`00000b20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
fffff901`a20eda90 00007ffd`6750be84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cc`123fcae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6750be84
SYMBOL_NAME: nt!MiMakeSystemCacheRangeValid+962
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xfffff901a20ec4f0 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 962
FAILURE_BUCKET_ID: 0x3B_c000001d_nt!MiMakeSystemCacheRangeValid
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fdcc85ec-c15d-c657-d7ac-651df8832082}
Followup: MachineOwner
---------