<DmlText>
Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\102121-4328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`59c00000 PsLoadedModuleList = 0xfffff803`5a82a3d0
Debug session time: Thu Oct 21 21:43:47.114 2021 (UTC + 8:00)
System Uptime: 0 days 0:02:51.970
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run <link alt="!analyze -v" cmd="!analyze -v"><u>!analyze -v</u></link>
nt!KeBugCheckEx:
fffff803`59ff5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803`5e29fe20=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8035e2a0140, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff8035e2a0098, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 36474
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 91831
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8035e2a0140
BUGCHECK_P3: fffff8035e2a0098
BUGCHECK_P4: 0
TRAP_FRAME: fffff8035e2a0140 -- <link alt=".trap 0xfffff8035e2a0140" cmd=".trap 0xfffff8035e2a0140"><u>(.trap 0xfffff8035e2a0140)</u></link>
NOTE: The trap frame does not contain all registers.
<col fg="emphfg">Some register values may be zeroed or incorrect.</col>
rax=ffffc886e2ab0158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc886e3463158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035a012aa0 rsp=fffff8035e2a02d0 rbp=fffff8035620b180
r8=0000000000000000 r9=0000000000000000 r10=fffff80359e4a230
r11=ffffa3fc81000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!KiTryUnwaitThread+0x1c6750:
fffff803`5a012aa0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8035e2a0098 -- <link alt=".exr 0xfffff8035e2a0098" cmd=".exr 0xfffff8035e2a0098"><u>(.exr 0xfffff8035e2a0098)</u></link>
ExceptionAddress: fffff8035a012aa0 (nt!KiTryUnwaitThread+0x00000000001c6750)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (<link alt="!blackboxbsd" cmd="!blackboxbsd"><u>!blackboxbsd</u></link>)
BLACKBOXNTFS: 1 (<link alt="!blackboxntfs" cmd="!blackboxntfs"><u>!blackboxntfs</u></link>)
BLACKBOXPNP: 1 (<link alt="!blackboxpnp" cmd="!blackboxpnp"><u>!blackboxpnp</u></link>)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff803`5e29fe18 fffff803`5a007d69 : 00000000`00000139 00000000`00000003 fffff803`5e2a0140 fffff803`5e2a0098 : nt!KeBugCheckEx
fffff803`5e29fe20 fffff803`5a008190 : 00000000`0000000a ffffc886`e1f81a30 00000000`00000001 fffff803`59c00000 : nt!KiBugCheckDispatch+0x69
fffff803`5e29ff60 fffff803`5a006523 : ffffc886`e1ec56c0 00000000`00000000 00000001`ffffffff fffffff6`00000008 : nt!KiFastFailDispatch+0xd0
fffff803`5e2a0140 fffff803`5a012aa0 : 00000000`00000001 ffffc886`e1fb4000 fffff803`59f62890 fffff803`59e40cff : nt!KiRaiseSecurityCheckFailure+0x323
fffff803`5e2a02d0 fffff803`59e4a3cb : ffffc886`e1dbc560 00000000`00000000 fffff803`5620b180 00000000`00000000 : nt!KiTryUnwaitThread+0x1c6750
fffff803`5e2a0330 fffff803`609554f5 : ffffc886`00000001 fffff803`5e2a04c0 ffffc886`e1fb4000 ffffc886`e2ab01c0 : nt!KeSetEvent+0x19b
fffff803`5e2a03c0 fffff803`60956674 : ffffc886`e1f8c000 ffffc886`e1ec5000 ffffc886`e1002000 00000000`00000000 : dxgmms2!VidSchiProcessDpcVSyncCookie+0x455
fffff803`5e2a05f0 fffff803`5e763c61 : fffff803`5e2a06e9 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x344
fffff803`5e2a06a0 fffff803`5ff65ca4 : 00000002`00001000 00000000`00000000 00000000`00000003 00000000`00000000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff803`5e2a0750 00000002`00001000 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffc886`e20e2c88 : igdkmd64+0x195ca4
fffff803`5e2a0758 00000000`00000000 : 00000000`00000003 00000000`00000000 ffffc886`e20e2c88 fffff803`5fedb067 : 0x00000002`00001000
SYMBOL_NAME: dxgmms2!VidSchiProcessDpcVSyncCookie+455
MODULE_NAME: <link alt="lmvm dxgmms2" cmd="lmvm dxgmms2"><u>dxgmms2</u></link>
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 455
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiProcessDpcVSyncCookie
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f81bd727-9b01-ae73-f5c1-22bb57a26d36}
Followup: MachineOwner
---------
0: kd> .trap 0xfffff8035e2a0140
NOTE: The trap frame does not contain all registers.
<col fg="emphfg">Some register values may be zeroed or incorrect.</col>
rax=ffffc886e2ab0158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc886e3463158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035a012aa0 rsp=fffff8035e2a02d0 rbp=fffff8035620b180
r8=0000000000000000 r9=0000000000000000 r10=fffff80359e4a230
r11=ffffa3fc81000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!KiTryUnwaitThread+0x1c6750:
fffff803`5a012aa0 cd29 int 29h
0: kd> lmvm dxgmms2
<link alt="lmDv" cmd="lmDv"><u>Browse full module list</u></link>
start end module name
fffff803`60950000 fffff803`60a31000 <link alt="lmDvmdxgmms2" cmd="lmDvmdxgmms2"><u>dxgmms2</u></link> # (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\E7143AD57C3B498C28DF28D3782E92D81\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\338A6BFAe1000\dxgmms2.sys
Image path: \SystemRoot\System32\drivers\dxgmms2.sys
Image name: dxgmms2.sys
<link alt="x /D dxgmms2!a*" cmd="x /D dxgmms2!a*"><u>Browse all global symbols</u></link> <link alt="x /D /f dxgmms2!a*" cmd="x /D /f dxgmms2!a*"><u>functions</u></link> <link alt="x /D /d dxgmms2!a*" cmd="x /D /d dxgmms2!a*"><u>data</u></link>
Image was built with /Brepro flag.
Timestamp: 338A6BFA (This is a reproducible build file hash, not a timestamp)
CheckSum: 000E9F28
ImageSize: 000E1000
File version: 10.0.19041.928
Product version: 10.0.19041.928
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgmms2.sys
OriginalFilename: dxgmms2.sys
ProductVersion: 10.0.19041.928
FileVersion: 10.0.19041.928 (WinBuild.160101.0800)
FileDescription: DirectX Graphics MMS
LegalCopyright: © Microsoft Corporation. All rights reserved.
0: kd> lmvm dxgmms2
<link alt="lmDv" cmd="lmDv"><u>Browse full module list</u></link>
start end module name
fffff803`60950000 fffff803`60a31000 <link alt="lmDvmdxgmms2" cmd="lmDvmdxgmms2"><u>dxgmms2</u></link> # (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\E7143AD57C3B498C28DF28D3782E92D81\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\338A6BFAe1000\dxgmms2.sys
Image path: \SystemRoot\System32\drivers\dxgmms2.sys
Image name: dxgmms2.sys
<link alt="x /D dxgmms2!a*" cmd="x /D dxgmms2!a*"><u>Browse all global symbols</u></link> <link alt="x /D /f dxgmms2!a*" cmd="x /D /f dxgmms2!a*"><u>functions</u></link> <link alt="x /D /d dxgmms2!a*" cmd="x /D /d dxgmms2!a*"><u>data</u></link>
Image was built with /Brepro flag.
Timestamp: 338A6BFA (This is a reproducible build file hash, not a timestamp)
CheckSum: 000E9F28
ImageSize: 000E1000
File version: 10.0.19041.928
Product version: 10.0.19041.928
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgmms2.sys
OriginalFilename: dxgmms2.sys
ProductVersion: 10.0.19041.928
FileVersion: 10.0.19041.928 (WinBuild.160101.0800)
FileDescription: DirectX Graphics MMS
LegalCopyright: © Microsoft Corporation. All rights reserved.
0: kd> x /D /d dxgmms2!a*
<link alt="x /D /d dxgmms2!a*" cmd="x /D /d dxgmms2!a*"><u>A</u></link> <link alt="x /D /d dxgmms2!b*" cmd="x /D /d dxgmms2!b*"><u>B</u></link> <link alt="x /D /d dxgmms2!c*" cmd="x /D /d dxgmms2!c*"><u>C</u></link> <link alt="x /D /d dxgmms2!d*" cmd="x /D /d dxgmms2!d*"><u>D</u></link> <link alt="x /D /d dxgmms2!e*" cmd="x /D /d dxgmms2!e*"><u>E</u></link> <link alt="x /D /d dxgmms2!f*" cmd="x /D /d dxgmms2!f*"><u>F</u></link> <link alt="x /D /d dxgmms2!g*" cmd="x /D /d dxgmms2!g*"><u>G</u></link> <link alt="x /D /d dxgmms2!h*" cmd="x /D /d dxgmms2!h*"><u>H</u></link> <link alt="x /D /d dxgmms2!i*" cmd="x /D /d dxgmms2!i*"><u>I</u></link> <link alt="x /D /d dxgmms2!j*" cmd="x /D /d dxgmms2!j*"><u>J</u></link> <link alt="x /D /d dxgmms2!k*" cmd="x /D /d dxgmms2!k*"><u>K</u></link> <link alt="x /D /d dxgmms2!l*" cmd="x /D /d dxgmms2!l*"><u>L</u></link> <link alt="x /D /d dxgmms2!m*" cmd="x /D /d dxgmms2!m*"><u>M</u></link> <link alt="x /D /d dxgmms2!n*" cmd="x /D /d dxgmms2!n*"><u>N</u></link> <link alt="x /D /d dxgmms2!o*" cmd="x /D /d dxgmms2!o*"><u>O</u></link> <link alt="x /D /d dxgmms2!p*" cmd="x /D /d dxgmms2!p*"><u>P</u></link> <link alt="x /D /d dxgmms2!q*" cmd="x /D /d dxgmms2!q*"><u>Q</u></link> <link alt="x /D /d dxgmms2!r*" cmd="x /D /d dxgmms2!r*"><u>R</u></link> <link alt="x /D /d dxgmms2!s*" cmd="x /D /d dxgmms2!s*"><u>S</u></link> <link alt="x /D /d dxgmms2!t*" cmd="x /D /d dxgmms2!t*"><u>T</u></link> <link alt="x /D /d dxgmms2!u*" cmd="x /D /d dxgmms2!u*"><u>U</u></link> <link alt="x /D /d dxgmms2!v*" cmd="x /D /d dxgmms2!v*"><u>V</u></link> <link alt="x /D /d dxgmms2!w*" cmd="x /D /d dxgmms2!w*"><u>W</u></link> <link alt="x /D /d dxgmms2!x*" cmd="x /D /d dxgmms2!x*"><u>X</u></link> <link alt="x /D /d dxgmms2!y*" cmd="x /D /d dxgmms2!y*"><u>Y</u></link> <link alt="x /D /d dxgmms2!z*" cmd="x /D /d dxgmms2!z*"><u>Z</u></link>
fffff803`609a10e0 dxgmms2!ApertureCheckPattern = <no type information>
fffff803`609929a0 dxgmms2!AbortQueuePacket = <no type information>
0: kd> !blackboxbsd
Version: 0xb0
Product type: 1
Auto advanced boot: FALSE
Advanced boot menu timeout: 30
Last boot succeeded: TRUE
Last boot shutdown: FALSE
Sleep in progress: FALSE
Power button timestamp: 0x0
System running: TRUE
Connected standby in progress: FALSE
User shutdown in progress: FALSE
System shutdown in progress: FALSE
Sleep in progress: 0
Connected standby scenario instance id: 0
Connected standby entry reason: 0
Connected standby exit reason: 0
System sleep transitions to on: 0
Last reference time: 0x1d7c681479bc8b8
2021-10-21T13:40:58.519Z
Last reference time checksum: 0x7b08f9ac
Last update boot id: 8
Boot attempt count: 1
Last boot checkpoint: TRUE
Checksum: 0xfe
Last boot id: 8
Last successful shutdown boot id: 7
Last reported abnormal shutdown boot id: 7
Error info boot id: 0
Error info repeat count: 0
Error info other error count: 0
Error info code: 0
Error info status: 0x0
Power button last press time: 0x0
Power button cumulative press count: 0
Power button last press boot id: 0
Power button last power watchdog stage: 0
Power button watchdog armed: FALSE
Power button shutdown in progress: FALSE
Power button last release time: 0x0
Power button cumulative release count: 0
Power button last release boot id: 0
Power button error count: 0
Power button current connected standby phase: 0
Power button transition latest checkpoint id: 0
Power button transition latest checkpoint type: 0
Power button transition latest checkpoint sequence number: 0
Power transition Shutdown Device Type: 0
Power transition Setup In Progress: FALSE
Power transition OOBE In Progress: FALSE
Power transition Sleep Checkpoint Source: 0
Power transition Sleep Checkpoint: 0
Power transition Connected Standby Entry Reason Category: 0
Power transition Connected Standby Exit Reason Category: 0
Power transition Connected Standby Entry Scenario Instance Id: 0x0
Feature Configuration State : Uninitialized
0: kd> .prefer_dml 0
DML versions of commands off by default
0: kd> .prefer_dml 1
DML versions of commands on by default
0: kd> .prefer_dml 0
DML versions of commands off by default
0: kd> .prefer_dml 1
DML versions of commands on by default
0: kd> .prefer_dml 0
DML versions of commands off by default
0: kd> .prefer_dml 1
DML versions of commands on by default
</DmlText>
Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\102121-4328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`59c00000 PsLoadedModuleList = 0xfffff803`5a82a3d0
Debug session time: Thu Oct 21 21:43:47.114 2021 (UTC + 8:00)
System Uptime: 0 days 0:02:51.970
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run <link alt="!analyze -v" cmd="!analyze -v"><u>!analyze -v</u></link>
nt!KeBugCheckEx:
fffff803`59ff5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803`5e29fe20=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8035e2a0140, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff8035e2a0098, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 36474
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 91831
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8035e2a0140
BUGCHECK_P3: fffff8035e2a0098
BUGCHECK_P4: 0
TRAP_FRAME: fffff8035e2a0140 -- <link alt=".trap 0xfffff8035e2a0140" cmd=".trap 0xfffff8035e2a0140"><u>(.trap 0xfffff8035e2a0140)</u></link>
NOTE: The trap frame does not contain all registers.
<col fg="emphfg">Some register values may be zeroed or incorrect.</col>
rax=ffffc886e2ab0158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc886e3463158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035a012aa0 rsp=fffff8035e2a02d0 rbp=fffff8035620b180
r8=0000000000000000 r9=0000000000000000 r10=fffff80359e4a230
r11=ffffa3fc81000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!KiTryUnwaitThread+0x1c6750:
fffff803`5a012aa0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8035e2a0098 -- <link alt=".exr 0xfffff8035e2a0098" cmd=".exr 0xfffff8035e2a0098"><u>(.exr 0xfffff8035e2a0098)</u></link>
ExceptionAddress: fffff8035a012aa0 (nt!KiTryUnwaitThread+0x00000000001c6750)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (<link alt="!blackboxbsd" cmd="!blackboxbsd"><u>!blackboxbsd</u></link>)
BLACKBOXNTFS: 1 (<link alt="!blackboxntfs" cmd="!blackboxntfs"><u>!blackboxntfs</u></link>)
BLACKBOXPNP: 1 (<link alt="!blackboxpnp" cmd="!blackboxpnp"><u>!blackboxpnp</u></link>)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff803`5e29fe18 fffff803`5a007d69 : 00000000`00000139 00000000`00000003 fffff803`5e2a0140 fffff803`5e2a0098 : nt!KeBugCheckEx
fffff803`5e29fe20 fffff803`5a008190 : 00000000`0000000a ffffc886`e1f81a30 00000000`00000001 fffff803`59c00000 : nt!KiBugCheckDispatch+0x69
fffff803`5e29ff60 fffff803`5a006523 : ffffc886`e1ec56c0 00000000`00000000 00000001`ffffffff fffffff6`00000008 : nt!KiFastFailDispatch+0xd0
fffff803`5e2a0140 fffff803`5a012aa0 : 00000000`00000001 ffffc886`e1fb4000 fffff803`59f62890 fffff803`59e40cff : nt!KiRaiseSecurityCheckFailure+0x323
fffff803`5e2a02d0 fffff803`59e4a3cb : ffffc886`e1dbc560 00000000`00000000 fffff803`5620b180 00000000`00000000 : nt!KiTryUnwaitThread+0x1c6750
fffff803`5e2a0330 fffff803`609554f5 : ffffc886`00000001 fffff803`5e2a04c0 ffffc886`e1fb4000 ffffc886`e2ab01c0 : nt!KeSetEvent+0x19b
fffff803`5e2a03c0 fffff803`60956674 : ffffc886`e1f8c000 ffffc886`e1ec5000 ffffc886`e1002000 00000000`00000000 : dxgmms2!VidSchiProcessDpcVSyncCookie+0x455
fffff803`5e2a05f0 fffff803`5e763c61 : fffff803`5e2a06e9 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x344
fffff803`5e2a06a0 fffff803`5ff65ca4 : 00000002`00001000 00000000`00000000 00000000`00000003 00000000`00000000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff803`5e2a0750 00000002`00001000 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffc886`e20e2c88 : igdkmd64+0x195ca4
fffff803`5e2a0758 00000000`00000000 : 00000000`00000003 00000000`00000000 ffffc886`e20e2c88 fffff803`5fedb067 : 0x00000002`00001000
SYMBOL_NAME: dxgmms2!VidSchiProcessDpcVSyncCookie+455
MODULE_NAME: <link alt="lmvm dxgmms2" cmd="lmvm dxgmms2"><u>dxgmms2</u></link>
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 455
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiProcessDpcVSyncCookie
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f81bd727-9b01-ae73-f5c1-22bb57a26d36}
Followup: MachineOwner
---------
0: kd> .trap 0xfffff8035e2a0140
NOTE: The trap frame does not contain all registers.
<col fg="emphfg">Some register values may be zeroed or incorrect.</col>
rax=ffffc886e2ab0158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc886e3463158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035a012aa0 rsp=fffff8035e2a02d0 rbp=fffff8035620b180
r8=0000000000000000 r9=0000000000000000 r10=fffff80359e4a230
r11=ffffa3fc81000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!KiTryUnwaitThread+0x1c6750:
fffff803`5a012aa0 cd29 int 29h
0: kd> lmvm dxgmms2
<link alt="lmDv" cmd="lmDv"><u>Browse full module list</u></link>
start end module name
fffff803`60950000 fffff803`60a31000 <link alt="lmDvmdxgmms2" cmd="lmDvmdxgmms2"><u>dxgmms2</u></link> # (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\E7143AD57C3B498C28DF28D3782E92D81\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\338A6BFAe1000\dxgmms2.sys
Image path: \SystemRoot\System32\drivers\dxgmms2.sys
Image name: dxgmms2.sys
<link alt="x /D dxgmms2!a*" cmd="x /D dxgmms2!a*"><u>Browse all global symbols</u></link> <link alt="x /D /f dxgmms2!a*" cmd="x /D /f dxgmms2!a*"><u>functions</u></link> <link alt="x /D /d dxgmms2!a*" cmd="x /D /d dxgmms2!a*"><u>data</u></link>
Image was built with /Brepro flag.
Timestamp: 338A6BFA (This is a reproducible build file hash, not a timestamp)
CheckSum: 000E9F28
ImageSize: 000E1000
File version: 10.0.19041.928
Product version: 10.0.19041.928
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgmms2.sys
OriginalFilename: dxgmms2.sys
ProductVersion: 10.0.19041.928
FileVersion: 10.0.19041.928 (WinBuild.160101.0800)
FileDescription: DirectX Graphics MMS
LegalCopyright: © Microsoft Corporation. All rights reserved.
0: kd> lmvm dxgmms2
<link alt="lmDv" cmd="lmDv"><u>Browse full module list</u></link>
start end module name
fffff803`60950000 fffff803`60a31000 <link alt="lmDvmdxgmms2" cmd="lmDvmdxgmms2"><u>dxgmms2</u></link> # (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\E7143AD57C3B498C28DF28D3782E92D81\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\338A6BFAe1000\dxgmms2.sys
Image path: \SystemRoot\System32\drivers\dxgmms2.sys
Image name: dxgmms2.sys
<link alt="x /D dxgmms2!a*" cmd="x /D dxgmms2!a*"><u>Browse all global symbols</u></link> <link alt="x /D /f dxgmms2!a*" cmd="x /D /f dxgmms2!a*"><u>functions</u></link> <link alt="x /D /d dxgmms2!a*" cmd="x /D /d dxgmms2!a*"><u>data</u></link>
Image was built with /Brepro flag.
Timestamp: 338A6BFA (This is a reproducible build file hash, not a timestamp)
CheckSum: 000E9F28
ImageSize: 000E1000
File version: 10.0.19041.928
Product version: 10.0.19041.928
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgmms2.sys
OriginalFilename: dxgmms2.sys
ProductVersion: 10.0.19041.928
FileVersion: 10.0.19041.928 (WinBuild.160101.0800)
FileDescription: DirectX Graphics MMS
LegalCopyright: © Microsoft Corporation. All rights reserved.
0: kd> x /D /d dxgmms2!a*
<link alt="x /D /d dxgmms2!a*" cmd="x /D /d dxgmms2!a*"><u>A</u></link> <link alt="x /D /d dxgmms2!b*" cmd="x /D /d dxgmms2!b*"><u>B</u></link> <link alt="x /D /d dxgmms2!c*" cmd="x /D /d dxgmms2!c*"><u>C</u></link> <link alt="x /D /d dxgmms2!d*" cmd="x /D /d dxgmms2!d*"><u>D</u></link> <link alt="x /D /d dxgmms2!e*" cmd="x /D /d dxgmms2!e*"><u>E</u></link> <link alt="x /D /d dxgmms2!f*" cmd="x /D /d dxgmms2!f*"><u>F</u></link> <link alt="x /D /d dxgmms2!g*" cmd="x /D /d dxgmms2!g*"><u>G</u></link> <link alt="x /D /d dxgmms2!h*" cmd="x /D /d dxgmms2!h*"><u>H</u></link> <link alt="x /D /d dxgmms2!i*" cmd="x /D /d dxgmms2!i*"><u>I</u></link> <link alt="x /D /d dxgmms2!j*" cmd="x /D /d dxgmms2!j*"><u>J</u></link> <link alt="x /D /d dxgmms2!k*" cmd="x /D /d dxgmms2!k*"><u>K</u></link> <link alt="x /D /d dxgmms2!l*" cmd="x /D /d dxgmms2!l*"><u>L</u></link> <link alt="x /D /d dxgmms2!m*" cmd="x /D /d dxgmms2!m*"><u>M</u></link> <link alt="x /D /d dxgmms2!n*" cmd="x /D /d dxgmms2!n*"><u>N</u></link> <link alt="x /D /d dxgmms2!o*" cmd="x /D /d dxgmms2!o*"><u>O</u></link> <link alt="x /D /d dxgmms2!p*" cmd="x /D /d dxgmms2!p*"><u>P</u></link> <link alt="x /D /d dxgmms2!q*" cmd="x /D /d dxgmms2!q*"><u>Q</u></link> <link alt="x /D /d dxgmms2!r*" cmd="x /D /d dxgmms2!r*"><u>R</u></link> <link alt="x /D /d dxgmms2!s*" cmd="x /D /d dxgmms2!s*"><u>S</u></link> <link alt="x /D /d dxgmms2!t*" cmd="x /D /d dxgmms2!t*"><u>T</u></link> <link alt="x /D /d dxgmms2!u*" cmd="x /D /d dxgmms2!u*"><u>U</u></link> <link alt="x /D /d dxgmms2!v*" cmd="x /D /d dxgmms2!v*"><u>V</u></link> <link alt="x /D /d dxgmms2!w*" cmd="x /D /d dxgmms2!w*"><u>W</u></link> <link alt="x /D /d dxgmms2!x*" cmd="x /D /d dxgmms2!x*"><u>X</u></link> <link alt="x /D /d dxgmms2!y*" cmd="x /D /d dxgmms2!y*"><u>Y</u></link> <link alt="x /D /d dxgmms2!z*" cmd="x /D /d dxgmms2!z*"><u>Z</u></link>
fffff803`609a10e0 dxgmms2!ApertureCheckPattern = <no type information>
fffff803`609929a0 dxgmms2!AbortQueuePacket = <no type information>
0: kd> !blackboxbsd
Version: 0xb0
Product type: 1
Auto advanced boot: FALSE
Advanced boot menu timeout: 30
Last boot succeeded: TRUE
Last boot shutdown: FALSE
Sleep in progress: FALSE
Power button timestamp: 0x0
System running: TRUE
Connected standby in progress: FALSE
User shutdown in progress: FALSE
System shutdown in progress: FALSE
Sleep in progress: 0
Connected standby scenario instance id: 0
Connected standby entry reason: 0
Connected standby exit reason: 0
System sleep transitions to on: 0
Last reference time: 0x1d7c681479bc8b8
2021-10-21T13:40:58.519Z
Last reference time checksum: 0x7b08f9ac
Last update boot id: 8
Boot attempt count: 1
Last boot checkpoint: TRUE
Checksum: 0xfe
Last boot id: 8
Last successful shutdown boot id: 7
Last reported abnormal shutdown boot id: 7
Error info boot id: 0
Error info repeat count: 0
Error info other error count: 0
Error info code: 0
Error info status: 0x0
Power button last press time: 0x0
Power button cumulative press count: 0
Power button last press boot id: 0
Power button last power watchdog stage: 0
Power button watchdog armed: FALSE
Power button shutdown in progress: FALSE
Power button last release time: 0x0
Power button cumulative release count: 0
Power button last release boot id: 0
Power button error count: 0
Power button current connected standby phase: 0
Power button transition latest checkpoint id: 0
Power button transition latest checkpoint type: 0
Power button transition latest checkpoint sequence number: 0
Power transition Shutdown Device Type: 0
Power transition Setup In Progress: FALSE
Power transition OOBE In Progress: FALSE
Power transition Sleep Checkpoint Source: 0
Power transition Sleep Checkpoint: 0
Power transition Connected Standby Entry Reason Category: 0
Power transition Connected Standby Exit Reason Category: 0
Power transition Connected Standby Entry Scenario Instance Id: 0x0
Feature Configuration State : Uninitialized
0: kd> .prefer_dml 0
DML versions of commands off by default
0: kd> .prefer_dml 1
DML versions of commands on by default
0: kd> .prefer_dml 0
DML versions of commands off by default
0: kd> .prefer_dml 1
DML versions of commands on by default
0: kd> .prefer_dml 0
DML versions of commands off by default
0: kd> .prefer_dml 1
DML versions of commands on by default
</DmlText>