Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\PC\Downloads\080616-5140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.18378.amd64fre.winblue_ltsb.160611-0600
Machine Name:
Kernel base = 0xfffff802`70a0e000 PsLoadedModuleList = 0xfffff802`70ce1630
Debug session time: Sat Aug 6 23:05:08.885 2016 (UTC - 4:00)
System Uptime: 0 days 7:04:40.224
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd001d921f3e0, ffffd001d921f338, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+1a895 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd001d921f3e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd001d921f338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.18378.amd64fre.winblue_ltsb.160611-0600
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7978
SYSTEM_SKU: Default string
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.60
BIOS_DATE: 05/16/2016
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: Z170A GAMING M3 (MS-7978)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd001d921f3e0
BUGCHECK_P3: ffffd001d921f338
BUGCHECK_P4: 0
TRAP_FRAME: ffffd001d921f3e0 -- (.trap 0xffffd001d921f3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe001c2a0a2f0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc000bd2e3878 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8003e5db515 rsp=ffffd001d921f570 rbp=0000000000000000
r8=000000000000000b r9=000000000000000b r10=fffff78000000008
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x1a895:
fffff800`3e5db515 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd001d921f338 -- (.exr 0xffffd001d921f338)
ExceptionAddress: fffff8003e5db515 (dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x000000000001a895)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: Overwatch.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: COREREACTOR
ANALYSIS_SESSION_TIME: 08-06-2016 23:17:13.0616
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
LAST_CONTROL_TRANSFER: from fffff80270b67de9 to fffff80270b5c2a0
STACK_TEXT:
ffffd001`d921f0b8 fffff802`70b67de9 : 00000000`00000139 00000000`00000003 ffffd001`d921f3e0 ffffd001`d921f338 : nt!KeBugCheckEx
ffffd001`d921f0c0 fffff802`70b68110 : ffffd001`d921f3e0 ffffd001`d921f289 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd001`d921f200 fffff802`70b67334 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiFastFailDispatch+0xd0
ffffd001`d921f3e0 fffff800`3e5db515 : ffffe001`c2a0a320 fffff800`00000000 ffffe001`bbfd7000 ffffe001`c2910000 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd001`d921f570 fffff800`3e5c0c32 : ffffc000`be2e93e0 fffff800`00000000 ffffe001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x1a895
ffffd001`d921f6f0 fffff800`3e4630f2 : ffffc000`be0a98d0 ffffd001`d921f8c0 ffffc000`be3448b0 00000000`00000002 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd001`d921f730 fffff800`3e45d452 : ffffc000`be2e93e0 00000000`00000000 ffffc000`00000000 ffffc000`be0a98d0 : dxgkrnl!DXGDEVICE:
estroyAllocations+0x172
ffffd001`d921f830 fffff802`70b67ab3 : ffffe001`c1a98880 00000000`00000000 ffffe001`bcbbf401 00000078`00000000 : dxgkrnl!DxgkPresent+0x682
ffffd001`d921fa00 00007ffe`300d173a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000078`1e24e3b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`300d173a
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 3988fb283b99614e9758437a32f5e2c62bada263
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 02b50e937fa59ec0298772d9017dcd03ef496666
THREAD_SHA1_HASH_MOD: 05c6c0f2a208b89951c23c5d66f594e30627c075
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+1a895
fffff800`3e5db515 cd29 int 29h
FAULT_INSTR_CODE: 44cc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+1a895
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
IMAGE_VERSION: 6.3.9600.17415
BUCKET_ID_FUNC_OFFSET: 1a895
FAILURE_BUCKET_ID: 0x139_3_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation
BUCKET_ID: 0x139_3_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation
PRIMARY_PROBLEM_CLASS: 0x139_3_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation
TARGET_TIME: 2016-08-07T03:05:08.000Z
OSBUILD: 9600
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-06-11 11:45:59
BUILDDATESTAMP_STR: 160611-0600
BUILDLAB_STR: winblue_ltsb
BUILDOSVER_STR: 6.3.9600.18378.amd64fre.winblue_ltsb.160611-0600
ANALYSIS_SESSION_ELAPSED_TIME: 2b6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_dxgmms1!vidmm_global::closeoneallocation
FAILURE_ID_HASH: {b88b4adf-cd8b-03a6-aa30-49ad86850731}