FireNova
2021-03-13T12:51:16+00:00
不知道是主板还是cpu、内存的问题,用了半年,电脑每两天都会蓝屏1-2次。
想请各位帮忙分析一下,谢谢。
这是WINDBG的记录
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ZTY\Desktop\032121-21562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`5dc00000 PsLoadedModuleList = 0xfffff807`5e82a490
Debug session time: Sun Mar 21 18:06:31.683 2021 (UTC + 8:00)
System Uptime: 0 days 2:33:11.716
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`5dff5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff807`642a5c50=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff807642a5f70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff807642a5ec8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 220253
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 646475
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff807642a5f70
BUGCHECK_P3: fffff807642a5ec8
BUGCHECK_P4: 0
TRAP_FRAME: fffff807642a5f70 -- (.trap 0xfffff807642a5f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8075dff76d0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075de4a8fd rsp=fffff807642a6100 rbp=ffffb8840bf8c080
r8=0000000000000001 r9=0000000000000006 r10=fffff8075de48700
r11=fffff8075c479180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x1ad:
fffff807`5de4a8fd cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff807642a5ec8 -- (.exr 0xfffff807642a5ec8)
ExceptionAddress: fffff8075de4a8fd (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: JX3ClientX64.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DPC_STACK_BASE: FFFFF807642A6FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff807`642a5c48 fffff807`5e007b69 : 00000000`00000139 00000000`00000003 fffff807`642a5f70 fffff807`642a5ec8 : nt!KeBugCheckEx
fffff807`642a5c50 fffff807`5e007f90 : 00000000`00000000 fffff807`642a5de0 00000000`00000000 00000000`00220003 : nt!KiBugCheckDispatch+0x69
fffff807`642a5d90 fffff807`5e006323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff807`642a5f70 fffff807`5de4a8fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`642a6100 fffff807`5de48c87 : ffffb884`0bf8c080 00000000`00000000 ffffb884`0bf8c080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`642a6170 fffff807`5de48727 : 00000000`00000000 fffff807`642a6206 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`642a6260 fffff807`74405056 : 00000000`00000018 fffff807`642a6300 ffffb884`139e8050 fffff807`642a6340 : nt!IofCompleteRequest+0x17
fffff807`642a6290 fffff807`743e3aa7 : 00000000`00000002 ffffb884`099fd460 ffffb884`098e9580 fffff807`642a6374 : mouclass!MouseClassServiceCallback+0x476
fffff807`642a6330 fffff807`5de4885e : 00000000`00000000 00000001`74484a00 fffff807`5c479101 ffff9b07`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`642a63d0 fffff807`5de48727 : 00000000`00000000 ffffb884`09953506 ffffb884`09624c70 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`642a64c0 fffff807`743aaef5 : ffffb884`0be7b358 ffffb884`09940102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff807`642a64f0 fffff807`743aa7ed : ffffb884`099401d0 ffffb884`09940102 ffffb884`099401d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`642a65f0 fffff807`5de4885e : ffffb884`099c5010 ffffb884`099c5010 fffff807`642a6701 ffffb884`099c53fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`642a6690 fffff807`5de48727 : 00000000`00000001 00000000`00000000 ffffb884`099035f0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`642a6780 fffff807`62bb811a : 00000000`00000000 ffffb884`093acc30 ffffb884`099c5010 fffff807`642a6860 : nt!IofCompleteRequest+0x17
fffff807`642a67b0 fffff807`62bb5bbf : ffffb884`0b029702 ffffb884`09946010 ffffb884`099c5010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`642a6840 fffff807`6f50b91c : 00000000`ffffff02 ffffb884`0b029630 ffffb884`099039d0 ffffb884`099039d0 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`642a68a0 fffff807`6f50b7e1 : ffffb884`0b0297d0 00000000`00000008 ffffb884`0b029860 fffff807`642a6ab8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`642a6900 fffff807`6f50b5d0 : 00000000`00000004 fffff807`642a6a70 00000000`00000000 ffffb884`09904050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`642a69b0 fffff807`6f506570 : 00000000`00000004 fffff807`642a6a88 00000000`00000008 fffff807`642a6a90 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`642a69e0 fffff807`6f5060a5 : 00000000`00000780 0000477b`f6d0d900 ffffb884`0982d520 ffffb884`09992470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`642a6a40 fffff807`6f505d7c : ffffb884`029efb28 ffffb884`027306c0 0000477b`f6d12fd8 ffffb884`029ef000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`642a6b40 fffff807`62bb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00001e28`7a7b2fa0 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`642a6b70 fffff807`5de0781e : fffff807`5c47c240 ffffb884`02853000 fffff807`642a6e70 ffffb884`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`642a6bb0 fffff807`5de06b04 : fffff807`00000007 00000000`00000000 00000000`00000008 00000000`000559c3 : nt!KiExecuteAllDpcs+0x30e
fffff807`642a6d20 fffff807`5dffcc95 : 00000000`00000000 fffff807`5c479180 ffffe481`75e7d000 00000215`f1e280e0 : nt!KiRetireDpcList+0x1f4
fffff807`642a6fb0 fffff807`5dffca80 : fffff807`5dff1d40 fffff807`5deec5ca ffffb884`0db11080 ffffe387`3383eb80 : nt!KxRetireDpcList+0x5
ffffe387`3383eac0 fffff807`5dffc335 : 00000215`f1e280e0 fffff807`5dff77c1 00000215`f2717230 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffe387`3383eaf0 fffff807`5dff77c1 : 00000215`f2717230 00000000`00000000 00000000`00000000 ffffb884`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe387`3383eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff807642a5f70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff807642a5ec8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3250
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3254
Key : Analysis.Init.CPU.mSec
Value: 4437
Key : Analysis.Init.Elapsed.mSec
Value: 866732
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff807642a5f70
BUGCHECK_P3: fffff807642a5ec8
BUGCHECK_P4: 0
TRAP_FRAME: fffff807642a5f70 -- (.trap 0xfffff807642a5f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8075dff76d0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075de4a8fd rsp=fffff807642a6100 rbp=ffffb8840bf8c080
r8=0000000000000001 r9=0000000000000006 r10=fffff8075de48700
r11=fffff8075c479180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x1ad:
fffff807`5de4a8fd cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff807642a5ec8 -- (.exr 0xfffff807642a5ec8)
ExceptionAddress: fffff8075de4a8fd (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: JX3ClientX64.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DPC_STACK_BASE: FFFFF807642A6FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff807`642a5c48 fffff807`5e007b69 : 00000000`00000139 00000000`00000003 fffff807`642a5f70 fffff807`642a5ec8 : nt!KeBugCheckEx
fffff807`642a5c50 fffff807`5e007f90 : 00000000`00000000 fffff807`642a5de0 00000000`00000000 00000000`00220003 : nt!KiBugCheckDispatch+0x69
fffff807`642a5d90 fffff807`5e006323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff807`642a5f70 fffff807`5de4a8fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`642a6100 fffff807`5de48c87 : ffffb884`0bf8c080 00000000`00000000 ffffb884`0bf8c080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`642a6170 fffff807`5de48727 : 00000000`00000000 fffff807`642a6206 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`642a6260 fffff807`74405056 : 00000000`00000018 fffff807`642a6300 ffffb884`139e8050 fffff807`642a6340 : nt!IofCompleteRequest+0x17
fffff807`642a6290 fffff807`743e3aa7 : 00000000`00000002 ffffb884`099fd460 ffffb884`098e9580 fffff807`642a6374 : mouclass!MouseClassServiceCallback+0x476
fffff807`642a6330 fffff807`5de4885e : 00000000`00000000 00000001`74484a00 fffff807`5c479101 ffff9b07`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`642a63d0 fffff807`5de48727 : 00000000`00000000 ffffb884`09953506 ffffb884`09624c70 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`642a64c0 fffff807`743aaef5 : ffffb884`0be7b358 ffffb884`09940102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff807`642a64f0 fffff807`743aa7ed : ffffb884`099401d0 ffffb884`09940102 ffffb884`099401d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`642a65f0 fffff807`5de4885e : ffffb884`099c5010 ffffb884`099c5010 fffff807`642a6701 ffffb884`099c53fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`642a6690 fffff807`5de48727 : 00000000`00000001 00000000`00000000 ffffb884`099035f0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`642a6780 fffff807`62bb811a : 00000000`00000000 ffffb884`093acc30 ffffb884`099c5010 fffff807`642a6860 : nt!IofCompleteRequest+0x17
fffff807`642a67b0 fffff807`62bb5bbf : ffffb884`0b029702 ffffb884`09946010 ffffb884`099c5010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`642a6840 fffff807`6f50b91c : 00000000`ffffff02 ffffb884`0b029630 ffffb884`099039d0 ffffb884`099039d0 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`642a68a0 fffff807`6f50b7e1 : ffffb884`0b0297d0 00000000`00000008 ffffb884`0b029860 fffff807`642a6ab8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`642a6900 fffff807`6f50b5d0 : 00000000`00000004 fffff807`642a6a70 00000000`00000000 ffffb884`09904050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`642a69b0 fffff807`6f506570 : 00000000`00000004 fffff807`642a6a88 00000000`00000008 fffff807`642a6a90 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`642a69e0 fffff807`6f5060a5 : 00000000`00000780 0000477b`f6d0d900 ffffb884`0982d520 ffffb884`09992470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`642a6a40 fffff807`6f505d7c : ffffb884`029efb28 ffffb884`027306c0 0000477b`f6d12fd8 ffffb884`029ef000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`642a6b40 fffff807`62bb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00001e28`7a7b2fa0 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`642a6b70 fffff807`5de0781e : fffff807`5c47c240 ffffb884`02853000 fffff807`642a6e70 ffffb884`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`642a6bb0 fffff807`5de06b04 : fffff807`00000007 00000000`00000000 00000000`00000008 00000000`000559c3 : nt!KiExecuteAllDpcs+0x30e
fffff807`642a6d20 fffff807`5dffcc95 : 00000000`00000000 fffff807`5c479180 ffffe481`75e7d000 00000215`f1e280e0 : nt!KiRetireDpcList+0x1f4
fffff807`642a6fb0 fffff807`5dffca80 : fffff807`5dff1d40 fffff807`5deec5ca ffffb884`0db11080 ffffe387`3383eb80 : nt!KxRetireDpcList+0x5
ffffe387`3383eac0 fffff807`5dffc335 : 00000215`f1e280e0 fffff807`5dff77c1 00000215`f2717230 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffe387`3383eaf0 fffff807`5dff77c1 : 00000215`f2717230 00000000`00000000 00000000`00000000 ffffb884`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe387`3383eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------
想请各位帮忙分析一下,谢谢。
这是WINDBG的记录
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ZTY\Desktop\032121-21562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`5dc00000 PsLoadedModuleList = 0xfffff807`5e82a490
Debug session time: Sun Mar 21 18:06:31.683 2021 (UTC + 8:00)
System Uptime: 0 days 2:33:11.716
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`5dff5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff807`642a5c50=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff807642a5f70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff807642a5ec8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 220253
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 646475
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff807642a5f70
BUGCHECK_P3: fffff807642a5ec8
BUGCHECK_P4: 0
TRAP_FRAME: fffff807642a5f70 -- (.trap 0xfffff807642a5f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8075dff76d0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075de4a8fd rsp=fffff807642a6100 rbp=ffffb8840bf8c080
r8=0000000000000001 r9=0000000000000006 r10=fffff8075de48700
r11=fffff8075c479180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x1ad:
fffff807`5de4a8fd cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff807642a5ec8 -- (.exr 0xfffff807642a5ec8)
ExceptionAddress: fffff8075de4a8fd (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: JX3ClientX64.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DPC_STACK_BASE: FFFFF807642A6FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff807`642a5c48 fffff807`5e007b69 : 00000000`00000139 00000000`00000003 fffff807`642a5f70 fffff807`642a5ec8 : nt!KeBugCheckEx
fffff807`642a5c50 fffff807`5e007f90 : 00000000`00000000 fffff807`642a5de0 00000000`00000000 00000000`00220003 : nt!KiBugCheckDispatch+0x69
fffff807`642a5d90 fffff807`5e006323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff807`642a5f70 fffff807`5de4a8fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`642a6100 fffff807`5de48c87 : ffffb884`0bf8c080 00000000`00000000 ffffb884`0bf8c080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`642a6170 fffff807`5de48727 : 00000000`00000000 fffff807`642a6206 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`642a6260 fffff807`74405056 : 00000000`00000018 fffff807`642a6300 ffffb884`139e8050 fffff807`642a6340 : nt!IofCompleteRequest+0x17
fffff807`642a6290 fffff807`743e3aa7 : 00000000`00000002 ffffb884`099fd460 ffffb884`098e9580 fffff807`642a6374 : mouclass!MouseClassServiceCallback+0x476
fffff807`642a6330 fffff807`5de4885e : 00000000`00000000 00000001`74484a00 fffff807`5c479101 ffff9b07`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`642a63d0 fffff807`5de48727 : 00000000`00000000 ffffb884`09953506 ffffb884`09624c70 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`642a64c0 fffff807`743aaef5 : ffffb884`0be7b358 ffffb884`09940102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff807`642a64f0 fffff807`743aa7ed : ffffb884`099401d0 ffffb884`09940102 ffffb884`099401d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`642a65f0 fffff807`5de4885e : ffffb884`099c5010 ffffb884`099c5010 fffff807`642a6701 ffffb884`099c53fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`642a6690 fffff807`5de48727 : 00000000`00000001 00000000`00000000 ffffb884`099035f0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`642a6780 fffff807`62bb811a : 00000000`00000000 ffffb884`093acc30 ffffb884`099c5010 fffff807`642a6860 : nt!IofCompleteRequest+0x17
fffff807`642a67b0 fffff807`62bb5bbf : ffffb884`0b029702 ffffb884`09946010 ffffb884`099c5010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`642a6840 fffff807`6f50b91c : 00000000`ffffff02 ffffb884`0b029630 ffffb884`099039d0 ffffb884`099039d0 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`642a68a0 fffff807`6f50b7e1 : ffffb884`0b0297d0 00000000`00000008 ffffb884`0b029860 fffff807`642a6ab8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`642a6900 fffff807`6f50b5d0 : 00000000`00000004 fffff807`642a6a70 00000000`00000000 ffffb884`09904050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`642a69b0 fffff807`6f506570 : 00000000`00000004 fffff807`642a6a88 00000000`00000008 fffff807`642a6a90 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`642a69e0 fffff807`6f5060a5 : 00000000`00000780 0000477b`f6d0d900 ffffb884`0982d520 ffffb884`09992470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`642a6a40 fffff807`6f505d7c : ffffb884`029efb28 ffffb884`027306c0 0000477b`f6d12fd8 ffffb884`029ef000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`642a6b40 fffff807`62bb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00001e28`7a7b2fa0 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`642a6b70 fffff807`5de0781e : fffff807`5c47c240 ffffb884`02853000 fffff807`642a6e70 ffffb884`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`642a6bb0 fffff807`5de06b04 : fffff807`00000007 00000000`00000000 00000000`00000008 00000000`000559c3 : nt!KiExecuteAllDpcs+0x30e
fffff807`642a6d20 fffff807`5dffcc95 : 00000000`00000000 fffff807`5c479180 ffffe481`75e7d000 00000215`f1e280e0 : nt!KiRetireDpcList+0x1f4
fffff807`642a6fb0 fffff807`5dffca80 : fffff807`5dff1d40 fffff807`5deec5ca ffffb884`0db11080 ffffe387`3383eb80 : nt!KxRetireDpcList+0x5
ffffe387`3383eac0 fffff807`5dffc335 : 00000215`f1e280e0 fffff807`5dff77c1 00000215`f2717230 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffe387`3383eaf0 fffff807`5dff77c1 : 00000215`f2717230 00000000`00000000 00000000`00000000 ffffb884`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe387`3383eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff807642a5f70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff807642a5ec8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3250
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3254
Key : Analysis.Init.CPU.mSec
Value: 4437
Key : Analysis.Init.Elapsed.mSec
Value: 866732
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff807642a5f70
BUGCHECK_P3: fffff807642a5ec8
BUGCHECK_P4: 0
TRAP_FRAME: fffff807642a5f70 -- (.trap 0xfffff807642a5f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8075dff76d0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075de4a8fd rsp=fffff807642a6100 rbp=ffffb8840bf8c080
r8=0000000000000001 r9=0000000000000006 r10=fffff8075de48700
r11=fffff8075c479180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x1ad:
fffff807`5de4a8fd cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff807642a5ec8 -- (.exr 0xfffff807642a5ec8)
ExceptionAddress: fffff8075de4a8fd (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: JX3ClientX64.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DPC_STACK_BASE: FFFFF807642A6FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff807`642a5c48 fffff807`5e007b69 : 00000000`00000139 00000000`00000003 fffff807`642a5f70 fffff807`642a5ec8 : nt!KeBugCheckEx
fffff807`642a5c50 fffff807`5e007f90 : 00000000`00000000 fffff807`642a5de0 00000000`00000000 00000000`00220003 : nt!KiBugCheckDispatch+0x69
fffff807`642a5d90 fffff807`5e006323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff807`642a5f70 fffff807`5de4a8fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`642a6100 fffff807`5de48c87 : ffffb884`0bf8c080 00000000`00000000 ffffb884`0bf8c080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`642a6170 fffff807`5de48727 : 00000000`00000000 fffff807`642a6206 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`642a6260 fffff807`74405056 : 00000000`00000018 fffff807`642a6300 ffffb884`139e8050 fffff807`642a6340 : nt!IofCompleteRequest+0x17
fffff807`642a6290 fffff807`743e3aa7 : 00000000`00000002 ffffb884`099fd460 ffffb884`098e9580 fffff807`642a6374 : mouclass!MouseClassServiceCallback+0x476
fffff807`642a6330 fffff807`5de4885e : 00000000`00000000 00000001`74484a00 fffff807`5c479101 ffff9b07`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`642a63d0 fffff807`5de48727 : 00000000`00000000 ffffb884`09953506 ffffb884`09624c70 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`642a64c0 fffff807`743aaef5 : ffffb884`0be7b358 ffffb884`09940102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff807`642a64f0 fffff807`743aa7ed : ffffb884`099401d0 ffffb884`09940102 ffffb884`099401d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`642a65f0 fffff807`5de4885e : ffffb884`099c5010 ffffb884`099c5010 fffff807`642a6701 ffffb884`099c53fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`642a6690 fffff807`5de48727 : 00000000`00000001 00000000`00000000 ffffb884`099035f0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`642a6780 fffff807`62bb811a : 00000000`00000000 ffffb884`093acc30 ffffb884`099c5010 fffff807`642a6860 : nt!IofCompleteRequest+0x17
fffff807`642a67b0 fffff807`62bb5bbf : ffffb884`0b029702 ffffb884`09946010 ffffb884`099c5010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`642a6840 fffff807`6f50b91c : 00000000`ffffff02 ffffb884`0b029630 ffffb884`099039d0 ffffb884`099039d0 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`642a68a0 fffff807`6f50b7e1 : ffffb884`0b0297d0 00000000`00000008 ffffb884`0b029860 fffff807`642a6ab8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`642a6900 fffff807`6f50b5d0 : 00000000`00000004 fffff807`642a6a70 00000000`00000000 ffffb884`09904050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`642a69b0 fffff807`6f506570 : 00000000`00000004 fffff807`642a6a88 00000000`00000008 fffff807`642a6a90 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`642a69e0 fffff807`6f5060a5 : 00000000`00000780 0000477b`f6d0d900 ffffb884`0982d520 ffffb884`09992470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`642a6a40 fffff807`6f505d7c : ffffb884`029efb28 ffffb884`027306c0 0000477b`f6d12fd8 ffffb884`029ef000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`642a6b40 fffff807`62bb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00001e28`7a7b2fa0 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`642a6b70 fffff807`5de0781e : fffff807`5c47c240 ffffb884`02853000 fffff807`642a6e70 ffffb884`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`642a6bb0 fffff807`5de06b04 : fffff807`00000007 00000000`00000000 00000000`00000008 00000000`000559c3 : nt!KiExecuteAllDpcs+0x30e
fffff807`642a6d20 fffff807`5dffcc95 : 00000000`00000000 fffff807`5c479180 ffffe481`75e7d000 00000215`f1e280e0 : nt!KiRetireDpcList+0x1f4
fffff807`642a6fb0 fffff807`5dffca80 : fffff807`5dff1d40 fffff807`5deec5ca ffffb884`0db11080 ffffe387`3383eb80 : nt!KxRetireDpcList+0x5
ffffe387`3383eac0 fffff807`5dffc335 : 00000215`f1e280e0 fffff807`5dff77c1 00000215`f2717230 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffe387`3383eaf0 fffff807`5dff77c1 : 00000215`f2717230 00000000`00000000 00000000`00000000 ffffb884`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe387`3383eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------