Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\cb\a\110721-8234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*f:\winsdk\symbols*
http://msdl.microsoft.com/download/symbols
Symbol search path is: srv*f:\winsdk\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (24 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`12a00000 PsLoadedModuleList = 0xfffff802`1362a270
Debug session time: Sun Nov 7 12:30:11.204 2021 (UTC - 5:00)
System Uptime: 0 days 0:02:39.868
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
18: kd> !analyze -v
*******************************************************************************
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffa0ca8317490, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffa0ca83173e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7C91
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.00
BIOS_DATE: 05/15/2020
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: MAG B550 TOMAHAWK (MS-7C91)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: fffffa0ca8317490
BUGCHECK_P3: fffffa0ca83173e8
BUGCHECK_P4: 0
TRAP_FRAME: fffffa0ca8317490 -- (.trap 0xfffffa0ca8317490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000003402 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff898b6ff6d290 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802237c6b2f rsp=fffffa0ca8317620 rbp=0000000000000000
r8=0000000000003402 r9=0000000000000002 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
rt640x64!MpHandleRecvIntPriVLanJumbo+0xc1b:
fffff802`237c6b2f cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffa0ca83173e8 -- (.exr 0xfffffa0ca83173e8)
ExceptionAddress: fffff802237c6b2f (rt640x64!MpHandleRecvIntPriVLanJumbo+0x0000000000000c1b)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 18
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: R7D7
ANALYSIS_SESSION_TIME: 11-07-2021 17:25:59.0768
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80212e09169 to fffff80212df71b0
STACK_TEXT:
fffffa0c`a8317168 fffff802`12e09169 : 00000000`00000139 00000000`00000003 fffffa0c`a8317490 fffffa0c`a83173e8 : nt!KeBugCheckEx
fffffa0c`a8317170 fffff802`12e09590 : 00000000`0000feff fffff802`123fdcc8 00000000`00000001 ffff898b`78c43410 : nt!KiBugCheckDispatch+0x69
fffffa0c`a83172b0 fffff802`12e07923 : ffff898b`77597580 ffff898b`6fcfb300 00000000`00000000 fffff802`11f72b40 : nt!KiFastFailDispatch+0xd0
fffffa0c`a8317490 fffff802`237c6b2f : ffff898b`6ffca000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffa0c`a8317620 fffff802`237b1dc8 : 00000000`00000001 00000000`5f4d1e01 ffff898b`00000400 fffffa0c`a8317790 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xc1b
fffffa0c`a8317710 fffff802`11fb3af9 : 00000000`00000000 ffff898b`70019010 ffff898b`00000000 00000000`ffffffff : rt640x64!MPHandleInterrupt+0x398
fffffa0c`a8317780 fffff802`12c9a24e : ffffde01`031c3240 ffff898b`632d6000 fffffa0c`a8317b40 ffffde01`00000002 : ndis!ndisInterruptDpc+0x3c409
fffffa0c`a8317860 fffff802`12c99534 : 00000000`00000000 fffff802`12cedb55 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffffa0c`a83179d0 fffff802`12dfad1e : ffffffff`00000000 ffffde01`031c0180 ffffde01`031cb640 ffff898b`763a1040 : nt!KiRetireDpcList+0x1f4
fffffa0c`a8317c60 00000000`00000000 : fffffa0c`a8318000 fffffa0c`a8312000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
THREAD_SHA1_HASH_MOD_FUNC: 8d0e08fdbec0c0a9cdc8549cf247361ef1ff27e6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 324e9bdf595ad565af1eab6e27eb618bdf38c0d5
THREAD_SHA1_HASH_MOD: cb57076c56b7535204a3c1b5d5632a392fda3c65
FOLLOWUP_IP:
rt640x64!MpHandleRecvIntPriVLanJumbo+c1b
fffff802`237c6b2f cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: rt640x64!MpHandleRecvIntPriVLanJumbo+c1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5ce7af86
IMAGE_VERSION: 9.1.410.2015
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c1b
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_rt640x64!MpHandleRecvIntPriVLanJumbo
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_rt640x64!MpHandleRecvIntPriVLanJumbo
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_rt640x64!MpHandleRecvIntPriVLanJumbo
TARGET_TIME: 2021-11-07T17:30:11.000Z
OSBUILD: 19041
OSSERVICEPACK: 1288
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1995-01-03 23:27:11
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 62f1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_rt640x64!mphandlerecvintprivlanjumbo
FAILURE_ID_HASH: {cdf88df1-f791-6c3f-0e87-27dc7eb30b26}
Followup: MachineOwner
---------