KERNEL_SECURITY_CHECK_FAILURE (139)

  • Thread starter AleksandarMilosevic91
  • Start date
A

AleksandarMilosevic91

Hi everybody, im having a issue with my laptop, keeps rebooting randomly, every 1hour if I don't use it.


Last night I left the game on for whole night and it didn't restart not even 1 time.


After I exit the game this morning and left laptop on it happened again.


Device name: ACER PREDATOR 17x G-791

Thanks
Alex



Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Aleksandar AM\Desktop\042119-8046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff807`4a8ae000 PsLoadedModuleList = 0xfffff807`4acc9790
Debug session time: Sun Apr 21 09:19:11.839 2019 (UTC + 4:00)
System Uptime: 0 days 11:40:13.704
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
............................
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff807`4aa61730 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffcd08`6aa4f220=0000000000000139
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffcd086aa4f540, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffcd086aa4f498, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.17763.437 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

DUMP_TYPE: 2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffcd086aa4f540

BUGCHECK_P3: ffffcd086aa4f498

BUGCHECK_P4: 0

TRAP_FRAME: ffffcd086aa4f540 --
(.trap 0xffffcd086aa4f540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd78269d72158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd78266ad4158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074aab8946 rsp=ffffcd086aa4f6d0 rbp=0000000000000000
r8=ffffd78264e61e90 r9=ffffa5819d4c9200 r10=00000061d21e999b
r11=fffff8074acd0fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!KiRemovePrcbWaitEntry+0x16f8b6:
fffff807`4aab8946 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffcd086aa4f498 --
(.exr 0xffffcd086aa4f498)
ExceptionAddress: fffff8074aab8946 (nt!KiRemovePrcbWaitEntry+0x000000000016f8b6)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 8

CPU_MHZ: a98

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT: 1

BUGCHECK_STR: 0x139

PROCESS_NAME: System

CURRENT_IRQL: 2

DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

ANALYSIS_SESSION_HOST: DESKTOP-PN2U4F9

ANALYSIS_SESSION_TIME: 04-21-2019 11:25:58.0937

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER: from fffff8074aa72e69 to fffff8074aa61730

STACK_TEXT:
ffffcd08`6aa4f218 fffff807`4aa72e69 : 00000000`00000139 00000000`00000003 ffffcd08`6aa4f540 ffffcd08`6aa4f498 : nt!KeBugCheckEx
ffffcd08`6aa4f220 fffff807`4aa73210 : 66696e75`5f696d77 5f646d63`5f646569 4d57203a`646e6573 46462066`75622049 : nt!KiBugCheckDispatch+0x69
ffffcd08`6aa4f360 fffff807`4aa71608 : ffffa581`9d380180 fffff807`4a935428 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffcd08`6aa4f540 fffff807`4aab8946 : ffffd782`69019080 ffffd782`62430140 00000000`00000002 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x308
ffffcd08`6aa4f6d0 fffff807`4a948f61 : ffffd782`00000000 ffffd782`64e61e90 ffffd782`69d72080 ffffd782`69fe21c0 : nt!KiRemovePrcbWaitEntry+0x16f8b6
ffffcd08`6aa4f700 fffff807`4a99bb4b : ffffd782`67c86648 00000000`00000000 ffffd782`674ce7c0 00000000`00000000 : nt!KiWakeQueueWaiter+0xd1
ffffcd08`6aa4f750 fffff807`4a99b717 : ffffd782`674ce7c0 ffffcd08`00000001 ffffd782`674ce7d8 00000000`00000000 : nt!KiExpireTimer2+0x17b
ffffcd08`6aa4f880 fffff807`4a92709d : 00000000`0000001c 00000000`00989680 ffffa581`9d4c9200 00000000`00000019 : nt!KiTimer2Expiration+0x257
ffffcd08`6aa4f950 fffff807`4aa6514a : ffffffff`00000000 ffffa581`9d4b9180 00000000`00000000 ffffa581`9d4c9200 : nt!KiRetireDpcList+0x68d
ffffcd08`6aa4fb60 00000000`00000000 : ffffcd08`6aa50000 ffffcd08`6aa49000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC: 037490564361ff61a86c935bad693b19bb238be9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a93de0acda023fe3ebe65f5955784e9dcb4a4058

THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!KiExpireTimer2+17b
fffff807`4a99bb4b 84c0 test al,al

FAULT_INSTR_CODE: 840fc084

SYMBOL_STACK_INDEX: 6

SYMBOL_NAME: nt!KiExpireTimer2+17b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME:
nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 438ffec3

IMAGE_VERSION: 10.0.17763.437

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 17b

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiExpireTimer2

BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiExpireTimer2

PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiExpireTimer2

TARGET_TIME: 2019-04-21T05:19:11.000Z

OSBUILD: 17763

OSSERVICEPACK: 437

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2005-12-02 11:58:59

BUILDDATESTAMP_STR: 160101.0800

BUILDLAB_STR: WinBuild

BUILDOSVER_STR: 10.0.17763.437

ANALYSIS_SESSION_ELAPSED_TIME: 1ff5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiexpiretimer2

FAILURE_ID_HASH: {48efa22e-90d6-78b9-5f27-2e68f070296e}

Followup: MachineOwner
---------



Continue reading...
 
Back
Top Bottom