Constant BSOD ntkrnlmp.exe - win32kfull.sys

  • Thread starter Benjamín Jerez
  • Start date
B

Benjamín Jerez

Hello.

I've been having a lot of BSOD recently, my pc is almost unusable.

I thought It may be a software problem, so I made a clean windows install, buy it keeps crashig. I also ran a memtest86, and it showed no error.

here is the minidump





*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc50f1badf270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc50f1badf1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2656

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6SM3QN9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2673

Key : Analysis.Memory.CommitPeak.Mb
Value: 91

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc50f1badf270

BUGCHECK_P3: ffffc50f1badf1c8

BUGCHECK_P4: 0

TRAP_FRAME: ffffc50f1badf270 --
(.trap 0xffffc50f1badf270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f0aaa36d158 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ac653e5 rsp=ffffc50f1badf400 rbp=ffffca81a1100180
r8=00000000000176c4 r9=0000000000000000 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KiQueueReadyThread+0x17b305:
fffff804`1ac653e5 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffc50f1badf1c8 --
(.exr 0xffffc50f1badf1c8)
ExceptionAddress: fffff8041ac653e5 (nt!KiQueueReadyThread+0x000000000017b305)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

BAD_STACK_POINTER: ffffc50f1badef48

STACK_TEXT:
ffffc50f`1badef48 fffff804`1abefa29 : 00000000`00000139 00000000`00000003 ffffc50f`1badf270 ffffc50f`1badf1c8 : nt!KeBugCheckEx
ffffc50f`1badef50 fffff804`1abefe50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50f`1badf090 fffff804`1abee1e3 : 00000000`00000000 ffffca81`a1100180 ffff9f0a`aa36d080 fffff804`1aa3f046 : nt!KiFastFailDispatch+0xd0
ffffc50f`1badf270 fffff804`1ac653e5 : ffffca81`a11088f0 ffffca81`a1100180 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc50f`1badf400 fffff804`1aa3e966 : ffff9f0a`aa3f0220 ffff9f0a`aa36d000 ffffc50f`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x17b305
ffffc50f`1badf480 fffff804`1aa3e2aa : 00000000`00000000 fffff804`00000000 ffff9f0a`a8cfb370 00000000`00000000 : nt!KiExitDispatcher+0x286
ffffc50f`1badf4f0 fffff758`a8667d43 : fffff720`00000000 fffff720`0062a8a0 00000000`000f0003 ffff9f0a`aa3f00a0 : nt!KeSetEvent+0xea
ffffc50f`1badf580 fffff758`a87011c8 : 00000000`00000001 00000000`00007ffe ffffd473`d184271d fffff758`a8620520 : win32kfull!InternalSetTimer+0x4f3
ffffc50f`1badf610 fffff758`a86ffb40 : fffff720`01200040 ffffc50f`1badfb00 00000000`00000020 00000000`00000004 : win32kfull!SetRITTimer+0x28
ffffc50f`1badf650 fffff758`a86ffacb : 00000000`00000007 00000000`00000010 00000000`00000000 00000000`00000000 : win32kfull!AdjustRITDelayableTimers+0x2c
ffffc50f`1badf690 fffff758`a8a69aff : 00000000`00000000 ffffc50f`1badf7c0 00000000`00000000 00000000`00000000 : win32kfull!SetTimerCoalescingTolerance+0x5b
ffffc50f`1badf6c0 fffff758`a8a69742 : ffff9f0a`afcd21a0 ffff9f0a`afcd21a0 00000000`00000001 00000000`00000000 : win32kbase!xxxUserPowerEventCalloutWorker+0x22f
ffffc50f`1badfa30 fffff758`a86a9fd0 : ffff9f0a`aa36d080 00000000`00000000 00000000`00000025 00000000`00000025 : win32kbase!xxxUserPowerCalloutWorker+0xe2
ffffc50f`1badfaa0 fffff758`a852474d : ffff9f0a`aa36d080 fffff804`1abef2d8 00000000`00000000 00000000`00040246 : win32kfull!NtUserCallNoParam+0x70
ffffc50f`1badfad0 fffff804`1abef478 : 00000000`00000170 00000000`00000025 00000000`00000000 00000000`00000000 : win32k!NtUserCallNoParam+0x15
ffffc50f`1badfb00 00007ffc`0cb810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`34f3fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0cb810e4


SYMBOL_NAME: win32kfull!InternalSetTimer+4f3

MODULE_NAME:
win32kfull

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 4f3

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_STACKPTR_ERROR_win32kfull!InternalSetTimer

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d6d41284-2d8d-9f4e-8a85-83d570096469}

Followup: MachineOwner
---------

10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc50f1badf270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc50f1badf1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2327

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6SM3QN9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2328

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc50f1badf270

BUGCHECK_P3: ffffc50f1badf1c8

BUGCHECK_P4: 0

TRAP_FRAME: ffffc50f1badf270 --
(.trap 0xffffc50f1badf270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f0aaa36d158 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ac653e5 rsp=ffffc50f1badf400 rbp=ffffca81a1100180
r8=00000000000176c4 r9=0000000000000000 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KiQueueReadyThread+0x17b305:
fffff804`1ac653e5 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffc50f1badf1c8 --
(.exr 0xffffc50f1badf1c8)
ExceptionAddress: fffff8041ac653e5 (nt!KiQueueReadyThread+0x000000000017b305)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

BAD_STACK_POINTER: ffffc50f1badef48

STACK_TEXT:
ffffc50f`1badef48 fffff804`1abefa29 : 00000000`00000139 00000000`00000003 ffffc50f`1badf270 ffffc50f`1badf1c8 : nt!KeBugCheckEx
ffffc50f`1badef50 fffff804`1abefe50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50f`1badf090 fffff804`1abee1e3 : 00000000`00000000 ffffca81`a1100180 ffff9f0a`aa36d080 fffff804`1aa3f046 : nt!KiFastFailDispatch+0xd0
ffffc50f`1badf270 fffff804`1ac653e5 : ffffca81`a11088f0 ffffca81`a1100180 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc50f`1badf400 fffff804`1aa3e966 : ffff9f0a`aa3f0220 ffff9f0a`aa36d000 ffffc50f`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x17b305
ffffc50f`1badf480 fffff804`1aa3e2aa : 00000000`00000000 fffff804`00000000 ffff9f0a`a8cfb370 00000000`00000000 : nt!KiExitDispatcher+0x286
ffffc50f`1badf4f0 fffff758`a8667d43 : fffff720`00000000 fffff720`0062a8a0 00000000`000f0003 ffff9f0a`aa3f00a0 : nt!KeSetEvent+0xea
ffffc50f`1badf580 fffff758`a87011c8 : 00000000`00000001 00000000`00007ffe ffffd473`d184271d fffff758`a8620520 : win32kfull!InternalSetTimer+0x4f3
ffffc50f`1badf610 fffff758`a86ffb40 : fffff720`01200040 ffffc50f`1badfb00 00000000`00000020 00000000`00000004 : win32kfull!SetRITTimer+0x28
ffffc50f`1badf650 fffff758`a86ffacb : 00000000`00000007 00000000`00000010 00000000`00000000 00000000`00000000 : win32kfull!AdjustRITDelayableTimers+0x2c
ffffc50f`1badf690 fffff758`a8a69aff : 00000000`00000000 ffffc50f`1badf7c0 00000000`00000000 00000000`00000000 : win32kfull!SetTimerCoalescingTolerance+0x5b
ffffc50f`1badf6c0 fffff758`a8a69742 : ffff9f0a`afcd21a0 ffff9f0a`afcd21a0 00000000`00000001 00000000`00000000 : win32kbase!xxxUserPowerEventCalloutWorker+0x22f
ffffc50f`1badfa30 fffff758`a86a9fd0 : ffff9f0a`aa36d080 00000000`00000000 00000000`00000025 00000000`00000025 : win32kbase!xxxUserPowerCalloutWorker+0xe2
ffffc50f`1badfaa0 fffff758`a852474d : ffff9f0a`aa36d080 fffff804`1abef2d8 00000000`00000000 00000000`00040246 : win32kfull!NtUserCallNoParam+0x70
ffffc50f`1badfad0 fffff804`1abef478 : 00000000`00000170 00000000`00000025 00000000`00000000 00000000`00000000 : win32k!NtUserCallNoParam+0x15
ffffc50f`1badfb00 00007ffc`0cb810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`34f3fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0cb810e4


SYMBOL_NAME: win32kfull!InternalSetTimer+4f3

MODULE_NAME:
win32kfull

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 4f3

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_STACKPTR_ERROR_win32kfull!InternalSetTimer

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d6d41284-2d8d-9f4e-8a85-83d570096469}

Followup: MachineOwner
---------



Continue reading...
 

Similar threads

J
Replies
0
Views
447
JanKybe
J
W
Replies
0
Views
808
Wyomingballer
W
J
Replies
0
Views
318
JakeIsTheGuy678
J
C
Replies
0
Views
358
CleanPinch123
C
Back
Top Bottom