Getting BSODs at random intervals, ntkrnlmp.exe

B

Biggze

Hi. I recently built a new PC, and it's working just fine, except that I randomly am experiencing BSODs. Usually they happen around once or twice per week. The failures all seem to be related to "ntkrnlmp.exe", but I am getting different codes each BSOD. Googling my issue I find that people are pointing to all sorts of issues, whether it's related to GPU drivers, memory, or whatnot. I'm coming here and asking because I'm hoping I can get some more accurate insight before I start troubleshooting myself.

Some things that I suspect could be causing issues:

I'm running an RTX3080 - even if the drivers are up to date, it's still a new card.

The 3080 is paired with an RMX650 PSU (rated 100w below Nvidia's own reccomendation). I'm gaming and stress testing just fine, and from what I gather - if my GPU would overdraw I shouldn't BSOD, rather the PC should just reboot.

I've enabled XMP for my memory, but only to run the sticks at advertised clock speeds.



I analyzed a few logs using WinDbg and this is what came out of it:

(1)


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdb0007947160, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdb00079470b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2655

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on GUSTOSANCHEZ

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2740

Key : Analysis.Memory.CommitPeak.Mb
Value: 87

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdb0007947160

BUGCHECK_P3: ffffdb00079470b8

BUGCHECK_P4: 0

TRAP_FRAME: ffffdb0007947160 --
(.trap 0xffffdb0007947160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdc0440c685d0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042f60cd4a rsp=ffffdb00079472f0 rbp=0000000000000705
r8=0000000000000000 r9=7fff820343d2c1b8 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
FLTMGR!DeleteStreamListCtrlCallback+0x7a:
fffff804`2f60cd4a cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffdb00079470b8 --
(.exr 0xffffdb00079470b8)
ExceptionAddress: fffff8042f60cd4a (FLTMGR!DeleteStreamListCtrlCallback+0x000000000000007a)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - En verskridning av en stackbaserad buffert uppt cktes. Detta kan ge anv ndare som vill v lla skada kontroll ver programmet.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffdb00`07946e38 fffff804`30007769 : 00000000`00000139 00000000`00000003 ffffdb00`07947160 ffffdb00`079470b8 : nt!KeBugCheckEx
ffffdb00`07946e40 fffff804`30007b90 : 00000000`00000004 ffff8203`2d1b1d50 00000000`00000001 ffffdb00`079472c0 : nt!KiBugCheckDispatch+0x69
ffffdb00`07946f80 fffff804`30005f23 : 00000028`00000000 00000018`00000028 ffffffd8`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffdb00`07947160 fffff804`2f60cd4a : 00000000`00000705 ffffdc04`40c685a8 ffffdc04`31b6a060 ffffdc04`40c685a0 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdb00`079472f0 fffff804`302b9069 : ffff8203`43d2c1a8 ffffdc04`40c685a8 ffff8203`00000000 ffffdb00`079477f0 : FLTMGR!DeleteStreamListCtrlCallback+0x7a
ffffdb00`07947330 fffff804`3591c10b : ffff8203`43d2c170 ffffdb00`07947478 ffffdb00`079477f0 00000000`00000703 : nt!FsRtlTeardownPerStreamContexts+0xc9
ffffdb00`07947370 fffff804`3591be96 : ffff8203`43d2c170 ffff8203`29a1d208 ffff8203`00000000 ffffdc04`31ba65a8 : Ntfs!NtfsDeleteScb+0x17b
ffffdb00`07947410 fffff804`35827b95 : ffff8203`43d2c010 ffff8203`43d2c170 ffff8203`43d2c170 ffff8203`43d2c170 : Ntfs!NtfsRemoveScb+0x66
ffffdb00`07947470 fffff804`3591bc2c : ffffdb00`079477f0 fffff804`35967930 ffff8203`43d2c010 ffff8203`43d2c500 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffdb00`079474b0 fffff804`3582bd40 : ffffdb00`079477f0 ffffdb00`079475b2 ffff8203`43d2c528 ffff8203`43d2c010 : Ntfs!NtfsTeardownStructures+0x9c
ffffdb00`07947530 fffff804`3594b4d7 : ffffdb00`07947600 ffff8203`00000000 00000000`00000000 fffff804`00000000 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffdb00`07947570 fffff804`35947ff1 : ffffdb00`079477f0 ffff8203`43d2c170 ffff8203`43d2c010 ffffdc04`31ba5180 : Ntfs!NtfsCommonClose+0x467
ffffdb00`07947650 fffff804`359679b8 : 00000000`0000001c fffff804`30924440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffdb00`079477b0 fffff804`2fe25975 : ffffdc04`4847d040 fffff804`302e4b10 ffffdc04`2aeb5ca0 00000000`00000000 : Ntfs!NtfsFspClose+0x88
ffffdb00`07947a70 fffff804`2ff17e25 : ffffdc04`4847d040 00000000`00000080 ffffdc04`2aeb6040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffdb00`07947b10 fffff804`2fffcdd8 : ffffae01`3f980180 ffffdc04`4847d040 fffff804`2ff17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffdb00`07947b60 00000000`00000000 : ffffdb00`07948000 ffffdb00`07941000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME:
nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------


(2)


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb50034d00000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80134f21ccf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4343

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on GUSTOSANCHEZ

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 49130

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffb50034d00000

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80134f21ccf

BUGCHECK_P4: 0

READ_ADDRESS: fffff8011bcfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011bc0f330: Unable to get Flags value from nt!KdVersionBlock
fffff8011bc0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb50034d00000

MM_INTERNAL_CODE: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffffd07881ea020 --
(.trap 0xfffffd07881ea020)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb50034cff000 rbx=0000000000000000 rcx=ffff8408f0cd4c38
rdx=000000000006f00d rsi=0000000000000000 rdi=0000000000000000
rip=fffff80134f21ccf rsp=fffffd07881ea1b0 rbp=000000000000000b
r8=0000000000000400 r9=000000000006e05e r10=0000000000000000
r11=fffffd07881ea1d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nvlddmkm+0x7b1ccf:
fffff801`34f21ccf 42891480 mov dword ptr [rax+r8*4],edx ds:ffffb500`34d00000=????????
Resetting default scope

STACK_TEXT:
fffffd07`881e9d78 fffff801`1b41eb6b : 00000000`00000050 ffffb500`34d00000 00000000`00000002 fffffd07`881ea020 : nt!KeBugCheckEx
fffffd07`881e9d80 fffff801`1b20c960 : fffffd07`881e9f90 00000000`00000002 fffffd07`881ea0a0 00000000`00000000 : nt!MiSystemFault+0x1f435b
fffffd07`881e9e80 fffff801`1b40395e : fffff801`347839e0 fffff801`3519ec6a fffff801`351a836a fffff801`3543dd57 : nt!MmAccessFault+0x400
fffffd07`881ea020 fffff801`34f21ccf : ffff8408`f0cd4c38 00000000`008d9ea4 fffffb09`d207846c 00000000`00000018 : nt!KiPageFault+0x35e
fffffd07`881ea1b0 ffff8408`f0cd4c38 : 00000000`008d9ea4 fffffb09`d207846c 00000000`00000018 00000000`0000000b : nvlddmkm+0x7b1ccf
fffffd07`881ea1b8 00000000`008d9ea4 : fffffb09`d207846c 00000000`00000018 00000000`0000000b fffff801`352144ba : 0xffff8408`f0cd4c38
fffffd07`881ea1c0 fffffb09`d207846c : 00000000`00000018 00000000`0000000b fffff801`352144ba 00000000`00000003 : 0x8d9ea4
fffffd07`881ea1c8 00000000`00000018 : 00000000`0000000b fffff801`352144ba 00000000`00000003 ffff8408`f56a6000 : 0xfffffb09`d207846c
fffffd07`881ea1d0 00000000`0000000b : fffff801`352144ba 00000000`00000003 ffff8408`f56a6000 ffff8408`f56a6003 : 0x18
fffffd07`881ea1d8 fffff801`352144ba : 00000000`00000003 ffff8408`f56a6000 ffff8408`f56a6003 00000000`0000000f : 0xb
fffffd07`881ea1e0 00000000`00000003 : ffff8408`f56a6000 ffff8408`f56a6003 00000000`0000000f 00000000`00000000 : nvlddmkm+0xaa44ba
fffffd07`881ea1e8 ffff8408`f56a6000 : ffff8408`f56a6003 00000000`0000000f 00000000`00000000 ffffb500`35540000 : 0x3
fffffd07`881ea1f0 ffff8408`f56a6003 : 00000000`0000000f 00000000`00000000 ffffb500`35540000 00000002`00000001 : 0xffff8408`f56a6000
fffffd07`881ea1f8 00000000`0000000f : 00000000`00000000 ffffb500`35540000 00000002`00000001 00000040`00000000 : 0xffff8408`f56a6003
fffffd07`881ea200 00000000`00000000 : ffffb500`35540000 00000002`00000001 00000040`00000000 ffff8408`f0cd4d18 : 0xf


SYMBOL_NAME: nvlddmkm+7b1ccf

MODULE_NAME:
nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 7b1ccf

FAILURE_BUCKET_ID: AV_INVALID_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {df018c6e-47ce-6234-d97b-e5d8699ade66}

Followup: MachineOwner
---------


(3)



*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80453f5ccf1, Address of the instruction which caused the bugcheck
Arg3: fffffc0bd4f01d60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2703

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on GUSTOSANCHEZ

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 17035

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80453f5ccf1

BUGCHECK_P3: fffffc0bd4f01d60

BUGCHECK_P4: 0

CONTEXT: fffffc0bd4f01d60 --
(.cxr 0xfffffc0bd4f01d60)
rax=0000000000000000 rbx=ffffc8000c3af3c0 rcx=ffffc8000c3af3f0
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc8000c3af3f0
rip=fffff80453f5ccf1 rsp=fffffc0bd4f02760 rbp=fffffc0bd4f02939
r8=0000000000000000 r9=0000000000000000 r10=fffff80453f5cce0
r11=0000000000000000 r12=0000000000000000 r13=ffffde091b1f9b40
r14=ffffc8000c3af3c0 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!IopDeleteDriver+0x11:
fffff804`53f5ccf1 488b4828 mov rcx,qword ptr [rax+28h] ds:002b:00000000`00000028=????????????????
Resetting default scope

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
fffffc0b`d4f02760 fffff804`53dfaef0 : ffffc800`0c3af3c0 fffffc0b`d4f02939 00000000`00000000 00000000`00000000 : nt!IopDeleteDriver+0x11
fffffc0b`d4f027b0 fffff804`53a61277 : 00000000`00000000 00000000`00000000 fffffc0b`d4f02939 ffffc800`0c3af3f0 : nt!ObpRemoveObjectRoutine+0x80
fffffc0b`d4f02810 fffff804`53e2887e : ffffc80f`fc95b640 00000000`00000001 ffffffff`ffffffff ffffde09`1196e820 : nt!ObfDereferenceObjectWithTag+0xc7
fffffc0b`d4f02850 fffff804`53e2c4fc : 00000000`00000208 00000000`00000000 00000000`00000000 fffff804`53e358fa : nt!ObCloseHandleTableEntry+0x29e
fffffc0b`d4f02990 fffff804`53c071b5 : 00000000`00000000 fffffc0b`d4f02a80 fffffc0b`d4f02a80 ffffc800`0ecf7340 : nt!NtClose+0xec
fffffc0b`d4f02a00 00007ffa`efc4c194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000e0`b267f878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`efc4c194


SYMBOL_NAME: nt!IopDeleteDriver+11

MODULE_NAME:
nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .cxr 0xfffffc0bd4f01d60 ; kb

BUCKET_ID_FUNC_OFFSET: 11

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopDeleteDriver

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {90ff16cc-c90a-bdfb-f031-796195b5424e}

Followup: MachineOwner
---------


(4)


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff9d06554ef250, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9d06554ef1a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3312

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on GUSTOSANCHEZ

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 11978

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff9d06554ef250

BUGCHECK_P3: ffff9d06554ef1a8

BUGCHECK_P4: 0

TRAP_FRAME: ffff9d06554ef250 --
(.trap 0xffff9d06554ef250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb8351c6a530 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdb8353d743d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80745d1b378 rsp=ffff9d06554ef3e0 rbp=fffff80745d67930
r8=ffff9d06554ef3f0 r9=7fffdb8353d74160 r10=fffff807402600d0
r11=ffffdb8353d74408 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
Ntfs!NtfsFullDeleteLcb+0x1f8:
fffff807`45d1b378 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff9d06554ef1a8 --
(.exr 0xffff9d06554ef1a8)
ExceptionAddress: fffff80745d1b378 (Ntfs!NtfsFullDeleteLcb+0x00000000000001f8)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - En verskridning av en stackbaserad buffert uppt cktes. Detta kan ge anv ndare som vill v lla skada kontroll ver programmet.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff9d06`554eef28 fffff807`40407769 : 00000000`00000139 00000000`00000003 ffff9d06`554ef250 ffff9d06`554ef1a8 : nt!KeBugCheckEx
ffff9d06`554eef30 fffff807`40407b90 : 00000000`00000000 ffff8d0b`00000000 ffffdb83`38a00100 fffff807`4024caf2 : nt!KiBugCheckDispatch+0x69
ffff9d06`554ef070 fffff807`40405f23 : ffff9d06`554ef7f0 00000000`00000000 ffff8d0b`1c972060 ffff8d0b`247756e8 : nt!KiFastFailDispatch+0xd0
ffff9d06`554ef250 fffff807`45d1b378 : fffff807`45d67930 ffffdb83`00000001 ffffdb83`00000000 ffffdb83`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9d06`554ef3e0 fffff807`45c27748 : ffff9d06`554ef7f0 ffffdb83`53d74170 ffffdb83`53d74170 ffff8d0b`1c9a85a0 : Ntfs!NtfsFullDeleteLcb+0x1f8
ffff9d06`554ef410 fffff807`45d1bc7a : ffff9d06`554ef7f0 ffff8d0b`1c9a7180 ffffdb83`51c6a010 ffffdb83`51c6a528 : Ntfs!NtfsTeardownFromLcb+0x1a8
ffff9d06`554ef4b0 fffff807`45c2bd40 : ffff9d06`554ef7f0 ffff9d06`554ef5b2 00000000`00000000 ffffdb83`51c6a010 : Ntfs!NtfsTeardownStructures+0xea
ffff9d06`554ef530 fffff807`45d4b4d7 : ffff9d06`554ef600 ffffdb83`51c6a010 00000000`00000000 ffffdb83`51c6a000 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffff9d06`554ef570 fffff807`45d47ff1 : ffff9d06`554ef7f0 ffffdb83`51c6a170 ffffdb83`51c6a010 ffff8d0b`1c9a7180 : Ntfs!NtfsCommonClose+0x467
ffff9d06`554ef650 fffff807`45d679b8 : 00000000`0000001c fffff807`40d24440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffff9d06`554ef7b0 fffff807`40225975 : ffff8d0b`261cb080 fffff807`45d67930 ffff8d0b`15c9b8d0 fffff807`00000000 : Ntfs!NtfsFspClose+0x88
ffff9d06`554efa70 fffff807`40317e25 : ffff8d0b`261cb080 00000000`00000080 ffff8d0b`15cca040 3c5f81bb`fce2b1a4 : nt!ExpWorkerThread+0x105
ffff9d06`554efb10 fffff807`403fcdd8 : fffff807`3e67d180 ffff8d0b`261cb080 fffff807`40317dd0 addb6bb9`6402dd6a : nt!PspSystemThreadStartup+0x55
ffff9d06`554efb60 00000000`00000000 : ffff9d06`554f0000 ffff9d06`554e9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME:
nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------



Continue reading...
 

Similar threads

P
Replies
0
Views
698
P
J
Replies
0
Views
430
JanKybe
J
W
Replies
0
Views
786
Wyomingballer
W
J
Replies
0
Views
299
JakeIsTheGuy678
J
Back
Top Bottom