- Joined
- Apr 29, 2016
- Messages
- 52 (0.02/day)
System Name | System 1 |
---|---|
Processor | AMD FX-6300(stock speed, stock cooler) |
Motherboard | ASUS M5A97 R2.0 |
Cooling | Stock Cooler |
Memory | 2*4 GB Corsair 1600 mHz vengeance cl9(use on stock speed) |
Video Card(s) | ASUS R9 380 STRIX 4 GB(factory OC no additional OC) |
Storage | Samsung 850 EVO 250 GB(system disk)+1 TB Seagate STDM1000 |
Display(s) | ASUS VX238H |
Case | Corsair Carbide 300R |
Audio Device(s) | Integrated |
Power Supply | Corsair cx600 |
Software | Windows 10+ASUS Fan Xpert+Crimson 16.11.4+using clockblocker while gaming |
Benchmark Scores | Unigine Heaven 4.0, dx11+ultra+normal tessellation+4X AA+1080p: score 1068 42.4 avg fps |
I got a BSOD today, and i'm dealing with it. It was Kernel_Security_Check_Failure. I debugged it with WinDbg but i did it with analyze-v! command because i'm not expert on debugging and i don't know how to use advanced commands. Its result:
So, what is the exact cause of this problem and what do i have to do? I tried all known classic solutions, memtest86, stress tests, bad sector scan, sfc/ scannow command, virus scan etc etc... And none of them reports any problem. What should i do to detect and solve the problem? Would you help me?
Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\042916-16843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 10586 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.212.amd64fre.th2_release_sec.160328-1908
Machine Name:
Kernel base = 0xfffff800`de08f000 PsLoadedModuleList = 0xfffff800`de36dcd0
Debug session time: Fri Apr 29 10:29:52.813 2016 (UTC + 3:00)
System Uptime: 1 days 1:36:46.534
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.................................................. ............
.................................................. ..............
.............................
Loading User Symbols
Loading unloaded module list
......................
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {e, ffffd0018b37d650, ffffd0018b37d5a8, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000000e, Type of memory safety violation
Arg2: ffffd0018b37d650, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd0018b37d5a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10586.212.amd64fre.th2_release_sec.160328-1908
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2501
BIOS_DATE: 04/07/2014
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: e
BUGCHECK_P2: ffffd0018b37d650
BUGCHECK_P3: ffffd0018b37d5a8
BUGCHECK_P4: 0
TRAP_FRAME: ffffd0018b37d650 -- (.trap 0xffffd0018b37d650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffecf3f9ffecf3fa rbx=0000000000000000 rcx=000000000000000e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800de5f89e2 rsp=ffffd0018b37d7e0 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000006 r10=0000000000000000
r11=fffff800de1dd397 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt! ?? ::NNGAKEGL::`string'+0x12c92:
fffff800`de5f89e2 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd0018b37d5a8 -- (.exr 0xffffd0018b37d5a8)
ExceptionAddress: fffff800de5f89e2 (nt! ?? ::NNGAKEGL::`string'+0x0000000000012c92)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000000e
Subcode: 0xe FAST_FAIL_INVALID_REFERENCE_COUNT
CPU_COUNT: 6
CPU_MHZ: db8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: INVALID_REFERENCE_COUNT
BUGCHECK_STR: 0x139
PROCESS_NAME: uTorrent.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000000e
ANALYSIS_SESSION_HOST: DESKTOP-HH247R6
ANALYSIS_SESSION_TIME: 04-29-2016 17:35:07.0076
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
LAST_CONTROL_TRANSFER: from fffff800de1dc2e9 to fffff800de1d1760
STACK_TEXT:
ffffd001`8b37d328 fffff800`de1dc2e9 : 00000000`00000139 00000000`0000000e ffffd001`8b37d650 ffffd001`8b37d5a8 : nt!KeBugCheckEx
ffffd001`8b37d330 fffff800`de1dc610 : ffffe000`00000000 ffffe000`613576b0 00000020`000003a0 000000f4`00000008 : nt!KiBugCheckDispatch+0x69
ffffd001`8b37d470 fffff800`de1db7f3 : ffffd001`8a827000 00000000`00000801 00000000`000006c0 ffffd001`00000001 : nt!KiFastFailDispatch+0xd0
ffffd001`8b37d650 fffff800`de5f89e2 : ffffd001`00000002 ffffc001`b0b93520 00000000`00000002 ffffc001`b1e51060 : nt!KiRaiseSecurityCheckFailure+0xf3
ffffd001`8b37d7e0 fffff800`de481e91 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd001`8b37db18 : nt! ?? ::NNGAKEGL::`string'+0x12c92
ffffd001`8b37d8b0 fffff800`de481083 : ffffd001`8b37dac8 ffffd001`8b37dac8 ffffc001`b33d8200 00000000`000007ff : nt!SeCopyClientToken+0x5d
ffffd001`8b37d940 fffff800`de481440 : ffffd001`8b37dac8 00000000`00000000 ffffc001`b33d8260 ffffc001`b1e51060 : nt!SepCreateClientSecurityEx+0x133
ffffd001`8b37d9a0 fffff800`de481bf6 : ffffc001`b33d8240 ffffe000`60f33080 00000000`00000001 ffffe000`6192e840 : nt!SeCreateClientSecurity+0xb0
ffffd001`8b37da30 fffff800`de4e6d5b : 00000000`003c3000 00000000`062b0730 ffffd001`8b37db80 00000000`003c3000 : nt!AlpcpCreateSecurityContext+0x96
ffffd001`8b37da90 fffff800`de1dbfa3 : ffffe000`60f33080 00000000`6f0426d0 00000000`00000000 ffffd001`8b37db80 : nt!NtAlpcCreateSecurityContext+0x10f
ffffd001`8b37db00 00007fff`46a96024 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02b0eaa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`46a96024
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: b149bcbda74b2222ba6ac073ad6478f560342d69
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 61d0ee007850ac82400889acb935ee5f81493f91
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff800`de1dc610 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 56fa1e56
IMAGE_VERSION: 10.0.10586.212
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_e_nt!KiFastFailDispatch
BUCKET_ID: 0x139_e_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_e_nt!KiFastFailDispatch
TARGET_TIME: 2016-04-29T07:29:52.000Z
OSBUILD: 10586
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-03-29 09:19:02
BUILDDATESTAMP_STR: 160328-1908
BUILDLAB_STR: th2_release_sec
BUILDOSVER_STR: 10.0.10586.212.amd64fre.th2_release_sec.160328-1908
ANALYSIS_SESSION_ELAPSED_TIME: b20
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_e_nt!kifastfaildispatch
FAILURE_ID_HASH: {1faaac6f-d0dd-5c78-ac77-c09952b72e7d}
Followup: MachineOwner
So, what is the exact cause of this problem and what do i have to do? I tried all known classic solutions, memtest86, stress tests, bad sector scan, sfc/ scannow command, virus scan etc etc... And none of them reports any problem. What should i do to detect and solve the problem? Would you help me?