BSOD General Usage - Security Check Failure


  1. Posts : 5
    Windows 10
       #1

    BSOD General Usage - Security Check Failure


    Hi All,

    I am being greeted with regular BSOD on my main PC - Security Check Failure and I cannot pinpoint which driver is causing it. I think that it is a driver issues, as in my own searches for a result, when I run Driver Verifier Manager, I cannot even boot to windows and have to enter safer mode to turn it off. I have provided the DM Log Collector output below as well as some other files that may be useful (I assume they are included in DM log Collector) but they are below just in case.

    I really appreciate your support in looking into this. If you need any other information please let me know what and I will provide it.

    Thanks,

    Jon

    DM Log Collector - https://drive.google.com/open?id=1AD...rmP9PkhzkI-Dai
    Mini DMP - https://drive.google.com/open?id=1AD...rmP9PkhzkI-Dai
    Full DMP - https://drive.google.com/open?id=123...DQjFRX29PJPa4D
    Speccy Snapshot - https://drive.google.com/open?id=1aJ...v0nk8ZaOaFka0V
    MSINFO - https://drive.google.com/open?id=1aJ...v0nk8ZaOaFka0V
      My Computer


  2. Posts : 1,538
    Windows 8.1 Enterprise x64
       #2

    KERNEL_SECURITY_CHECK_FAILURE (139)
    A kernel component has corrupted a critical data structure. The corruption
    could potentially allow a malicious user to gain control of this machine.
    1st parameter = 0x3 - A LIST_ENTRY has been corrupted (i.e. double remove).
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\MEMORY.DMP]
    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*
    Symbol search path is: SRV*
    Executable search path is: 
    Windows 10 Kernel Version 17763 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17763.1.amd64fre.rs5_release.180914-1434
    Machine Name:
    Kernel base = 0xfffff807`47412000 PsLoadedModuleList = 0xfffff807`4782d790
    Debug session time: Mon Apr 22 09:02:23.767 2019 (UTC + 2:00)
    System Uptime: 0 days 0:08:47.462
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ...........................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 0000003e`17e3a018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 139, {3, ffffea8c8683dcb0, ffffea8c8683dc08, 0}
    
    *** ERROR: Module load completed but symbols could not be loaded for hcmon.sys
    Page 100000000 too large to be in the dump file.
    *** ERROR: Module load completed but symbols could not be loaded for FiiOE10.sys
    Probably caused by : hcmon.sys ( hcmon+318a )
    
    Followup:     MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_SECURITY_CHECK_FAILURE (139)
    A kernel component has corrupted a critical data structure.  The corruption
    could potentially allow a malicious user to gain control of this machine.
    Arguments:
    Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
    Arg2: ffffea8c8683dcb0, Address of the trap frame for the exception that caused the bugcheck
    Arg3: ffffea8c8683dc08, Address of the exception record for the exception that caused the bugcheck
    Arg4: 0000000000000000, Reserved
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 401
    
    BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434
    
    SYSTEM_PRODUCT_NAME:  To Be Filled By O.E.M.
    
    SYSTEM_SKU:  To Be Filled By O.E.M.
    
    SYSTEM_VERSION:  To Be Filled By O.E.M.
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  P2.50
    
    BIOS_DATE:  10/06/2015
    
    BASEBOARD_MANUFACTURER:  ASRock
    
    BASEBOARD_PRODUCT:  Z97 Extreme6
    
    BASEBOARD_VERSION:                        
    
    DUMP_TYPE:  1
    
    BUGCHECK_P1: 3
    
    BUGCHECK_P2: ffffea8c8683dcb0
    
    BUGCHECK_P3: ffffea8c8683dc08
    
    BUGCHECK_P4: 0
    
    TRAP_FRAME:  ffffea8c8683dcb0 -- (.trap 0xffffea8c8683dcb0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffff83032789d0b8 rbx=0000000000000000 rcx=0000000000000003
    rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8074a33cef3 rsp=ffffea8c8683de40 rbp=ffff83031ece7010
     r8=fffff80751b7dd30  r9=ffff8303278a6010 r10=ffff8303331f1438
    r11=ffffbf7ae8a00000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    Wdf01000!RtlFailFast+0x5:
    fffff807`4a33cef3 cd29            int     29h
    Resetting default scope
    
    EXCEPTION_RECORD:  ffffea8c8683dc08 -- (.exr 0xffffea8c8683dc08)
    ExceptionAddress: fffff8074a33cef3 (Wdf01000!RtlFailFast+0x0000000000000005)
       ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
      ExceptionFlags: 00000001
    NumberParameters: 1
       Parameter[0]: 0000000000000003
    Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
    
    CPU_COUNT: 8
    
    CPU_MHZ: f9f
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 3c
    
    CPU_STEPPING: 3
    
    CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 24'00000000 (cache) 24'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    BUGCHECK_STR:  0x139
    
    PROCESS_NAME:  mpc-be64.exe
    
    CURRENT_IRQL:  2
    
    DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY
    
    ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
    
    EXCEPTION_CODE_STR:  c0000409
    
    EXCEPTION_PARAMETER1:  0000000000000003
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  04-22-2019 13:21:28.0815
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    DPC_STACK_BASE:  FFFFEA8C8683EFB0
    
    LAST_CONTROL_TRANSFER:  from fffff807475d6e69 to fffff807475c5730
    
    STACK_TEXT:  
    ffffea8c`8683d988 fffff807`475d6e69 : 00000000`00000139 00000000`00000003 ffffea8c`8683dcb0 ffffea8c`8683dc08 : nt!KeBugCheckEx
    ffffea8c`8683d990 fffff807`475d7210 : ffff8303`236b50e0 fffff807`474fbf02 ffff8303`236b50e0 ffff8303`23965c00 : nt!KiBugCheckDispatch+0x69
    ffffea8c`8683dad0 fffff807`475d5608 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8303`23965de0 : nt!KiFastFailDispatch+0xd0
    ffffea8c`8683dcb0 fffff807`4a33cef3 : ffff8303`331f1560 ffff8303`331f13c0 ffff8303`1e165ae0 ffff8303`2adaae10 : nt!KiRaiseSecurityCheckFailure+0x308
    ffffea8c`8683de40 fffff807`51b7b7ec : ffff8303`2adaae10 00000000`00000002 00000000`00000000 ffff8303`331f13c0 : Wdf01000!imp_WdfRequestMarkCancelableEx+0x16df3 [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 3529] 
    ffffea8c`8683dec0 fffff807`51b7a01c : 00007cfc`cce0ec38 ffff8303`331f1560 ffff8303`2adaae10 00000000`00000003 : USBXHCI!Isoch_RetrieveNextStage+0x4e4
    ffffea8c`8683df40 fffff807`51b79f08 : ffff8303`2adaae10 00000000`00000000 00007cfc`d5255500 00000000`00000000 : USBXHCI!Isoch_MappingLoop+0x88
    ffffea8c`8683df90 fffff807`51b7dcfc : ffff8303`2adaae10 fffff807`51b7dc60 00007cfc`d5255500 ffff8303`23965de0 : USBXHCI!Isoch_MapTransfers+0x78
    ffffea8c`8683dfe0 fffff807`4a32849b : ffff8303`2adaaa30 00007cfc`d52555c8 ffff8303`1ac02340 00000000`73556f49 : USBXHCI!Isoch_WdfEvtIoQueueReadyNotification+0x9c
    ffffea8c`8683e010 fffff807`4a3192fb : 00000000`00001000 ffff8303`2adaaa30 ffffea8c`8683e109 ffffcf81`542c0000 : Wdf01000!FxIoQueue::ProcessReadyNotify+0x8f [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 4841] 
    ffffea8c`8683e090 fffff807`4a322450 : ffff8303`2adaaa30 00000000`00000002 00000000`00000000 ffff8303`2adaaa30 : Wdf01000!FxIoQueue::DispatchEvents+0x67b [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 2871] 
    ffffea8c`8683e170 fffff807`510151a4 : ffff8303`1e165ae0 ffff8303`331f13c0 00000000`0000001e ffff8303`25a1fde0 : Wdf01000!imp_WdfDeviceWdmDispatchIrpToIoQueue+0x640 [minkernel\wdf\framework\shared\core\km\fxdeviceapikm.cpp @ 494] 
    ffffea8c`8683e250 fffff807`51014429 : 00000000`00000000 00000000`0000000a ffff8303`1e165ae0 00000000`00000000 : ucx01000!UrbHandler_USBPORTStyle_Legacy_IsochTransfer+0x1b4
    ffffea8c`8683e2b0 fffff807`51005a13 : 00007cfc`dc958bf8 ffff8303`278a6010 ffffea8c`8683e370 00007cfc`dc958bf8 : ucx01000!Urb_USBPORTStyle_ProcessURB+0x361
    ffffea8c`8683e310 fffff807`4a311c4d : ffff8303`278a6010 00000000`00000030 00000000`00000168 ffff8303`236a7400 : ucx01000!RootHub_Pdo_EvtInternalDeviceControlIrpPreprocessCallback+0x263
    ffffea8c`8683e3a0 fffff807`4de9318a : ffff8303`278a68c0 ffff8303`278a6010 00000000`00000000 00000000`00000000 : Wdf01000!FxDevice::DispatchWithLock+0x1ed [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430] 
    ffffea8c`8683e400 fffff807`4748a9e9 : ffff8303`278a6010 ffff8303`278a6010 ffff8303`25127e10 fffff807`00000030 : hcmon+0x318a
    ffffea8c`8683e450 fffff807`4a4fb63d : 00000000`00000002 ffff8303`278a6010 fffff807`4a570330 00000000`00000fff : nt!IofCallDriver+0x59
    ffffea8c`8683e490 fffff807`4a4f10c9 : ffff8303`1b3984b0 00000000`00000007 ffff8303`278a68c0 ffff8303`251d07c0 : ACPI!ACPIIrpDispatchDeviceControl+0xad
    ffffea8c`8683e4d0 fffff807`4748a9e9 : 00000000`00000007 00000000`00000000 ffffea8c`8683e5f9 ffff8303`25aaf3c0 : ACPI!ACPIDispatchIrp+0xb9
    ffffea8c`8683e550 fffff807`4fa36006 : 00000000`00000040 ffffcf81`542c0000 ffff8303`34f65030 00000000`00000000 : nt!IofCallDriver+0x59
    ffffea8c`8683e590 fffff807`4a311c4d : ffff8303`278a6010 ffffea8c`8683e7b9 ffff8303`278a6010 ffff8303`2529cd80 : UsbHub3!HUBPDO_EvtDeviceWdmIrpPreprocess+0x1086
    ffffea8c`8683e660 fffff807`4748a9e9 : ffffea8c`8683e7b9 00000000`00000001 00000000`0000000a ffff8303`276c1988 : Wdf01000!FxDevice::DispatchWithLock+0x1ed [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430] 
    ffffea8c`8683e6c0 fffff807`4f721ae6 : ffff8303`1e165ae0 ffff8303`278a6010 ffffea8c`8683e7b9 00000000`00000001 : nt!IofCallDriver+0x59
    ffffea8c`8683e700 fffff807`4f721816 : 00000000`00000000 ffff8303`278a6010 fffff807`4f7354b8 00000000`00000000 : usbccgp!DispatchPdoUrb+0x266
    ffffea8c`8683e820 fffff807`4f7216b3 : ffff8303`278a6010 ffff8303`276c1980 ffff8303`276c1988 00000000`0000000f : usbccgp!DispatchPdoInternalDeviceControl+0x86
    ffffea8c`8683e880 fffff807`4748a9e9 : ffff8303`276c1830 fffff807`47665c01 00000000`00000000 ffff8303`1add0770 : usbccgp!USBC_Dispatch+0x6a3
    ffffea8c`8683e940 fffff807`4f7f1d21 : ffffea8c`00000000 ffff8303`1add0770 00000000`00000fd0 ffff8303`278a6010 : nt!IofCallDriver+0x59
    ffffea8c`8683e980 fffff807`4f7f27fd : 00000000`00000000 00000000`0000002f 00000000`00000000 00000000`0000001c : FiiOE10+0x1d21
    ffffea8c`8683e9c0 fffff807`4f7f409c : ffff8303`1e0f1820 00000000`000001e0 00000000`000001a1 ffffea8c`8683eaa8 : FiiOE10+0x27fd
    ffffea8c`8683ea20 fffff807`50ef083b : 00000000`000000c0 00000000`000003c0 00000000`000003c0 ffffea8c`000003c0 : FiiOE10+0x409c
    ffffea8c`8683eac0 fffff807`50ef1687 : 00000000`00000001 ffffea8c`8683eb99 fffff807`000003c0 00000000`000003c0 : portcls!CPortPinWaveCyclic::Copy+0x97
    ffffea8c`8683eb10 fffff807`50eeb5e4 : ffff8303`2f6fe0f8 ffff8303`2a3fb490 ffff8303`284579b0 ffff8303`284579b8 : portcls!CPortPinWaveCyclic::RequestService+0x3b7
    ffffea8c`8683ec00 fffff807`4748b577 : ffffcf81`54296f80 ffff8303`28457970 ffffea8c`8683ed60 00000000`00000000 : portcls!CServiceGroup::ServiceDpc+0x74
    ffffea8c`8683ec60 fffff807`4748abbe : 00000000`00000008 00000000`00989680 ffff8303`3186e080 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
    ffffea8c`8683eda0 fffff807`475cc595 : 00000000`00000000 ffffcf81`54294180 ffffea8c`8e2fbb80 ffff8303`1b2a1d00 : nt!KiRetireDpcList+0x1ae
    ffffea8c`8683efb0 fffff807`475cc380 : fffff807`47e993a0 fffff807`47e83af5 ffff8303`2a920080 0000018c`79a18bd0 : nt!KxRetireDpcList+0x5
    ffffea8c`8e2fbac0 fffff807`475cbc45 : 00000000`00000001 fffff807`475c76f1 00000000`00000000 ffffea8c`8e2fbb80 : nt!KiDispatchInterruptContinue
    ffffea8c`8e2fbaf0 fffff807`475c76f1 : 00000000`00000000 ffffea8c`8e2fbb80 ffff8303`1b2a1d00 ffffea8c`8e2fbb80 : nt!KiDpcInterruptBypass+0x25
    ffffea8c`8e2fbb00 00007ff6`6d85565f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
    0000003e`193ff810 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`6d85565f
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  e3c54fde75b8385d041091359dfa978dd7237bbd
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0ba3a861998b367eb94feb844f7e7e8d31ce974a
    
    THREAD_SHA1_HASH_MOD:  edf4b3e1f27443474842db5d6be1b5fb2f368935
    
    FOLLOWUP_IP: 
    hcmon+318a
    fffff807`4de9318a f0ff8f48050000  lock dec dword ptr [rdi+548h]
    
    FAULT_INSTR_CODE:  488ffff0
    
    SYMBOL_STACK_INDEX:  10
    
    SYMBOL_NAME:  hcmon+318a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: hcmon
    
    IMAGE_NAME:  hcmon.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  57b54b19
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  318a
    
    FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_hcmon!unknown_function
    
    BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_hcmon!unknown_function
    
    PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_hcmon!unknown_function
    
    TARGET_TIME:  2019-04-22T07:02:23.000Z
    
    OSBUILD:  17763
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2005-12-02 08:58:59
    
    BUILDDATESTAMP_STR:  180914-1434
    
    BUILDLAB_STR:  rs5_release
    
    BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434
    
    ANALYSIS_SESSION_ELAPSED_TIME:  1ba6
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_hcmon!unknown_function
    
    FAILURE_ID_HASH:  {e326f27c-ead7-91ed-02df-dfa23587997f}
    
    Followup:     MachineOwner
    ---------
    
    2: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    2: kd> !dpx
    Start memory scan  : 0xffffea8c8683d988 ($csp)
    End memory scan    : 0xffffea8c8683efb0 (DPC Stack Base)
    
                   rax : 0xffffea8c8683da90 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
                   rbx : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
                   rsp : 0xffffea8c8683d988 : 0xfffff807475d6e69 : nt!KiBugCheckDispatch+0x69
                   rdi : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683d988 : 0xfffff807475d6e69 : nt!KiBugCheckDispatch+0x69
    0xffffea8c8683d9c0 : 0xfffff80751b7dc60 : USBXHCI!Isoch_WdfEvtIoQueueReadyNotification
    0xffffea8c8683da90 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683da98 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683dab8 : 0xfffff80751b7dd30 : USBXHCI!Isoch_WdfEvtRequestCancel
    0xffffea8c8683dac8 : 0xfffff807475d7210 : nt!KiFastFailDispatch+0xd0
    0xffffea8c8683dad8 : 0xfffff807474fbf02 : nt!KeAcquireSpinLockAtDpcLevel+0x62
    0xffffea8c8683db00 : 0xfffff80751b7dc60 : USBXHCI!Isoch_WdfEvtIoQueueReadyNotification
    0xffffea8c8683dbb8 : 0xfffff8074b805be3 : ndis!NdisFreeNetBufferList+0xc3
    0xffffea8c8683dbc8 : 0xfffff8074b977260 : NETIO!NetioFreeNetBufferAndNetBufferList+0x10
    0xffffea8c8683dbd0 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683dbd8 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683dbf8 : 0xfffff80751b7dd30 : USBXHCI!Isoch_WdfEvtRequestCancel
    0xffffea8c8683dc68 : 0xfffff8074ba7b568 : tcpip!TcpNotifyTcbDelay+0x194
    0xffffea8c8683dc98 : 0xffff8303252b25e0 : 0xfffff8074bc4a390 : tcpip!gWfpGlobalTriageBlock
    0xffffea8c8683dca8 : 0xfffff807475d5608 : nt!KiRaiseSecurityCheckFailure+0x308
    0xffffea8c8683dcf8 : 0xfffff80751b7dd30 : USBXHCI!Isoch_WdfEvtRequestCancel
    0xffffea8c8683dd90 : 0xffff83032adaba20 :  !da ""00 SLT09 DCI06""
    0xffffea8c8683dd98 : 0xfffff80751b7e61a : USBXHCI!WPP_RECORDER_SF_DDqDDDD+0x15a
    0xffffea8c8683dda8 : 0xfffff8074a312368 : Wdf01000!imp_WdfRequestGetParameters+0xc8
    0xffffea8c8683ddc8 : 0xffffea8c8683de78 : 0xfffff80751b7d42e : USBXHCI!Isoch_TransferUrb_MarkLatePackets+0x56
    0xffffea8c8683ddf8 : 0xfffff80751b7dd30 : USBXHCI!Isoch_WdfEvtRequestCancel
    0xffffea8c8683de48 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683de78 : 0xfffff80751b7d42e : USBXHCI!Isoch_TransferUrb_MarkLatePackets+0x56
    0xffffea8c8683dea8 : 0xfffff80751b96138 : USBXHCI!WPP_aca771c2c58c310d586a30bf5db36371_Traceguids
    0xffffea8c8683deb8 : 0xfffff80751b7b7ec : USBXHCI!Isoch_RetrieveNextStage+0x4e4
    0xffffea8c8683ded8 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683dee0 : 0xfffff80751b96101 :  !da ""ingCreate Failed""
    0xffffea8c8683df38 : 0xfffff80751b7a01c : USBXHCI!Isoch_MappingLoop+0x88
    0xffffea8c8683df88 : 0xfffff80751b79f08 : USBXHCI!Isoch_MapTransfers+0x78
    0xffffea8c8683dfd8 : 0xfffff80751b7dcfc : USBXHCI!Isoch_WdfEvtIoQueueReadyNotification+0x9c
    0xffffea8c8683dfe8 : 0xfffff80751b7dc60 : USBXHCI!Isoch_WdfEvtIoQueueReadyNotification
    0xffffea8c8683e008 : 0xfffff8074a32849b : Wdf01000!FxIoQueue::ProcessReadyNotify+0x8f
    0xffffea8c8683e010 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683e038 : 0xfffff8074748da8b : nt!ExAllocateHeapPool+0x98b
    0xffffea8c8683e048 : 0xfffff80751b7dc60 : USBXHCI!Isoch_WdfEvtIoQueueReadyNotification
    0xffffea8c8683e068 : 0xfffff8074a3a5750 : Wdf01000!FxPowerIdleMachine::m_StateTable
    0xffffea8c8683e078 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683e088 : 0xfffff8074a3192fb : Wdf01000!FxIoQueue::DispatchEvents+0x67b
    0xffffea8c8683e098 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683e0c8 : 0xfffff8074796f240 : nt!ExNode0
    0xffffea8c8683e0e8 : 0xfffff8074ba93220 : tcpip!FlpReturnNetBufferListChain
    0xffffea8c8683e120 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683e128 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683e148 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683e168 : 0xfffff8074a322450 : Wdf01000!imp_WdfDeviceWdmDispatchIrpToIoQueue+0x640
    0xffffea8c8683e170 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683e188 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683e1b8 : 0xfffff807474f3bbb : nt!KeQueryCurrentStackInformation+0x2b
    0xffffea8c8683e1c8 : 0xffff83032365ac00 :  dt Wdf01000!FxDevice
    0xffffea8c8683e1d0 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683e1d8 : 0xffff83032adaaa30 :  dt Wdf01000!FxIoQueue
    0xffffea8c8683e1e8 : 0xffff83031e5f99b0 :  dt Wdf01000!FxPkgIo
    0xffffea8c8683e200 : 0xffff83032365ac00 :  dt Wdf01000!FxDevice
    0xffffea8c8683e220 : 0xfffff80751014460 : ucx01000!Urb_LegacyTransferUrbCompletion
    0xffffea8c8683e248 : 0xfffff807510151a4 : ucx01000!UrbHandler_USBPORTStyle_Legacy_IsochTransfer+0x1b4
    0xffffea8c8683e258 : 0xffff8303331f13c0 :  dt Wdf01000!FxRequestFromLookaside
    0xffffea8c8683e298 : 0xfffff80751022360 : ucx01000!UrbDispatchTable
    0xffffea8c8683e2a8 : 0xfffff80751014429 : ucx01000!Urb_USBPORTStyle_ProcessURB+0x361
    0xffffea8c8683e2d8 : 0xfffff8074770da22 : nt!RtlpHpLfhSubsegmentCommitBlock+0x5a
    0xffffea8c8683e308 : 0xfffff80751005a13 : ucx01000!RootHub_Pdo_EvtInternalDeviceControlIrpPreprocessCallback+0x263
    0xffffea8c8683e340 : 0xffff83032f2fa030 :  !da "UUUUUUUUQE"
    0xffffea8c8683e398 : 0xfffff8074a311c4d : Wdf01000!FxDevice::DispatchWithLock+0x1ed
    0xffffea8c8683e3b8 : 0xffff8303236a7400 :  dt Wdf01000!FxDevice
    *** ERROR: Module load completed but symbols could not be loaded for hcmon.sys
    0xffffea8c8683e440 : 0xffff83031b3984b0 : 0xfffff8074a56d358 : ACPI!gAcpiTriageInfo
    0xffffea8c8683e448 : 0xfffff8074748a9e9 : nt!IofCallDriver+0x59
    0xffffea8c8683e488 : 0xfffff8074a4fb63d : ACPI!ACPIIrpDispatchDeviceControl+0xad
    0xffffea8c8683e4a0 : 0xfffff8074a570330 : ACPI!AcpiDeviceTreeLock
    0xffffea8c8683e4c0 : 0xfffff8074a55b068 : ACPI!AcpiFilterIrpDispatch+0x8
    0xffffea8c8683e4c8 : 0xfffff8074a4f10c9 : ACPI!ACPIDispatchIrp+0xb9
    0xffffea8c8683e4d0 : 0xffff83031b3984b0 : 0xfffff8074a56d358 : ACPI!gAcpiTriageInfo
    0xffffea8c8683e528 : 0xfffff8074a328801 : Wdf01000!FxDevice::_CompletionRoutineForRemlockMaintenance+0x1
    0xffffea8c8683e538 : 0xfffff8074fa77578 : UsbHub3!WPP_7c9a8c1f1a7c3ca72e1c468f1757432b_Traceguids
    0xffffea8c8683e548 : 0xfffff8074748a9e9 : nt!IofCallDriver+0x59
    0xffffea8c8683e580 : 0xfffff8074a311ee0 : Wdf01000!imp_WdfObjectGetTypedContextWorker
    0xffffea8c8683e5a0 : 0xffff830334f65030 :  !da "UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU..."
    0xffffea8c8683e5f8 : 0xfffff8074a328800 : Wdf01000!FxDevice::_CompletionRoutineForRemlockMaintenance
    0xffffea8c8683e640 : 0xffff830325aaf0d0 :  dt Wdf01000!FxDevice
    0xffffea8c8683e658 : 0xfffff8074a311c4d : Wdf01000!FxDevice::DispatchWithLock+0x1ed
    0xffffea8c8683e6b8 : 0xfffff8074748a9e9 : nt!IofCallDriver+0x59
    0xffffea8c8683e6f8 : 0xfffff8074f721ae6 : usbccgp!DispatchPdoUrb+0x266
    0xffffea8c8683e760 : 0xfffff8074a570330 : ACPI!AcpiDeviceTreeLock
    0xffffea8c8683e798 : 0xfffff8074775c06d : nt!ExAllocatePoolWithTag+0x3d
    0xffffea8c8683e7d0 : 0xfffff8074f8013a0 : intelppm!GV3HardwareFeedback
    0xffffea8c8683e7d8 : 0xfffff8074f801192 : intelppm!PerfReadWrappingCounter+0x32
    0xffffea8c8683e7e8 : 0xfffff8074a328801 : Wdf01000!FxDevice::_CompletionRoutineForRemlockMaintenance+0x1
    0xffffea8c8683e818 : 0xfffff8074f721816 : usbccgp!DispatchPdoInternalDeviceControl+0x86
    0xffffea8c8683e830 : 0xfffff8074f7354b8 : usbccgp!WPP_79cb2c6d9689380e37e7a082559969ff_Traceguids
    0xffffea8c8683e870 : 0xfffff8074f735260 : usbccgp!WPP_7aed94c50eb13c56b6bbe7bc20420442_Traceguids
    0xffffea8c8683e878 : 0xfffff8074f7216b3 : usbccgp!USBC_Dispatch+0x6a3
    0xffffea8c8683e8a8 : 0xfffff80747e827ae : hal!KeQueryPerformanceCounter+0x1de
    0xffffea8c8683e8e8 : 0xfffff807474f436a : nt!KiInsertQueueDpc+0x36a
    0xffffea8c8683e938 : 0xfffff8074748a9e9 : nt!IofCallDriver+0x59
    *** ERROR: Module load completed but symbols could not be loaded for FiiOE10.sys
    0xffffea8c8683e9e8 : 0xfffff80750ee6ba7 : portcls!WPP_RECORDER_SF_qqD+0x133
    0xffffea8c8683ea70 : 0xffff83032ada8de0 :  dt portcls!CIrpStream
    0xffffea8c8683ea78 : 0xffff8303282ca160 :  dt portcls!CPortPinWaveCyclic
    0xffffea8c8683eab0 : 0xffff8303282ca160 :  dt portcls!CPortPinWaveCyclic
    0xffffea8c8683eab8 : 0xfffff80750ef083b : portcls!CPortPinWaveCyclic::Copy+0x97
    0xffffea8c8683eb00 : 0xffff8303282ca160 :  dt portcls!CPortPinWaveCyclic
    0xffffea8c8683eb08 : 0xfffff80750ef1687 : portcls!CPortPinWaveCyclic::RequestService+0x3b7
    0xffffea8c8683ebb8 : 0xffffea8c8683eea0 : 0xfffff80750eeb570 : portcls!CServiceGroup::ServiceDpc
    0xffffea8c8683ebc8 : 0xfffff807474fbf02 : nt!KeAcquireSpinLockAtDpcLevel+0x62
    0xffffea8c8683ebd8 : 0xffffea8c8683eea0 : 0xfffff80750eeb570 : portcls!CServiceGroup::ServiceDpc
    0xffffea8c8683ebf8 : 0xfffff80750eeb5e4 : portcls!CServiceGroup::ServiceDpc+0x74
    0xffffea8c8683ec58 : 0xfffff8074748b577 : nt!KiExecuteAllDpcs+0x2e7
    0xffffea8c8683eca8 : 0xffff830328457950 :  dt portcls!CServiceGroup
    0xffffea8c8683ecb0 : 0xfffff80750eeb570 : portcls!CServiceGroup::ServiceDpc
    0xffffea8c8683ecc8 : 0xfffff807474ff7e3 : nt!KiTimer2Expiration+0x323
    0xffffea8c8683ed38 : 0xffffea8c8683ecb0 : 0xfffff80750eeb570 : portcls!CServiceGroup::ServiceDpc
    0xffffea8c8683ed98 : 0xfffff8074748abbe : nt!KiRetireDpcList+0x1ae
    0xffffea8c8683ee90 : 0xfffff807474fd0b0 : nt!PpmCheckPeriodicStart
    0xffffea8c8683eea0 : 0xfffff80750eeb570 : portcls!CServiceGroup::ServiceDpc
    0xffffea8c8683eeb0 : 0xfffff80750eeb570 : portcls!CServiceGroup::ServiceDpc
    0xffffea8c8683eec0 : 0xfffff8074a323f00 : Wdf01000!FxDpc::FxDpcThunk
    0xffffea8c8683eed0 : 0xfffff8074a323f00 : Wdf01000!FxDpc::FxDpcThunk
    0xffffea8c8683eee0 : 0xfffff8074b8066b0 : ndis!ndisInterruptDpc
    0xffffea8c8683eef0 : 0xfffff8074a323f00 : Wdf01000!FxDpc::FxDpcThunk
    0xffffea8c8683ef00 : 0xfffff80751147930 : USBPORT!USBPORT_Xdpc_Worker_MapDpc
    0xffffea8c8683ef10 : 0xfffff80751147930 : USBPORT!USBPORT_Xdpc_Worker_MapDpc
    0xffffea8c8683ef20 : 0xfffff80751147930 : USBPORT!USBPORT_Xdpc_Worker_MapDpc
    0xffffea8c8683efa8 : 0xfffff807475cc595 : nt!KxRetireDpcList+0x5
    
    2: kd> lmvm hcmon
    Browse full module list
    start             end                 module name
    fffff807`4de90000 fffff807`4dea5000   hcmon      (no symbols)           
        Loaded symbol image file: hcmon.sys
        Image path: \SystemRoot\system32\DRIVERS\hcmon.sys
        Image name: hcmon.sys
        Browse all global symbols  functions  data
        Timestamp:        Wed Aug 17 22:43:53 2016 (57B54B19)
        CheckSum:         00020186
        ImageSize:        00015000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    2: kd> lmvm fiioe10
    Browse full module list
    start             end                 module name
    fffff807`4f7f0000 fffff807`4f7fda80   FiiOE10    (no symbols)           
        Loaded symbol image file: FiiOE10.sys
        Image path: \SystemRoot\system32\drivers\FiiOE10.sys
        Image name: FiiOE10.sys
        Browse all global symbols  functions  data
        Timestamp:        Sun Nov 25 18:54:28 2012 (50B2D9E4)
        CheckSum:         0001DCDB
        ImageSize:        0000DA80
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    Update:
    VMWare (check updates in program)
    FiiO E10K DAC Driver (check in Snappy Driver Download)
    BIOS (ASRock > Z97 Extreme6)
      My Computer


  3. Posts : 41,460
    windows 10 professional version 1607 build 14393.969 64 bit
       #3

    1) Run HD Tune: (free version) (all drives)
    Post images into the thread for results on these tabs:
    a) Health (SMART)
    b) Benchmark
    c) Full error scan

    2) Sea Tools for Windows
    a) long generic test

    http://www.seagate.com/support/downl...ls-win-master/
    How to use SeaTools for Windows | Seagate Support US

    How to Upload and Post Screenshots and Files at Ten Forums | Tutorials
      My Computer


  4. Posts : 5
    Windows 10
    Thread Starter
       #4

    Thanks all - it turned out to be the driver for my Fiio E10k. Just uninstalling the device is not enough. Apparently you have to disconnect it, uninstall everything, restart, then connect via a different usb port. That forced windows to install a standard driver for it. Since then, no more BSOD.

    Thanks again.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:52.
Find Us




Windows 10 Forums