Win10 NAGA TRINITY driver bug : 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead | Razer Insider
Skip to main content

Win10 NAGA TRINITY driver bug : 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead

  • December 23, 2022
  • 1 reply
  • 81 views

FYI: just in case if there's a bug fix for FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead 13: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffffc8838a8edb00, Address of the trap frame for the exception that caused the BugCheck Arg3: ffffc8838a8eda58, Address of the exception record for the exception that caused the BugCheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ ... KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7139 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 8922 Key : Analysis.IO.Other.Mb Value: 21 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 33 Key : Analysis.Init.CPU.mSec Value: 4030 Key : Analysis.Init.Elapsed.mSec Value: 57675 Key : Analysis.Memory.CommitPeak.Mb Value: 107 Key : Bugcheck.Code.DumpHeader Value: 0x139 Key : Bugcheck.Code.KiBugCheckData Value: 0x139 Key : Bugcheck.Code.Register Value: 0x139 Key : FailFast.Name Value: CORRUPT_LIST_ENTRY Key : FailFast.Type Value: 3 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: MEMORY.DMP BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: ffffc8838a8edb00 BUGCHECK_P3: ffffc8838a8eda58 BUGCHECK_P4: 0 TRAP_FRAME: ffffc8838a8edb00 -- (.trap 0xffffc8838a8edb00) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc8838a8edd00 rbx=0000000000000000 rcx=0000000000000003 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800803a44ed rsp=ffffc8838a8edc98 rbp=ffffc8838a8edd10 r8=ffffb68fdf5eba58 r9=ffffc8838a8edde0 r10=fffff80062cda3d0 r11=fffff800803a4be0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe cy mouclass!MouseClassDequeueRead+0x51: fffff800`803a44ed cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffc8838a8eda58 -- (.exr 0xffffc8838a8eda58) ExceptionAddress: fffff800803a44ed (mouclass!MouseClassDequeueRead+0x0000000000000051) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffc883`8a8ed7d8 fffff800`62e0d329 : 00000000`00000139 00000000`00000003 ffffc883`8a8edb00 ffffc883`8a8eda58 : nt!KeBugCheckEx ffffc883`8a8ed7e0 fffff800`62e0d890 : 00004970`2c6d2ce8 fffff800`7aaa2285 00000000`00000001 00001f80`00c8026b : nt!KiBugCheckDispatch+0x69 ffffc883`8a8ed920 fffff800`62e0b85d : ffffb68f`dfdd5010 fffff800`8903eed8 00000000`00000000 fffff800`62c2a715 : nt!KiFastFailDispatch+0xd0 ffffc883`8a8edb00 fffff800`803a44ed : fffff800`803a4c7a ffffb68f`df5eb9c0 00000000`00000103 ffffb68f`dfe0a988 : nt!KiRaiseSecurityCheckFailure+0x31d ffffc883`8a8edc98 fffff800`803a4c7a : ffffb68f`df5eb9c0 00000000`00000103 ffffb68f`dfe0a988 00000000`00000000 : mouclass!MouseClassDequeueRead+0x51 ffffc883`8a8edca0 fffff800`80361c59 : ffffc883`8a8eddf0 ffffc883`8a8ede08 ffffc883`8a8edde0 ffffc883`8a8edde0 : mouclass!MouseClassServiceCallback+0x9a ffffc883`8a8edd40 fffff800`80361d69 : ffffb68f`dfdb4b30 ffffb68f`dff384c0 00000000`00000000 00000000`00000001 : RzDev_0067+0x1c59 ffffc883`8a8edd70 fffff800`803c4e9b : 00000000`00000001 00000000`00000001 00000000`00000004 ffffb68f`dff33ef8 : RzDev_0067+0x1d69 ffffc883`8a8eddb0 fffff800`803c40ef : ffffb68f`d3902dc0 00000000`00000000 ffffb68f`dfe10a20 ffffb68f`dfda0b90 : RzCommon+0x4e9b ffffc883`8a8ee160 fffff800`803c57a8 : ffffb68f`dfdd5010 ffffb68f`dff33ee0 ffffb68f`dff33ef8 ffffc883`8a8ee5a4 : RzCommon+0x40ef ffffc883`8a8ee450 fffff800`803618ea : 00000000`000b000b ffffb68f`f0fdc1a0 00000000`000b000b ffffb68f`dfe10060 : RzCommon+0x57a8 ffffc883`8a8ee480 fffff800`80361c05 : 00000000`00000000 ffffc883`8a8ee5b0 00000000`00000000 fffff800`00000000 : RzDev_0067+0x18ea ffffc883`8a8ee4b0 fffff800`80363149 : ffffb68f`dfe14510 ffffb68f`dff33ee0 ffffb68f`dff33ef8 fffff800`899523c4 : RzDev_0067+0x1c05 ffffc883`8a8ee4f0 fffff800`803621ab : ffffb68f`dff33ef0 00000000`00000000 00000000`ffffffff 00000000`00000001 : RzDev_0067+0x3149 ffffc883`8a8ee520 fffff800`80383aa8 : 00000000`00000002 ffffc883`8a8ee5b8 ffffb68f`db86f010 ffffb68f`dff33d80 : RzDev_0067+0x21ab ffffc883`8a8ee560 fffff800`62c1fece : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : mouhid!MouHid_ReadComplete+0x758 ffffc883`8a8ee600 fffff800`62c1fd97 : 00000000`00000000 ffffb68f`dd0c7806 ffffb68f`dfd664d0 00000000`00000000 : nt!IopfCompleteRequest+0x11e ffffc883`8a8ee6f0 fffff800`8990b345 : ffffb68f`e6196358 ffffb68f`dfe10102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17 ffffc883`8a8ee720 fffff800`8990ac3d : ffffb68f`dfe101d0 ffffb68f`dfe10102 ffffb68f`dfe101d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5 ffffc883`8a8ee820 fffff800`62c1fece : ffffb68f`dfdd4010 ffffb68f`dfdd4010 ffffc883`8a8ee901 fffff800`80f04701 : HIDCLASS!HidpInterruptReadComplete+0x37d ffffc883`8a8ee8c0 fffff800`62c1fd97 : 00000000`00000001 00000000`00000000 ffffb68f`dfdd3bc0 00000000`00000002 : nt!IopfCompleteRequest+0x11e ffffc883`8a8ee9b0 fffff800`64bd811a : 00000000`00000000 ffffb68f`df477db0 ffffb68f`dfdd4010 00000000`00000001 : nt!IofCompleteRequest+0x17 ffffc883`8a8ee9e0 fffff800`64bd7eb1 : 00000000`00000002 00000000`00000000 ffffb68f`dfdd4010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\\wdf\\framework\\shared\\core\\fxrequest.cpp @ 869] ffffc883`8a8eea70 fffff800`64bd9249 : ffffb68f`d2137370 ffffb68f`d2137370 00000000`00000001 fffff800`8036334c : Wdf01000!imp_WdfRequestCompleteWithInformation+0xa1 [minkernel\\wdf\\framework\\shared\\core\\fxrequestapi.cpp @ 571] ffffc883`8a8eead0 fffff800`64bdc854 : 00004970`2dec8c88 ffffb68f`d2137370 ffffb68f`d2137370 00000000`c0000001 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe9 [minkernel\\wdf\\framework\\shared\\core\\fxrequestbase.cpp @ 530] ffffc883`8a8eeb60 fffff800`62d569b6 : ffffb68f`df46ede0 ffffb68f`dfdd4002 ffffb68f`dfdd4010 ffffc883`8a8eec50 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe4 [minkernel\\wdf\\framework\\shared\\targets\\general\\fxiotarget.cpp @ 2448] ffffc883`8a8eebd0 fffff800`62c1fece : ffffb68f`dfdd4010 ffffc883`8a8eec89 ffffb68f`df46ede0 ffffb68f`dfdd47a3 : nt!IopUnloadSafeCompletion+0x56 ffffc883`8a8eec00 fffff800`62c1fd97 : 00000000`00000001 00000000`00000000 ffffb68f`dfe219b0 00000000`00000002 : nt!IopfCompleteRequest+0x11e ffffc883`8a8eecf0 fffff800`64bd811a : 00000000`00000000 ffffb68f`d3902dc0 ffffb68f`dfdd4010 ffffc883`8a8eedd0 : nt!IofCompleteRequest+0x17 ffffc883`8a8eed20 fffff800`64bd5bbf : ffffb68f`dd6bfa02 ffffb68f`f1324a60 ffffb68f`dfdd4010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\\wdf\\framework\\shared\\core\\fxrequest.cpp @ 869] ffffc883`8a8eedb0 fffff800`7aa0c1ed : 00000000`ffffff02 ffffb68f`dd6bf950 ffffb68f`dfe21d90 ffffb68f`dfe21d90 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\\wdf\\framework\\shared\\core\\fxrequestapi.cpp @ 436] ffffc883`8a8eee10 fffff800`7aa0c0b1 : ffffb68f`dd6bfaf0 00000000`00000008 ffffb68f`dd6bfb80 ffffc883`8a8ef028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9 ffffc883`8a8eee70 fffff800`7aa0bea0 : 00000000`00000004 ffffc883`8a8eefe0 00000000`00000000 ffffb68f`dfe0fa60 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd ffffc883`8a8eef20 fffff800`7aa06911 : 00000000`00000004 ffffc883`8a8eeff8 00000000`00000008 ffffc883`8a8ef000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10 ffffc883`8a8eef50 fffff800`7aa06445 : 00000000`00000780 00004970`2c6ec300 ffffb68f`dbfff4c0 ffffb68f`dfe036e0 : USBXHCI!Endpoint_TransferEventHandler+0xb1 ffffc883`8a8eefb0 fffff800`7aa0611c : ffffb68f`dd3bd368 ffffcc01`cccc0180 00004970`2c6e1538 ffffc883`8a8ef3f4 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315 ffffc883`8a8ef0b0 fffff800`64bd38f6 : ffffc883`8a8ef420 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc ffffc883`8a8ef0e0 fffff800`62c348fe : ffffcc01`cccc3240 ffffb68f`d14db000 ffffc883`8a8ef3e0 ffffcc01`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\\wdf\\framework\\shared\\irphandlers\\pnp\\km\\interruptobjectkm.cpp @ 410] ffffc883`8a8ef120 fffff800`62c33be4 : 00000000`00000000 fffff800`62d2306a 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e ffffc883`8a8ef290 fffff800`62dfdb9e : ffffffff`00000000 ffffcc01`cccc0180 ffffcc01`ccccb540 ffffb68f`e8ea0080 : nt!KiRetireDpcList+0x1f4 ffffc883`8a8ef520 00000000`00000000 : ffffc883`8a8f0000 ffffc883`8a8e9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: mouclass!MouseClassDequeueRead+51 MODULE_NAME: mouclass IMAGE_NAME: mouclass.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 51 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32} Followup: MachineOwner ---------

1 Reply

  • Author
  • December 24, 2022