Hey OSR, I am dealing with this crash. Can't understand the possible reason. Need help
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff820a8ee56d90, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff820a8ee56ce8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
Unable to load image \SystemRoot\system32\DRIVERS\my_driver.sys, Win32 error 0n2
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2343
Key : Analysis.Elapsed.mSec
Value: 3995
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 3157
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.KiBugCheckData
Value: 0x139
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_my_driver!AddFilePathToHashMap
Key : Failure.Hash
Value: {d5adf79d-3f67-6a55-5729-5ce7bd377337}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff820a8ee56d90
BUGCHECK_P3: ffff820a8ee56ce8
BUGCHECK_P4: 0
FILE_IN_CAB: MEMORY.DMP
TRAP_FRAME: ffff820a8ee56d90 -- (.trap 0xffff820a8ee56d90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8005ecd1408 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb50427e7ebb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800456739ab rsp=ffff820a8ee56f20 rbp=fffff8005ecd1400
r8=0000000000000008 r9=0000000000000000 r10=0000000068746170
r11=0000000000001001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!RtlInsertElementGenericTableFull+0x14d0bb:
fffff800`456739ab cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff820a8ee56ce8 -- (.exr 0xffff820a8ee56ce8)
ExceptionAddress: fffff800456739ab (nt!RtlInsertElementGenericTableFull+0x000000000014d0bb)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: service_process.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff820a8ee56a68 fffff800
45611729 : 0000000000000139 00000000
00000003 ffff820a8ee56d90 ffff820a
8ee56ce8 : nt!KeBugCheckEx
ffff820a8ee56a70 fffff800
45611c90 : ffff820a8ee56c50 ffffc601
3b9a0b80 0000000000000000 ffffb504
23561060 : nt!KiBugCheckDispatch+0x69
ffff820a8ee56bb0 fffff800
4560fc5d : 0000000000000000 fffff800
43eab850 000000000000080e 00000000
00000000 : nt!KiFastFailDispatch+0xd0
ffff820a8ee56d90 fffff800
456739ab : 0000000000000000 00000000
00000000 ffffb50422298738 00000000
00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffff820a8ee56f20 fffff800
455268cd : 0000000000000000 ffff820a
8ee57000 0000000000000030 00000000
00000000 : nt!RtlInsertElementGenericTableFull+0x14d0bb
ffff820a8ee56f50 fffff800
5ecc5838 : 00000000c0000001 ffffc601
3cd490f8 ffffc6012fdd1800 ffff820a
8ee57018 : nt!RtlInsertElementGenericTable+0x4d
ffff820a8ee56fa0 fffff800
5ecc3839 : 0000000000000000 00000000
6abf11ee ffffc6016abf11ee ffffffff
80004c3c : my_driver!AddFilePathToHashMap+0xc0 [D:\file.c]
ffff820a8ee56ff0 fffff800
5ecc40c5 : ffffc6013cd490f8 00000000
00000001 000000006abf11ee 00000000
00000001 : my_driver!CheckandTagFilewithADS+0x201 [D:\file.c]
ffff820a8ee57070 fffff800
43e75b87 : ffffc6013cd49010 00000000
00000000 ffffc60128cbf6d0 fffff800
00000000 : my_driver!FileScannerPostCreate+0x135 [D:\file.c]
ffff820a8ee570b0 fffff800
43e7545b : ffffc6013cd49000 fffff800
43ea7e00 0000000000000000 00000000
00000000 : FLTMGR!FltpPerformPostCallbacksWorker+0x347
ffff820a8ee57180 fffff800
43e771a2 : ffff820a8ee51000 ffff820a
8ee58000 0000000000000000 fffff800
43e8c490 : FLTMGR!FltpPassThroughCompletionWorker+0xfb
ffff820a8ee57220 fffff800
43ea9f54 : ffff820a8ee572d0 ffffc601
3b9996d8 ffffc6012e129970 00000000
00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x322
ffff820a8ee57290 fffff800
45435cf5 : 0000000000000000 ffffc601
3b0545f0 0000000000000000 00000000
00000000 : FLTMGR!FltpCreate+0x324
ffff820a8ee57340 fffff800
4544cac4 : 0000000000000003 ffffc601
3cd36a30 ffffc6016d4e6f49 fffff800
4544ca33 : nt!IofCallDriver+0x55
ffff820a8ee57380 fffff800
45854e0b : ffff820a8ee57640 ffffc601
3b0545f0 ffffc6013b999718 00000000
00000000 : nt!IoCallDriverWithTracing+0x34
ffff820a8ee573d0 fffff800
458494c7 : ffffc6013b0545f0 ffffc601
3b0545c0 ffffc6012ffef010 ffffb504
16c23f01 : nt!IopParseDevice+0x11bb
ffff820a8ee57540 fffff800
45851c6a : ffffc6012ffef001 ffff820a
8ee577a8 0000000000000040 ffffc601
204fbc40 : nt!ObpLookupObjectName+0x1117
ffff820a8ee57710 fffff800
45840e2b : ffffc60100000000 0000000f
8416f770 0000000000000001 00000000
00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffff820a8ee57840 fffff800
4583ef59 : 0000000f8416f710 00000000
80100080 0000000f8416f770 0000000f
8416f718 : nt!IopCreateFile+0x132b
ffff820a8ee57900 fffff800
45610ef5 : 0000000000002170 ffff820a
8ee57a80 ffffc60128cbf080 ffffc601
00000018 : nt!NtCreateFile+0x79
ffff820a8ee57990 00007fff
858eda84 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25
0000000f8416f688 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007fff`858eda84
FAULTING_SOURCE_LINE: D:\file.c
FAULTING_SOURCE_FILE: D:\file.c
FAULTING_SOURCE_LINE_NUMBER: 924
FAULTING_SOURCE_CODE:
No source found for 'D:\file.c'
SYMBOL_NAME: my_driver!AddFilePathToHashMap+c0
MODULE_NAME: my_driver
IMAGE_NAME: my_driver.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: c0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_my_driver!AddFilePathToHashMap
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d5adf79d-3f67-6a55-5729-5ce7bd377337}