none
由于USB共享网络连接而出现的蓝屏错误 RRS feed

  • 问题

  • 使用Android手机以USB连接方式共享Internet连接时,此问题都会复现,dump文件分析如下

    Microsoft (R) Windows Debugger Version 10.0.17074.1002 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Tang\Desktop\031118-9343-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 16299 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 16299.15.amd64fre.rs3_release.170928-1534
    Machine Name:
    Kernel base = 0xfffff801`0c48a000 PsLoadedModuleList = 0xfffff801`0c7f1110
    Debug session time: Sun Mar 11 10:17:30.474 2018 (UTC + 8:00)
    System Uptime: 0 days 0:00:20.368
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 139, {3, fffff8010f3bc650, fffff8010f3bc5a8, 0}
    
    *** WARNING: Unable to verify checksum for win32k.sys
    Probably caused by : ntkrnlmp.exe ( nt!KiProcessExpiredTimerList+153 )
    
    Followup:     MachineOwner
    ---------
    
    nt!KeBugCheckEx:
    fffff801`0c5ff430 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff801`0f3bc330=0000000000000139
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_SECURITY_CHECK_FAILURE (139)
    A kernel component has corrupted a critical data structure.  The corruption
    could potentially allow a malicious user to gain control of this machine.
    Arguments:
    Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
    Arg2: fffff8010f3bc650, Address of the trap frame for the exception that caused the bugcheck
    Arg3: fffff8010f3bc5a8, Address of the exception record for the exception that caused the bugcheck
    Arg4: 0000000000000000, Reserved
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  10.0.16299.251 (WinBuild.160101.0800)
    
    SYSTEM_MANUFACTURER:  HP
    
    SYSTEM_PRODUCT_NAME:  OMEN by HP Laptop 15-ce0xx
    
    SYSTEM_SKU:  2EF97PA#AB2
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  F.13
    
    BIOS_DATE:  01/23/2018
    
    BASEBOARD_MANUFACTURER:  HP
    
    BASEBOARD_PRODUCT:  838F
    
    BASEBOARD_VERSION:  40.26
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: 3
    
    BUGCHECK_P2: fffff8010f3bc650
    
    BUGCHECK_P3: fffff8010f3bc5a8
    
    BUGCHECK_P4: 0
    
    TRAP_FRAME:  fffff8010f3bc650 -- (.trap 0xfffff8010f3bc650)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe10234131070 rbx=0000000000000000 rcx=0000000000000003
    rdx=ffffe102341312a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8010acb670a rsp=fffff8010f3bc7e0 rbp=0000000000000000
     r8=ffffe10234131080  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po nc
    RNDISMP6!KeepAliveTimerHandler+0x18a:
    fffff801`0acb670a cd29            int     29h
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff8010f3bc5a8 -- (.exr 0xfffff8010f3bc5a8)
    ExceptionAddress: fffff8010acb670a (RNDISMP6!KeepAliveTimerHandler+0x000000000000018a)
       ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
      ExceptionFlags: 00000001
    NumberParameters: 1
       Parameter[0]: 0000000000000003
    Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
    
    CPU_COUNT: 4
    
    CPU_MHZ: 9c0
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: 9
    
    CPU_MICROCODE: 6,9e,9,0 (F,M,S,R)  SIG: 70'00000000 (cache) 70'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    BUGCHECK_STR:  0x139
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY
    
    ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
    
    EXCEPTION_CODE_STR:  c0000409
    
    EXCEPTION_PARAMETER1:  0000000000000003
    
    ANALYSIS_SESSION_HOST:  LAPTOP-J83C0HPL
    
    ANALYSIS_SESSION_TIME:  03-11-2018 10:30:40.0693
    
    ANALYSIS_VERSION: 10.0.17074.1002 amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff8010c612529 to fffff8010c5ff430
    
    STACK_TEXT:  
    fffff801`0f3bc328 fffff801`0c612529 : 00000000`00000139 00000000`00000003 fffff801`0f3bc650 fffff801`0f3bc5a8 : nt!KeBugCheckEx
    fffff801`0f3bc330 fffff801`0c6128d0 : 00000000`00000000 fffff801`0c40c8ae 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff801`0f3bc470 fffff801`0c610c13 : 00000000`0c010000 00000002`00000001 fffff801`0c7ecf48 ffffe102`34e5f000 : nt!KiFastFailDispatch+0xd0
    fffff801`0f3bc650 fffff801`0acb670a : 00000000`00000000 00000000`0c20470a ffffe102`00000000 ffffffff`00000001 : nt!KiRaiseSecurityCheckFailure+0x3d3
    fffff801`0f3bc7e0 fffff804`d799312d : ffffe102`3410fc68 00000000`00004f87 ffffe102`341d45c0 00000000`00000000 : RNDISMP6!KeepAliveTimerHandler+0x18a
    fffff801`0f3bc820 fffff801`0c54e8a3 : 00000000`00000002 00000000`0c23eb00 fffff801`0f3bca10 00000000`00000000 : ndis!ndisMTimerObjectDpc+0xcd
    fffff801`0f3bc870 fffff801`0c54f93d : 00000000`0000000c 00000000`00000000 00000000`0025317d fffff801`0a8fd180 : nt!KiProcessExpiredTimerList+0x153
    fffff801`0f3bc960 fffff801`0c602d1a : 00000000`00000000 fffff801`0a8fd180 00000000`001a6f79 fffff801`0c8a3380 : nt!KiRetireDpcList+0x43d
    fffff801`0f3bcb60 00000000`00000000 : fffff801`0f3bd000 fffff801`0f3b6000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  c80e045b47686e3d98fdf4f5345927c1181d74ff
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  555ebaba1b1c00dbab11e929088b8b9257068ba9
    
    THREAD_SHA1_HASH_MOD:  0d6ffe99e9a8f47e10c5bc10a47de92d3f5842f0
    
    FOLLOWUP_IP: 
    nt!KiProcessExpiredTimerList+153
    fffff801`0c54e8a3 8b542434        mov     edx,dword ptr [rsp+34h]
    
    FAULT_INSTR_CODE:  3424548b
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  nt!KiProcessExpiredTimerList+153
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5a8e0c50
    
    IMAGE_VERSION:  10.0.16299.251
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  153
    
    FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    TARGET_TIME:  2018-03-11T02:17:30.000Z
    
    OSBUILD:  16299
    
    OSSERVICEPACK:  251
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2018-02-22 08:18:24
    
    BUILDDATESTAMP_STR:  160101.0800
    
    BUILDLAB_STR:  WinBuild
    
    BUILDOSVER_STR:  10.0.16299.251
    
    ANALYSIS_SESSION_ELAPSED_TIME:  3528
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
    
    FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}
    
    Followup:     MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_SECURITY_CHECK_FAILURE (139)
    A kernel component has corrupted a critical data structure.  The corruption
    could potentially allow a malicious user to gain control of this machine.
    Arguments:
    Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
    Arg2: fffff8010f3bc650, Address of the trap frame for the exception that caused the bugcheck
    Arg3: fffff8010f3bc5a8, Address of the exception record for the exception that caused the bugcheck
    Arg4: 0000000000000000, Reserved
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  10.0.16299.251 (WinBuild.160101.0800)
    
    SYSTEM_MANUFACTURER:  HP
    
    SYSTEM_PRODUCT_NAME:  OMEN by HP Laptop 15-ce0xx
    
    SYSTEM_SKU:  2EF97PA#AB2
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  F.13
    
    BIOS_DATE:  01/23/2018
    
    BASEBOARD_MANUFACTURER:  HP
    
    BASEBOARD_PRODUCT:  838F
    
    BASEBOARD_VERSION:  40.26
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: 3
    
    BUGCHECK_P2: fffff8010f3bc650
    
    BUGCHECK_P3: fffff8010f3bc5a8
    
    BUGCHECK_P4: 0
    
    TRAP_FRAME:  fffff8010f3bc650 -- (.trap 0xfffff8010f3bc650)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe10234131070 rbx=0000000000000000 rcx=0000000000000003
    rdx=ffffe102341312a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8010acb670a rsp=fffff8010f3bc7e0 rbp=0000000000000000
     r8=ffffe10234131080  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po nc
    RNDISMP6!KeepAliveTimerHandler+0x18a:
    fffff801`0acb670a cd29            int     29h
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff8010f3bc5a8 -- (.exr 0xfffff8010f3bc5a8)
    ExceptionAddress: fffff8010acb670a (RNDISMP6!KeepAliveTimerHandler+0x000000000000018a)
       ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
      ExceptionFlags: 00000001
    NumberParameters: 1
       Parameter[0]: 0000000000000003
    Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
    
    CPU_COUNT: 4
    
    CPU_MHZ: 9c0
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: 9
    
    CPU_MICROCODE: 6,9e,9,0 (F,M,S,R)  SIG: 70'00000000 (cache) 70'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    BUGCHECK_STR:  0x139
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY
    
    ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
    
    EXCEPTION_CODE_STR:  c0000409
    
    EXCEPTION_PARAMETER1:  0000000000000003
    
    ANALYSIS_SESSION_HOST:  LAPTOP-J83C0HPL
    
    ANALYSIS_SESSION_TIME:  03-11-2018 10:30:54.0312
    
    ANALYSIS_VERSION: 10.0.17074.1002 amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff8010c612529 to fffff8010c5ff430
    
    STACK_TEXT:  
    fffff801`0f3bc328 fffff801`0c612529 : 00000000`00000139 00000000`00000003 fffff801`0f3bc650 fffff801`0f3bc5a8 : nt!KeBugCheckEx
    fffff801`0f3bc330 fffff801`0c6128d0 : 00000000`00000000 fffff801`0c40c8ae 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff801`0f3bc470 fffff801`0c610c13 : 00000000`0c010000 00000002`00000001 fffff801`0c7ecf48 ffffe102`34e5f000 : nt!KiFastFailDispatch+0xd0
    fffff801`0f3bc650 fffff801`0acb670a : 00000000`00000000 00000000`0c20470a ffffe102`00000000 ffffffff`00000001 : nt!KiRaiseSecurityCheckFailure+0x3d3
    fffff801`0f3bc7e0 fffff804`d799312d : ffffe102`3410fc68 00000000`00004f87 ffffe102`341d45c0 00000000`00000000 : RNDISMP6!KeepAliveTimerHandler+0x18a
    fffff801`0f3bc820 fffff801`0c54e8a3 : 00000000`00000002 00000000`0c23eb00 fffff801`0f3bca10 00000000`00000000 : ndis!ndisMTimerObjectDpc+0xcd
    fffff801`0f3bc870 fffff801`0c54f93d : 00000000`0000000c 00000000`00000000 00000000`0025317d fffff801`0a8fd180 : nt!KiProcessExpiredTimerList+0x153
    fffff801`0f3bc960 fffff801`0c602d1a : 00000000`00000000 fffff801`0a8fd180 00000000`001a6f79 fffff801`0c8a3380 : nt!KiRetireDpcList+0x43d
    fffff801`0f3bcb60 00000000`00000000 : fffff801`0f3bd000 fffff801`0f3b6000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  c80e045b47686e3d98fdf4f5345927c1181d74ff
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  555ebaba1b1c00dbab11e929088b8b9257068ba9
    
    THREAD_SHA1_HASH_MOD:  0d6ffe99e9a8f47e10c5bc10a47de92d3f5842f0
    
    FOLLOWUP_IP: 
    nt!KiProcessExpiredTimerList+153
    fffff801`0c54e8a3 8b542434        mov     edx,dword ptr [rsp+34h]
    
    FAULT_INSTR_CODE:  3424548b
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  nt!KiProcessExpiredTimerList+153
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5a8e0c50
    
    IMAGE_VERSION:  10.0.16299.251
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  153
    
    FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    TARGET_TIME:  2018-03-11T02:17:30.000Z
    
    OSBUILD:  16299
    
    OSSERVICEPACK:  251
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2018-02-22 08:18:24
    
    BUILDDATESTAMP_STR:  160101.0800
    
    BUILDLAB_STR:  WinBuild
    
    BUILDOSVER_STR:  10.0.16299.251
    
    ANALYSIS_SESSION_ELAPSED_TIME:  3628
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
    
    FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}
    
    Followup:     MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_SECURITY_CHECK_FAILURE (139)
    A kernel component has corrupted a critical data structure.  The corruption
    could potentially allow a malicious user to gain control of this machine.
    Arguments:
    Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
    Arg2: fffff8010f3bc650, Address of the trap frame for the exception that caused the bugcheck
    Arg3: fffff8010f3bc5a8, Address of the exception record for the exception that caused the bugcheck
    Arg4: 0000000000000000, Reserved
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  10.0.16299.251 (WinBuild.160101.0800)
    
    SYSTEM_MANUFACTURER:  HP
    
    SYSTEM_PRODUCT_NAME:  OMEN by HP Laptop 15-ce0xx
    
    SYSTEM_SKU:  2EF97PA#AB2
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  F.13
    
    BIOS_DATE:  01/23/2018
    
    BASEBOARD_MANUFACTURER:  HP
    
    BASEBOARD_PRODUCT:  838F
    
    BASEBOARD_VERSION:  40.26
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: 3
    
    BUGCHECK_P2: fffff8010f3bc650
    
    BUGCHECK_P3: fffff8010f3bc5a8
    
    BUGCHECK_P4: 0
    
    TRAP_FRAME:  fffff8010f3bc650 -- (.trap 0xfffff8010f3bc650)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe10234131070 rbx=0000000000000000 rcx=0000000000000003
    rdx=ffffe102341312a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8010acb670a rsp=fffff8010f3bc7e0 rbp=0000000000000000
     r8=ffffe10234131080  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po nc
    RNDISMP6!KeepAliveTimerHandler+0x18a:
    fffff801`0acb670a cd29            int     29h
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff8010f3bc5a8 -- (.exr 0xfffff8010f3bc5a8)
    ExceptionAddress: fffff8010acb670a (RNDISMP6!KeepAliveTimerHandler+0x000000000000018a)
       ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
      ExceptionFlags: 00000001
    NumberParameters: 1
       Parameter[0]: 0000000000000003
    Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
    
    CPU_COUNT: 4
    
    CPU_MHZ: 9c0
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: 9
    
    CPU_MICROCODE: 6,9e,9,0 (F,M,S,R)  SIG: 70'00000000 (cache) 70'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    BUGCHECK_STR:  0x139
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY
    
    ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
    
    EXCEPTION_CODE_STR:  c0000409
    
    EXCEPTION_PARAMETER1:  0000000000000003
    
    ANALYSIS_SESSION_HOST:  LAPTOP-J83C0HPL
    
    ANALYSIS_SESSION_TIME:  03-11-2018 10:31:08.0181
    
    ANALYSIS_VERSION: 10.0.17074.1002 amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff8010c612529 to fffff8010c5ff430
    
    STACK_TEXT:  
    fffff801`0f3bc328 fffff801`0c612529 : 00000000`00000139 00000000`00000003 fffff801`0f3bc650 fffff801`0f3bc5a8 : nt!KeBugCheckEx
    fffff801`0f3bc330 fffff801`0c6128d0 : 00000000`00000000 fffff801`0c40c8ae 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff801`0f3bc470 fffff801`0c610c13 : 00000000`0c010000 00000002`00000001 fffff801`0c7ecf48 ffffe102`34e5f000 : nt!KiFastFailDispatch+0xd0
    fffff801`0f3bc650 fffff801`0acb670a : 00000000`00000000 00000000`0c20470a ffffe102`00000000 ffffffff`00000001 : nt!KiRaiseSecurityCheckFailure+0x3d3
    fffff801`0f3bc7e0 fffff804`d799312d : ffffe102`3410fc68 00000000`00004f87 ffffe102`341d45c0 00000000`00000000 : RNDISMP6!KeepAliveTimerHandler+0x18a
    fffff801`0f3bc820 fffff801`0c54e8a3 : 00000000`00000002 00000000`0c23eb00 fffff801`0f3bca10 00000000`00000000 : ndis!ndisMTimerObjectDpc+0xcd
    fffff801`0f3bc870 fffff801`0c54f93d : 00000000`0000000c 00000000`00000000 00000000`0025317d fffff801`0a8fd180 : nt!KiProcessExpiredTimerList+0x153
    fffff801`0f3bc960 fffff801`0c602d1a : 00000000`00000000 fffff801`0a8fd180 00000000`001a6f79 fffff801`0c8a3380 : nt!KiRetireDpcList+0x43d
    fffff801`0f3bcb60 00000000`00000000 : fffff801`0f3bd000 fffff801`0f3b6000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  c80e045b47686e3d98fdf4f5345927c1181d74ff
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  555ebaba1b1c00dbab11e929088b8b9257068ba9
    
    THREAD_SHA1_HASH_MOD:  0d6ffe99e9a8f47e10c5bc10a47de92d3f5842f0
    
    FOLLOWUP_IP: 
    nt!KiProcessExpiredTimerList+153
    fffff801`0c54e8a3 8b542434        mov     edx,dword ptr [rsp+34h]
    
    FAULT_INSTR_CODE:  3424548b
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  nt!KiProcessExpiredTimerList+153
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5a8e0c50
    
    IMAGE_VERSION:  10.0.16299.251
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  153
    
    FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
    
    TARGET_TIME:  2018-03-11T02:17:30.000Z
    
    OSBUILD:  16299
    
    OSSERVICEPACK:  251
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2018-02-22 08:18:24
    
    BUILDDATESTAMP_STR:  160101.0800
    
    BUILDLAB_STR:  WinBuild
    
    BUILDOSVER_STR:  10.0.16299.251
    
    ANALYSIS_SESSION_ELAPSED_TIME:  3448
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
    
    FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}
    
    Followup:     MachineOwner
    ---------
    
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
    NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.1801.31001.0_x86__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
    

    2018年3月11日 2:46

全部回复

  • 你好,

    请问手机型号是什么?电脑上是否用安装安卓手机的驱动呢?如果没有建议手动安装驱动先。

    请问是一接入usb 就蓝屏吗?再电脑中你能看到自己的手机设备吗?可以打开device manager 看usb 安卓是否列入。

    有两个相似问题的连接供您参考

    https://communities.intel.com/thread/35688

    https://android.stackexchange.com/questions/73168/how-to-use-pcs-internet-on-android-phone-through-usb-cable

    注意:以上为三方链接,我们对网站没有任何承诺,只是为了方便您。

    另外,我建议您可以把dump文件发送至网盘,把连接分享到这儿,供我们进一步根系问题。


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.


    2018年3月12日 2:25
  • 有问题请及时联系我,我很乐意帮助到您。

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    2018年3月13日 1:09