I have using other PC to decode mini dump file by Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64.
Could you give me suggestion for find out root cause? Caused by which driver or HW.
Following is result form "Bugcheck Analysis":
******************************************************************************** *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000221ff6b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000221ff608, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10240.16463.amd64fre.th1.150819-1946
SYSTEM_MANUFACTURER: LENOVO
SYSTEM_PRODUCT_NAME: 62772RV
SYSTEM_SKU: LENOVO_MT_6277_BU_Think_FM_ThinkPad Edge E431
SYSTEM_VERSION: ThinkPad Edge E431
BIOS_VENDOR: LENOVO
BIOS_VERSION: HEET47WW (1.28 )
BIOS_DATE: 10/24/2014
BASEBOARD_MANUFACTURER: LENOVO
BASEBOARD_PRODUCT: 62772RV
BASEBOARD_VERSION: Win8 STD DPK TPG
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd000221ff6b0
BUGCHECK_P3: ffffd000221ff608
BUGCHECK_P4: 0
TRAP_FRAME: ffffd000221ff6b0 -- (.trap 0xffffd000221ff6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0000935ccb8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe0000935c808 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a9018900 rsp=ffffd000221ff840 rbp=ffffe00009378180
r8=fffff80049265840 r9=fffff78000000008 r10=000000000000031b
r11=ffffd000221ff750 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
btwampfl+0x18900:
fffff800`a9018900 ?? ???
Resetting default scope
EXCEPTION_RECORD: ffffd000221ff608 -- (.exr 0xffffd000221ff608)
ExceptionAddress: fffff800a9018900 (btwampfl+0x0000000000018900)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: a22
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: WENHUICHEN-NB
ANALYSIS_SESSION_TIME: 01-27-2016 15:47:39.0335
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
LAST_CONTROL_TRANSFER: from fffff80048fe5ba9 to fffff80048fdb240
STACK_TEXT:
ffffd000`221ff388 fffff800`48fe5ba9 : 00000000`00000139 00000000`00000003 ffffd000`221ff6b0 ffffd000`221ff608 : nt!KeBugCheckEx
ffffd000`221ff390 fffff800`48fe5ed0 : fffff800`49266200 00000000`00000246 00000000`00000000 ffffe000`0f504000 : nt!KiBugCheckDispatch+0x69
ffffd000`221ff4d0 fffff800`48fe50f4 : 00000000`00000001 fffff800`a904e298 ffffe000`0935f550 ffffe000`09367040 : nt!KiFastFailDispatch+0xd0
ffffd000`221ff6b0 fffff800`a9018900 : ffffe000`0935f500 ffffe000`0935cc10 ffff98ff`ece92aa6 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`221ff840 ffffe000`0935f500 : ffffe000`0935cc10 ffff98ff`ece92aa6 00000000`00000000 fffff800`a904e298 : btwampfl+0x18900
ffffd000`221ff848 ffffe000`0935cc10 : ffff98ff`ece92aa6 00000000`00000000 fffff800`a904e298 fffff800`48f24e3e : 0xffffe000`0935f500
ffffd000`221ff850 ffff98ff`ece92aa6 : 00000000`00000000 fffff800`a904e298 fffff800`48f24e3e ffffe000`0935cc10 : 0xffffe000`0935cc10
ffffd000`221ff858 00000000`00000000 : fffff800`a904e298 fffff800`48f24e3e ffffe000`0935cc10 00000000`00000000 : 0xffff98ff`ece92aa6
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: bdba8f078679078d8f2dafb5a356bd9a20abfeb3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9a66eeffb7c30b56bec09bf51d68c9854389fdd0
THREAD_SHA1_HASH_MOD: 64a7d8891ee120678c3d143a89155f616c389846
FOLLOWUP_IP:
btwampfl+18900
fffff800`a9018900 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: btwampfl+18900
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: btwampfl
IMAGE_NAME: btwampfl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5510860d
BUCKET_ID_FUNC_OFFSET: 18900
FAILURE_BUCKET_ID: 0x139_3_btwampfl!Unknown_Function
BUCKET_ID: 0x139_3_btwampfl!Unknown_Function
PRIMARY_PROBLEM_CLASS: 0x139_3_btwampfl!Unknown_Function
TARGET_TIME: 2016-01-22T08:36:03.000Z
OSBUILD: 10240
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-08-20 13:15:23
BUILDDATESTAMP_STR: 150819-1946
BUILDLAB_STR: th1
BUILDOSVER_STR: 10.0.10240.16463.amd64fre.th1.150819-1946
ANALYSIS_SESSION_ELAPSED_TIME: f28
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_btwampfl!unknown_function
FAILURE_ID_HASH: {6e191919-2f10-2ea6-2cf1-64b67def4549}
Followup: MachineOwner
---------