I'm having a stop error the instant I remove a wifi adapter from the usb port. I remove this device because my internet connection deteriorates from time to time and reinserting the adapter used to solve the throttling and latency spikes.
My device is TL-WN722N from TP Link.
Below is a minidump file of the event.
My questions are:
1. Is there a way to diagnose or repair the wifi adapter?
2. Is there some way to solve the wifi instability and latency spikes?
3. Will replacing the adapter with a pci-e wifi network card solve the problem?
My device is TL-WN722N from TP Link.
Below is a minidump file of the event.
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred .sympath cache*
Deferred srv*https://msdl.microsoft.com/download/symbols
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000227bf3a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000227bf2f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
TRAP_FRAME: ffffd000227bf3a0 -- (.trap 0xffffd000227bf3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe001843e70f8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe0018275dc48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801f0b0abe9 rsp=ffffd000227bf530 rbp=0000000000000001
r8=0000000000000014 r9=0000000000000000 r10=00000000fffffff8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe nc
nt!ExInterlockedRemoveHeadList+0x89:
fffff801`f0b0abe9 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd000227bf2f8 -- (.exr 0xffffd000227bf2f8)
ExceptionAddress: fffff801f0b0abe9 (nt!ExInterlockedRemoveHeadList+0x0000000000000089)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff801f0b794e9 to fffff801f0b6d9a0
STACK_TEXT:
ffffd000`227bf078 fffff801`f0b794e9 : 00000000`00000139 00000000`00000003 ffffd000`227bf3a0 ffffd000`227bf2f8 : nt!KeBugCheckEx
ffffd000`227bf080 fffff801`f0b79810 : fffff801`f0ccf200 ffffe001`82596c90 ffffe001`844d3d00 ffffe001`843aab80 : nt!KiBugCheckDispatch+0x69
ffffd000`227bf1c0 fffff801`f0b78a34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd000`227bf3a0 fffff801`f0b0abe9 : 00000000`00000282 fffff801`b8c64501 ffffd000`227bfabc fffff801`f0b5c999 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`227bf530 fffff801`b8c644a0 : ffffe001`843b5010 00000000`00000000 fffff801`b615a05c fffff801`b8cb5440 : nt!ExInterlockedRemoveHeadList+0x89
ffffd000`227bf570 ffffe001`843b5010 : 00000000`00000000 fffff801`b615a05c fffff801`b8cb5440 00000000`00000000 : ts_arnusbx+0x54a0
ffffd000`227bf578 00000000`00000000 : fffff801`b615a05c fffff801`b8cb5440 00000000`00000000 ffffe001`8274b030 : 0xffffe001`843b5010
STACK_COMMAND: kb
FOLLOWUP_IP:
ts_arnusbx+54a0
fffff801`b8c644a0 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: ts_arnusbx+54a0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ts_arnusbx
IMAGE_NAME: ts_arnusbx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 532c99ec
FAILURE_BUCKET_ID: 0x139_3_ts_arnusbx+54a0
BUCKET_ID: 0x139_3_ts_arnusbx+54a0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_ts_arnusbx+54a0
FAILURE_ID_HASH: {0e60503c-5700-f02f-a944-14751b0d5d2b}
Response Time (ms) Location
Deferred .sympath cache*
Deferred srv*https://msdl.microsoft.com/download/symbols
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000227bf3a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000227bf2f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
TRAP_FRAME: ffffd000227bf3a0 -- (.trap 0xffffd000227bf3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe001843e70f8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe0018275dc48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801f0b0abe9 rsp=ffffd000227bf530 rbp=0000000000000001
r8=0000000000000014 r9=0000000000000000 r10=00000000fffffff8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe nc
nt!ExInterlockedRemoveHeadList+0x89:
fffff801`f0b0abe9 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd000227bf2f8 -- (.exr 0xffffd000227bf2f8)
ExceptionAddress: fffff801f0b0abe9 (nt!ExInterlockedRemoveHeadList+0x0000000000000089)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff801f0b794e9 to fffff801f0b6d9a0
STACK_TEXT:
ffffd000`227bf078 fffff801`f0b794e9 : 00000000`00000139 00000000`00000003 ffffd000`227bf3a0 ffffd000`227bf2f8 : nt!KeBugCheckEx
ffffd000`227bf080 fffff801`f0b79810 : fffff801`f0ccf200 ffffe001`82596c90 ffffe001`844d3d00 ffffe001`843aab80 : nt!KiBugCheckDispatch+0x69
ffffd000`227bf1c0 fffff801`f0b78a34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd000`227bf3a0 fffff801`f0b0abe9 : 00000000`00000282 fffff801`b8c64501 ffffd000`227bfabc fffff801`f0b5c999 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`227bf530 fffff801`b8c644a0 : ffffe001`843b5010 00000000`00000000 fffff801`b615a05c fffff801`b8cb5440 : nt!ExInterlockedRemoveHeadList+0x89
ffffd000`227bf570 ffffe001`843b5010 : 00000000`00000000 fffff801`b615a05c fffff801`b8cb5440 00000000`00000000 : ts_arnusbx+0x54a0
ffffd000`227bf578 00000000`00000000 : fffff801`b615a05c fffff801`b8cb5440 00000000`00000000 ffffe001`8274b030 : 0xffffe001`843b5010
STACK_COMMAND: kb
FOLLOWUP_IP:
ts_arnusbx+54a0
fffff801`b8c644a0 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: ts_arnusbx+54a0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ts_arnusbx
IMAGE_NAME: ts_arnusbx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 532c99ec
FAILURE_BUCKET_ID: 0x139_3_ts_arnusbx+54a0
BUCKET_ID: 0x139_3_ts_arnusbx+54a0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_ts_arnusbx+54a0
FAILURE_ID_HASH: {0e60503c-5700-f02f-a944-14751b0d5d2b}
1. Is there a way to diagnose or repair the wifi adapter?
2. Is there some way to solve the wifi instability and latency spikes?
3. Will replacing the adapter with a pci-e wifi network card solve the problem?