KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffff9b804b3fc010, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff9b804b3fbf68, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
TRAP_FRAME: fffff8058340f4d7 -- (.trap 0xfffff8058340f4d7)
Unable to read trap frame at fffff805`8340f4d7
Resetting default scope
EXCEPTION_RECORD: ffff9b804b3fbf68 -- (.exr 0xffff9b804b3fbf68)
ExceptionAddress: fffff8043a897a2b (nt!RtlpGetStackLimitsEx+0x000000000014b30b)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: PEAK.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9b80`4b3fbce8 fffff804`3a8127a9 : 00000000`00000139 00000000`00000004 ffff9b80`4b3fc010 ffff9b80`4b3fbf68 : nt!KeBugCheckEx
ffff9b80`4b3fbcf0 fffff804`3a812d50 : ffffdf06`095cdb10 00000000`000004f7 ffffc007`3773c080 ffffe280`5a3fcdf0 : nt!KiBugCheckDispatch+0x69
ffff9b80`4b3fbe30 fffff804`3a810bf2 : ffff9b80`4b3fc7c0 00000000`00000000 ffff9b80`4b3fba60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9b80`4b3fc010 fffff804`3a897a2b : 000000a0`37ffeac0 00007ff8`df89c90f ffff9b80`4b3fc710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x332
ffff9b80`4b3fc1a0 fffff804`3a8980e7 : ffff9b80`4b3fc710 00000000`00000000 ffff9b80`4b3fc920 fffff804`00000003 : nt!RtlpGetStackLimitsEx+0x14b30b
ffff9b80`4b3fc1d0 fffff804`3a74b7f6 : ffffab83`f3cbf188 ffff9b80`4b3fce20 ffffab83`f3cbf188 00007ff8`e03c33d0 : nt!RtlDispatchException+0x14ab17
ffff9b80`4b3fc8f0 fffff804`3a7ff142 : ffffce80`131fc210 ffffffff`c0000005 fffff805`8340f4d7 b5ab6b20`ca3ca7e1 : nt!KiDispatchException+0x186
ffff9b80`4b3fcfb0 fffff804`3a7ff110 : fffff804`3a8128e5 00000000`00000040 ffffab83`f3cbf140 00000279`da98e130 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffab83`f3cbf048 fffff804`3a8128e5 : 00000000`00000040 ffffab83`f3cbf140 00000279`da98e130 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffab83`f3cbf050 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.5965
STACK_COMMAND: .process /r /p 0xffffc40b655e3340; .thread 0xffffc40b5ffbc080 ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch