CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fc9e332e8d5da, Reserved
Arg2: b3b6d669856be971, Reserved
Arg3: ffff8a8aa1204646, Failure type dependent information
Arg4: 0000000000000027, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.19041.207 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7C37
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.70
BIOS_DATE: 01/09/2020
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: MPG X570 GAMING PLUS (MS-7C37)
BASEBOARD_VERSION: 2.0
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: a39fc9e332e8d5da
BUGCHECK_P2: b3b6d669856be971
BUGCHECK_P3: ffff8a8aa1204646
BUGCHECK_P4: 27
PG_MISMATCH: 400000000000
MEMORY_CORRUPTOR: ONE_BIT
CPU_COUNT: 18
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x109
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-19-2020 23:48:06.0131
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
STACK_TEXT:
ffff9d84`458e5e28 00000000`00000000 : 00000000`00000109 a39fc9e3`32e8d5da b3b6d669`856be971 ffff8a8a`a1204646 : nt!KeBugCheckEx
THREAD_SHA1_HASH_MOD_FUNC: 81a83ae0317433a47fcc36991983df3b6e638b71
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e16edd8c7dd677734fdbcd2397a2e35e9fae964
THREAD_SHA1_HASH_MOD: 76cd06466d098060a9eb26e5fd2a25cb1f3fe0a3
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-04-19T20:06:24.000Z
OSBUILD: 19041
OSSERVICEPACK: 207
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.19041.207
ANALYSIS_SESSION_ELAPSED_TIME: 85c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff89ae21ebf8b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff806622b07e9, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.19041.207 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7C37
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.70
BIOS_DATE: 01/09/2020
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: MPG X570 GAMING PLUS (MS-7C37)
BASEBOARD_VERSION: 2.0
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffff89ae21ebf8b0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff806622b07e9
WRITE_ADDRESS: fffff80662cfb388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff89ae21ebf8b0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReadyStandbyPageForActive+b5
fffff806`622b07e9 48891e mov qword ptr [rsi],rbx
CPU_COUNT: 18
CPU_MHZ: ed8
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-19-2020 23:48:09.0255
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff5868e572010 -- (.trap 0xfffff5868e572010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff89ae21ebf8b0
rdx=00000001beaa5921 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806622b07e9 rsp=fffff5868e5721a0 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=0000000000000000
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReadyStandbyPageForActive+0xb5:
fffff806`622b07e9 48891e mov qword ptr [rsi],rbx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff806623af829 to fffff8066239d900
STACK_TEXT:
fffff586`8e571ec8 fffff806`623af829 : 00000000`0000000a ffff89ae`21ebf8b0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff586`8e571ed0 fffff806`623abb29 : 00000000`00000000 00000000`00000000 0a000001`beaa5921 fffff806`62c51708 : nt!KiBugCheckDispatch+0x69
fffff586`8e572010 fffff806`622b07e9 : ffffec62`c51502b0 fffff586`8e5722e0 ffff89ae`21ebf8b0 ffff9b80`053bfef0 : nt!KiPageFault+0x469
fffff586`8e5721a0 fffff806`6226efb3 : ffff9b80`053bfef0 fffff586`8e5722e0 00000000`00000001 00000000`001beaa5 : nt!MiReadyStandbyPageForActive+0xb5
fffff586`8e5721e0 fffff806`6224e090 : 00000000`00000116 00000000`00001000 00000000`00001000 ffffc58a`2a056000 : nt!MmCheckCachedPageStates+0x3f3
fffff586`8e572380 fffff806`625cc189 : 00000000`00116000 00000000`00001000 ffffa086`ffeb6d00 fffff586`8e572490 : nt!CcFetchDataForRead+0x8c
fffff586`8e5723e0 fffff806`6224df19 : ffffa087`13d30700 00000000`00116000 ffffa086`0002a000 00000000`00000001 : nt!CcMapAndCopyFromCache+0xd9
fffff586`8e572480 fffff806`669da1ad : fffff586`00000000 00000000`00000000 ffff898e`21c279e8 00000000`00001000 : nt!CcCopyReadEx+0x109
fffff586`8e572520 fffff806`609473fb : 00000000`00000000 00000000`00000003 000001d3`3c977000 000001d3`3c975a60 : Ntfs!NtfsCopyReadA+0x2ed
fffff586`8e572810 fffff806`609444d7 : fffff586`8e572920 fffff586`8e5728b8 ffffa087`0397c560 ffffa087`0397c460 : FLTMGR!FltpPerformFastIoCall+0x16b
fffff586`8e572870 fffff806`6097b3f5 : fffff586`8e573000 fffff586`8e56d000 fffff586`8e5729f8 fffff806`625d8d2b : FLTMGR!FltpPassThroughFastIo+0x107
fffff586`8e5728f0 fffff806`625e79fd : ffffa087`098029b0 00000000`00030000 00000000`00001000 ffffa087`00000000 : FLTMGR!FltpFastIoRead+0x165
fffff586`8e5729a0 fffff806`623af278 : 00000000`00000000 00000000`00000000 00000000`00000000 00000015`b21fe408 : nt!NtReadFile+0x36d
fffff586`8e572a90 00007ffd`cc5cae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000015`b21fe348 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`cc5cae54
THREAD_SHA1_HASH_MOD_FUNC: dd4f1183ce592978833e722daacc7f7ab33fd97b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8adcd442c0dc3ee740a03dca6409975c329ec63c
THREAD_SHA1_HASH_MOD: e1ba9cfcf25ede23ae6417a3f58a65d04badb60a
FOLLOWUP_IP:
nt!MiReadyStandbyPageForActive+b5
fffff806`622b07e9 48891e mov qword ptr [rsi],rbx
FAULT_INSTR_CODE: 851e8948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReadyStandbyPageForActive+b5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.207
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: b5
FAILURE_BUCKET_ID: AV_nt!MiReadyStandbyPageForActive
BUCKET_ID: AV_nt!MiReadyStandbyPageForActive
PRIMARY_PROBLEM_CLASS: AV_nt!MiReadyStandbyPageForActive
TARGET_TIME: 2020-04-18T00:35:44.000Z
OSBUILD: 19041
OSSERVICEPACK: 207
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.19041.207
ANALYSIS_SESSION_ELAPSED_TIME: e81
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mireadystandbypageforactive
FAILURE_ID_HASH: {162abed9-8eea-1274-0bec-dc2682dbf597}
Followup: MachineOwner
---------