KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4281
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 10464
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  139
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
TRAP_FRAME:  0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
STACK_TEXT:
fffff803`1cc6b6b8 fffff803`165fd0ab     : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff803`1cc6b6c0 fffff803`2a2418e3     : 00000000`00000000 00000000`00989680 00003d57`3a8b54d7 ffff9d05`ee3d6150 : nt!guard_icall_bugcheck+0x1b
fffff803`1cc6b6f0 fffff803`16529172     : 00000000`00000013 00003d57`0000003f 00000000`00000000 00000000`00000000 : amdppm!AcpiCStateIdleExecute+0x23
fffff803`1cc6b720 fffff803`16528884     : 00000000`00000000 00001f80`00000000 00000000`00000000 00000000`00000002 : nt!PpmIdleExecuteTransition+0x772
fffff803`1cc6baf0 fffff803`165f80c4     : 00000000`00000000 fffff803`16f27600 ffff9d05`e7fec080 00000000`00000cdd : nt!PoIdle+0x374
fffff803`1cc6bc60 00000000`00000000     : fffff803`1cc6c000 fffff803`1cc66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME:  amdppm!AcpiCStateIdleExecute+23
MODULE_NAME: amdppm
IMAGE_NAME:  amdppm.sys
IMAGE_VERSION:  10.0.19041.546
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  23
FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_amdppm!AcpiCStateIdleExecute
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {d6b6f22d-4285-fca1-565c-5adc5725dac8}
Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8006f764464, Address of the instruction which caused the bugcheck
Arg3: ffffca01f5aff920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4811
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 6112
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8006f764464
BUGCHECK_P3: ffffca01f5aff920
BUGCHECK_P4: 0
CONTEXT:  ffffca01f5aff920 -- (.cxr 0xffffca01f5aff920)
rax=0000000000000000 rbx=3250694d02280000 rcx=0000000000000001
rdx=ea6521964442389a rsi=0000000000000004 rdi=ea6521964442389a
rip=fffff8006f764464 rsp=fffff6048bb481f0 rbp=fffff80070052638
r8=0000000000000004  r9=0000000000000000 r10=0000000000003934
r11=ffffb58000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff80070052530
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!MiAllocateCombineProto+0x84:
fffff800`6f764464 483b7b18        cmp     rdi,qword ptr [rbx+18h] ds:002b:3250694d`02280018=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  svchost.exe
BAD_STACK_POINTER:  ffffca01f5aff018
STACK_TEXT:
fffff604`8bb481f0 fffff800`6fb0b41c     : ffff980f`74c2e080 fffff604`8bb48329 ffff9400`04564f50 80000000`00000000 : nt!MiAllocateCombineProto+0x84
fffff604`8bb48270 fffff800`6fb0bef7     : 00000000`00000000 ffff9400`0c5d9bd0 00000000`00000080 00000000`00000001 : nt!MiProcessCrcList+0x19c
fffff604`8bb48390 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x4e7
SYMBOL_NAME:  nt!MiAllocateCombineProto+84
MODULE_NAME: nt
IMAGE_VERSION:  10.0.19041.572
STACK_COMMAND:  .cxr 0xffffca01f5aff920 ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  84
FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!MiAllocateCombineProto
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {9921802c-be72-6fd1-b4c1-b02f655731a7}
Followup:     MachineOwner
---------