KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4281
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10464
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff803`1cc6b6b8 fffff803`165fd0ab : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff803`1cc6b6c0 fffff803`2a2418e3 : 00000000`00000000 00000000`00989680 00003d57`3a8b54d7 ffff9d05`ee3d6150 : nt!guard_icall_bugcheck+0x1b
fffff803`1cc6b6f0 fffff803`16529172 : 00000000`00000013 00003d57`0000003f 00000000`00000000 00000000`00000000 : amdppm!AcpiCStateIdleExecute+0x23
fffff803`1cc6b720 fffff803`16528884 : 00000000`00000000 00001f80`00000000 00000000`00000000 00000000`00000002 : nt!PpmIdleExecuteTransition+0x772
fffff803`1cc6baf0 fffff803`165f80c4 : 00000000`00000000 fffff803`16f27600 ffff9d05`e7fec080 00000000`00000cdd : nt!PoIdle+0x374
fffff803`1cc6bc60 00000000`00000000 : fffff803`1cc6c000 fffff803`1cc66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: amdppm!AcpiCStateIdleExecute+23
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 23
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_amdppm!AcpiCStateIdleExecute
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6b6f22d-4285-fca1-565c-5adc5725dac8}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8006f764464, Address of the instruction which caused the bugcheck
Arg3: ffffca01f5aff920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4811
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6112
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8006f764464
BUGCHECK_P3: ffffca01f5aff920
BUGCHECK_P4: 0
CONTEXT: ffffca01f5aff920 -- (.cxr 0xffffca01f5aff920)
rax=0000000000000000 rbx=3250694d02280000 rcx=0000000000000001
rdx=ea6521964442389a rsi=0000000000000004 rdi=ea6521964442389a
rip=fffff8006f764464 rsp=fffff6048bb481f0 rbp=fffff80070052638
r8=0000000000000004 r9=0000000000000000 r10=0000000000003934
r11=ffffb58000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff80070052530
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!MiAllocateCombineProto+0x84:
fffff800`6f764464 483b7b18 cmp rdi,qword ptr [rbx+18h] ds:002b:3250694d`02280018=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
BAD_STACK_POINTER: ffffca01f5aff018
STACK_TEXT:
fffff604`8bb481f0 fffff800`6fb0b41c : ffff980f`74c2e080 fffff604`8bb48329 ffff9400`04564f50 80000000`00000000 : nt!MiAllocateCombineProto+0x84
fffff604`8bb48270 fffff800`6fb0bef7 : 00000000`00000000 ffff9400`0c5d9bd0 00000000`00000080 00000000`00000001 : nt!MiProcessCrcList+0x19c
fffff604`8bb48390 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x4e7
SYMBOL_NAME: nt!MiAllocateCombineProto+84
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffca01f5aff920 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 84
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!MiAllocateCombineProto
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9921802c-be72-6fd1-b4c1-b02f655731a7}
Followup: MachineOwner
---------