STORE_DATA_STRUCTURE_CORRUPTION (1c7)
The store component detected a corruption in its data structures.
Arguments:
Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match.
Arg2: ffff888e949b5000, Chunk heap buffer whose hash didn't match.
Arg3: 00000000318aeb15, Expected buffer hash.
Arg4: a7f35770f9835d15, Page frame number of the corrupted page.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: ffff888e949b5000
BUGCHECK_P3: 318aeb15
BUGCHECK_P4: a7f35770f9835d15
BUGCHECK_STR: 0x1C7_0
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 1
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-01-2020 22:53:36.0976
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DEVICE_OBJECT: ffff888e00000000
LAST_CONTROL_TRANSFER: from fffff8065975c785 to fffff806549c14e0
STACK_TEXT:
ffff848c`54525518 fffff806`5975c785 : 00000000`000001c7 00000000`00000000 ffff888e`949b5000 00000000`318aeb15 : nt!KeBugCheckEx
ffff848c`54525520 fffff806`5974dbd5 : a7f35770`f9835d15 00000000`000000d9 00000000`00000001 00000000`00000000 : rdyboost!SmHpBufferProtectEx+0xb3a1
ffff848c`54525570 fffff806`59753a62 : ffff888e`93166050 ffff888e`93166000 ffff888e`93167868 fffff806`00000000 : rdyboost!SmHpChunkHeapProtect+0x51
ffff848c`545255a0 fffff806`59755364 : 00000000`00000000 00000000`00000001 ffff888e`93166000 ffff888e`93166000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCleanup+0x32
ffff848c`54525600 fffff806`5974b7f3 : ffff888e`93166000 ffff888e`93167868 00000000`00000000 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StCleanup+0x24
ffff848c`54525630 fffff806`59755bb7 : 00000000`00000000 ffff888e`93166000 fffff806`59772650 ffff888e`93166000 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStCleanup+0xd3
ffff848c`545256b0 fffff806`5977cef4 : ffff888e`931ee010 ffff888e`931ee000 ffff888e`00000002 ffff888e`931ee000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmStoreMgrCallback+0x67
ffff848c`545256e0 fffff806`5974ab7b : fffff806`59772650 ffff848c`545257a0 fffff806`59772650 ffff888e`8ff4caf8 : rdyboost!SmKmCleanup+0xfc
ffff848c`54525710 fffff806`5977b350 : fffff806`59772650 00000000`00000000 fffff806`59772650 00000000`00000000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmCleanup+0x17
ffff848c`54525740 fffff806`5974220a : ffff888e`8ccdf070 00000000`00000000 00000000`00000000 ffff888e`99e70bb0 : rdyboost!SmdRBContextShutdown+0x11c
ffff848c`545257c0 fffff806`54831f79 : ffff888e`00000000 ffff888e`8ccdf070 ffff888e`8ccdf070 00000000`00000000 : rdyboost!SmdDispatchDeviceControl+0x12a
ffff848c`54525820 fffff806`54de95e5 : ffff848c`54525b80 ffff888e`8ccdf070 00000000`00000001 ffff888e`99e70bb0 : nt!IofCallDriver+0x59
ffff848c`54525860 fffff806`54de93f0 : ffff888e`00000000 00000000`00000000 ffff888e`99e70bb0 ffff848c`54525b80 : nt!IopSynchronousServiceTail+0x1a5
ffff848c`54525900 fffff806`54de87c6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffff848c`54525a20 fffff806`549d2d18 : 00000000`000003d0 ffff888e`967f86b0 ffffffff`ff8545ac 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffff848c`54525a90 00007ffd`fccbc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`19a7cff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fccbc1a4
THREAD_SHA1_HASH_MOD_FUNC: ade035d9fa1aac25168c14438334e7385bdaf6b4
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9545dd7c0bb7a3446b27abd542da4a0642e3ebb5
THREAD_SHA1_HASH_MOD: b1d4afcedc5935b809e8cb8df2ad14dcf61482cc
FOLLOWUP_IP:
rdyboost!SmHpBufferProtectEx+b3a1
fffff806`5975c785 cc int 3
FAULT_INSTR_CODE: d38b4ccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: rdyboost!SmHpBufferProtectEx+b3a1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b3a1
FAILURE_BUCKET_ID: 0x1C7_0_rdyboost!SmHpBufferProtectEx
BUCKET_ID: 0x1C7_0_rdyboost!SmHpBufferProtectEx
PRIMARY_PROBLEM_CLASS: 0x1C7_0_rdyboost!SmHpBufferProtectEx
TARGET_TIME: 2020-01-01T13:43:17.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2355
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1c7_0_rdyboost!smhpbufferprotectex
FAILURE_ID_HASH: {e4df3e54-cb2b-19a5-89db-02ffa9120592}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000030, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5222
BIOS_DATE: 10/14/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: TUF B350M-PLUS GAMING
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 30
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-01-2020 22:53:42.0624
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff805333c9f5b to fffff805333c14e0
STACK_TEXT:
ffffa808`004fa818 fffff805`333c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffa808`004fa820 fffff805`36a03a37 : ffff8302`b81d35b0 ffffa808`004fab38 00000000`00001000 ffffc20a`00040000 : nt!guard_icall_bugcheck+0x1b
ffffa808`004fa850 fffff805`36a03022 : ffffa808`004fb4b0 00000000`00000000 ffffa808`004faa80 00000000`00000004 : Ntfs!ReadIndexBuffer+0x517
ffffa808`004fa900 fffff805`369e7a62 : 00000000`00000000 ffffae8f`47aa4578 ffff8302`baa16180 00000000`00000001 : Ntfs!FindFirstIndexEntry+0x182
ffffa808`004fa9c0 fffff805`369e6f09 : 00000000`00000038 00000000`00000038 ffffa808`004faf40 00000000`00000010 : Ntfs!NtfsUpdateFileNameInIndex+0x262
ffffa808`004fac40 fffff805`369e693f : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179
ffffa808`004fae20 fffff805`36a1caec : ffffa808`004fb4b0 00000000`00000000 ffffa808`004fb0d0 ffffa808`004fb070 : Ntfs!NtfsUpdateDuplicateInfo+0x18f
ffffa808`004fafc0 fffff805`36a1ab9d : 00000000`00000000 00000000`00000258 00000000`00000000 ffffa808`004fb480 : Ntfs!NtfsCommonCleanup+0x1adc
ffffa808`004fb410 fffff805`33231f79 : ffff8302`c33708b0 fffff805`35ee45a0 ffff8302`c13613f8 ffff8302`c12a4200 : Ntfs!NtfsFsdCleanup+0x1ad
ffffa808`004fb760 fffff805`35ee55de : ffff8302`c1361010 ffffa808`004fb840 ffff8302`c1361010 ffffa808`004fb850 : nt!IofCallDriver+0x59
ffffa808`004fb7a0 fffff805`35ee3f16 : ffffa808`004fb840 00000000`00000001 00000000`00000001 ffff8302`c12a42c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffa808`004fb820 fffff805`33231f79 : ffff8302`c3748960 fffff805`33231e5d ffff8302`b6e73080 fffff805`33860351 : FLTMGR!FltpDispatch+0xb6
ffffa808`004fb880 fffff805`337e42b8 : 00000000`00000000 ffff8302`c3748960 00000000`00000000 ffff8302`c1361010 : nt!IofCallDriver+0x59
ffffa808`004fb8c0 fffff805`337ec408 : 00000000`00000000 00000000`00000001 ffff8302`00000000 00000000`00007ffe : nt!IopCloseFile+0x188
ffffa808`004fb950 fffff805`337f174e : 00000000`00000234 00000013`bc1ff480 000001c0`67a2d440 000001c0`000000dc : nt!ObCloseHandleTableEntry+0x278
ffffa808`004fba90 fffff805`333d2d18 : ffff8302`c12e3080 000001c0`67b02de8 ffffa808`004fbb80 00000000`00000000 : nt!NtClose+0xde
ffffa808`004fbb00 00007ffb`ec47c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000013`bc1ff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ec47c2a4
THREAD_SHA1_HASH_MOD_FUNC: b97645537eaa82deef66548b30b0909c4ab321e3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 949b9fb21efa6fdbef598dc78b2f5db8b1e62940
THREAD_SHA1_HASH_MOD: 5b8c895baef0e5f7f654f3b184b1b65282436b44
FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff805`333c9f5b 90 nop
FAULT_INSTR_CODE: ccccc390
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!guard_icall_bugcheck+1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
PRIMARY_PROBLEM_CLASS: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
TARGET_TIME: 2020-01-01T13:41:15.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5d90
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck
FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}
Followup: MachineOwner
---------