mrshekspeare
Centipat
- Katılım
- 23 Aralık 2019
- Mesajlar
- 161
Ceza yedim ve neden yedim anlamadım. @MayCrasH bizden fazlasiyla bilgili, söylediklerini harfiyen yap sorunun biter.
Tamamdır.
Yeni klasör.rarEvet gerçek, teste devam bu test önemli 4 PASS'ı 0 hata ile almalısınız.
[Memory Device (Type 17) - Length 40 - Handle 0035h]
Physical Memory Array Handle 0027h
Memory Error Info Handle 0034h
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM_B2
Bank Locator BANK 3
Memory Type 1ah - Specification Reserved
Type Detail 4080h - Synchronous
Speed 3200MHz
Manufacturer Corsair
Serial Number
Asset Tag Number [String Not Specified]
Part Number CMK16GX4M2E3200C16
STORE_DATA_STRUCTURE_CORRUPTION (1c7)
The store component detected a corruption in its data structures.
Arguments:
Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match.
Arg2: ffff888e949b5000, Chunk heap buffer whose hash didn't match.
Arg3: 00000000318aeb15, Expected buffer hash.
Arg4: a7f35770f9835d15, Page frame number of the corrupted page.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: ffff888e949b5000
BUGCHECK_P3: 318aeb15
BUGCHECK_P4: a7f35770f9835d15
BUGCHECK_STR: 0x1C7_0
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 1
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-01-2020 22:53:36.0976
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DEVICE_OBJECT: ffff888e00000000
LAST_CONTROL_TRANSFER: from fffff8065975c785 to fffff806549c14e0
STACK_TEXT:
ffff848c`54525518 fffff806`5975c785 : 00000000`000001c7 00000000`00000000 ffff888e`949b5000 00000000`318aeb15 : nt!KeBugCheckEx
ffff848c`54525520 fffff806`5974dbd5 : a7f35770`f9835d15 00000000`000000d9 00000000`00000001 00000000`00000000 : rdyboost!SmHpBufferProtectEx+0xb3a1
ffff848c`54525570 fffff806`59753a62 : ffff888e`93166050 ffff888e`93166000 ffff888e`93167868 fffff806`00000000 : rdyboost!SmHpChunkHeapProtect+0x51
ffff848c`545255a0 fffff806`59755364 : 00000000`00000000 00000000`00000001 ffff888e`93166000 ffff888e`93166000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCleanup+0x32
ffff848c`54525600 fffff806`5974b7f3 : ffff888e`93166000 ffff888e`93167868 00000000`00000000 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StCleanup+0x24
ffff848c`54525630 fffff806`59755bb7 : 00000000`00000000 ffff888e`93166000 fffff806`59772650 ffff888e`93166000 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStCleanup+0xd3
ffff848c`545256b0 fffff806`5977cef4 : ffff888e`931ee010 ffff888e`931ee000 ffff888e`00000002 ffff888e`931ee000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmStoreMgrCallback+0x67
ffff848c`545256e0 fffff806`5974ab7b : fffff806`59772650 ffff848c`545257a0 fffff806`59772650 ffff888e`8ff4caf8 : rdyboost!SmKmCleanup+0xfc
ffff848c`54525710 fffff806`5977b350 : fffff806`59772650 00000000`00000000 fffff806`59772650 00000000`00000000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmCleanup+0x17
ffff848c`54525740 fffff806`5974220a : ffff888e`8ccdf070 00000000`00000000 00000000`00000000 ffff888e`99e70bb0 : rdyboost!SmdRBContextShutdown+0x11c
ffff848c`545257c0 fffff806`54831f79 : ffff888e`00000000 ffff888e`8ccdf070 ffff888e`8ccdf070 00000000`00000000 : rdyboost!SmdDispatchDeviceControl+0x12a
ffff848c`54525820 fffff806`54de95e5 : ffff848c`54525b80 ffff888e`8ccdf070 00000000`00000001 ffff888e`99e70bb0 : nt!IofCallDriver+0x59
ffff848c`54525860 fffff806`54de93f0 : ffff888e`00000000 00000000`00000000 ffff888e`99e70bb0 ffff848c`54525b80 : nt!IopSynchronousServiceTail+0x1a5
ffff848c`54525900 fffff806`54de87c6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffff848c`54525a20 fffff806`549d2d18 : 00000000`000003d0 ffff888e`967f86b0 ffffffff`ff8545ac 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffff848c`54525a90 00007ffd`fccbc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`19a7cff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fccbc1a4
THREAD_SHA1_HASH_MOD_FUNC: ade035d9fa1aac25168c14438334e7385bdaf6b4
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9545dd7c0bb7a3446b27abd542da4a0642e3ebb5
THREAD_SHA1_HASH_MOD: b1d4afcedc5935b809e8cb8df2ad14dcf61482cc
FOLLOWUP_IP:
rdyboost!SmHpBufferProtectEx+b3a1
fffff806`5975c785 cc int 3
FAULT_INSTR_CODE: d38b4ccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: rdyboost!SmHpBufferProtectEx+b3a1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b3a1
FAILURE_BUCKET_ID: 0x1C7_0_rdyboost!SmHpBufferProtectEx
BUCKET_ID: 0x1C7_0_rdyboost!SmHpBufferProtectEx
PRIMARY_PROBLEM_CLASS: 0x1C7_0_rdyboost!SmHpBufferProtectEx
TARGET_TIME: 2020-01-01T13:43:17.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2355
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1c7_0_rdyboost!smhpbufferprotectex
FAILURE_ID_HASH: {e4df3e54-cb2b-19a5-89db-02ffa9120592}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000030, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5222
BIOS_DATE: 10/14/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: TUF B350M-PLUS GAMING
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 30
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-01-2020 22:53:42.0624
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff805333c9f5b to fffff805333c14e0
STACK_TEXT:
ffffa808`004fa818 fffff805`333c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffa808`004fa820 fffff805`36a03a37 : ffff8302`b81d35b0 ffffa808`004fab38 00000000`00001000 ffffc20a`00040000 : nt!guard_icall_bugcheck+0x1b
ffffa808`004fa850 fffff805`36a03022 : ffffa808`004fb4b0 00000000`00000000 ffffa808`004faa80 00000000`00000004 : Ntfs!ReadIndexBuffer+0x517
ffffa808`004fa900 fffff805`369e7a62 : 00000000`00000000 ffffae8f`47aa4578 ffff8302`baa16180 00000000`00000001 : Ntfs!FindFirstIndexEntry+0x182
ffffa808`004fa9c0 fffff805`369e6f09 : 00000000`00000038 00000000`00000038 ffffa808`004faf40 00000000`00000010 : Ntfs!NtfsUpdateFileNameInIndex+0x262
ffffa808`004fac40 fffff805`369e693f : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179
ffffa808`004fae20 fffff805`36a1caec : ffffa808`004fb4b0 00000000`00000000 ffffa808`004fb0d0 ffffa808`004fb070 : Ntfs!NtfsUpdateDuplicateInfo+0x18f
ffffa808`004fafc0 fffff805`36a1ab9d : 00000000`00000000 00000000`00000258 00000000`00000000 ffffa808`004fb480 : Ntfs!NtfsCommonCleanup+0x1adc
ffffa808`004fb410 fffff805`33231f79 : ffff8302`c33708b0 fffff805`35ee45a0 ffff8302`c13613f8 ffff8302`c12a4200 : Ntfs!NtfsFsdCleanup+0x1ad
ffffa808`004fb760 fffff805`35ee55de : ffff8302`c1361010 ffffa808`004fb840 ffff8302`c1361010 ffffa808`004fb850 : nt!IofCallDriver+0x59
ffffa808`004fb7a0 fffff805`35ee3f16 : ffffa808`004fb840 00000000`00000001 00000000`00000001 ffff8302`c12a42c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffa808`004fb820 fffff805`33231f79 : ffff8302`c3748960 fffff805`33231e5d ffff8302`b6e73080 fffff805`33860351 : FLTMGR!FltpDispatch+0xb6
ffffa808`004fb880 fffff805`337e42b8 : 00000000`00000000 ffff8302`c3748960 00000000`00000000 ffff8302`c1361010 : nt!IofCallDriver+0x59
ffffa808`004fb8c0 fffff805`337ec408 : 00000000`00000000 00000000`00000001 ffff8302`00000000 00000000`00007ffe : nt!IopCloseFile+0x188
ffffa808`004fb950 fffff805`337f174e : 00000000`00000234 00000013`bc1ff480 000001c0`67a2d440 000001c0`000000dc : nt!ObCloseHandleTableEntry+0x278
ffffa808`004fba90 fffff805`333d2d18 : ffff8302`c12e3080 000001c0`67b02de8 ffffa808`004fbb80 00000000`00000000 : nt!NtClose+0xde
ffffa808`004fbb00 00007ffb`ec47c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000013`bc1ff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ec47c2a4
THREAD_SHA1_HASH_MOD_FUNC: b97645537eaa82deef66548b30b0909c4ab321e3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 949b9fb21efa6fdbef598dc78b2f5db8b1e62940
THREAD_SHA1_HASH_MOD: 5b8c895baef0e5f7f654f3b184b1b65282436b44
FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff805`333c9f5b 90 nop
FAULT_INSTR_CODE: ccccc390
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!guard_icall_bugcheck+1b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
PRIMARY_PROBLEM_CLASS: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
TARGET_TIME: 2020-01-01T13:41:15.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5d90
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck
FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}
Followup: MachineOwner
---------
Google Chrome'da gezerkende hay aksi hatası ve Chrome'un kapanması gibi sorunlar alıyodum şu anlık gözükmüyor,eğer işe yaramış ise büyük teşekkür borçluyum size.Bu hataları alırken belleklerin 3200MHz hızında çalıştığı için çoğunluğu bellek hataları, arada bir kaç farklı aygıt hata vermiş fakat bellek hatası nedenli olabilir.
Yeni hata alırsan gönder.
Kod:STORE_DATA_STRUCTURE_CORRUPTION (1c7) The store component detected a corruption in its data structures. Arguments: Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match. Arg2: ffff888e949b5000, Chunk heap buffer whose hash didn't match. Arg3: 00000000318aeb15, Expected buffer hash. Arg4: a7f35770f9835d15, Page frame number of the corrupted page. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 0 BUGCHECK_P2: ffff888e949b5000 BUGCHECK_P3: 318aeb15 BUGCHECK_P4: a7f35770f9835d15 BUGCHECK_STR: 0x1C7_0 CPU_COUNT: c CPU_MHZ: d42 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 1 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-01-2020 22:53:36.0976 ANALYSIS_VERSION: 10.0.18362.1 x86fre DEVICE_OBJECT: ffff888e00000000 LAST_CONTROL_TRANSFER: from fffff8065975c785 to fffff806549c14e0 STACK_TEXT: ffff848c`54525518 fffff806`5975c785 : 00000000`000001c7 00000000`00000000 ffff888e`949b5000 00000000`318aeb15 : nt!KeBugCheckEx ffff848c`54525520 fffff806`5974dbd5 : a7f35770`f9835d15 00000000`000000d9 00000000`00000001 00000000`00000000 : rdyboost!SmHpBufferProtectEx+0xb3a1 ffff848c`54525570 fffff806`59753a62 : ffff888e`93166050 ffff888e`93166000 ffff888e`93167868 fffff806`00000000 : rdyboost!SmHpChunkHeapProtect+0x51 ffff848c`545255a0 fffff806`59755364 : 00000000`00000000 00000000`00000001 ffff888e`93166000 ffff888e`93166000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCleanup+0x32 ffff848c`54525600 fffff806`5974b7f3 : ffff888e`93166000 ffff888e`93167868 00000000`00000000 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StCleanup+0x24 ffff848c`54525630 fffff806`59755bb7 : 00000000`00000000 ffff888e`93166000 fffff806`59772650 ffff888e`93166000 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStCleanup+0xd3 ffff848c`545256b0 fffff806`5977cef4 : ffff888e`931ee010 ffff888e`931ee000 ffff888e`00000002 ffff888e`931ee000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmStoreMgrCallback+0x67 ffff848c`545256e0 fffff806`5974ab7b : fffff806`59772650 ffff848c`545257a0 fffff806`59772650 ffff888e`8ff4caf8 : rdyboost!SmKmCleanup+0xfc ffff848c`54525710 fffff806`5977b350 : fffff806`59772650 00000000`00000000 fffff806`59772650 00000000`00000000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmCleanup+0x17 ffff848c`54525740 fffff806`5974220a : ffff888e`8ccdf070 00000000`00000000 00000000`00000000 ffff888e`99e70bb0 : rdyboost!SmdRBContextShutdown+0x11c ffff848c`545257c0 fffff806`54831f79 : ffff888e`00000000 ffff888e`8ccdf070 ffff888e`8ccdf070 00000000`00000000 : rdyboost!SmdDispatchDeviceControl+0x12a ffff848c`54525820 fffff806`54de95e5 : ffff848c`54525b80 ffff888e`8ccdf070 00000000`00000001 ffff888e`99e70bb0 : nt!IofCallDriver+0x59 ffff848c`54525860 fffff806`54de93f0 : ffff888e`00000000 00000000`00000000 ffff888e`99e70bb0 ffff848c`54525b80 : nt!IopSynchronousServiceTail+0x1a5 ffff848c`54525900 fffff806`54de87c6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10 ffff848c`54525a20 fffff806`549d2d18 : 00000000`000003d0 ffff888e`967f86b0 ffffffff`ff8545ac 00000000`00000000 : nt!NtDeviceIoControlFile+0x56 ffff848c`54525a90 00007ffd`fccbc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f3`19a7cff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fccbc1a4 THREAD_SHA1_HASH_MOD_FUNC: ade035d9fa1aac25168c14438334e7385bdaf6b4 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 9545dd7c0bb7a3446b27abd542da4a0642e3ebb5 THREAD_SHA1_HASH_MOD: b1d4afcedc5935b809e8cb8df2ad14dcf61482cc FOLLOWUP_IP: rdyboost!SmHpBufferProtectEx+b3a1 fffff806`5975c785 cc int 3 FAULT_INSTR_CODE: d38b4ccc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: rdyboost!SmHpBufferProtectEx+b3a1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: rdyboost IMAGE_NAME: rdyboost.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.476 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: b3a1 FAILURE_BUCKET_ID: 0x1C7_0_rdyboost!SmHpBufferProtectEx BUCKET_ID: 0x1C7_0_rdyboost!SmHpBufferProtectEx PRIMARY_PROBLEM_CLASS: 0x1C7_0_rdyboost!SmHpBufferProtectEx TARGET_TIME: 2020-01-01T13:43:17.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 2355 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1c7_0_rdyboost!smhpbufferprotectex FAILURE_ID_HASH: {e4df3e54-cb2b-19a5-89db-02ffa9120592} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000000, A stack-based buffer has been overrun. Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000030, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 5222 BIOS_DATE: 10/14/2019 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: TUF B350M-PLUS GAMING BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 2 BUGCHECK_P1: 0 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 30 TRAP_FRAME: 0000000000000000 -- (.trap 0x0) EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0) Cannot read Exception record @ 0000000000000000 CPU_COUNT: c CPU_MHZ: d42 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x139 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 01-01-2020 22:53:42.0624 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff805333c9f5b to fffff805333c14e0 STACK_TEXT: ffffa808`004fa818 fffff805`333c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffffa808`004fa820 fffff805`36a03a37 : ffff8302`b81d35b0 ffffa808`004fab38 00000000`00001000 ffffc20a`00040000 : nt!guard_icall_bugcheck+0x1b ffffa808`004fa850 fffff805`36a03022 : ffffa808`004fb4b0 00000000`00000000 ffffa808`004faa80 00000000`00000004 : Ntfs!ReadIndexBuffer+0x517 ffffa808`004fa900 fffff805`369e7a62 : 00000000`00000000 ffffae8f`47aa4578 ffff8302`baa16180 00000000`00000001 : Ntfs!FindFirstIndexEntry+0x182 ffffa808`004fa9c0 fffff805`369e6f09 : 00000000`00000038 00000000`00000038 ffffa808`004faf40 00000000`00000010 : Ntfs!NtfsUpdateFileNameInIndex+0x262 ffffa808`004fac40 fffff805`369e693f : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179 ffffa808`004fae20 fffff805`36a1caec : ffffa808`004fb4b0 00000000`00000000 ffffa808`004fb0d0 ffffa808`004fb070 : Ntfs!NtfsUpdateDuplicateInfo+0x18f ffffa808`004fafc0 fffff805`36a1ab9d : 00000000`00000000 00000000`00000258 00000000`00000000 ffffa808`004fb480 : Ntfs!NtfsCommonCleanup+0x1adc ffffa808`004fb410 fffff805`33231f79 : ffff8302`c33708b0 fffff805`35ee45a0 ffff8302`c13613f8 ffff8302`c12a4200 : Ntfs!NtfsFsdCleanup+0x1ad ffffa808`004fb760 fffff805`35ee55de : ffff8302`c1361010 ffffa808`004fb840 ffff8302`c1361010 ffffa808`004fb850 : nt!IofCallDriver+0x59 ffffa808`004fb7a0 fffff805`35ee3f16 : ffffa808`004fb840 00000000`00000001 00000000`00000001 ffff8302`c12a42c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e ffffa808`004fb820 fffff805`33231f79 : ffff8302`c3748960 fffff805`33231e5d ffff8302`b6e73080 fffff805`33860351 : FLTMGR!FltpDispatch+0xb6 ffffa808`004fb880 fffff805`337e42b8 : 00000000`00000000 ffff8302`c3748960 00000000`00000000 ffff8302`c1361010 : nt!IofCallDriver+0x59 ffffa808`004fb8c0 fffff805`337ec408 : 00000000`00000000 00000000`00000001 ffff8302`00000000 00000000`00007ffe : nt!IopCloseFile+0x188 ffffa808`004fb950 fffff805`337f174e : 00000000`00000234 00000013`bc1ff480 000001c0`67a2d440 000001c0`000000dc : nt!ObCloseHandleTableEntry+0x278 ffffa808`004fba90 fffff805`333d2d18 : ffff8302`c12e3080 000001c0`67b02de8 ffffa808`004fbb80 00000000`00000000 : nt!NtClose+0xde ffffa808`004fbb00 00007ffb`ec47c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000013`bc1ff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ec47c2a4 THREAD_SHA1_HASH_MOD_FUNC: b97645537eaa82deef66548b30b0909c4ab321e3 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 949b9fb21efa6fdbef598dc78b2f5db8b1e62940 THREAD_SHA1_HASH_MOD: 5b8c895baef0e5f7f654f3b184b1b65282436b44 FOLLOWUP_IP: nt!guard_icall_bugcheck+1b fffff805`333c9f5b 90 nop FAULT_INSTR_CODE: ccccc390 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!guard_icall_bugcheck+1b FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470 IMAGE_VERSION: 10.0.18362.535 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1b FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck PRIMARY_PROBLEM_CLASS: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck TARGET_TIME: 2020-01-01T13:41:15.000Z OSBUILD: 18362 OSSERVICEPACK: 535 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1980-01-11 18:53:20 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5d90 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05} Followup: MachineOwner ---------