KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffb3809923eff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb3809923ef48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffffb3809923eff0
BUGCHECK_P3: ffffb3809923ef48
BUGCHECK_P4: 0
TRAP_FRAME: ffffb3809923eff0 -- (.trap 0xffffb3809923eff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff6067db20000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffff6067db26000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022fe4f1df rsp=ffffb3809923f180 rbp=ffffb3809923f6f0
r8=fffff6067db26000 r9=ffffb3809923f700 r10=ffff968b66762080
r11=0000000052c6f228 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12ea53:
fffff802`2fe4f1df cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb3809923ef48 -- (.exr 0xffffb3809923ef48)
ExceptionAddress: fffff8022fe4f1df (nt!RtlpGetStackLimitsEx+0x000000000012ea53)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
CPU_COUNT: 4
CPU_MHZ: cde
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: aow_exe.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-29-2019 17:29:28.0729
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffffb3809923ecc8
LAST_CONTROL_TRANSFER: from fffff8022fdd32e9 to fffff8022fdc14e0
STACK_TEXT:
ffffb380`9923ecc8 fffff802`2fdd32e9 : 00000000`00000139 00000000`00000004 ffffb380`9923eff0 ffffb380`9923ef48 : nt!KeBugCheckEx
ffffb380`9923ecd0 fffff802`2fdd3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb380`9923ee10 fffff802`2fdd1aa5 : fffff802`2fd27368 fffff802`3000ec74 ffffb380`9923f7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb380`9923eff0 fffff802`2fe4f1df : 00000000`00000000 00000000`000002b9 0005e548`00ab6000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325
ffffb380`9923f180 fffff802`2fe2e860 : fffff606`7db258c8 00000000`00000000 ffffb380`9923f6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x12ea53
ffffb380`9923f1b0 fffff802`2fcc753e : fffff606`7db258c8 ffffb380`9923fe30 fffff606`7db258c8 00000000`00d420e0 : nt!RtlDispatchException+0x16bd60
ffffb380`9923f900 fffff802`2fdc2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffb380`9923ffb0 fffff802`2fdc2300 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff606`7db25788 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSaveStateForHibernate+0x110
THREAD_SHA1_HASH_MOD_FUNC: ce8f35c381f15507f74c18be990dbec4808cf06c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b4bf7e46a8f03cc8ef4bd9b80d798d31f207a7b9
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff802`2fdd3710 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
TARGET_TIME: 2019-12-29T11:39:09.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2322
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------