I am on an old MSI GT60 2PC Dominator laptop.
I have tried for hours to fix the blue screens (reinstalled windows 5 times). i did driver updates, but nothing is working.
Here is one of my Crash Dumps:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffb2811d7befa0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffb2811d7beef8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3358
Key : Analysis.Elapsed.mSec
Value: 8130
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 2
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 7423
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : FailFast.Name
Value: STACK_COOKIE_CHECK_FAILURE
Key : FailFast.Type
Value: 2
Key : Failure.Bucket
Value: 0x139_MISSING_GSFRAME_tcpip!_report_gsfailure
Key : Failure.Hash
Value: {33a64846-ba4d-9e86-d89a-752893ad80a6}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 2
BUGCHECK_P2: ffffb2811d7befa0
BUGCHECK_P3: ffffb2811d7beef8
BUGCHECK_P4: 0
FILE_IN_CAB: 031324-16953-01.dmp
TRAP_FRAME: ffffb2811d7befa0 -- (.trap 0xffffb2811d7befa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80618fc0000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80619065f95 rsp=ffffb2811d7bf138 rbp=ffffb2811d7bf710
r8=0000000000000000 r9=ffff9f0dc538d9d0 r10=ffff9f0dc538d9d0
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
tcpip!_report_gsfailure+0x5:
fffff806`19065f95 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb2811d7beef8 -- (.exr 0xffffb2811d7beef8)
ExceptionAddress: fffff80619065f95 (tcpip!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb281`1d7bec78 fffff806`13211e29 : 00000000`00000139 00000000`00000002 ffffb281`1d7befa0 ffffb281`1d7beef8 : nt!KeBugCheckEx
ffffb281`1d7bec80 fffff806`132123d0 : 6d058b48`28ec8348 ffa32480`e8003755 ccccccc3`28c48348 cccccccc`cccccccc : nt!KiBugCheckDispatch+0x69
ffffb281`1d7bedc0 fffff806`132102dd : ffff9f0d`c6ffe0e8 ffffb281`1d7bf7c0 ffffb281`1d7bf210 ffffffff`c0000005 : nt!KiFastFailDispatch+0xd0
ffffb281`1d7befa0 fffff806`19065f95 : fffff806`19069316 ffffb281`1d7bf710 fffff806`130ab33f fffff806`191cce34 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffb281`1d7bf138 fffff806`19069316 : ffffb281`1d7bf710 fffff806`130ab33f fffff806`191cce34 ffffb281`00000000 : tcpip!_report_gsfailure+0x5
ffffb281`1d7bf140 fffff806`190692ab : ffffb281`1d7bf210 00000000`00000000 ffffb281`1d7bf748 ffffb281`1d7bf720 : tcpip!_GSHandlerCheckCommon+0x5a
ffffb281`1d7bf170 fffff806`132082d2 : fffff806`19069298 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!_GSHandlerCheck+0x13
ffffb281`1d7bf1a0 fffff806`130ab127 : ffffb281`1d7bf710 00000000`00000000 ffffb281`1d7bf920 fffff806`18ff3000 : nt!RtlpExecuteHandlerForException+0x12
ffffb281`1d7bf1d0 fffff806`131394d6 : ffff9f0d`c538d798 ffffb281`1d7bfe20 ffff9f0d`c538d798 ffffc909`d0522950 : nt!RtlDispatchException+0x297
ffffb281`1d7bf8f0 fffff806`131fe9f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb281`1d7bffb0 fffff806`131fe9c0 : fffff806`13211f65 ffffc909`d15c6e30 ffffc909`ba2c88a8 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9f0d`c538d658 fffff806`13211f65 : ffffc909`d15c6e30 ffffc909`ba2c88a8 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9f0d`c538d660 fffff806`1320d41a : ffffc909`cd1ff040 34c4d17e`34c4d17e 00000000`00000000 ffffc909`ba33f960 : nt!KiExceptionDispatch+0x125
ffff9f0d`c538d840 fffff806`18ff3000 : 00000000`00008969 ffff9f0d`c538dad0 00000000`00000000 ffffc909`d0522950 : nt!KiGeneralProtectionFault+0x31a
ffff9f0d`c538d9d0 ffffc909`ce471544 : fffff806`00000000 ffffc909`ba33f940 fffff806`00000000 ffffc909`cb0fc120 : tcpip!UdpSegmentMessage+0x210
ffff9f0d`c538db00 fffff806`00000000 : ffffc909`ba33f940 fffff806`00000000 ffffc909`cb0fc120 00000000`00000000 : 0xffffc909`ce471544
ffff9f0d`c538db08 ffffc909`ba33f940 : fffff806`00000000 ffffc909`cb0fc120 00000000`00000000 ffffc909`cd1ff040 : 0xfffff806`00000000
ffff9f0d`c538db10 fffff806`00000000 : ffffc909`cb0fc120 00000000`00000000 ffffc909`cd1ff040 00000000`00000004 : 0xffffc909`ba33f940
ffff9f0d`c538db18 ffffc909`cb0fc120 : 00000000`00000000 ffffc909`cd1ff040 00000000`00000004 fffff806`e0000001 : 0xfffff806`00000000
ffff9f0d`c538db20 00000000`00000000 : ffffc909`cd1ff040 00000000`00000004 fffff806`e0000001 ffffc909`ba33f8a0 : 0xffffc909`cb0fc120
SYMBOL_NAME: tcpip!_report_gsfailure+5
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.19041.4170
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_tcpip!_report_gsfailure
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {33a64846-ba4d-9e86-d89a-752893ad80a6}
Followup: MachineOwner
And another one-
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff803324c8b0b, Address of the instruction which caused the BugCheck
Arg3: ffff8b0ca1491530, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3062
Key : Analysis.Elapsed.mSec
Value: 3715
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 562
Key : Analysis.Init.Elapsed.mSec
Value: 2173
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Failure.Bucket
Value: AV_FLTMGR!TreeUnlinkMulti
Key : Failure.Hash
Value: {ca6fc98c-5b37-6c44-6983-7e23d46c66bf}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff803324c8b0b
BUGCHECK_P3: ffff8b0ca1491530
BUGCHECK_P4: 0
FILE_IN_CAB: 031324-7734-01.dmp
CONTEXT: ffff8b0ca1491530 -- (.cxr 0xffff8b0ca1491530)
rax=aaaaaaaa00000000 rbx=0000000000000000 rcx=ffffb902fc439340
rdx=ffffb90311cdbd60 rsi=ffffb90311cdbd60 rdi=aaaaaaaa00000000
rip=fffff803324c8b0b rsp=ffff8b0ca1491f30 rbp=ffffb902fc82869c
r8=ffffffffffffffff r9=7fffb902fc439308 r10=fffff80335245370
r11=ffffb9030b98e080 r12=fffff803324e8060 r13=0000000000000000
r14=ffffb902fc439340 r15=0000000000004000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
FLTMGR!TreeUnlinkMulti+0x4b:
fffff803`324c8b0b 483b7020 cmp rsi,qword ptr [rax+20h] ds:002b:aaaaaaaa`00000020=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8b0c`a1491f30 fffff803`324fa857 : ffffb902`fc4392a0 ffffb902`00000000 ffff8b0c`00000000 00000000`ffffbfff : FLTMGR!TreeUnlinkMulti+0x4b
ffff8b0c`a1491f80 fffff803`324c69fe : ffffb903`104c2b70 ffffb903`11cdbd60 ffff8b0c`a14920a9 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0x157
ffff8b0c`a1491ff0 fffff803`324c5f7a : ffff8b0c`a1492200 ffff8b0c`a1492102 ffffb903`11cdbd00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x89e
ffff8b0c`a1492110 fffff803`324c5021 : ffff8b0c`a1493000 ffff8b0c`a148d000 ffffb903`112df010 ffff8b0c`a1492220 : FLTMGR!FltpPassThroughInternal+0xca
ffff8b0c`a1492160 fffff803`324c4a2b : ffffffff`fffe7960 00000000`00000000 ffffb903`112df010 ffff8b0c`a14928a0 : FLTMGR!FltpPassThrough+0x541
ffff8b0c`a14921f0 fffff803`35235cf5 : ffffb903`11cdbd60 fffff803`35d238c0 ffffb902`fc7d1aa0 00000000`00000000 : FLTMGR!FltpDispatch+0x8b
ffff8b0c`a1492250 fffff803`3564289f : ffffb903`11cdbd60 ffffb902`fc7d1aa0 ffffb902`fc5f1be0 ffffb902`fc5f1be0 : nt!IofCallDriver+0x55
ffff8b0c`a1492290 fffff803`35646040 : ffffb902`fa6bd820 00000000`00000000 ffffb903`11cdbd30 ffffb903`112df010 : nt!IopDeleteFile+0x14f
ffff8b0c`a1492310 fffff803`35245c07 : 00000000`00000000 00000000`00000000 ffff8b0c`a1492650 ffffb903`11cdbd60 : nt!ObpRemoveObjectRoutine+0x80
ffff8b0c`a1492370 fffff803`35245b2e : fffff803`324f7270 00000000`00000001 ffff8b0c`a14928a0 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7
ffff8b0c`a14923b0 fffff803`35656f5d : ffffb903`11cdbd60 00000000`00000000 ffff8b0c`a1492650 fffff803`324f7270 : nt!HalPutDmaAdapter+0xe
ffff8b0c`a14923e0 fffff803`3564abb7 : ffffb902`fc7438f0 fffff803`324f7270 ffffb903`0ec0f010 ffffde8e`8bc17801 : nt!IopParseDevice+0x1e0d
ffff8b0c`a1492550 fffff803`3565316a : ffffb903`0ec0f001 ffff8b0c`a14927b8 00000000`00000040 ffffb902`fa6bd820 : nt!ObpLookupObjectName+0x1117
ffff8b0c`a1492720 fffff803`356ec125 : ffff8b0c`00000000 000000cb`c85fdaa0 000000cb`c85fe001 000000cb`c85fda70 : nt!ObOpenObjectByNameEx+0x1fa
ffff8b0c`a1492850 fffff803`35411578 : ffffb903`0b98e080 00000000`00000000 ffffb903`0b98e080 00000251`0d3401a0 : nt!NtQueryAttributesFile+0x1c5
ffff8b0c`a1492b00 00007ff8`7aacd784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cb`c85fd9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7aacd784
STACK_COMMAND: .process /r /p 0x43dfffffffffffff; .cxr 0xffff8b0ca1491530 ; kb
SYMBOL_NAME: FLTMGR!TreeUnlinkMulti+4b
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.4106
BUCKET_ID_FUNC_OFFSET: 4b
FAILURE_BUCKET_ID: AV_FLTMGR!TreeUnlinkMulti
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ca6fc98c-5b37-6c44-6983-7e23d46c66bf}
Followup: MachineOwner
---------
I have tried for hours to fix the blue screens (reinstalled windows 5 times). i did driver updates, but nothing is working.
Here is one of my Crash Dumps:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffb2811d7befa0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffb2811d7beef8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3358
Key : Analysis.Elapsed.mSec
Value: 8130
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 2
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 7423
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : FailFast.Name
Value: STACK_COOKIE_CHECK_FAILURE
Key : FailFast.Type
Value: 2
Key : Failure.Bucket
Value: 0x139_MISSING_GSFRAME_tcpip!_report_gsfailure
Key : Failure.Hash
Value: {33a64846-ba4d-9e86-d89a-752893ad80a6}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 2
BUGCHECK_P2: ffffb2811d7befa0
BUGCHECK_P3: ffffb2811d7beef8
BUGCHECK_P4: 0
FILE_IN_CAB: 031324-16953-01.dmp
TRAP_FRAME: ffffb2811d7befa0 -- (.trap 0xffffb2811d7befa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80618fc0000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80619065f95 rsp=ffffb2811d7bf138 rbp=ffffb2811d7bf710
r8=0000000000000000 r9=ffff9f0dc538d9d0 r10=ffff9f0dc538d9d0
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
tcpip!_report_gsfailure+0x5:
fffff806`19065f95 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb2811d7beef8 -- (.exr 0xffffb2811d7beef8)
ExceptionAddress: fffff80619065f95 (tcpip!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb281`1d7bec78 fffff806`13211e29 : 00000000`00000139 00000000`00000002 ffffb281`1d7befa0 ffffb281`1d7beef8 : nt!KeBugCheckEx
ffffb281`1d7bec80 fffff806`132123d0 : 6d058b48`28ec8348 ffa32480`e8003755 ccccccc3`28c48348 cccccccc`cccccccc : nt!KiBugCheckDispatch+0x69
ffffb281`1d7bedc0 fffff806`132102dd : ffff9f0d`c6ffe0e8 ffffb281`1d7bf7c0 ffffb281`1d7bf210 ffffffff`c0000005 : nt!KiFastFailDispatch+0xd0
ffffb281`1d7befa0 fffff806`19065f95 : fffff806`19069316 ffffb281`1d7bf710 fffff806`130ab33f fffff806`191cce34 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffb281`1d7bf138 fffff806`19069316 : ffffb281`1d7bf710 fffff806`130ab33f fffff806`191cce34 ffffb281`00000000 : tcpip!_report_gsfailure+0x5
ffffb281`1d7bf140 fffff806`190692ab : ffffb281`1d7bf210 00000000`00000000 ffffb281`1d7bf748 ffffb281`1d7bf720 : tcpip!_GSHandlerCheckCommon+0x5a
ffffb281`1d7bf170 fffff806`132082d2 : fffff806`19069298 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!_GSHandlerCheck+0x13
ffffb281`1d7bf1a0 fffff806`130ab127 : ffffb281`1d7bf710 00000000`00000000 ffffb281`1d7bf920 fffff806`18ff3000 : nt!RtlpExecuteHandlerForException+0x12
ffffb281`1d7bf1d0 fffff806`131394d6 : ffff9f0d`c538d798 ffffb281`1d7bfe20 ffff9f0d`c538d798 ffffc909`d0522950 : nt!RtlDispatchException+0x297
ffffb281`1d7bf8f0 fffff806`131fe9f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb281`1d7bffb0 fffff806`131fe9c0 : fffff806`13211f65 ffffc909`d15c6e30 ffffc909`ba2c88a8 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9f0d`c538d658 fffff806`13211f65 : ffffc909`d15c6e30 ffffc909`ba2c88a8 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9f0d`c538d660 fffff806`1320d41a : ffffc909`cd1ff040 34c4d17e`34c4d17e 00000000`00000000 ffffc909`ba33f960 : nt!KiExceptionDispatch+0x125
ffff9f0d`c538d840 fffff806`18ff3000 : 00000000`00008969 ffff9f0d`c538dad0 00000000`00000000 ffffc909`d0522950 : nt!KiGeneralProtectionFault+0x31a
ffff9f0d`c538d9d0 ffffc909`ce471544 : fffff806`00000000 ffffc909`ba33f940 fffff806`00000000 ffffc909`cb0fc120 : tcpip!UdpSegmentMessage+0x210
ffff9f0d`c538db00 fffff806`00000000 : ffffc909`ba33f940 fffff806`00000000 ffffc909`cb0fc120 00000000`00000000 : 0xffffc909`ce471544
ffff9f0d`c538db08 ffffc909`ba33f940 : fffff806`00000000 ffffc909`cb0fc120 00000000`00000000 ffffc909`cd1ff040 : 0xfffff806`00000000
ffff9f0d`c538db10 fffff806`00000000 : ffffc909`cb0fc120 00000000`00000000 ffffc909`cd1ff040 00000000`00000004 : 0xffffc909`ba33f940
ffff9f0d`c538db18 ffffc909`cb0fc120 : 00000000`00000000 ffffc909`cd1ff040 00000000`00000004 fffff806`e0000001 : 0xfffff806`00000000
ffff9f0d`c538db20 00000000`00000000 : ffffc909`cd1ff040 00000000`00000004 fffff806`e0000001 ffffc909`ba33f8a0 : 0xffffc909`cb0fc120
SYMBOL_NAME: tcpip!_report_gsfailure+5
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.19041.4170
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_tcpip!_report_gsfailure
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {33a64846-ba4d-9e86-d89a-752893ad80a6}
Followup: MachineOwner
And another one-
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff803324c8b0b, Address of the instruction which caused the BugCheck
Arg3: ffff8b0ca1491530, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3062
Key : Analysis.Elapsed.mSec
Value: 3715
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 562
Key : Analysis.Init.Elapsed.mSec
Value: 2173
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Failure.Bucket
Value: AV_FLTMGR!TreeUnlinkMulti
Key : Failure.Hash
Value: {ca6fc98c-5b37-6c44-6983-7e23d46c66bf}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff803324c8b0b
BUGCHECK_P3: ffff8b0ca1491530
BUGCHECK_P4: 0
FILE_IN_CAB: 031324-7734-01.dmp
CONTEXT: ffff8b0ca1491530 -- (.cxr 0xffff8b0ca1491530)
rax=aaaaaaaa00000000 rbx=0000000000000000 rcx=ffffb902fc439340
rdx=ffffb90311cdbd60 rsi=ffffb90311cdbd60 rdi=aaaaaaaa00000000
rip=fffff803324c8b0b rsp=ffff8b0ca1491f30 rbp=ffffb902fc82869c
r8=ffffffffffffffff r9=7fffb902fc439308 r10=fffff80335245370
r11=ffffb9030b98e080 r12=fffff803324e8060 r13=0000000000000000
r14=ffffb902fc439340 r15=0000000000004000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
FLTMGR!TreeUnlinkMulti+0x4b:
fffff803`324c8b0b 483b7020 cmp rsi,qword ptr [rax+20h] ds:002b:aaaaaaaa`00000020=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8b0c`a1491f30 fffff803`324fa857 : ffffb902`fc4392a0 ffffb902`00000000 ffff8b0c`00000000 00000000`ffffbfff : FLTMGR!TreeUnlinkMulti+0x4b
ffff8b0c`a1491f80 fffff803`324c69fe : ffffb903`104c2b70 ffffb903`11cdbd60 ffff8b0c`a14920a9 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0x157
ffff8b0c`a1491ff0 fffff803`324c5f7a : ffff8b0c`a1492200 ffff8b0c`a1492102 ffffb903`11cdbd00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x89e
ffff8b0c`a1492110 fffff803`324c5021 : ffff8b0c`a1493000 ffff8b0c`a148d000 ffffb903`112df010 ffff8b0c`a1492220 : FLTMGR!FltpPassThroughInternal+0xca
ffff8b0c`a1492160 fffff803`324c4a2b : ffffffff`fffe7960 00000000`00000000 ffffb903`112df010 ffff8b0c`a14928a0 : FLTMGR!FltpPassThrough+0x541
ffff8b0c`a14921f0 fffff803`35235cf5 : ffffb903`11cdbd60 fffff803`35d238c0 ffffb902`fc7d1aa0 00000000`00000000 : FLTMGR!FltpDispatch+0x8b
ffff8b0c`a1492250 fffff803`3564289f : ffffb903`11cdbd60 ffffb902`fc7d1aa0 ffffb902`fc5f1be0 ffffb902`fc5f1be0 : nt!IofCallDriver+0x55
ffff8b0c`a1492290 fffff803`35646040 : ffffb902`fa6bd820 00000000`00000000 ffffb903`11cdbd30 ffffb903`112df010 : nt!IopDeleteFile+0x14f
ffff8b0c`a1492310 fffff803`35245c07 : 00000000`00000000 00000000`00000000 ffff8b0c`a1492650 ffffb903`11cdbd60 : nt!ObpRemoveObjectRoutine+0x80
ffff8b0c`a1492370 fffff803`35245b2e : fffff803`324f7270 00000000`00000001 ffff8b0c`a14928a0 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7
ffff8b0c`a14923b0 fffff803`35656f5d : ffffb903`11cdbd60 00000000`00000000 ffff8b0c`a1492650 fffff803`324f7270 : nt!HalPutDmaAdapter+0xe
ffff8b0c`a14923e0 fffff803`3564abb7 : ffffb902`fc7438f0 fffff803`324f7270 ffffb903`0ec0f010 ffffde8e`8bc17801 : nt!IopParseDevice+0x1e0d
ffff8b0c`a1492550 fffff803`3565316a : ffffb903`0ec0f001 ffff8b0c`a14927b8 00000000`00000040 ffffb902`fa6bd820 : nt!ObpLookupObjectName+0x1117
ffff8b0c`a1492720 fffff803`356ec125 : ffff8b0c`00000000 000000cb`c85fdaa0 000000cb`c85fe001 000000cb`c85fda70 : nt!ObOpenObjectByNameEx+0x1fa
ffff8b0c`a1492850 fffff803`35411578 : ffffb903`0b98e080 00000000`00000000 ffffb903`0b98e080 00000251`0d3401a0 : nt!NtQueryAttributesFile+0x1c5
ffff8b0c`a1492b00 00007ff8`7aacd784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cb`c85fd9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7aacd784
STACK_COMMAND: .process /r /p 0x43dfffffffffffff; .cxr 0xffff8b0ca1491530 ; kb
SYMBOL_NAME: FLTMGR!TreeUnlinkMulti+4b
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.4106
BUCKET_ID_FUNC_OFFSET: 4b
FAILURE_BUCKET_ID: AV_FLTMGR!TreeUnlinkMulti
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ca6fc98c-5b37-6c44-6983-7e23d46c66bf}
Followup: MachineOwner
---------