Jed03
Member
Already tried rebooting, troubleshooting, memtest84, i don't even know anymore. I really just want this to be fixed as there's really no error found in any of the hardwares. The rebooting I did twice was keeping all my files, I might try fully rebooting it as I have an external hard drive if there's really no option. The BSOD randomly pops out, more when I leave my laptop in my room turned on while I bath and chores, I would just open my room and then boom, there's a BSOD. I already rerolled back every update, both the chipset and the GPU already updated, and downgraded windows as it had no effects. I think I have done everything except fully rebooting it or going to Acers' service center for a repair or replacement as it hasn't be a month since I bought my laptop.
CRITICAL_STRUCTURE_CORRUPTION (109)This BugCheck is generated when the kernel detects that critical kernel code ordata have been corrupted. There are generally three causes for a corruption:1) A driver has inadvertently or deliberately modified critical kernel code or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx2) A developer attempted to set a normal kernel breakpoint using a kernel debugger that was not attached when the system was booted. Normal breakpoints, "bp", can only be set if the debugger is attached at boot time. Hardware breakpoints, "ba", can be set at any time.3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.Arguments:Arg1: a39fd36251c8d58a, ReservedArg2: b3b6dfe8a4456ee7, ReservedArg3: fffff80705e464bb, Failure type dependent informationArg4: 0000000000000001, Type of corrupted region, can be 0 : A generic data region 1 : Modification of a function or .pdata 2 : A processor IDT 3 : A processor GDT 4 : Type 1 process list corruption 5 : Type 2 process list corruption 6 : Debug routine modification 7 : Critical MSR modification 8 : Object type 9 : A processor IVT a : Modification of a system service function b : A generic session data region c : Modification of a session function or .pdata d : Modification of an import table e : Modification of a session import table f : Ps Win32 callout modification 10 : Debug switch routine modification 11 : IRP allocator modification 12 : Driver call dispatcher modification 13 : IRP completion dispatcher modification 14 : IRP deallocator modification 15 : A processor control register 16 : Critical floating point control register modification 17 : Local APIC modification 18 : Kernel notification callout modification 19 : Loaded module list modification 1a : Type 3 process list corruption 1b : Type 4 process list corruption 1c : Driver object corruption 1d : Executive callback object modification 1e : Modification of module padding 1f : Modification of a protected process 20 : A generic data region 21 : A page hash mismatch 22 : A session page hash mismatch 23 : Load config directory modification 24 : Inverted function table modification 25 : Session configuration modification 26 : An extended processor control register 27 : Type 1 pool corruption 28 : Type 2 pool corruption 29 : Type 3 pool corruption 2a : Type 4 pool corruption 2b : Modification of a function or .pdata 2c : Image integrity corruption 2d : Processor misconfiguration 2e : Type 5 process list corruption 2f : Process shadow corruption 30 : Retpoline code page corruption 101 : General pool corruption 102 : Modification of win32k.sysDebugging Details:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2546 Key : Analysis.Elapsed.mSec Value: 2556 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 406 Key : Analysis.Init.Elapsed.mSec Value: 8557 Key : Analysis.Memory.CommitPeak.Mb Value: 99 Key : Bugcheck.Code.KiBugCheckData Value: 0x109 Key : Bugcheck.Code.LegacyAPI Value: 0x109 Key : Dump.Attributes.AsUlong Value: 1800 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.LastLine Value: Dumping physical memory to disk: 100% Key : Dump.Attributes.ProgressPercentage Value: 100 Key : Failure.Bucket Value: MEMORY_CORRUPTION_ONE_BIT Key : Failure.Hash Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Key : Hypervisor.Enlightenments.ValueHex Value: 1497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 4853999 Key : Hypervisor.Flags.ValueHex Value: 4a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 Key : SecureKernel.HalpHvciEnabled Value: 1 Key : WER.OS.Branch Value: ni_release Key : WER.OS.Version Value: 10.0.22621.1BUGCHECK_CODE: 109BUGCHECK_P1: a39fd36251c8d58aBUGCHECK_P2: b3b6dfe8a4456ee7BUGCHECK_P3: fffff80705e464bbBUGCHECK_P4: 1FILE_IN_CAB: MEMORY.DMPTAG_NOT_DEFINED_202b: * Unknown TAG in analysis list 202bDUMP_FILE_ATTRIBUTES: 0x1800MEMORY_CORRUPTOR: ONE_BITPROCESS_NAME: csrss.exeSTACK_TEXT: ffff9203`ad5aee08 00000000`00000000 : 00000000`00000109 a39fd362`51c8d58a b3b6dfe8`a4456ee7 fffff807`05e464bb : nt!KeBugCheckExSYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+7abMODULE_NAME: ntSTACK_COMMAND: .cxr; .ecxr ; kbIMAGE_NAME: ntkrnlmp.exeFAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BITOS_VERSION: 10.0.22621.1BUILDLAB_STR: ni_releaseOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}Followup: MachineOwner---------
CRITICAL_STRUCTURE_CORRUPTION (109)This BugCheck is generated when the kernel detects that critical kernel code ordata have been corrupted. There are generally three causes for a corruption:1) A driver has inadvertently or deliberately modified critical kernel code or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx2) A developer attempted to set a normal kernel breakpoint using a kernel debugger that was not attached when the system was booted. Normal breakpoints, "bp", can only be set if the debugger is attached at boot time. Hardware breakpoints, "ba", can be set at any time.3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.Arguments:Arg1: a39fd36251c8d58a, ReservedArg2: b3b6dfe8a4456ee7, ReservedArg3: fffff80705e464bb, Failure type dependent informationArg4: 0000000000000001, Type of corrupted region, can be 0 : A generic data region 1 : Modification of a function or .pdata 2 : A processor IDT 3 : A processor GDT 4 : Type 1 process list corruption 5 : Type 2 process list corruption 6 : Debug routine modification 7 : Critical MSR modification 8 : Object type 9 : A processor IVT a : Modification of a system service function b : A generic session data region c : Modification of a session function or .pdata d : Modification of an import table e : Modification of a session import table f : Ps Win32 callout modification 10 : Debug switch routine modification 11 : IRP allocator modification 12 : Driver call dispatcher modification 13 : IRP completion dispatcher modification 14 : IRP deallocator modification 15 : A processor control register 16 : Critical floating point control register modification 17 : Local APIC modification 18 : Kernel notification callout modification 19 : Loaded module list modification 1a : Type 3 process list corruption 1b : Type 4 process list corruption 1c : Driver object corruption 1d : Executive callback object modification 1e : Modification of module padding 1f : Modification of a protected process 20 : A generic data region 21 : A page hash mismatch 22 : A session page hash mismatch 23 : Load config directory modification 24 : Inverted function table modification 25 : Session configuration modification 26 : An extended processor control register 27 : Type 1 pool corruption 28 : Type 2 pool corruption 29 : Type 3 pool corruption 2a : Type 4 pool corruption 2b : Modification of a function or .pdata 2c : Image integrity corruption 2d : Processor misconfiguration 2e : Type 5 process list corruption 2f : Process shadow corruption 30 : Retpoline code page corruption 101 : General pool corruption 102 : Modification of win32k.sysDebugging Details:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2546 Key : Analysis.Elapsed.mSec Value: 2556 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 406 Key : Analysis.Init.Elapsed.mSec Value: 8557 Key : Analysis.Memory.CommitPeak.Mb Value: 99 Key : Bugcheck.Code.KiBugCheckData Value: 0x109 Key : Bugcheck.Code.LegacyAPI Value: 0x109 Key : Dump.Attributes.AsUlong Value: 1800 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.LastLine Value: Dumping physical memory to disk: 100% Key : Dump.Attributes.ProgressPercentage Value: 100 Key : Failure.Bucket Value: MEMORY_CORRUPTION_ONE_BIT Key : Failure.Hash Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Key : Hypervisor.Enlightenments.ValueHex Value: 1497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 4853999 Key : Hypervisor.Flags.ValueHex Value: 4a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 Key : SecureKernel.HalpHvciEnabled Value: 1 Key : WER.OS.Branch Value: ni_release Key : WER.OS.Version Value: 10.0.22621.1BUGCHECK_CODE: 109BUGCHECK_P1: a39fd36251c8d58aBUGCHECK_P2: b3b6dfe8a4456ee7BUGCHECK_P3: fffff80705e464bbBUGCHECK_P4: 1FILE_IN_CAB: MEMORY.DMPTAG_NOT_DEFINED_202b: * Unknown TAG in analysis list 202bDUMP_FILE_ATTRIBUTES: 0x1800MEMORY_CORRUPTOR: ONE_BITPROCESS_NAME: csrss.exeSTACK_TEXT: ffff9203`ad5aee08 00000000`00000000 : 00000000`00000109 a39fd362`51c8d58a b3b6dfe8`a4456ee7 fffff807`05e464bb : nt!KeBugCheckExSYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+7abMODULE_NAME: ntSTACK_COMMAND: .cxr; .ecxr ; kbIMAGE_NAME: ntkrnlmp.exeFAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BITOS_VERSION: 10.0.22621.1BUILDLAB_STR: ni_releaseOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}Followup: MachineOwner---------
My Computer
System One
-
- OS
- Windows 11
- Computer type
- Laptop
- Manufacturer/Model
- Acer Nitro V15
- CPU
- AMD Ryzen 5 7535HS with Radeon Graphics
- Memory
- 8GB
- Graphics Card(s)
- RTX 2050 4GB