[SOLVED] BSOD stop code Memory management

Status
Not open for further replies.
Sep 2, 2020
4
0
10
AMD- A10-5800k
Korean Rated 500w PSU
GTX 1050ti
1x4 Hyperx 1x4 Kingston
1 TB HDD wd cavler green
Gammax 400s cooler



So here are the dumpfiles


Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\user\OneDrive\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff8071f600000 PsLoadedModuleList = 0xfffff8071fa461b0
Debug session time: Fri Dec 4 17:48:31.021 2020 (UTC + 8:00)
System Uptime: 0 days 21:10:12.726
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
................
For analysis of this file, run !analyze -v
2: kd> !analyze -v
***
  • *
  • Bugcheck Analysis *
  • *
***

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 6

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 87

Key : Analysis.Memory.CommitPeak.Mb
Value: 66

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 1414c

BUGCHECK_P3: d68280e0

BUGCHECK_P4: 3ef99bfc

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff8071f760d70 418b08 mov ecx,dword ptr [r8] ds:0000021d205f1420=????????
Resetting default scope

STACK_TEXT:
fffff3033e64c208 fffff8071f8666f2 : 000000000000001a 000000000000003f 000000000001414c 00000000d68280e0 : nt!KeBugCheckEx
fffff3033e64c210 fffff8071f607052 : ffffb70a99877250 ffffffffffffffff 0000000000000000 ffffb70a99877340 : nt!MiValidatePagefilePageHash+0x1014a6
fffff3033e64c2f0 fffff8071f6072ad : 0000000000000002 fffff30300000000 fffff3033e64c4a8 fffff80700000000 : nt!MiWaitForInPageComplete+0x472
fffff3033e64c400 fffff8071f6cabbb : 00000000c0033333 0000000000000000 0000021d205f1420 fffff8071f7cacef : nt!MiIssueHardFault+0x1ad
fffff3033e64c500 fffff8071f7d1b5e : 0000021d207078f1 fffff3033e64c720 fffff3033e64cac8 0000000000000000 : nt!MmAccessFault+0x40b
fffff3033e64c6a0 fffff8071f760d70 : ffffcb005f7c0000 ffffb70a999a2050 fffff8071f707ae0 ffffcb005f7c0000 : nt!KiPageFault+0x35e
fffff3033e64c838 fffff8071f707ae0 : ffffcb005f7c0000 ffffcb005f7c0000 0000000000000002 0000021d205f1420 : nt!RtlDecompressBufferXpressLz+0x50
fffff3033e64c850 fffff8071f762af9 : 0000000000000000 0000000000000000 0000000000000000 ffffb70a999a3788 : nt!RtlDecompressBufferEx+0x60
fffff3033e64c8a0 fffff8071f762984 : 0000000000000004 fffff3033e64cab0 0000000000000000 0000000000000007 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155
fffff3033e64c980 fffff8071f762802 : 0000000000000001 0000000000001420 ffffb70a00001420 ffffb70a00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff3033e64c9d0 fffff8071f76262b : 00000000ffffffff ffffb70a999a5000 fffff3033e64cab0 ffffb70a9c4ec4d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
fffff3033e64ca70 fffff8071f762471 : ffffb70a999a5000 fffff80700000000 0000000000000000 ffffb70a999a3788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
fffff3033e64cb20 fffff8071f705480 : ffffb70a999a2000 ffffb70a9c4ec4d0 ffffb70a999a5000 ffffb70a999a39b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffff3033e64cba0 fffff8071f733585 : ffffb70a99983080 0000000000000080 fffff8071f705330 fffff3033e5e9278 : nt!SMKM_STORE<SM_TRAITS>::SmStReadThread+0x150
fffff3033e64cc10 fffff8071f7cb128 : ffffcb005d754180 ffffb70a99983080 fffff8071f733530 0000000000000000 : nt!PspSystemThreadStartup+0x55
fffff3033e64cc60 0000000000000000 : fffff3033e64d000 fffff3033e647000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

2: kd> !analyze -v
***
  • *
  • Bugcheck Analysis *
  • *
***

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 4

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 1414c

BUGCHECK_P3: d68280e0

BUGCHECK_P4: 3ef99bfc

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff8071f760d70 418b08 mov ecx,dword ptr [r8] ds:0000021d205f1420=????????
Resetting default scope

STACK_TEXT:
fffff3033e64c208 fffff8071f8666f2 : 000000000000001a 000000000000003f 000000000001414c 00000000d68280e0 : nt!KeBugCheckEx
fffff3033e64c210 fffff8071f607052 : ffffb70a99877250 ffffffffffffffff 0000000000000000 ffffb70a99877340 : nt!MiValidatePagefilePageHash+0x1014a6
fffff3033e64c2f0 fffff8071f6072ad : 0000000000000002 fffff30300000000 fffff3033e64c4a8 fffff80700000000 : nt!MiWaitForInPageComplete+0x472
fffff3033e64c400 fffff8071f6cabbb : 00000000c0033333 0000000000000000 0000021d205f1420 fffff8071f7cacef : nt!MiIssueHardFault+0x1ad
fffff3033e64c500 fffff8071f7d1b5e : 0000021d207078f1 fffff3033e64c720 fffff3033e64cac8 0000000000000000 : nt!MmAccessFault+0x40b
fffff3033e64c6a0 fffff8071f760d70 : ffffcb005f7c0000 ffffb70a999a2050 fffff8071f707ae0 ffffcb005f7c0000 : nt!KiPageFault+0x35e
fffff3033e64c838 fffff8071f707ae0 : ffffcb005f7c0000 ffffcb005f7c0000 0000000000000002 0000021d205f1420 : nt!RtlDecompressBufferXpressLz+0x50
fffff3033e64c850 fffff8071f762af9 : 0000000000000000 0000000000000000 0000000000000000 ffffb70a999a3788 : nt!RtlDecompressBufferEx+0x60
fffff3033e64c8a0 fffff8071f762984 : 0000000000000004 fffff3033e64cab0 0000000000000000 0000000000000007 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155
fffff3033e64c980 fffff8071f762802 : 0000000000000001 0000000000001420 ffffb70a00001420 ffffb70a00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff3033e64c9d0 fffff8071f76262b : 00000000ffffffff ffffb70a999a5000 fffff3033e64cab0 ffffb70a9c4ec4d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
fffff3033e64ca70 fffff8071f762471 : ffffb70a999a5000 fffff80700000000 0000000000000000 ffffb70a999a3788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
fffff3033e64cb20 fffff8071f705480 : ffffb70a999a2000 ffffb70a9c4ec4d0 ffffb70a999a5000 ffffb70a999a39b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffff3033e64cba0 fffff8071f733585 : ffffb70a99983080 0000000000000080 fffff8071f705330 fffff3033e5e9278 : nt!SMKM_STORE<SM_TRAITS>::SmStReadThread+0x150
fffff3033e64cc10 fffff8071f7cb128 : ffffcb005d754180 ffffb70a99983080 fffff8071f733530 0000000000000000 : nt!PspSystemThreadStartup+0x55
fffff3033e64cc60 0000000000000000 : fffff3033e64d000 fffff3033e647000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
Solution
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

Page file is on the hdd.

try running this - https://support.wdc.com/downloads.aspx?lang=en&p=3

one possible solution might be set virtual memory to off and then set it to automatic again, I think that might move where it is on disk.

in command prompt (admin)
Type chkdsk c: /f /r
and press enter
it will come up with a warning, agree to run it at startup and restart PC.

having miss matched ram could also be a cause.
Sep 2, 2020
4
0
10
AMD- A10-5800k
Korean Rated 500w PSU
GTX 1050ti
1x4 Hyperx 1x4 Kingston
1 TB HDD wd cavler green
Gammax 400s cooler



So here are the dumpfiles


Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\user\OneDrive\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff8071f600000 PsLoadedModuleList = 0xfffff8071fa461b0
Debug session time: Fri Dec 4 17:48:31.021 2020 (UTC + 8:00)
System Uptime: 0 days 21:10:12.726
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
................
For analysis of this file, run !analyze -v
2: kd> !analyze -v
***
  • *
  • Bugcheck Analysis *
  • *
***

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 6

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 87

Key : Analysis.Memory.CommitPeak.Mb
Value: 66

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 1414c

BUGCHECK_P3: d68280e0

BUGCHECK_P4: 3ef99bfc

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff8071f760d70 418b08 mov ecx,dword ptr [r8] ds:0000021d205f1420=????????
Resetting default scope

STACK_TEXT:
fffff3033e64c208 fffff8071f8666f2 : 000000000000001a 000000000000003f 000000000001414c 00000000d68280e0 : nt!KeBugCheckEx
fffff3033e64c210 fffff8071f607052 : ffffb70a99877250 ffffffffffffffff 0000000000000000 ffffb70a99877340 : nt!MiValidatePagefilePageHash+0x1014a6
fffff3033e64c2f0 fffff8071f6072ad : 0000000000000002 fffff30300000000 fffff3033e64c4a8 fffff80700000000 : nt!MiWaitForInPageComplete+0x472
fffff3033e64c400 fffff8071f6cabbb : 00000000c0033333 0000000000000000 0000021d205f1420 fffff8071f7cacef : nt!MiIssueHardFault+0x1ad
fffff3033e64c500 fffff8071f7d1b5e : 0000021d207078f1 fffff3033e64c720 fffff3033e64cac8 0000000000000000 : nt!MmAccessFault+0x40b
fffff3033e64c6a0 fffff8071f760d70 : ffffcb005f7c0000 ffffb70a999a2050 fffff8071f707ae0 ffffcb005f7c0000 : nt!KiPageFault+0x35e
fffff3033e64c838 fffff8071f707ae0 : ffffcb005f7c0000 ffffcb005f7c0000 0000000000000002 0000021d205f1420 : nt!RtlDecompressBufferXpressLz+0x50
fffff3033e64c850 fffff8071f762af9 : 0000000000000000 0000000000000000 0000000000000000 ffffb70a999a3788 : nt!RtlDecompressBufferEx+0x60
fffff3033e64c8a0 fffff8071f762984 : 0000000000000004 fffff3033e64cab0 0000000000000000 0000000000000007 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155
fffff3033e64c980 fffff8071f762802 : 0000000000000001 0000000000001420 ffffb70a00001420 ffffb70a00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff3033e64c9d0 fffff8071f76262b : 00000000ffffffff ffffb70a999a5000 fffff3033e64cab0 ffffb70a9c4ec4d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
fffff3033e64ca70 fffff8071f762471 : ffffb70a999a5000 fffff80700000000 0000000000000000 ffffb70a999a3788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
fffff3033e64cb20 fffff8071f705480 : ffffb70a999a2000 ffffb70a9c4ec4d0 ffffb70a999a5000 ffffb70a999a39b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffff3033e64cba0 fffff8071f733585 : ffffb70a99983080 0000000000000080 fffff8071f705330 fffff3033e5e9278 : nt!SMKM_STORE<SM_TRAITS>::SmStReadThread+0x150
fffff3033e64cc10 fffff8071f7cb128 : ffffcb005d754180 ffffb70a99983080 fffff8071f733530 0000000000000000 : nt!PspSystemThreadStartup+0x55
fffff3033e64cc60 0000000000000000 : fffff3033e64d000 fffff3033e647000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

2: kd> !analyze -v
***
  • *
  • Bugcheck Analysis *
  • *
***

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000001414c
Arg3: 00000000d68280e0
Arg4: 000000003ef99bfc

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RH6MTVE

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 4

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 1414c

BUGCHECK_P3: d68280e0

BUGCHECK_P4: 3ef99bfc

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME: fffff3033e64c6a0 -- (.trap 0xfffff3033e64c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8071f760d20 rbx=0000000000000000 rcx=ffffcb005f7c0000
rdx=ffffcb005f7c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071f760d70 rsp=fffff3033e64c838 rbp=ffffcb005f7c0000
r8=0000021d205f1420 r9=00000000000007ee r10=ffffcb005f7c0ea0
r11=0000021d205f1c0e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff8071f760d70 418b08 mov ecx,dword ptr [r8] ds:0000021d205f1420=????????
Resetting default scope

STACK_TEXT:
fffff3033e64c208 fffff8071f8666f2 : 000000000000001a 000000000000003f 000000000001414c 00000000d68280e0 : nt!KeBugCheckEx
fffff3033e64c210 fffff8071f607052 : ffffb70a99877250 ffffffffffffffff 0000000000000000 ffffb70a99877340 : nt!MiValidatePagefilePageHash+0x1014a6
fffff3033e64c2f0 fffff8071f6072ad : 0000000000000002 fffff30300000000 fffff3033e64c4a8 fffff80700000000 : nt!MiWaitForInPageComplete+0x472
fffff3033e64c400 fffff8071f6cabbb : 00000000c0033333 0000000000000000 0000021d205f1420 fffff8071f7cacef : nt!MiIssueHardFault+0x1ad
fffff3033e64c500 fffff8071f7d1b5e : 0000021d207078f1 fffff3033e64c720 fffff3033e64cac8 0000000000000000 : nt!MmAccessFault+0x40b
fffff3033e64c6a0 fffff8071f760d70 : ffffcb005f7c0000 ffffb70a999a2050 fffff8071f707ae0 ffffcb005f7c0000 : nt!KiPageFault+0x35e
fffff3033e64c838 fffff8071f707ae0 : ffffcb005f7c0000 ffffcb005f7c0000 0000000000000002 0000021d205f1420 : nt!RtlDecompressBufferXpressLz+0x50
fffff3033e64c850 fffff8071f762af9 : 0000000000000000 0000000000000000 0000000000000000 ffffb70a999a3788 : nt!RtlDecompressBufferEx+0x60
fffff3033e64c8a0 fffff8071f762984 : 0000000000000004 fffff3033e64cab0 0000000000000000 0000000000000007 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155
fffff3033e64c980 fffff8071f762802 : 0000000000000001 0000000000001420 ffffb70a00001420 ffffb70a00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff3033e64c9d0 fffff8071f76262b : 00000000ffffffff ffffb70a999a5000 fffff3033e64cab0 ffffb70a9c4ec4d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
fffff3033e64ca70 fffff8071f762471 : ffffb70a999a5000 fffff80700000000 0000000000000000 ffffb70a999a3788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
fffff3033e64cb20 fffff8071f705480 : ffffb70a999a2000 ffffb70a9c4ec4d0 ffffb70a999a5000 ffffb70a999a39b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffff3033e64cba0 fffff8071f733585 : ffffb70a99983080 0000000000000080 fffff8071f705330 fffff3033e5e9278 : nt!SMKM_STORE<SM_TRAITS>::SmStReadThread+0x150
fffff3033e64cc10 fffff8071f7cb128 : ffffcb005d754180 ffffb70a99983080 fffff8071f733530 0000000000000000 : nt!PspSystemThreadStartup+0x55
fffff3033e64cc60 0000000000000000 : fffff3033e64d000 fffff3033e647000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.

Ran memtest on both rams 8 passes on each ram, and it reported no errors
Dont know what to do now :((( would very much appreciate your help guys <3
 

Colif

Win 11 Master
Moderator
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

Page file is on the hdd.

try running this - https://support.wdc.com/downloads.aspx?lang=en&p=3

one possible solution might be set virtual memory to off and then set it to automatic again, I think that might move where it is on disk.

in command prompt (admin)
Type chkdsk c: /f /r
and press enter
it will come up with a warning, agree to run it at startup and restart PC.

having miss matched ram could also be a cause.
 
Last edited:
  • Like
Reactions: c2gino
Solution
Page file is on the hdd.

try running this - https://support.wdc.com/downloads.aspx?lang=en&p=3

one possible solution might be set virtual memory to off and then set it to automatic again, I think that might move where it is on disk.

in command prompt (admin)
Type chkdsk c: /f /r
and press enter
it will come up with a warning, agree to run it at startup and restart PC.

having miss matched ram could also be a cause.
yep, first thing to do would be to delete the pagefile.sys by turning off the virtual memory, rebooting and turning it back on.

then go try to find out why the data was corrupted on disk in the first place.
 
  • Like
Reactions: c2gino
Sep 2, 2020
4
0
10
Page file is on the hdd.

try running this - https://support.wdc.com/downloads.aspx?lang=en&p=3

one possible solution might be set virtual memory to off and then set it to automatic again, I think that might move where it is on disk.

in command prompt (admin)
Type chkdsk c: /f /r
and press enter
it will come up with a warning, agree to run it at startup and restart PC.

having miss matched ram could also be a cause.
dying hard drive :(( thanks for the help
 
Last edited:
Status
Not open for further replies.