Hi guys, I'm a new member!
I've run into same problem since last week, my PC gets this BSOD when I try to wake it up after 3h+ from sleep, and cost me every file I was working on.
I've tried
but the problem still here. And the Virtual Memory when I choose Automatically Manage is on HDD, and it consumes 28672MB disk space for some reason.
I know that the Virtual memory is on HDD, but I've had it on HDD for ~2 years now. And this problem only just happened now.
The memory consumption on Ram before putting the PC to sleep is ~50% in task manager, and the BSOD happened. I used to put it at much higher, like 78% but no problem when waking the PC up at all.
Please help me solve this problem. It has been quite stressful finding solutions for this, and nothing worked.
Here are the DMPs logs for 3 times BSOD:
The 1st two are BSOD when Sleep after 3h+, before that when I turn on after sleep 1 - 2 hours it was ok.
the 3rd just happened right now, instantly BSOD even when I just press sleep, and turn it back on after ~ 1 min.
(Please search "2nd" & "3rd" to jump on top of 2nd & 3rd log)
I've run into same problem since last week, my PC gets this BSOD when I try to wake it up after 3h+ from sleep, and cost me every file I was working on.
I've tried
- Window Memory Diagnostic,
- Run chkdsk and sfc /scannow on both disks.
- Updated Window & drives,
- Removed Ram to clean it.
- unclicking the Automatically Manage page file size and turn it on to reset the sys,
but the problem still here. And the Virtual Memory when I choose Automatically Manage is on HDD, and it consumes 28672MB disk space for some reason.
I know that the Virtual memory is on HDD, but I've had it on HDD for ~2 years now. And this problem only just happened now.
The memory consumption on Ram before putting the PC to sleep is ~50% in task manager, and the BSOD happened. I used to put it at much higher, like 78% but no problem when waking the PC up at all.
Please help me solve this problem. It has been quite stressful finding solutions for this, and nothing worked.
Here are the DMPs logs for 3 times BSOD:
The 1st two are BSOD when Sleep after 3h+, before that when I turn on after sleep 1 - 2 hours it was ok.
the 3rd just happened right now, instantly BSOD even when I just press sleep, and turn it back on after ~ 1 min.
(Please search "2nd" & "3rd" to jump on top of 2nd & 3rd log)
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff805`76000000 PsLoadedModuleList = 0xfffff805`76c2a770
Debug session time: Sun Jan 21 10:35:50.976 2024 (UTC + 7:00)
System Uptime: 2 days 11:30:57.917
Loading Kernel Symbols
...............................................................
..............Page 392375 not present in the dump file. Type ".hh dbgerr004" for details
..................................................
................................................................
.....
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
.......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`763fd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef8b`4833aa80=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000000b62e
Arg3: 00000000ac1773f7
Arg4: 000000001f3ad16c
Debugging Details:
------------------
Page 1cd2b5 not present in the dump file. Type ".hh dbgerr004" for details
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8827
Key : Analysis.Elapsed.mSec
Value: 9074
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1030
Key : Analysis.Init.Elapsed.mSec
Value: 6869
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: PAGE_HASH_ERRORS_0x1a_3f
Key : Failure.Hash
Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : Memory.System.Errors.PageHashErrors
Value: 1
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: b62e
BUGCHECK_P3: ac1773f7
BUGCHECK_P4: 1f3ad16c
FILE_IN_CAB: MEMORY.DMP
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffef8b4833b9a0 -- (.trap 0xffffef8b4833b9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffef8b4833bb80 rbx=0000000000000000 rcx=ffff820156f22dc8
rdx=ffffef8b4833bb70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057917a090 rsp=ffffef8b4833bb38 rbp=0000000000000080
r8=0000000000000000 r9=0000000000000003 r10=0000080000000000
r11=ffffef8b4833bba8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ACPI!ACPIAmliEvaluateOsc:
fffff805`7917a090 0bfa or edi,edx
Resetting default scope
STACK_TEXT:
ffffef8b`4833aa78 fffff805`7655dfad : 00000000`0000001a 00000000`0000003f 00000000`0000b62e 00000000`ac1773f7 : nt!KeBugCheckEx
ffffef8b`4833aa80 fffff805`7626e241 : ffff8201`81170870 ffffffff`ffffffff 00000000`00000000 ffff9480`e86ff1e8 : nt!MiValidatePagefilePageHash+0x331
ffffef8b`4833ab60 fffff805`7626eac5 : ffffef8b`0000d000 ffffef8b`4833ac00 ffffef8b`4833acf0 fffff805`00000000 : nt!MiWaitForInPageComplete+0x351
ffffef8b`4833ac50 fffff805`762246c8 : 00000000`c0033333 00000000`00000000 000001d0`dfe3d9e0 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffef8b`4833ad60 fffff805`7640d458 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
ffffef8b`4833af00 fffff805`76330490 : ffffa481`4e1b4000 ffff8201`6c120050 fffff805`762ef7d0 ffffa481`4e1b4000 : nt!KiPageFault+0x358
ffffef8b`4833b098 fffff805`762ef7d0 : ffffa481`4e1b4000 ffffa481`4e1b4000 00000000`00000002 000001d0`dfe3d9e0 : nt!RtlDecompressBufferXpressLz+0x50
ffffef8b`4833b0b0 fffff805`762ef4e0 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDecompressBufferEx+0x60
ffffef8b`4833b100 fffff805`762ef36d : 00000000`00000004 fffff805`762eeed6 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffef8b`4833b1c0 fffff805`762ee61c : 00000000`00000001 00000000`0001d9e0 ffff8201`6c120000 ffff8201`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffef8b`4833b210 fffff805`762ee44c : ffff8201`ffffffff ffff8201`757db000 ffffef8b`4833b2f0 ffff8201`6a9066d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffef8b`4833b2b0 fffff805`762ee299 : ffffa481`16ade730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffef8b`4833b360 fffff805`762ee151 : ffff8201`6c120000 ffff8201`6a9066d0 ffff8201`757db000 ffff8201`6c1219c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffef8b`4833b3e0 fffff805`7627c798 : ffff8201`57ecb100 ffff8201`6c120000 00000000`00000000 ffff8201`81171550 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffef8b`4833b410 fffff805`762ec8eb : fffff805`762ee130 ffffef8b`4833b4b0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffef8b`4833b480 fffff805`7620f69c : ffffef8b`4833b580 00000000`31526d73 00000000`000003ff fffff805`76d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffef8b`4833b550 fffff805`7620f0d0 : 00000000`0000000c 00000000`000003ff ffffef8b`4833b600 fffff805`76d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffef8b`4833b5a0 fffff805`762ece67 : 00000000`0000000c 00000000`00000003 ffff8201`6a9066d0 ffff8201`81171550 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffef8b`4833b630 fffff805`7635eccf : ffff8201`00000003 ffff8201`81171610 00000000`00000000 ffff8201`6c120000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffef8b`4833b6a0 fffff805`7626dec4 : ffffef8b`00000100 00000000`00000000 ffffef8b`4833b8f8 fffff805`7626ee40 : nt!SmPageRead+0x33
ffffef8b`4833b6f0 fffff805`7626e99d : 00000000`00000002 ffffef8b`4833b780 ffffef8b`4833b8f8 ffff8201`81171500 : nt!MiIssueHardFaultIo+0x10c
ffffef8b`4833b740 fffff805`762246c8 : 00000000`c0033333 00000000`00000000 fffff805`7917a090 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffef8b`4833b800 fffff805`7640d458 : 00000000`00000000 00000000`52706341 00000000`00000040 00000000`00000000 : nt!MmAccessFault+0x468
ffffef8b`4833b9a0 fffff805`7917a090 : fffff805`790f19c7 00000000`00000000 ffff8201`57e06ab0 ffff8201`57ecb100 : nt!KiPageFault+0x358
ffffef8b`4833bb38 fffff805`790f19c7 : 00000000`00000000 ffff8201`57e06ab0 ffff8201`57ecb100 00000000`00000000 : ACPI!ACPIAmliEvaluateOsc
ffffef8b`4833bb40 fffff805`7912919f : ffff8201`54bd4000 ffff8201`57e06980 ffff8201`57e06980 00000000`00000000 : ACPI!AcpiEvaluateOscMethodOnPciRootBus+0x6b
ffffef8b`4833bbb0 fffff805`763078e5 : ffff8201`57ecb100 fffff805`79111990 ffff8201`57e06980 000f8067`bcbbbdff : ACPI!PciRootBusBiosMethodDispatcherOnResume+0x1780f
ffffef8b`4833bc10 fffff805`764064b8 : ffffa481`16997180 ffff8201`57ecb100 fffff805`76307890 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef8b`4833bc60 00000000`00000000 : ffffef8b`4833c000 ffffef8b`48336000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.
------------------------
2nd dmp log:
HERE IS AN ORDER DMP LOG OF 3 DAYS AGO:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff800`46800000 PsLoadedModuleList = 0xfffff800`4742a790
Debug session time: Thu Jan 18 21:22:58.014 2024 (UTC + 7:00)
System Uptime: 1 days 6:27:02.645
Loading Kernel Symbols
...............................................................
..............Page a624b not present in the dump file. Type ".hh dbgerr004" for details
..................................................
................................................................
...
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`46bfd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdc0f`13e135c0=000000000000001a
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000027198
Arg3: 0000000012ee58a0
Arg4: 00000000b9f9e41a
Debugging Details:
------------------
Page 1e4f6b not present in the dump file. Type ".hh dbgerr004" for details
Page 2463f4 not present in the dump file. Type ".hh dbgerr004" for details
Page 1e4f6b not present in the dump file. Type ".hh dbgerr004" for details
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7296
Key : Analysis.Elapsed.mSec
Value: 13964
Key : Analysis.IO.Other.Mb
Value: 3
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 20
Key : Analysis.Init.CPU.mSec
Value: 1343
Key : Analysis.Init.Elapsed.mSec
Value: 133776
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: PAGE_HASH_ERRORS_0x1a_3f
Key : Failure.Hash
Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : Memory.System.Errors.PageHashErrors
Value: 1
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 27198
BUGCHECK_P3: 12ee58a0
BUGCHECK_P4: b9f9e41a
FILE_IN_CAB: MEMORY.DMP
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffdc0f13e144e0 -- (.trap 0xffffdc0f13e144e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80046800000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80046a3c174 rsp=ffffdc0f13e14670 rbp=ffffbc0e88805f10
r8=0000000000000001 r9=0000000000000508 r10=ffffbc0e82729aa0
r11=ffffbc0e9c2c72a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExFreeHeapPool+0x124:
fffff800`46a3c174 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
ffffdc0f`13e135b8 fffff800`46d5dfad : 00000000`0000001a 00000000`0000003f 00000000`00027198 00000000`12ee58a0 : nt!KeBugCheckEx
ffffdc0f`13e135c0 fffff800`46a6e241 : ffffbc0e`977fb080 ffffffff`ffffffff 00000000`00000000 ffffa680`bbf52bf8 : nt!MiValidatePagefilePageHash+0x331
ffffdc0f`13e136a0 fffff800`46a6eac5 : ffffdc0f`00010000 ffffdc0f`13e13800 ffffdc0f`13e13830 fffff800`00000000 : nt!MiWaitForInPageComplete+0x351
ffffdc0f`13e13790 fffff800`46a246c8 : 00000000`c0033333 00000000`00000000 00000177`ea57f000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffdc0f`13e138a0 fffff800`46c0d458 : 00000000`0000000a 00000000`00000001 ffffbc0e`a7b86d70 00000000`201f0b56 : nt!MmAccessFault+0x468
ffffdc0f`13e13a40 fffff800`46b304c6 : ffffcc00`7a7fb000 ffffbc0e`98e7f050 fffff800`46aef7d0 ffffcc00`7a7fb000 : nt!KiPageFault+0x358
ffffdc0f`13e13bd8 fffff800`46aef7d0 : ffffcc00`7a7fb000 ffffcc00`7a7fb000 00000000`00000002 00000177`ea57ef90 : nt!RtlDecompressBufferXpressLz+0x86
ffffdc0f`13e13bf0 fffff800`46aef4e0 : 00000001`00000001 00000000`00000000 00000000`00000000 fffff800`47450bc0 : nt!RtlDecompressBufferEx+0x60
ffffdc0f`13e13c40 fffff800`46aef36d : 00000000`00000004 fffff800`46aeeed6 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffdc0f`13e13d00 fffff800`46aee61c : 00000000`00000001 00000000`0000ef90 ffffbc0e`98e7f000 ffffbc0e`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffdc0f`13e13d50 fffff800`46aee44c : fffff800`ffffffff ffffbc0e`a6141000 ffffdc0f`13e13e30 ffffbc0e`a56c6e10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffdc0f`13e13df0 fffff800`46aee299 : ffffcc00`6db2e730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffdc0f`13e13ea0 fffff800`46aee151 : ffffbc0e`98e7f000 ffffbc0e`a56c6e10 ffffbc0e`a6141000 ffffbc0e`98e809c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffdc0f`13e13f20 fffff800`46a7c798 : ffffbc0e`88851040 ffffbc0e`98e7f000 00000000`00000000 ffffbc0e`a7b86cb0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffdc0f`13e13f50 fffff800`46aec8eb : fffff800`46aee130 ffffdc0f`13e13ff0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffdc0f`13e13fc0 fffff800`46a0f69c : ffffdc0f`13e140c0 00000000`31526d73 00000000`000003ff fffff800`475239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffdc0f`13e14090 fffff800`46a0f0d0 : 00000000`0000000c 00000000`000003ff ffffdc0f`13e14140 fffff800`475239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffdc0f`13e140e0 fffff800`46aece67 : 00000000`0000000c 00000000`00000001 ffffbc0e`a56c6e10 ffffbc0e`a7b86cb0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffdc0f`13e14170 fffff800`46b5eccf : ffffbc0e`00000001 ffffbc0e`a7b86d70 00000000`00000000 ffffbc0e`98e7f000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffdc0f`13e141e0 fffff800`46a6dec4 : ffffdc0f`00000100 00000000`00000000 ffffdc0f`13e14438 fffff800`46a6ee40 : nt!SmPageRead+0x33
ffffdc0f`13e14230 fffff800`46a6e99d : 00000000`00000002 ffffdc0f`13e142c0 ffffdc0f`13e14438 ffffbc0e`a7b86c60 : nt!MiIssueHardFaultIo+0x10c
ffffdc0f`13e14280 fffff800`46a246c8 : 00000000`c0033333 00000000`00000000 ffff960b`82c5a153 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffdc0f`13e14340 fffff800`46c0d458 : 00000000`00000000 fffff800`4916b44e ffffbc0e`a155f3e0 00000000`00000001 : nt!MmAccessFault+0x468
ffffdc0f`13e144e0 fffff800`46a3c174 : 00000000`74530006 ffffdc0f`13e146e0 00000000`00000000 ffff960b`4a400100 : nt!KiPageFault+0x358
ffffdc0f`13e14670 fffff800`471b70b9 : ffffbc0e`9c2c72a0 ffffbc0e`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffffdc0f`13e14750 fffff800`46e42213 : ffffbc0e`88805f10 ffffbc0e`9c2c72a0 ffffbc0e`9fa2f450 00000000`00000000 : nt!ExFreePool+0x9
ffffdc0f`13e14780 fffff800`46e45950 : ffffbc0e`8273d4e0 ffffbc0e`9fa2f450 ffffbc0e`a155f3b0 fffff800`471b70b9 : nt!IopDeleteFile+0x1b3
ffffdc0f`13e14800 fffff800`46a45c07 : 00000000`00000000 00000000`00000000 ffff960b`736d3e50 ffffbc0e`a155f3e0 : nt!ObpRemoveObjectRoutine+0x80
ffffdc0f`13e14860 fffff800`46a45b2e : 00000000`00000000 ffffbc0e`9fa2f410 ffffbc0e`9fa2f410 ffffbc0e`9fa2f410 : nt!ObfDereferenceObjectWithTag+0xc7
ffffdc0f`13e148a0 fffff800`46ea2325 : 00000000`00088081 ffffbc0e`9fa2f410 fffff800`47450bc0 00000000`00088081 : nt!HalPutDmaAdapter+0xe
ffffdc0f`13e148d0 fffff800`46b87925 : 00000000`00000001 00000000`00000000 ffffdc0f`13e149a0 ffffbc0e`9fa2f418 : nt!MiSegmentDelete+0x155
ffffdc0f`13e14920 fffff800`46bbd4d9 : 00000000`00000000 fffff800`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
ffffdc0f`13e149e0 fffff800`46b078e5 : ffffbc0e`88851040 ffffbc0e`88851040 00000000`00000080 fffff800`46bbd3b0 : nt!MiDereferenceSegmentThread+0x129
ffffdc0f`13e14c10 fffff800`46c064b8 : ffffcc00`6d840180 ffffbc0e`88851040 fffff800`46b07890 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffdc0f`13e14c60 00000000`00000000 : ffffdc0f`13e15000 ffffdc0f`13e0f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.
________________________________________________
3rd log:
This one just happened right now, right after turning the PC to sleep & turn it back on right away:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff802`19400000 PsLoadedModuleList = 0xfffff802`1a02a770
Debug session time: Sun Jan 21 16:31:18.073 2024 (UTC + 7:00)
System Uptime: 0 days 2:28:09.708
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`197fd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffe8f`456f50b0=000000000000001a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000004df2
Arg3: 00000000ee5d7207
Arg4: 00000000c93136e6
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3843
Key : Analysis.Elapsed.mSec
Value: 3920
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 3419
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: PAGE_HASH_ERRORS_0x1a_3f
Key : Failure.Hash
Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : Memory.System.Errors.PageHashErrors
Value: 1
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 4df2
BUGCHECK_P3: ee5d7207
BUGCHECK_P4: c93136e6
FILE_IN_CAB: MEMORY.DMP
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
STACK_TEXT:
fffffe8f`456f50a8 fffff802`1995dfad : 00000000`0000001a 00000000`0000003f 00000000`00004df2 00000000`ee5d7207 : nt!KeBugCheckEx
fffffe8f`456f50b0 fffff802`1966e241 : ffffd583`26bde4a0 ffffffff`ffffffff 00000000`00000000 ffffd583`18a6b700 : nt!MiValidatePagefilePageHash+0x331
fffffe8f`456f5190 fffff802`1969f25f : fffffe8f`00001000 0000023f`b95d0000 fffffe8f`456f52b0 ffffd583`00000000 : nt!MiWaitForInPageComplete+0x351
fffffe8f`456f5280 fffff802`1969f30d : fffffe8f`456f53f8 ffffd583`18a6b700 fffffe8f`456f53f8 00000000`00000000 : nt!MiPfCompleteInPageSupport+0x83
fffffe8f`456f5370 fffff802`19668e0c : 00000000`00014012 ffffd583`18b090c0 ffffd583`0a894c01 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x51
fffffe8f`456f53a0 fffff802`19762180 : ffffd583`00000000 ffffd583`18b090c0 ffffd583`23fd3930 ffffffff`00000000 : nt!MiPrefetchVirtualMemory+0x36c
fffffe8f`456f54a0 fffff802`1966e0d0 : ffffffff`ffffffff 00040000`0026294f ffffa001`1fdcae80 ffffd583`121e0e20 : nt!MiPrefetchRestOfCluster+0xdc
fffffe8f`456f54f0 fffff802`1966eac5 : fffffe8f`456f57b0 fffffe8f`456f5600 fffffe8f`456f5680 fffff802`00000000 : nt!MiWaitForInPageComplete+0x1e0
fffffe8f`456f55e0 fffff802`196246c8 : 00000000`c0033333 00000000`00000000 0000023f`b95d0000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffffe8f`456f56f0 fffff802`197489a0 : ffffa050`28140000 ffffd583`18a6b700 ffffa050`008fee50 0000023f`b95d0000 : nt!MmAccessFault+0x468
fffffe8f`456f5890 fffff802`1962283c : 00000000`00000001 ffffa001`1fdcae80 fffffe8f`456f5a20 ffffa050`28140a00 : nt!MiFaultInProbeAddress+0xbc
fffffe8f`456f5940 fffff802`1974876c : 00000000`00000094 00000000`00000000 fffffe8f`456f5a89 ffffd583`29a491d0 : nt!MiLockPageLeafPageTable+0x28c
fffffe8f`456f59b0 fffff802`1974867c : fffffe8f`00000000 00000000`00000000 ffffd583`29a491d0 00000000`00000000 : nt!MiProbeLeafFrame+0x1c
fffffe8f`456f59e0 fffff802`196edb29 : 00000000`00040000 fffff802`1963dcda ffffd583`1af528d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0x9c
fffffe8f`456f5af0 fffff802`196ecc0c : 00000000`00040000 fffff802`196159b7 fffffe8f`456f5b60 00000000`00040246 : nt!SmKmProbeAndLockAddress+0x5d
fffffe8f`456f5b20 fffff802`196ecae1 : 00000000`00040000 00000000`00000004 0000023f`b95d0000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
fffffe8f`456f5b90 fffff802`197078e5 : ffffd583`18b090c0 00000000`00000080 fffff802`196eca80 ffffd583`1af9d800 : nt!SmKmStoreHelperWorker+0x61
fffffe8f`456f5c10 fffff802`198064b8 : fffff802`152c6180 ffffd583`18b090c0 fffff802`19707890 ffffd583`07a2a010 : nt!PspSystemThreadStartup+0x55
fffffe8f`456f5c60 00000000`00000000 : fffffe8f`456f6000 fffffe8f`456f0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff805`76000000 PsLoadedModuleList = 0xfffff805`76c2a770
Debug session time: Sun Jan 21 10:35:50.976 2024 (UTC + 7:00)
System Uptime: 2 days 11:30:57.917
Loading Kernel Symbols
...............................................................
..............Page 392375 not present in the dump file. Type ".hh dbgerr004" for details
..................................................
................................................................
.....
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
.......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`763fd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef8b`4833aa80=000000000000001a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000000b62e
Arg3: 00000000ac1773f7
Arg4: 000000001f3ad16c
Debugging Details:
------------------
Page 1cd2b5 not present in the dump file. Type ".hh dbgerr004" for details
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8827
Key : Analysis.Elapsed.mSec
Value: 9074
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1030
Key : Analysis.Init.Elapsed.mSec
Value: 6869
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: PAGE_HASH_ERRORS_0x1a_3f
Key : Failure.Hash
Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : Memory.System.Errors.PageHashErrors
Value: 1
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: b62e
BUGCHECK_P3: ac1773f7
BUGCHECK_P4: 1f3ad16c
FILE_IN_CAB: MEMORY.DMP
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffef8b4833b9a0 -- (.trap 0xffffef8b4833b9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffef8b4833bb80 rbx=0000000000000000 rcx=ffff820156f22dc8
rdx=ffffef8b4833bb70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057917a090 rsp=ffffef8b4833bb38 rbp=0000000000000080
r8=0000000000000000 r9=0000000000000003 r10=0000080000000000
r11=ffffef8b4833bba8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ACPI!ACPIAmliEvaluateOsc:
fffff805`7917a090 0bfa or edi,edx
Resetting default scope
STACK_TEXT:
ffffef8b`4833aa78 fffff805`7655dfad : 00000000`0000001a 00000000`0000003f 00000000`0000b62e 00000000`ac1773f7 : nt!KeBugCheckEx
ffffef8b`4833aa80 fffff805`7626e241 : ffff8201`81170870 ffffffff`ffffffff 00000000`00000000 ffff9480`e86ff1e8 : nt!MiValidatePagefilePageHash+0x331
ffffef8b`4833ab60 fffff805`7626eac5 : ffffef8b`0000d000 ffffef8b`4833ac00 ffffef8b`4833acf0 fffff805`00000000 : nt!MiWaitForInPageComplete+0x351
ffffef8b`4833ac50 fffff805`762246c8 : 00000000`c0033333 00000000`00000000 000001d0`dfe3d9e0 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffef8b`4833ad60 fffff805`7640d458 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
ffffef8b`4833af00 fffff805`76330490 : ffffa481`4e1b4000 ffff8201`6c120050 fffff805`762ef7d0 ffffa481`4e1b4000 : nt!KiPageFault+0x358
ffffef8b`4833b098 fffff805`762ef7d0 : ffffa481`4e1b4000 ffffa481`4e1b4000 00000000`00000002 000001d0`dfe3d9e0 : nt!RtlDecompressBufferXpressLz+0x50
ffffef8b`4833b0b0 fffff805`762ef4e0 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDecompressBufferEx+0x60
ffffef8b`4833b100 fffff805`762ef36d : 00000000`00000004 fffff805`762eeed6 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffef8b`4833b1c0 fffff805`762ee61c : 00000000`00000001 00000000`0001d9e0 ffff8201`6c120000 ffff8201`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffef8b`4833b210 fffff805`762ee44c : ffff8201`ffffffff ffff8201`757db000 ffffef8b`4833b2f0 ffff8201`6a9066d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffef8b`4833b2b0 fffff805`762ee299 : ffffa481`16ade730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffef8b`4833b360 fffff805`762ee151 : ffff8201`6c120000 ffff8201`6a9066d0 ffff8201`757db000 ffff8201`6c1219c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffef8b`4833b3e0 fffff805`7627c798 : ffff8201`57ecb100 ffff8201`6c120000 00000000`00000000 ffff8201`81171550 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffef8b`4833b410 fffff805`762ec8eb : fffff805`762ee130 ffffef8b`4833b4b0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffef8b`4833b480 fffff805`7620f69c : ffffef8b`4833b580 00000000`31526d73 00000000`000003ff fffff805`76d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffef8b`4833b550 fffff805`7620f0d0 : 00000000`0000000c 00000000`000003ff ffffef8b`4833b600 fffff805`76d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffef8b`4833b5a0 fffff805`762ece67 : 00000000`0000000c 00000000`00000003 ffff8201`6a9066d0 ffff8201`81171550 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffef8b`4833b630 fffff805`7635eccf : ffff8201`00000003 ffff8201`81171610 00000000`00000000 ffff8201`6c120000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffef8b`4833b6a0 fffff805`7626dec4 : ffffef8b`00000100 00000000`00000000 ffffef8b`4833b8f8 fffff805`7626ee40 : nt!SmPageRead+0x33
ffffef8b`4833b6f0 fffff805`7626e99d : 00000000`00000002 ffffef8b`4833b780 ffffef8b`4833b8f8 ffff8201`81171500 : nt!MiIssueHardFaultIo+0x10c
ffffef8b`4833b740 fffff805`762246c8 : 00000000`c0033333 00000000`00000000 fffff805`7917a090 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffef8b`4833b800 fffff805`7640d458 : 00000000`00000000 00000000`52706341 00000000`00000040 00000000`00000000 : nt!MmAccessFault+0x468
ffffef8b`4833b9a0 fffff805`7917a090 : fffff805`790f19c7 00000000`00000000 ffff8201`57e06ab0 ffff8201`57ecb100 : nt!KiPageFault+0x358
ffffef8b`4833bb38 fffff805`790f19c7 : 00000000`00000000 ffff8201`57e06ab0 ffff8201`57ecb100 00000000`00000000 : ACPI!ACPIAmliEvaluateOsc
ffffef8b`4833bb40 fffff805`7912919f : ffff8201`54bd4000 ffff8201`57e06980 ffff8201`57e06980 00000000`00000000 : ACPI!AcpiEvaluateOscMethodOnPciRootBus+0x6b
ffffef8b`4833bbb0 fffff805`763078e5 : ffff8201`57ecb100 fffff805`79111990 ffff8201`57e06980 000f8067`bcbbbdff : ACPI!PciRootBusBiosMethodDispatcherOnResume+0x1780f
ffffef8b`4833bc10 fffff805`764064b8 : ffffa481`16997180 ffff8201`57ecb100 fffff805`76307890 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef8b`4833bc60 00000000`00000000 : ffffef8b`4833c000 ffffef8b`48336000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.
------------------------
2nd dmp log:
HERE IS AN ORDER DMP LOG OF 3 DAYS AGO:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff800`46800000 PsLoadedModuleList = 0xfffff800`4742a790
Debug session time: Thu Jan 18 21:22:58.014 2024 (UTC + 7:00)
System Uptime: 1 days 6:27:02.645
Loading Kernel Symbols
...............................................................
..............Page a624b not present in the dump file. Type ".hh dbgerr004" for details
..................................................
................................................................
...
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`46bfd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdc0f`13e135c0=000000000000001a
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000027198
Arg3: 0000000012ee58a0
Arg4: 00000000b9f9e41a
Debugging Details:
------------------
Page 1e4f6b not present in the dump file. Type ".hh dbgerr004" for details
Page 2463f4 not present in the dump file. Type ".hh dbgerr004" for details
Page 1e4f6b not present in the dump file. Type ".hh dbgerr004" for details
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7296
Key : Analysis.Elapsed.mSec
Value: 13964
Key : Analysis.IO.Other.Mb
Value: 3
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 20
Key : Analysis.Init.CPU.mSec
Value: 1343
Key : Analysis.Init.Elapsed.mSec
Value: 133776
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: PAGE_HASH_ERRORS_0x1a_3f
Key : Failure.Hash
Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : Memory.System.Errors.PageHashErrors
Value: 1
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 27198
BUGCHECK_P3: 12ee58a0
BUGCHECK_P4: b9f9e41a
FILE_IN_CAB: MEMORY.DMP
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffdc0f13e144e0 -- (.trap 0xffffdc0f13e144e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80046800000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80046a3c174 rsp=ffffdc0f13e14670 rbp=ffffbc0e88805f10
r8=0000000000000001 r9=0000000000000508 r10=ffffbc0e82729aa0
r11=ffffbc0e9c2c72a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExFreeHeapPool+0x124:
fffff800`46a3c174 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
ffffdc0f`13e135b8 fffff800`46d5dfad : 00000000`0000001a 00000000`0000003f 00000000`00027198 00000000`12ee58a0 : nt!KeBugCheckEx
ffffdc0f`13e135c0 fffff800`46a6e241 : ffffbc0e`977fb080 ffffffff`ffffffff 00000000`00000000 ffffa680`bbf52bf8 : nt!MiValidatePagefilePageHash+0x331
ffffdc0f`13e136a0 fffff800`46a6eac5 : ffffdc0f`00010000 ffffdc0f`13e13800 ffffdc0f`13e13830 fffff800`00000000 : nt!MiWaitForInPageComplete+0x351
ffffdc0f`13e13790 fffff800`46a246c8 : 00000000`c0033333 00000000`00000000 00000177`ea57f000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffdc0f`13e138a0 fffff800`46c0d458 : 00000000`0000000a 00000000`00000001 ffffbc0e`a7b86d70 00000000`201f0b56 : nt!MmAccessFault+0x468
ffffdc0f`13e13a40 fffff800`46b304c6 : ffffcc00`7a7fb000 ffffbc0e`98e7f050 fffff800`46aef7d0 ffffcc00`7a7fb000 : nt!KiPageFault+0x358
ffffdc0f`13e13bd8 fffff800`46aef7d0 : ffffcc00`7a7fb000 ffffcc00`7a7fb000 00000000`00000002 00000177`ea57ef90 : nt!RtlDecompressBufferXpressLz+0x86
ffffdc0f`13e13bf0 fffff800`46aef4e0 : 00000001`00000001 00000000`00000000 00000000`00000000 fffff800`47450bc0 : nt!RtlDecompressBufferEx+0x60
ffffdc0f`13e13c40 fffff800`46aef36d : 00000000`00000004 fffff800`46aeeed6 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffdc0f`13e13d00 fffff800`46aee61c : 00000000`00000001 00000000`0000ef90 ffffbc0e`98e7f000 ffffbc0e`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffdc0f`13e13d50 fffff800`46aee44c : fffff800`ffffffff ffffbc0e`a6141000 ffffdc0f`13e13e30 ffffbc0e`a56c6e10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffdc0f`13e13df0 fffff800`46aee299 : ffffcc00`6db2e730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffdc0f`13e13ea0 fffff800`46aee151 : ffffbc0e`98e7f000 ffffbc0e`a56c6e10 ffffbc0e`a6141000 ffffbc0e`98e809c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffdc0f`13e13f20 fffff800`46a7c798 : ffffbc0e`88851040 ffffbc0e`98e7f000 00000000`00000000 ffffbc0e`a7b86cb0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffdc0f`13e13f50 fffff800`46aec8eb : fffff800`46aee130 ffffdc0f`13e13ff0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffdc0f`13e13fc0 fffff800`46a0f69c : ffffdc0f`13e140c0 00000000`31526d73 00000000`000003ff fffff800`475239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffdc0f`13e14090 fffff800`46a0f0d0 : 00000000`0000000c 00000000`000003ff ffffdc0f`13e14140 fffff800`475239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffdc0f`13e140e0 fffff800`46aece67 : 00000000`0000000c 00000000`00000001 ffffbc0e`a56c6e10 ffffbc0e`a7b86cb0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffdc0f`13e14170 fffff800`46b5eccf : ffffbc0e`00000001 ffffbc0e`a7b86d70 00000000`00000000 ffffbc0e`98e7f000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffdc0f`13e141e0 fffff800`46a6dec4 : ffffdc0f`00000100 00000000`00000000 ffffdc0f`13e14438 fffff800`46a6ee40 : nt!SmPageRead+0x33
ffffdc0f`13e14230 fffff800`46a6e99d : 00000000`00000002 ffffdc0f`13e142c0 ffffdc0f`13e14438 ffffbc0e`a7b86c60 : nt!MiIssueHardFaultIo+0x10c
ffffdc0f`13e14280 fffff800`46a246c8 : 00000000`c0033333 00000000`00000000 ffff960b`82c5a153 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffdc0f`13e14340 fffff800`46c0d458 : 00000000`00000000 fffff800`4916b44e ffffbc0e`a155f3e0 00000000`00000001 : nt!MmAccessFault+0x468
ffffdc0f`13e144e0 fffff800`46a3c174 : 00000000`74530006 ffffdc0f`13e146e0 00000000`00000000 ffff960b`4a400100 : nt!KiPageFault+0x358
ffffdc0f`13e14670 fffff800`471b70b9 : ffffbc0e`9c2c72a0 ffffbc0e`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffffdc0f`13e14750 fffff800`46e42213 : ffffbc0e`88805f10 ffffbc0e`9c2c72a0 ffffbc0e`9fa2f450 00000000`00000000 : nt!ExFreePool+0x9
ffffdc0f`13e14780 fffff800`46e45950 : ffffbc0e`8273d4e0 ffffbc0e`9fa2f450 ffffbc0e`a155f3b0 fffff800`471b70b9 : nt!IopDeleteFile+0x1b3
ffffdc0f`13e14800 fffff800`46a45c07 : 00000000`00000000 00000000`00000000 ffff960b`736d3e50 ffffbc0e`a155f3e0 : nt!ObpRemoveObjectRoutine+0x80
ffffdc0f`13e14860 fffff800`46a45b2e : 00000000`00000000 ffffbc0e`9fa2f410 ffffbc0e`9fa2f410 ffffbc0e`9fa2f410 : nt!ObfDereferenceObjectWithTag+0xc7
ffffdc0f`13e148a0 fffff800`46ea2325 : 00000000`00088081 ffffbc0e`9fa2f410 fffff800`47450bc0 00000000`00088081 : nt!HalPutDmaAdapter+0xe
ffffdc0f`13e148d0 fffff800`46b87925 : 00000000`00000001 00000000`00000000 ffffdc0f`13e149a0 ffffbc0e`9fa2f418 : nt!MiSegmentDelete+0x155
ffffdc0f`13e14920 fffff800`46bbd4d9 : 00000000`00000000 fffff800`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
ffffdc0f`13e149e0 fffff800`46b078e5 : ffffbc0e`88851040 ffffbc0e`88851040 00000000`00000080 fffff800`46bbd3b0 : nt!MiDereferenceSegmentThread+0x129
ffffdc0f`13e14c10 fffff800`46c064b8 : ffffcc00`6d840180 ffffbc0e`88851040 fffff800`46b07890 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffdc0f`13e14c60 00000000`00000000 : ffffdc0f`13e15000 ffffdc0f`13e0f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.
________________________________________________
3rd log:
This one just happened right now, right after turning the PC to sleep & turn it back on right away:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff802`19400000 PsLoadedModuleList = 0xfffff802`1a02a770
Debug session time: Sun Jan 21 16:31:18.073 2024 (UTC + 7:00)
System Uptime: 0 days 2:28:09.708
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`197fd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffe8f`456f50b0=000000000000001a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000004df2
Arg3: 00000000ee5d7207
Arg4: 00000000c93136e6
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3843
Key : Analysis.Elapsed.mSec
Value: 3920
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 3419
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: PAGE_HASH_ERRORS_0x1a_3f
Key : Failure.Hash
Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : Memory.System.Errors.PageHashErrors
Value: 1
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 4df2
BUGCHECK_P3: ee5d7207
BUGCHECK_P4: c93136e6
FILE_IN_CAB: MEMORY.DMP
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
STACK_TEXT:
fffffe8f`456f50a8 fffff802`1995dfad : 00000000`0000001a 00000000`0000003f 00000000`00004df2 00000000`ee5d7207 : nt!KeBugCheckEx
fffffe8f`456f50b0 fffff802`1966e241 : ffffd583`26bde4a0 ffffffff`ffffffff 00000000`00000000 ffffd583`18a6b700 : nt!MiValidatePagefilePageHash+0x331
fffffe8f`456f5190 fffff802`1969f25f : fffffe8f`00001000 0000023f`b95d0000 fffffe8f`456f52b0 ffffd583`00000000 : nt!MiWaitForInPageComplete+0x351
fffffe8f`456f5280 fffff802`1969f30d : fffffe8f`456f53f8 ffffd583`18a6b700 fffffe8f`456f53f8 00000000`00000000 : nt!MiPfCompleteInPageSupport+0x83
fffffe8f`456f5370 fffff802`19668e0c : 00000000`00014012 ffffd583`18b090c0 ffffd583`0a894c01 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x51
fffffe8f`456f53a0 fffff802`19762180 : ffffd583`00000000 ffffd583`18b090c0 ffffd583`23fd3930 ffffffff`00000000 : nt!MiPrefetchVirtualMemory+0x36c
fffffe8f`456f54a0 fffff802`1966e0d0 : ffffffff`ffffffff 00040000`0026294f ffffa001`1fdcae80 ffffd583`121e0e20 : nt!MiPrefetchRestOfCluster+0xdc
fffffe8f`456f54f0 fffff802`1966eac5 : fffffe8f`456f57b0 fffffe8f`456f5600 fffffe8f`456f5680 fffff802`00000000 : nt!MiWaitForInPageComplete+0x1e0
fffffe8f`456f55e0 fffff802`196246c8 : 00000000`c0033333 00000000`00000000 0000023f`b95d0000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffffe8f`456f56f0 fffff802`197489a0 : ffffa050`28140000 ffffd583`18a6b700 ffffa050`008fee50 0000023f`b95d0000 : nt!MmAccessFault+0x468
fffffe8f`456f5890 fffff802`1962283c : 00000000`00000001 ffffa001`1fdcae80 fffffe8f`456f5a20 ffffa050`28140a00 : nt!MiFaultInProbeAddress+0xbc
fffffe8f`456f5940 fffff802`1974876c : 00000000`00000094 00000000`00000000 fffffe8f`456f5a89 ffffd583`29a491d0 : nt!MiLockPageLeafPageTable+0x28c
fffffe8f`456f59b0 fffff802`1974867c : fffffe8f`00000000 00000000`00000000 ffffd583`29a491d0 00000000`00000000 : nt!MiProbeLeafFrame+0x1c
fffffe8f`456f59e0 fffff802`196edb29 : 00000000`00040000 fffff802`1963dcda ffffd583`1af528d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0x9c
fffffe8f`456f5af0 fffff802`196ecc0c : 00000000`00040000 fffff802`196159b7 fffffe8f`456f5b60 00000000`00040246 : nt!SmKmProbeAndLockAddress+0x5d
fffffe8f`456f5b20 fffff802`196ecae1 : 00000000`00040000 00000000`00000004 0000023f`b95d0000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
fffffe8f`456f5b90 fffff802`197078e5 : ffffd583`18b090c0 00000000`00000080 fffff802`196eca80 ffffd583`1af9d800 : nt!SmKmStoreHelperWorker+0x61
fffffe8f`456f5c10 fffff802`198064b8 : fffff802`152c6180 ffffd583`18b090c0 fffff802`19707890 ffffd583`07a2a010 : nt!PspSystemThreadStartup+0x55
fffffe8f`456f5c60 00000000`00000000 : fffffe8f`456f6000 fffffe8f`456f0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.
Last edited by a moderator: