Question MEMORY_MANAGEMENT BSOD when I wake my PC from Sleep ?

Jan 21, 2024
1
0
10
Hi guys, I'm a new member!


I've run into same problem since last week, my PC gets this BSOD when I try to wake it up after 3h+ from sleep, and cost me every file I was working on.

I've tried
  • Window Memory Diagnostic,
  • Run chkdsk and sfc /scannow on both disks.
  • Updated Window & drives,
  • Removed Ram to clean it.
  • unclicking the Automatically Manage page file size and turn it on to reset the sys,

but the problem still here. And the Virtual Memory when I choose Automatically Manage is on HDD, and it consumes 28672MB disk space for some reason.

I know that the Virtual memory is on HDD, but I've had it on HDD for ~2 years now. And this problem only just happened now.

The memory consumption on Ram before putting the PC to sleep is ~50% in task manager, and the BSOD happened. I used to put it at much higher, like 78% but no problem when waking the PC up at all.

Please help me solve this problem. It has been quite stressful finding solutions for this, and nothing worked.

Here are the DMPs logs for 3 times BSOD:

The 1st two are BSOD when Sleep after 3h+, before that when I turn on after sleep 1 - 2 hours it was ok.

the 3rd just happened right now, instantly BSOD even when I just press sleep, and turn it back on after ~ 1 min.

(Please search "2nd" & "3rd" to jump on top of 2nd & 3rd log)

************* Preparing the environment for Debugger Extensions Gallery repositories **************

ExtensionRepository : Implicit

UseExperimentalFeatureForNugetShare : false

AllowNugetExeUpdate : false

AllowNugetMSCredentialProviderInstall : false

AllowParallelInitializationOfLocalRepositories : true



-- Configuring repositories

----> Repository : LocalInstalled, Enabled: true

----> Repository : UserExtensions, Enabled: true



>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds



************* Waiting for Debugger Extensions Gallery to Initialize **************



>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds

----> Repository : UserExtensions, Enabled: true, Packages count: 0

----> Repository : LocalInstalled, Enabled: true, Packages count: 36



Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [D:\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 19041.1.amd64fre.vb_release.191206-1406

Kernel base = 0xfffff805`76000000 PsLoadedModuleList = 0xfffff805`76c2a770

Debug session time: Sun Jan 21 10:35:50.976 2024 (UTC + 7:00)

System Uptime: 2 days 11:30:57.917

Loading Kernel Symbols

...............................................................

..............Page 392375 not present in the dump file. Type ".hh dbgerr004" for details

..................................................

................................................................

.....

Loading User Symbols

PEB address is NULL !

Loading unloaded module list

.......................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff805`763fd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef8b`4833aa80=000000000000001a

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



MEMORY_MANAGEMENT (1a)

# Any other values for parameter 1 must be individually examined.

Arguments:

Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains

the pagefile offset. Parameter 3 contains the page CRC value.

Parameter 4 contains the expected CRC value.

Arg2: 000000000000b62e

Arg3: 00000000ac1773f7

Arg4: 000000001f3ad16c



Debugging Details:

------------------



Page 1cd2b5 not present in the dump file. Type ".hh dbgerr004" for details

*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll



KEY_VALUES_STRING: 1



Key : Analysis.CPU.mSec

Value: 8827



Key : Analysis.Elapsed.mSec

Value: 9074



Key : Analysis.IO.Other.Mb

Value: 0



Key : Analysis.IO.Read.Mb

Value: 0



Key : Analysis.IO.Write.Mb

Value: 0



Key : Analysis.Init.CPU.mSec

Value: 1030



Key : Analysis.Init.Elapsed.mSec

Value: 6869



Key : Analysis.Memory.CommitPeak.Mb

Value: 99



Key : Bugcheck.Code.KiBugCheckData

Value: 0x1a



Key : Bugcheck.Code.LegacyAPI

Value: 0x1a



Key : Failure.Bucket

Value: PAGE_HASH_ERRORS_0x1a_3f



Key : Failure.Hash

Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}



Key : Hypervisor.Enlightenments.Value

Value: 0



Key : Hypervisor.Enlightenments.ValueHex

Value: 0



Key : Hypervisor.Flags.AnyHypervisorPresent

Value: 0



Key : Hypervisor.Flags.ApicEnlightened

Value: 0



Key : Hypervisor.Flags.ApicVirtualizationAvailable

Value: 1



Key : Hypervisor.Flags.AsyncMemoryHint

Value: 0



Key : Hypervisor.Flags.CoreSchedulerRequested

Value: 0



Key : Hypervisor.Flags.CpuManager

Value: 0



Key : Hypervisor.Flags.DeprecateAutoEoi

Value: 0



Key : Hypervisor.Flags.DynamicCpuDisabled

Value: 0



Key : Hypervisor.Flags.Epf

Value: 0



Key : Hypervisor.Flags.ExtendedProcessorMasks

Value: 0



Key : Hypervisor.Flags.HardwareMbecAvailable

Value: 1



Key : Hypervisor.Flags.MaxBankNumber

Value: 0



Key : Hypervisor.Flags.MemoryZeroingControl

Value: 0



Key : Hypervisor.Flags.NoExtendedRangeFlush

Value: 0



Key : Hypervisor.Flags.NoNonArchCoreSharing

Value: 0



Key : Hypervisor.Flags.Phase0InitDone

Value: 0



Key : Hypervisor.Flags.PowerSchedulerQos

Value: 0



Key : Hypervisor.Flags.RootScheduler

Value: 0



Key : Hypervisor.Flags.SynicAvailable

Value: 0



Key : Hypervisor.Flags.UseQpcBias

Value: 0



Key : Hypervisor.Flags.Value

Value: 16908288



Key : Hypervisor.Flags.ValueHex

Value: 1020000



Key : Hypervisor.Flags.VpAssistPage

Value: 0



Key : Hypervisor.Flags.VsmAvailable

Value: 0



Key : Hypervisor.RootFlags.AccessStats

Value: 0



Key : Hypervisor.RootFlags.CrashdumpEnlightened

Value: 0



Key : Hypervisor.RootFlags.CreateVirtualProcessor

Value: 0



Key : Hypervisor.RootFlags.DisableHyperthreading

Value: 0



Key : Hypervisor.RootFlags.HostTimelineSync

Value: 0



Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled

Value: 0



Key : Hypervisor.RootFlags.IsHyperV

Value: 0



Key : Hypervisor.RootFlags.LivedumpEnlightened

Value: 0



Key : Hypervisor.RootFlags.MapDeviceInterrupt

Value: 0



Key : Hypervisor.RootFlags.MceEnlightened

Value: 0



Key : Hypervisor.RootFlags.Nested

Value: 0



Key : Hypervisor.RootFlags.StartLogicalProcessor

Value: 0



Key : Hypervisor.RootFlags.Value

Value: 0



Key : Hypervisor.RootFlags.ValueHex

Value: 0



Key : Memory.System.Errors.PageHashErrors

Value: 1



Key : SecureKernel.HalpHvciEnabled

Value: 0



Key : WER.OS.Branch

Value: vb_release



Key : WER.OS.Version

Value: 10.0.19041.1





BUGCHECK_CODE: 1a



BUGCHECK_P1: 3f



BUGCHECK_P2: b62e



BUGCHECK_P3: ac1773f7



BUGCHECK_P4: 1f3ad16c



FILE_IN_CAB: MEMORY.DMP



ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.

The data read from storage does not match the original data written.

This indicates the data was corrupted by the storage stack, or device hardware.





BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



PROCESS_NAME: MemCompression



PAGE_HASH_ERRORS_DETECTED: 1



TRAP_FRAME: ffffef8b4833b9a0 -- (.trap 0xffffef8b4833b9a0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=ffffef8b4833bb80 rbx=0000000000000000 rcx=ffff820156f22dc8

rdx=ffffef8b4833bb70 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8057917a090 rsp=ffffef8b4833bb38 rbp=0000000000000080

r8=0000000000000000 r9=0000000000000003 r10=0000080000000000

r11=ffffef8b4833bba8 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl zr na po nc

ACPI!ACPIAmliEvaluateOsc:

fffff805`7917a090 0bfa or edi,edx

Resetting default scope



STACK_TEXT:

ffffef8b`4833aa78 fffff805`7655dfad : 00000000`0000001a 00000000`0000003f 00000000`0000b62e 00000000`ac1773f7 : nt!KeBugCheckEx

ffffef8b`4833aa80 fffff805`7626e241 : ffff8201`81170870 ffffffff`ffffffff 00000000`00000000 ffff9480`e86ff1e8 : nt!MiValidatePagefilePageHash+0x331

ffffef8b`4833ab60 fffff805`7626eac5 : ffffef8b`0000d000 ffffef8b`4833ac00 ffffef8b`4833acf0 fffff805`00000000 : nt!MiWaitForInPageComplete+0x351

ffffef8b`4833ac50 fffff805`762246c8 : 00000000`c0033333 00000000`00000000 000001d0`dfe3d9e0 00000000`00000000 : nt!MiIssueHardFault+0x3c5

ffffef8b`4833ad60 fffff805`7640d458 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468

ffffef8b`4833af00 fffff805`76330490 : ffffa481`4e1b4000 ffff8201`6c120050 fffff805`762ef7d0 ffffa481`4e1b4000 : nt!KiPageFault+0x358

ffffef8b`4833b098 fffff805`762ef7d0 : ffffa481`4e1b4000 ffffa481`4e1b4000 00000000`00000002 000001d0`dfe3d9e0 : nt!RtlDecompressBufferXpressLz+0x50

ffffef8b`4833b0b0 fffff805`762ef4e0 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDecompressBufferEx+0x60

ffffef8b`4833b100 fffff805`762ef36d : 00000000`00000004 fffff805`762eeed6 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150

ffffef8b`4833b1c0 fffff805`762ee61c : 00000000`00000001 00000000`0001d9e0 ffff8201`6c120000 ffff8201`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5

ffffef8b`4833b210 fffff805`762ee44c : ffff8201`ffffffff ffff8201`757db000 ffffef8b`4833b2f0 ffff8201`6a9066d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180

ffffef8b`4833b2b0 fffff805`762ee299 : ffffa481`16ade730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8

ffffef8b`4833b360 fffff805`762ee151 : ffff8201`6c120000 ffff8201`6a9066d0 ffff8201`757db000 ffff8201`6c1219c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85

ffffef8b`4833b3e0 fffff805`7627c798 : ffff8201`57ecb100 ffff8201`6c120000 00000000`00000000 ffff8201`81171550 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21

ffffef8b`4833b410 fffff805`762ec8eb : fffff805`762ee130 ffffef8b`4833b4b0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78

ffffef8b`4833b480 fffff805`7620f69c : ffffef8b`4833b580 00000000`31526d73 00000000`000003ff fffff805`76d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7

ffffef8b`4833b550 fffff805`7620f0d0 : 00000000`0000000c 00000000`000003ff ffffef8b`4833b600 fffff805`76d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac

ffffef8b`4833b5a0 fffff805`762ece67 : 00000000`0000000c 00000000`00000003 ffff8201`6a9066d0 ffff8201`81171550 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0

ffffef8b`4833b630 fffff805`7635eccf : ffff8201`00000003 ffff8201`81171610 00000000`00000000 ffff8201`6c120000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167

ffffef8b`4833b6a0 fffff805`7626dec4 : ffffef8b`00000100 00000000`00000000 ffffef8b`4833b8f8 fffff805`7626ee40 : nt!SmPageRead+0x33

ffffef8b`4833b6f0 fffff805`7626e99d : 00000000`00000002 ffffef8b`4833b780 ffffef8b`4833b8f8 ffff8201`81171500 : nt!MiIssueHardFaultIo+0x10c

ffffef8b`4833b740 fffff805`762246c8 : 00000000`c0033333 00000000`00000000 fffff805`7917a090 00000000`00000000 : nt!MiIssueHardFault+0x29d

ffffef8b`4833b800 fffff805`7640d458 : 00000000`00000000 00000000`52706341 00000000`00000040 00000000`00000000 : nt!MmAccessFault+0x468

ffffef8b`4833b9a0 fffff805`7917a090 : fffff805`790f19c7 00000000`00000000 ffff8201`57e06ab0 ffff8201`57ecb100 : nt!KiPageFault+0x358

ffffef8b`4833bb38 fffff805`790f19c7 : 00000000`00000000 ffff8201`57e06ab0 ffff8201`57ecb100 00000000`00000000 : ACPI!ACPIAmliEvaluateOsc

ffffef8b`4833bb40 fffff805`7912919f : ffff8201`54bd4000 ffff8201`57e06980 ffff8201`57e06980 00000000`00000000 : ACPI!AcpiEvaluateOscMethodOnPciRootBus+0x6b

ffffef8b`4833bbb0 fffff805`763078e5 : ffff8201`57ecb100 fffff805`79111990 ffff8201`57e06980 000f8067`bcbbbdff : ACPI!PciRootBusBiosMethodDispatcherOnResume+0x1780f

ffffef8b`4833bc10 fffff805`764064b8 : ffffa481`16997180 ffff8201`57ecb100 fffff805`76307890 00000000`00000000 : nt!PspSystemThreadStartup+0x55

ffffef8b`4833bc60 00000000`00000000 : ffffef8b`4833c000 ffffef8b`48336000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE



MODULE_NAME: Unknown_Module



IMAGE_NAME: Unknown_Image



STACK_COMMAND: .cxr; .ecxr ; kb



FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}



Followup: MachineOwner

---------



*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.



------------------------





2nd dmp log:





HERE IS AN ORDER DMP LOG OF 3 DAYS AGO:






************* Preparing the environment for Debugger Extensions Gallery repositories **************

ExtensionRepository : Implicit

UseExperimentalFeatureForNugetShare : false

AllowNugetExeUpdate : false

AllowNugetMSCredentialProviderInstall : false

AllowParallelInitializationOfLocalRepositories : true



-- Configuring repositories

----> Repository : LocalInstalled, Enabled: true

----> Repository : UserExtensions, Enabled: true



>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds



************* Waiting for Debugger Extensions Gallery to Initialize **************



>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds

----> Repository : UserExtensions, Enabled: true, Packages count: 0

----> Repository : LocalInstalled, Enabled: true, Packages count: 36



Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\WINDOWS\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 19041.1.amd64fre.vb_release.191206-1406

Kernel base = 0xfffff800`46800000 PsLoadedModuleList = 0xfffff800`4742a790

Debug session time: Thu Jan 18 21:22:58.014 2024 (UTC + 7:00)

System Uptime: 1 days 6:27:02.645

Loading Kernel Symbols

...............................................................

..............Page a624b not present in the dump file. Type ".hh dbgerr004" for details

..................................................

................................................................

...

Loading User Symbols

PEB address is NULL !

Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff800`46bfd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdc0f`13e135c0=000000000000001a

6: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



MEMORY_MANAGEMENT (1a)

# Any other values for parameter 1 must be individually examined.

Arguments:

Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains

the pagefile offset. Parameter 3 contains the page CRC value.

Parameter 4 contains the expected CRC value.

Arg2: 0000000000027198

Arg3: 0000000012ee58a0

Arg4: 00000000b9f9e41a



Debugging Details:

------------------



Page 1e4f6b not present in the dump file. Type ".hh dbgerr004" for details

Page 2463f4 not present in the dump file. Type ".hh dbgerr004" for details

Page 1e4f6b not present in the dump file. Type ".hh dbgerr004" for details

*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll



KEY_VALUES_STRING: 1



Key : Analysis.CPU.mSec

Value: 7296



Key : Analysis.Elapsed.mSec

Value: 13964



Key : Analysis.IO.Other.Mb

Value: 3



Key : Analysis.IO.Read.Mb

Value: 0



Key : Analysis.IO.Write.Mb

Value: 20



Key : Analysis.Init.CPU.mSec

Value: 1343



Key : Analysis.Init.Elapsed.mSec

Value: 133776



Key : Analysis.Memory.CommitPeak.Mb

Value: 88



Key : Bugcheck.Code.KiBugCheckData

Value: 0x1a



Key : Bugcheck.Code.LegacyAPI

Value: 0x1a



Key : Failure.Bucket

Value: PAGE_HASH_ERRORS_0x1a_3f



Key : Failure.Hash

Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}



Key : Hypervisor.Enlightenments.Value

Value: 0



Key : Hypervisor.Enlightenments.ValueHex

Value: 0



Key : Hypervisor.Flags.AnyHypervisorPresent

Value: 0



Key : Hypervisor.Flags.ApicEnlightened

Value: 0



Key : Hypervisor.Flags.ApicVirtualizationAvailable

Value: 1



Key : Hypervisor.Flags.AsyncMemoryHint

Value: 0



Key : Hypervisor.Flags.CoreSchedulerRequested

Value: 0



Key : Hypervisor.Flags.CpuManager

Value: 0



Key : Hypervisor.Flags.DeprecateAutoEoi

Value: 0



Key : Hypervisor.Flags.DynamicCpuDisabled

Value: 0



Key : Hypervisor.Flags.Epf

Value: 0



Key : Hypervisor.Flags.ExtendedProcessorMasks

Value: 0



Key : Hypervisor.Flags.HardwareMbecAvailable

Value: 1



Key : Hypervisor.Flags.MaxBankNumber

Value: 0



Key : Hypervisor.Flags.MemoryZeroingControl

Value: 0



Key : Hypervisor.Flags.NoExtendedRangeFlush

Value: 0



Key : Hypervisor.Flags.NoNonArchCoreSharing

Value: 0



Key : Hypervisor.Flags.Phase0InitDone

Value: 0



Key : Hypervisor.Flags.PowerSchedulerQos

Value: 0



Key : Hypervisor.Flags.RootScheduler

Value: 0



Key : Hypervisor.Flags.SynicAvailable

Value: 0



Key : Hypervisor.Flags.UseQpcBias

Value: 0



Key : Hypervisor.Flags.Value

Value: 16908288



Key : Hypervisor.Flags.ValueHex

Value: 1020000



Key : Hypervisor.Flags.VpAssistPage

Value: 0



Key : Hypervisor.Flags.VsmAvailable

Value: 0



Key : Hypervisor.RootFlags.AccessStats

Value: 0



Key : Hypervisor.RootFlags.CrashdumpEnlightened

Value: 0



Key : Hypervisor.RootFlags.CreateVirtualProcessor

Value: 0



Key : Hypervisor.RootFlags.DisableHyperthreading

Value: 0



Key : Hypervisor.RootFlags.HostTimelineSync

Value: 0



Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled

Value: 0



Key : Hypervisor.RootFlags.IsHyperV

Value: 0



Key : Hypervisor.RootFlags.LivedumpEnlightened

Value: 0



Key : Hypervisor.RootFlags.MapDeviceInterrupt

Value: 0



Key : Hypervisor.RootFlags.MceEnlightened

Value: 0



Key : Hypervisor.RootFlags.Nested

Value: 0



Key : Hypervisor.RootFlags.StartLogicalProcessor

Value: 0



Key : Hypervisor.RootFlags.Value

Value: 0



Key : Hypervisor.RootFlags.ValueHex

Value: 0



Key : Memory.System.Errors.PageHashErrors

Value: 1



Key : SecureKernel.HalpHvciEnabled

Value: 0



Key : WER.OS.Branch

Value: vb_release



Key : WER.OS.Version

Value: 10.0.19041.1





BUGCHECK_CODE: 1a



BUGCHECK_P1: 3f



BUGCHECK_P2: 27198



BUGCHECK_P3: 12ee58a0



BUGCHECK_P4: b9f9e41a



FILE_IN_CAB: MEMORY.DMP



ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.

The data read from storage does not match the original data written.

This indicates the data was corrupted by the storage stack, or device hardware.





BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



PROCESS_NAME: MemCompression



PAGE_HASH_ERRORS_DETECTED: 1



TRAP_FRAME: ffffdc0f13e144e0 -- (.trap 0xffffdc0f13e144e0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000

rdx=fffff80046800000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff80046a3c174 rsp=ffffdc0f13e14670 rbp=ffffbc0e88805f10

r8=0000000000000001 r9=0000000000000508 r10=ffffbc0e82729aa0

r11=ffffbc0e9c2c72a0 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl nz na po nc

nt!ExFreeHeapPool+0x124:

fffff800`46a3c174 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??

Resetting default scope



STACK_TEXT:

ffffdc0f`13e135b8 fffff800`46d5dfad : 00000000`0000001a 00000000`0000003f 00000000`00027198 00000000`12ee58a0 : nt!KeBugCheckEx

ffffdc0f`13e135c0 fffff800`46a6e241 : ffffbc0e`977fb080 ffffffff`ffffffff 00000000`00000000 ffffa680`bbf52bf8 : nt!MiValidatePagefilePageHash+0x331

ffffdc0f`13e136a0 fffff800`46a6eac5 : ffffdc0f`00010000 ffffdc0f`13e13800 ffffdc0f`13e13830 fffff800`00000000 : nt!MiWaitForInPageComplete+0x351

ffffdc0f`13e13790 fffff800`46a246c8 : 00000000`c0033333 00000000`00000000 00000177`ea57f000 00000000`00000000 : nt!MiIssueHardFault+0x3c5

ffffdc0f`13e138a0 fffff800`46c0d458 : 00000000`0000000a 00000000`00000001 ffffbc0e`a7b86d70 00000000`201f0b56 : nt!MmAccessFault+0x468

ffffdc0f`13e13a40 fffff800`46b304c6 : ffffcc00`7a7fb000 ffffbc0e`98e7f050 fffff800`46aef7d0 ffffcc00`7a7fb000 : nt!KiPageFault+0x358

ffffdc0f`13e13bd8 fffff800`46aef7d0 : ffffcc00`7a7fb000 ffffcc00`7a7fb000 00000000`00000002 00000177`ea57ef90 : nt!RtlDecompressBufferXpressLz+0x86

ffffdc0f`13e13bf0 fffff800`46aef4e0 : 00000001`00000001 00000000`00000000 00000000`00000000 fffff800`47450bc0 : nt!RtlDecompressBufferEx+0x60

ffffdc0f`13e13c40 fffff800`46aef36d : 00000000`00000004 fffff800`46aeeed6 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150

ffffdc0f`13e13d00 fffff800`46aee61c : 00000000`00000001 00000000`0000ef90 ffffbc0e`98e7f000 ffffbc0e`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5

ffffdc0f`13e13d50 fffff800`46aee44c : fffff800`ffffffff ffffbc0e`a6141000 ffffdc0f`13e13e30 ffffbc0e`a56c6e10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180

ffffdc0f`13e13df0 fffff800`46aee299 : ffffcc00`6db2e730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8

ffffdc0f`13e13ea0 fffff800`46aee151 : ffffbc0e`98e7f000 ffffbc0e`a56c6e10 ffffbc0e`a6141000 ffffbc0e`98e809c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85

ffffdc0f`13e13f20 fffff800`46a7c798 : ffffbc0e`88851040 ffffbc0e`98e7f000 00000000`00000000 ffffbc0e`a7b86cb0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21

ffffdc0f`13e13f50 fffff800`46aec8eb : fffff800`46aee130 ffffdc0f`13e13ff0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78

ffffdc0f`13e13fc0 fffff800`46a0f69c : ffffdc0f`13e140c0 00000000`31526d73 00000000`000003ff fffff800`475239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7

ffffdc0f`13e14090 fffff800`46a0f0d0 : 00000000`0000000c 00000000`000003ff ffffdc0f`13e14140 fffff800`475239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac

ffffdc0f`13e140e0 fffff800`46aece67 : 00000000`0000000c 00000000`00000001 ffffbc0e`a56c6e10 ffffbc0e`a7b86cb0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0

ffffdc0f`13e14170 fffff800`46b5eccf : ffffbc0e`00000001 ffffbc0e`a7b86d70 00000000`00000000 ffffbc0e`98e7f000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167

ffffdc0f`13e141e0 fffff800`46a6dec4 : ffffdc0f`00000100 00000000`00000000 ffffdc0f`13e14438 fffff800`46a6ee40 : nt!SmPageRead+0x33

ffffdc0f`13e14230 fffff800`46a6e99d : 00000000`00000002 ffffdc0f`13e142c0 ffffdc0f`13e14438 ffffbc0e`a7b86c60 : nt!MiIssueHardFaultIo+0x10c

ffffdc0f`13e14280 fffff800`46a246c8 : 00000000`c0033333 00000000`00000000 ffff960b`82c5a153 00000000`00000000 : nt!MiIssueHardFault+0x29d

ffffdc0f`13e14340 fffff800`46c0d458 : 00000000`00000000 fffff800`4916b44e ffffbc0e`a155f3e0 00000000`00000001 : nt!MmAccessFault+0x468

ffffdc0f`13e144e0 fffff800`46a3c174 : 00000000`74530006 ffffdc0f`13e146e0 00000000`00000000 ffff960b`4a400100 : nt!KiPageFault+0x358

ffffdc0f`13e14670 fffff800`471b70b9 : ffffbc0e`9c2c72a0 ffffbc0e`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124

ffffdc0f`13e14750 fffff800`46e42213 : ffffbc0e`88805f10 ffffbc0e`9c2c72a0 ffffbc0e`9fa2f450 00000000`00000000 : nt!ExFreePool+0x9

ffffdc0f`13e14780 fffff800`46e45950 : ffffbc0e`8273d4e0 ffffbc0e`9fa2f450 ffffbc0e`a155f3b0 fffff800`471b70b9 : nt!IopDeleteFile+0x1b3

ffffdc0f`13e14800 fffff800`46a45c07 : 00000000`00000000 00000000`00000000 ffff960b`736d3e50 ffffbc0e`a155f3e0 : nt!ObpRemoveObjectRoutine+0x80

ffffdc0f`13e14860 fffff800`46a45b2e : 00000000`00000000 ffffbc0e`9fa2f410 ffffbc0e`9fa2f410 ffffbc0e`9fa2f410 : nt!ObfDereferenceObjectWithTag+0xc7

ffffdc0f`13e148a0 fffff800`46ea2325 : 00000000`00088081 ffffbc0e`9fa2f410 fffff800`47450bc0 00000000`00088081 : nt!HalPutDmaAdapter+0xe

ffffdc0f`13e148d0 fffff800`46b87925 : 00000000`00000001 00000000`00000000 ffffdc0f`13e149a0 ffffbc0e`9fa2f418 : nt!MiSegmentDelete+0x155

ffffdc0f`13e14920 fffff800`46bbd4d9 : 00000000`00000000 fffff800`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1

ffffdc0f`13e149e0 fffff800`46b078e5 : ffffbc0e`88851040 ffffbc0e`88851040 00000000`00000080 fffff800`46bbd3b0 : nt!MiDereferenceSegmentThread+0x129

ffffdc0f`13e14c10 fffff800`46c064b8 : ffffcc00`6d840180 ffffbc0e`88851040 fffff800`46b07890 00000000`00000000 : nt!PspSystemThreadStartup+0x55

ffffdc0f`13e14c60 00000000`00000000 : ffffdc0f`13e15000 ffffdc0f`13e0f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE



MODULE_NAME: Unknown_Module



IMAGE_NAME: Unknown_Image



STACK_COMMAND: .cxr; .ecxr ; kb



FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}



Followup: MachineOwner

---------



*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.



________________________________________________






3rd log:

This one just happened right now, right after turning the PC to sleep & turn it back on right away:










************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff802`19400000 PsLoadedModuleList = 0xfffff802`1a02a770
Debug session time: Sun Jan 21 16:31:18.073 2024 (UTC + 7:00)
System Uptime: 0 days 2:28:09.708
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`197fd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffe8f`456f50b0=000000000000001a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000004df2
Arg3: 00000000ee5d7207
Arg4: 00000000c93136e6

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3843

Key : Analysis.Elapsed.mSec
Value: 3920

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 874

Key : Analysis.Init.Elapsed.mSec
Value: 3419

Key : Analysis.Memory.CommitPeak.Mb
Value: 95

Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a

Key : Bugcheck.Code.LegacyAPI
Value: 0x1a

Key : Failure.Bucket
Value: PAGE_HASH_ERRORS_0x1a_3f

Key : Failure.Hash
Value: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Key : Hypervisor.Enlightenments.Value
Value: 0

Key : Hypervisor.Enlightenments.ValueHex
Value: 0

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 0

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0

Key : Hypervisor.Flags.Phase0InitDone
Value: 0

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 0

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 16908288

Key : Hypervisor.Flags.ValueHex
Value: 1020000

Key : Hypervisor.Flags.VpAssistPage
Value: 0

Key : Hypervisor.Flags.VsmAvailable
Value: 0

Key : Hypervisor.RootFlags.AccessStats
Value: 0

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 0

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0

Key : Hypervisor.RootFlags.MceEnlightened
Value: 0

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0

Key : Hypervisor.RootFlags.Value
Value: 0

Key : Hypervisor.RootFlags.ValueHex
Value: 0

Key : Memory.System.Errors.PageHashErrors
Value: 1

Key : SecureKernel.HalpHvciEnabled
Value: 0

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 4df2

BUGCHECK_P3: ee5d7207

BUGCHECK_P4: c93136e6

FILE_IN_CAB: MEMORY.DMP

ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

STACK_TEXT:
fffffe8f`456f50a8 fffff802`1995dfad : 00000000`0000001a 00000000`0000003f 00000000`00004df2 00000000`ee5d7207 : nt!KeBugCheckEx
fffffe8f`456f50b0 fffff802`1966e241 : ffffd583`26bde4a0 ffffffff`ffffffff 00000000`00000000 ffffd583`18a6b700 : nt!MiValidatePagefilePageHash+0x331
fffffe8f`456f5190 fffff802`1969f25f : fffffe8f`00001000 0000023f`b95d0000 fffffe8f`456f52b0 ffffd583`00000000 : nt!MiWaitForInPageComplete+0x351
fffffe8f`456f5280 fffff802`1969f30d : fffffe8f`456f53f8 ffffd583`18a6b700 fffffe8f`456f53f8 00000000`00000000 : nt!MiPfCompleteInPageSupport+0x83
fffffe8f`456f5370 fffff802`19668e0c : 00000000`00014012 ffffd583`18b090c0 ffffd583`0a894c01 00000000`00000000 : nt!MiPfCompletePrefetchIos+0x51
fffffe8f`456f53a0 fffff802`19762180 : ffffd583`00000000 ffffd583`18b090c0 ffffd583`23fd3930 ffffffff`00000000 : nt!MiPrefetchVirtualMemory+0x36c
fffffe8f`456f54a0 fffff802`1966e0d0 : ffffffff`ffffffff 00040000`0026294f ffffa001`1fdcae80 ffffd583`121e0e20 : nt!MiPrefetchRestOfCluster+0xdc
fffffe8f`456f54f0 fffff802`1966eac5 : fffffe8f`456f57b0 fffffe8f`456f5600 fffffe8f`456f5680 fffff802`00000000 : nt!MiWaitForInPageComplete+0x1e0
fffffe8f`456f55e0 fffff802`196246c8 : 00000000`c0033333 00000000`00000000 0000023f`b95d0000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffffe8f`456f56f0 fffff802`197489a0 : ffffa050`28140000 ffffd583`18a6b700 ffffa050`008fee50 0000023f`b95d0000 : nt!MmAccessFault+0x468
fffffe8f`456f5890 fffff802`1962283c : 00000000`00000001 ffffa001`1fdcae80 fffffe8f`456f5a20 ffffa050`28140a00 : nt!MiFaultInProbeAddress+0xbc
fffffe8f`456f5940 fffff802`1974876c : 00000000`00000094 00000000`00000000 fffffe8f`456f5a89 ffffd583`29a491d0 : nt!MiLockPageLeafPageTable+0x28c
fffffe8f`456f59b0 fffff802`1974867c : fffffe8f`00000000 00000000`00000000 ffffd583`29a491d0 00000000`00000000 : nt!MiProbeLeafFrame+0x1c
fffffe8f`456f59e0 fffff802`196edb29 : 00000000`00040000 fffff802`1963dcda ffffd583`1af528d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0x9c
fffffe8f`456f5af0 fffff802`196ecc0c : 00000000`00040000 fffff802`196159b7 fffffe8f`456f5b60 00000000`00040246 : nt!SmKmProbeAndLockAddress+0x5d
fffffe8f`456f5b20 fffff802`196ecae1 : 00000000`00040000 00000000`00000004 0000023f`b95d0000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
fffffe8f`456f5b90 fffff802`197078e5 : ffffd583`18b090c0 00000000`00000080 fffff802`196eca80 ffffd583`1af9d800 : nt!SmKmStoreHelperWorker+0x61
fffffe8f`456f5c10 fffff802`198064b8 : fffff802`152c6180 ffffd583`18b090c0 fffff802`19707890 ffffd583`07a2a010 : nt!PspSystemThreadStartup+0x55
fffffe8f`456f5c60 00000000`00000000 : fffffe8f`456f6000 fffffe8f`456f0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup: MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefile page(s) while performing in-page operations.
 
Last edited by a moderator:

Lutfij

Titan
Moderator
Welcome to the forums, newcomer!

When posting a thread of troubleshooting nature, it's customary to include your full system's specs. Please list the specs to your build like so:
CPU:
CPU cooler:
Motherboard:
Ram:
SSD/HDD:
GPU:
PSU:
Chassis:
OS:
Monitor:
include the age of the PSU apart from it's make and model. BIOS version for your motherboard at this moment of time.

Just an FYI, you could've included the .dmp file for us to look at as opposed to including a wall of text.