FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000329, physical page number
Arg3: 000001a6c87361c0, zero
Arg4: ffffd401e67b7000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8787
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x329
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xf67c3e5e
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x161c0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0xcec18
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0xffffffffffffffff
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x3d68a
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 329
BUGCHECK_P3: 1a6c87361c0
BUGCHECK_P4: ffffd401e67b7000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffffbb03`597722f8 fffff800`49f23bab : 00000000`0000012b ffffffff`c00002c4 00000000`00000329 000001a6`c87361c0 : nt!KeBugCheckEx
ffffbb03`59772300 fffff800`49e63054 : 00000000`00000200 00000000`c00002c4 ffffd401`e67b7000 00000000`00000002 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
ffffbb03`59772350 fffff800`49d5ff54 : 00000000`00000004 ffffbb03`59772560 00000000`00000000 00000000`0000037f : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1030e0
ffffbb03`59772430 fffff800`49d5fdd2 : 00000000`00000001 00000000`000161c0 ffffab0f`000161c0 ffffab0f`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
ffffbb03`59772480 fffff800`49d5fbfb : 00000000`ffffffff ffffab0f`8b3e3000 ffffbb03`59772560 ffffab0f`968ced10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
ffffbb03`59772520 fffff800`49d5fa41 : ffffab0f`8b3e3000 00000000`00000000 00000000`00000001 ffffab0f`89847788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
ffffbb03`597725d0 fffff800`49d5f951 : ffffab0f`89846000 ffffab0f`968ced10 ffffab0f`8b3e3000 ffffab0f`898479b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffbb03`59772650 fffff800`49c69e28 : ffffab0f`8bce26c0 ffffab0f`89846000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffbb03`59772680 fffff800`49d62eb1 : fffff800`49d5f930 ffffbb03`59772730 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbb03`597726f0 fffff800`49d4b9c1 : ffffbb03`597727f0 fffff800`4a18db78 ffffab0f`89846000 ffffbb03`59772940 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcd
ffffbb03`597727c0 fffff800`49d4b5a7 : 00000000`0000000c ffffab0f`89846000 ffffbb03`59772870 ffffab0f`968ced10 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a5
ffffbb03`59772810 fffff800`49d621c3 : 00000000`0000000c ffffab0f`968ced10 00000000`00000001 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffbb03`597728a0 fffff800`49d6389f : ffffab0f`00000001 ffffab0f`9541f8e0 00000000`00000000 ffffab0f`89846000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffbb03`59772910 fffff800`49c8e0ab : ffffab0f`987c55c0 00000000`00000001 ffffab0f`987c5680 fffff800`49c74ef6 : nt!SmPageRead+0x33
ffffbb03`59772960 fffff800`49c8d7a9 : 00000000`00000002 ffffbb03`597729f0 ffffbb03`59772b58 ffffe5f2`c3e7fcf8 : nt!MiIssueHardFaultIo+0x117
ffffbb03`597729b0 fffff800`49c72fab : 00000000`c0033333 00000000`00000001 00000f9f`f3e81022 000042a2`23f90000 : nt!MiIssueHardFault+0x489
ffffbb03`59772a60 fffff800`49dcf520 : ffffab0f`8bce26c0 00000026`9f9fde60 00000000`00000000 ffffab0f`8d944060 : nt!MmAccessFault+0x40b
ffffbb03`59772c00 00007ff9`9dd34824 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000026`9f9fe8d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`9dd34824
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80049c69e8a-fffff80049c69e8f 6 bytes - nt!KeExpandKernelStackAndCalloutInternal+da
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049c74f8a-fffff80049c74f8f 6 bytes - nt!MiUnlockWorkingSetShared+fa (+0xb100)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049c8d87a-fffff80049c8d87f 6 bytes - nt!MiIssueHardFault+55a (+0x188f0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049c8e0d2-fffff80049c8e0d7 6 bytes - nt!MiIssueHardFaultIo+13e (+0x858)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049c8e0fe-fffff80049c8e103 6 bytes - nt!CcReferenceSharedCacheMapFileObject+26 (+0x2c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049c8e15a-fffff80049c8e15f 6 bytes - nt!CcSlowReferenceSharedCacheMapFileObject+56 (+0x5c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049c8e19a-fffff80049c8e19f 6 bytes - nt!ObFastReferenceObjectLocked+3a (+0x40)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d38f4a-fffff80049d38f4f 6 bytes - nt!MmChargeResources+86 (+0xaadb0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d38f8e-fffff80049d38f93 6 bytes - nt!MmReleaseResourceCharge+3e (+0x44)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d48cbe-fffff80049d48cc3 6 bytes - nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxWorkItemComplete+196 (+0xfd30)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d4baae-fffff80049d4bab3 6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+292 (+0x2df0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5f98a-fffff80049d5f98f 6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+5a (+0x13edc)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5f9b6-fffff80049d5f9bb 6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadComplete+26 (+0x2c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5fad2-fffff80049d5fad7 6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+116 (+0x11c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5fb2a-fffff80049d5fb2f 6 bytes - nt!ST_STORE<SM_TRAITS>::StDmLazyWorkItemQueue+52 (+0x58)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5fc46-fffff80049d5fc4b 6 bytes - nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+116 (+0x11c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5fe6e-fffff80049d5fe73 6 bytes - nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+222 (+0x228)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5feae-fffff80049d5feb3 6 bytes - nt!SmSetThreadSystemPagePriority+3a (+0x40)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d5ff6e-fffff80049d5ff73 6 bytes - nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+ba (+0xc0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d62286-fffff80049d6228b 6 bytes - nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+22a (+0x2318)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d62f3a-fffff80049d62f3f 6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+156 (+0xcb4)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d62fae-fffff80049d62fb0 3 bytes - nt!ST_STORE<SM_TRAITS>::StDmCombineTargetCompare+6e (+0x74)
[ cc cc cc:4c 87 00 ]
fffff80049d638aa-fffff80049d638af 6 bytes - nt!SmPageRead+3e (+0x8fc)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d638fa-fffff80049d638ff 6 bytes - nt!RtlpMakeXpressCallback+4a (+0x50)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d7527a-fffff80049d7527f 6 bytes - nt!EmpCheckErrataList+a (+0x11980)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049d752b6-fffff80049d752bb 6 bytes - nt!IoAllocateErrorLogEntry+36 (+0x3c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80049dc14ba-fffff80049dc14bb 2 bytes - nt!ZwWaitLowEventPair+2a (+0x4c204)
[ 84 00:4c 87 ]
fffff80049dc14bd-fffff80049dc14bf 3 bytes - nt!ZwWaitLowEventPair+2d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc14da-fffff80049dc14db 2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
[ 84 00:4c 87 ]
fffff80049dc14dd-fffff80049dc14df 3 bytes - nt!KiBugCheckReturn+19 (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc160a-fffff80049dc160b 2 bytes - nt!KeBugCheckEx+12a (+0x12d)
[ 84 00:4c 87 ]
fffff80049dc160d-fffff80049dc160f 3 bytes - nt!KeBugCheckEx+12d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc170a-fffff80049dc170b 2 bytes - nt!KeContextToKframes+fa (+0xfd)
[ 84 00:4c 87 ]
fffff80049dc170d-fffff80049dc170f 3 bytes - nt!KeContextToKframes+fd (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc175a-fffff80049dc175b 2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
[ 84 00:4c 87 ]
fffff80049dc175d-fffff80049dc175f 3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc182a-fffff80049dc182f 6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
[ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
fffff80049dc19aa-fffff80049dc19ab 2 bytes - nt!KiSaveProcessorControlState+17a (+0x180)
[ 84 00:4c 87 ]
fffff80049dc19ad-fffff80049dc19af 3 bytes - nt!KiSaveProcessorControlState+17d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc1a2a-fffff80049dc1a2f 6 bytes - nt!KiRestoreDebugRegisterState+7a (+0x7d)
[ cc 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
fffff80049dc1bba-fffff80049dc1bbb 2 bytes - nt!KiSaveDebugRegisterState+18a (+0x190)
[ 84 00:4c 87 ]
fffff80049dc1bbd-fffff80049dc1bbf 3 bytes - nt!KiSaveDebugRegisterState+18d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc1bca-fffff80049dc1bcf 6 bytes - nt!KeGetCurrentStackPointer+a (+0x0d)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff80049dc1bda-fffff80049dc1bdb 2 bytes - nt!KeResetLegacyFloatingPointState+a (+0x10)
[ 1f 80:4c 87 ]
fffff80049dc1bdd-fffff80049dc1bdf 3 bytes - nt!KeResetLegacyFloatingPointState+d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc1bea-fffff80049dc1bef 6 bytes - nt!KeSaveLegacyFloatingPointControlWord+a (+0x0d)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff80049dc1c0a-fffff80049dc1c0b 2 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1a (+0x20)
[ 84 00:4c 87 ]
fffff80049dc1c0d-fffff80049dc1c0f 3 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80049dc1eda-fffff80049dc1edb 2 bytes - nt!NtContinue+2ca (+0x2cd)
[ 84 00:4c 87 ]
fffff80049dc1edd-fffff80049dc1edf 3 bytes - nt!NtContinue+2cd (+0x03)
[ 00 00 00:98 c3 90 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
263 errors : !nt (fffff80049c69e8a-fffff80049f247f7)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fc3dbb4d2b72f, Reserved
Arg2: 0000000000000000, Reserved
Arg3: d3d448fc4b873134, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3983
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10495
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 109
BUGCHECK_P1: a39fc3dbb4d2b72f
BUGCHECK_P2: 0
BUGCHECK_P3: d3d448fc4b873134
BUGCHECK_P4: 101
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffbb02`1a4daf98 00000000`00000000 : 00000000`00000109 a39fc3db`b4d2b72f 00000000`00000000 d3d448fc`4b873134 : nt!KeBugCheckEx
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 000000000000031b, physical page number
Arg3: 000001ee8ddb64c0, zero
Arg4: ffff8680994a0000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3311
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10927
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x31b
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0xe8d394ea
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x164c0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0xb6d04
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0xffffffffffffffff
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x148eb1
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 31b
BUGCHECK_P3: 1ee8ddb64c0
BUGCHECK_P4: ffff8680994a0000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
fffffd8f`4f1d22f8 fffff803`56d23bab : 00000000`0000012b ffffffff`c00002c4 00000000`0000031b 000001ee`8ddb64c0 : nt!KeBugCheckEx
fffffd8f`4f1d2300 fffff803`56c63054 : 00000000`00000200 00000000`c00002c4 ffff8680`994a0000 00000000`00000002 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffffd8f`4f1d2350 fffff803`56b5ff54 : 00000000`00000004 fffffd8f`4f1d2560 00000000`00000000 00000000`00002c60 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1030e0
fffffd8f`4f1d2430 fffff803`56b5fdd2 : 00000000`00000001 00000000`000164c0 ffffaf8c`000164c0 ffffaf8c`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffffd8f`4f1d2480 fffff803`56b5fbfb : ffffaf8c`ffffffff ffffaf8c`79164000 fffffd8f`4f1d2560 ffffaf8c`86613190 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
fffffd8f`4f1d2520 fffff803`56b5fa41 : ffffaf8c`79164000 00000000`00000000 00000000`00000001 ffffaf8c`769c4788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
fffffd8f`4f1d25d0 fffff803`56b5f951 : ffffaf8c`769c3000 ffffaf8c`86613190 ffffaf8c`79164000 ffffaf8c`769c49b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffffd8f`4f1d2650 fffff803`56a69e28 : ffffaf8c`7671f080 ffffaf8c`769c3000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffffd8f`4f1d2680 fffff803`56b62eb1 : fffff803`56b5f930 fffffd8f`4f1d2730 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffd8f`4f1d26f0 fffff803`56b4b9c1 : fffffd8f`4f1d27f0 fffff803`56f8db78 ffffaf8c`769c3000 fffffd8f`4f1d2940 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcd
fffffd8f`4f1d27c0 fffff803`56b4b5a7 : 00000000`0000000c ffffaf8c`769c3000 fffffd8f`4f1d2870 ffffaf8c`86613190 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a5
fffffd8f`4f1d2810 fffff803`56b621c3 : 00000000`0000000c ffffaf8c`86613190 00000000`00000003 00000000`00000003 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
fffffd8f`4f1d28a0 fffff803`56b6389f : ffffaf8c`00000003 ffffaf8c`863dcb50 00000000`00000000 ffffaf8c`769c3000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
fffffd8f`4f1d2910 fffff803`56a8e0ab : ffffaf8c`75f35580 00000000`00000001 ffffaf8c`75f35640 fffff803`56a74ef6 : nt!SmPageRead+0x33
fffffd8f`4f1d2960 fffff803`56a8d7a9 : 00000000`00000002 fffffd8f`4f1d29f0 fffffd8f`4f1d2b58 fffff57a`80537148 : nt!MiIssueHardFaultIo+0x117
fffffd8f`4f1d29b0 fffff803`56a72fab : 00000000`c0033333 00000000`00000001 0000014d`c52989b0 00000000`00000004 : nt!MiIssueHardFault+0x489
fffffd8f`4f1d2a60 fffff803`56bcf520 : ffffaf8c`7671f080 00000000`00000000 00000000`0000001a ffffaf8c`75f41c60 : nt!MmAccessFault+0x40b
fffffd8f`4f1d2c00 00007ff6`f2af8690 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
0000004b`551ff2b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`f2af8690
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fb
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a00859f3c9b967, Reserved
Arg2: b3b714e0464cf224, Reserved
Arg3: ffffc9016202cce3, Failure type dependent information
Arg4: 000000000000002a, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4405
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8535
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 109
BUGCHECK_P1: a3a00859f3c9b967
BUGCHECK_P2: b3b714e0464cf224
BUGCHECK_P3: ffffc9016202cce3
BUGCHECK_P4: 2a
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
DPC_STACK_BASE: FFFFF80440C6EFB0
STACK_TEXT:
fffff804`40c6eb28 00000000`00000000 : 00000000`00000109 a3a00859`f3c9b967 b3b714e0`464cf224 ffffc901`6202cce3 : nt!KeBugCheckEx
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff73f47e982f0
Arg3: 0080000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7150
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff73f47e982f0
BUGCHECK_P3: 80000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff9d05`7ce60cd8 fffff801`2d0252ee : 00000000`0000001a 00000000`00041792 fffff73f`47e982f0 00800000`00000000 : nt!KeBugCheckEx
ffff9d05`7ce60ce0 fffff801`2ceac9e7 : 00000000`00000000 fffff73f`47e982f0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffff9d05`7ce60df0 fffff801`2ceacea1 : ffff9d05`7ce61240 fffff77b`9fa3f4c0 00000000`00000000 0a000000`cec5d867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff9d05`7ce60eb0 fffff801`2ceacea1 : ffff9d05`7ce61240 fffff77b`bdcfd1f8 00000000`00000000 0a000000`bb3de867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9d05`7ce60f70 fffff801`2ceacea1 : ffff9d05`7ce61240 fffff77b`bddee7e8 fffff77b`00000000 0a000001`6235c867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9d05`7ce61030 fffff801`2ceac62c : ffff9d05`7ce61240 fffff77b`bddeef70 ffff9d05`00000000 ffff9d05`7ce611b9 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9d05`7ce610f0 fffff801`2ceaaa98 : ffff9d05`7ce61240 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff9d05`7ce611f0 fffff801`2ceb8bf0 : ffffffff`ffffffff ffffca8b`27d423f8 ffff9d05`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff9d05`7ce61590 fffff801`2d3c7a5d : ffffca8b`25cbc080 ffffca8b`25cbc080 ffffca8b`2c30d520 ffffca8b`27d423f0 : nt!MiDeleteVad+0x860
ffff9d05`7ce61750 fffff801`2d3d9e14 : ffffca8b`2c30d520 ffffca8b`27da7470 ffffca8b`25cbc080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9d05`7ce61780 fffff801`2d3d98cf : ffffca8b`2c302bc0 ffffca8b`2c302bc0 ffffca8b`27d42080 fffff801`2d26a400 : nt!MiCleanVad+0x30
ffff9d05`7ce617b0 fffff801`2d438771 : ffffffff`00000000 ffffffff`ffffffff ffff9d05`7ce61a01 ffffca8b`27d42080 : nt!MmCleanProcessAddressSpace+0x137
ffff9d05`7ce61830 fffff801`2d45e6d3 : ffffca8b`27d42080 ffffda8a`0004d060 ffff9d05`7ce61a59 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff9d05`7ce618b0 fffff801`2d4cd143 : 00000000`00000000 ffffb480`42be7101 0000008b`2a7e2000 00000000`00000000 : nt!PspExitThread+0x60b
ffff9d05`7ce619c0 fffff801`2ce3e551 : ffffca8b`25cbc080 ffff9d05`00000000 ffffca8b`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff9d05`7ce61a00 fffff801`2cfc5a60 : 0000008b`2c7f0001 ffff9d05`7ce61ac0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff9d05`7ce61ac0 fffff801`2cfd2dbf : ffffca8b`25cbc080 0000008b`2c7ff3f8 ffff9d05`7ce61c18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff9d05`7ce61c00 00007ffa`7a47c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000008b`2c7ff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`7a47c144
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------