FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 00000000000006a6, physical page number
Arg3: 00000180c9465990, zero
Arg4: ffffc480ed5bb000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2531
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8G3PQ7K
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8270
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x6a6
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0x48966e29
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x15990
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x599b4
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0x1d11b3
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x1ac5d7
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 6a6
BUGCHECK_P3: 180c9465990
BUGCHECK_P4: ffffc480ed5bb000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffff9304`a08fb208 fffff806`701a4bb2 : 00000000`0000012b ffffffff`c00002c4 00000000`000006a6 00000180`c9465990 : nt!KeBugCheckEx
ffff9304`a08fb210 fffff806`7002b76f : 00000000`00000001 00000000`c00002c4 ffffc480`ed5bb000 00000000`000ed99f : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffff9304`a08fb270 fffff806`6fe70bc5 : 00000000`00000004 fffff806`6fe7072e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1bab87
ffff9304`a08fb330 fffff806`6fe70494 : 00000000`00000001 00000000`00015990 00000000`00000000 ffffad8f`00009000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff9304`a08fb380 fffff806`6fe71090 : fffff806`ffffffff ffffad8f`e0329000 ffff9304`a08fb460 ffffad8f`df8e8490 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff9304`a08fb420 fffff806`6fe71301 : ffffc480`ec6ed730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff9304`a08fb4d0 fffff806`6fe713c1 : ffffad8f`dbc1e000 ffffad8f`df8e8490 ffffad8f`e0329000 ffffad8f`dbc1f9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff9304`a08fb550 fffff806`6fe37218 : ffffad8f`dcef6040 ffffad8f`dbc1e000 00000000`00000000 ffffad8f`d8a1b8a0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff9304`a08fb580 fffff806`6ff0e223 : fffff806`6fe713a0 ffff9304`a08fb620 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9304`a08fb5f0 fffff806`6fe63008 : ffff9304`a08fb6f0 00000000`31526d73 00000000`000003ff fffff806`709229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff9304`a08fb6c0 fffff806`6fe62a3c : 00000000`0000000c 00000000`000003ff ffff9304`a08fb770 fffff806`709229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff9304`a08fb710 fffff806`6ff0cb1f : 00000000`0000000c 00000000`00000009 ffffad8f`df8e8490 ffffad8f`d8a1b8a0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff9304`a08fb7a0 fffff806`6ff4ae5f : ffffad8f`00000009 ffffad8f`d8a1b960 00000000`00000000 ffffad8f`dbc1e000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff9304`a08fb810 fffff806`6fe95ea4 : ffffad8f`d8a1b850 ffffad8f`dd4a7740 ffff9304`a08fba58 fffff806`6fe9429c : nt!SmPageRead+0x33
ffff9304`a08fb860 fffff806`6fe940f8 : 00000000`00000002 ffff9304`a08fb8f0 00000000`00000000 ffffad8f`d8a1b850 : nt!MiIssueHardFaultIo+0x10c
ffff9304`a08fb8b0 fffff806`6fe12d68 : 00000000`c0033333 00000000`00000001 00000229`d303c478 00000000`00000000 : nt!MiIssueHardFault+0x3e8
ffff9304`a08fb960 fffff806`6ffebc1e : ffffad8f`dcef6040 00000000`00000001 00000229`d2ff0000 ffff9304`a08fbb80 : nt!MmAccessFault+0x468
ffff9304`a08fbb00 00007ffe`d0d34c29 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000ab`d32ff8d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d0d34c29
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+10a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10a
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc7bffed87088
Arg3: 0000000008000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8G3PQ7K
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2232
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffc7bffed87088
BUGCHECK_P3: 8000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffb709`520cef58 fffff807`28a54286 : 00000000`0000001a 00000000`00041792 ffffc7bf`fed87088 00000000`08000000 : nt!KeBugCheckEx
ffffb709`520cef60 fffff807`288c217f : ffff9609`76f1f700 00007ffd`b0e10000 ffffc7bf`00000002 ffffb709`520cf150 : nt!MiDeleteVa+0x191f46
ffffb709`520cf050 fffff807`288a789f : 00000000`00000000 00000000`00000060 ffff9609`76f1f7c0 00000000`00000000 : nt!MiDeletePagablePteRange+0x31f
ffffb709`520cf4d0 fffff807`28beab99 : ffff9609`76f1f080 00000000`00000000 ffff9609`00000000 ffff9609`00000001 : nt!MiDeleteVad+0x41f
ffffb709`520cf600 fffff807`28c66dc0 : ffff9609`76d64d40 ffff9609`6cf04a10 ffff9609`761f1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb709`520cf630 fffff807`28c67c73 : ffff9609`76d64ca0 ffff9609`76d64ca0 ffff9609`76d64d40 ffff9609`76f1f080 : nt!MiCleanVad+0x30
ffffb709`520cf660 fffff807`28cba247 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9609`76f1f080 : nt!MmCleanProcessAddressSpace+0x137
ffffb709`520cf6e0 fffff807`28be8e32 : ffff9609`76f1f080 ffffcf06`81a30090 ffffb709`520cf920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffb709`520cf760 fffff807`28cf5298 : 00000000`000000ff 00000000`00000101 00000000`00000000 000000c2`8d2fb000 : nt!PspExitThread+0x5f6
ffffb709`520cf860 fffff807`2882a507 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffb709`520cf8a0 fffff807`289e2100 : 00000000`00000001 ffffb709`520cf950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffb709`520cf950 fffff807`289ef51f : ffffb709`520cfb18 00000000`00000000 ffff9609`761f1080 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb709`520cfa90 00007ffd`b1eab8e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c2`8dcff708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b1eab8e4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc7bffed87088
Arg3: 0000000008000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8G3PQ7K
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2213
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffc7bffed87088
BUGCHECK_P3: 8000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffb709`520cef58 fffff807`28a54286 : 00000000`0000001a 00000000`00041792 ffffc7bf`fed87088 00000000`08000000 : nt!KeBugCheckEx
ffffb709`520cef60 fffff807`288c217f : ffff9609`76f1f700 00007ffd`b0e10000 ffffc7bf`00000002 ffffb709`520cf150 : nt!MiDeleteVa+0x191f46
ffffb709`520cf050 fffff807`288a789f : 00000000`00000000 00000000`00000060 ffff9609`76f1f7c0 00000000`00000000 : nt!MiDeletePagablePteRange+0x31f
ffffb709`520cf4d0 fffff807`28beab99 : ffff9609`76f1f080 00000000`00000000 ffff9609`00000000 ffff9609`00000001 : nt!MiDeleteVad+0x41f
ffffb709`520cf600 fffff807`28c66dc0 : ffff9609`76d64d40 ffff9609`6cf04a10 ffff9609`761f1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb709`520cf630 fffff807`28c67c73 : ffff9609`76d64ca0 ffff9609`76d64ca0 ffff9609`76d64d40 ffff9609`76f1f080 : nt!MiCleanVad+0x30
ffffb709`520cf660 fffff807`28cba247 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9609`76f1f080 : nt!MmCleanProcessAddressSpace+0x137
ffffb709`520cf6e0 fffff807`28be8e32 : ffff9609`76f1f080 ffffcf06`81a30090 ffffb709`520cf920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffb709`520cf760 fffff807`28cf5298 : 00000000`000000ff 00000000`00000101 00000000`00000000 000000c2`8d2fb000 : nt!PspExitThread+0x5f6
ffffb709`520cf860 fffff807`2882a507 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffb709`520cf8a0 fffff807`289e2100 : 00000000`00000001 ffffb709`520cf950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffb709`520cf950 fffff807`289ef51f : ffffb709`520cfb18 00000000`00000000 ffff9609`761f1080 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb709`520cfa90 00007ffd`b1eab8e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c2`8dcff708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b1eab8e4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
AULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page. This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 00000000000002ca, physical page number
Arg3: 00000206f7b90000, zero
Arg4: ffffce81673f3000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8G3PQ7K
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17437
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : BlackBox.SmDecompressionFailure.CompressedSize
Value: 0x2ca
Key : BlackBox.SmDecompressionFailure.CompressionFormat
Value: 0x3
Key : BlackBox.SmDecompressionFailure.SourceDataHash
Value: 0x653a2075
Key : BlackBox.SmDecompressionFailure.SourceDataOffset
Value: 0x0
Key : BlackBox.SmDecompressionFailure.SourcePFN1
Value: 0x1d11b0
Key : BlackBox.SmDecompressionFailure.SourcePFN2
Value: 0xffffffffffffffff
Key : BlackBox.SmDecompressionFailure.TargetPFN
Value: 0x1c9808
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 12b
BUGCHECK_P1: ffffffffc00002c4
BUGCHECK_P2: 2ca
BUGCHECK_P3: 206f7b90000
BUGCHECK_P4: ffffce81673f3000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffff9c84`2874f208 fffff807`46fa4bb2 : 00000000`0000012b ffffffff`c00002c4 00000000`000002ca 00000206`f7b90000 : nt!KeBugCheckEx
ffff9c84`2874f210 fffff807`46e2b76f : ffff9a80`00000001 00000000`c00002c4 ffffce81`673f3000 fffff807`46c58d29 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffff9c84`2874f270 fffff807`46c70bc5 : 00000000`00000004 fffff807`46c7072e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1bab87
ffff9c84`2874f330 fffff807`46c70494 : 00000000`00000001 00000000`00000000 00000000`00000000 ffffb98d`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff9c84`2874f380 fffff807`46c71090 : 00000000`ffffffff ffffb98d`dfb07000 ffff9c84`2874f460 ffffb98d`e2bf19d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff9c84`2874f420 fffff807`46c71301 : ffffce81`667d6730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff9c84`2874f4d0 fffff807`46c713c1 : ffffb98d`dd77c000 ffffb98d`e2bf19d0 ffffb98d`dfb07000 ffffb98d`dd77d9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff9c84`2874f550 fffff807`46c37218 : ffffb98d`de6b8080 ffffb98d`dd77c000 00000000`00000000 ffffb98d`e32ea3a0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff9c84`2874f580 fffff807`46d0e223 : fffff807`46c713a0 ffff9c84`2874f620 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9c84`2874f5f0 fffff807`46c63008 : ffff9c84`2874f6f0 00000000`31526d73 00000000`000003ff fffff807`477229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff9c84`2874f6c0 fffff807`46c62a3c : 00000000`0000000c 00000000`000003ff ffff9c84`2874f770 fffff807`477229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff9c84`2874f710 fffff807`46d0cb1f : 00000000`0000000c 00000000`00000010 ffffb98d`e2bf19d0 ffffb98d`e32ea3a0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff9c84`2874f7a0 fffff807`46d4ae5f : ffffb98d`00000010 ffffb98d`e32ea460 00000000`00000000 ffffb98d`dd77c000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff9c84`2874f810 fffff807`46c95ea4 : ffffb98d`e32ea350 ffffb98d`dde32700 ffff9c84`2874fa58 fffff807`46c9429c : nt!SmPageRead+0x33
ffff9c84`2874f860 fffff807`46c940f8 : 00000000`00000002 ffff9c84`2874f8f0 00000000`00000000 ffffb98d`e32ea350 : nt!MiIssueHardFaultIo+0x10c
ffff9c84`2874f8b0 fffff807`46c12d68 : 00000000`c0033333 00000000`00000001 000002b8`33377b0c 00000000`00000001 : nt!MiIssueHardFault+0x3e8
ffff9c84`2874f960 fffff807`46debc1e : 000002b8`00000000 000000f4`00000001 00007ffe`eed415f8 ffff9c84`2874fb80 : nt!MmAccessFault+0x468
ffff9c84`2874fb00 00007ffe`ee4a1bba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000f4`b3cfaac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ee4a1bba
SYMBOL_NAME: nt!ST_STORE<SM_TRAITS>::StDmPageError+10a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10a
FAILURE_BUCKET_ID: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff94062aa86eb0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8007fe41920, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8G3PQ7K
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 59680
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff94062aa86eb0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8007fe41920
BUGCHECK_P4: 2
READ_ADDRESS: fffff800808fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8008080f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8008080f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff94062aa86eb0
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffb98e44f39b80 -- (.trap 0xffffb98e44f39b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff94062aa86eb8 rbx=0000000000000000 rcx=0000000095130000
rdx=0000000000130000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007fe41920 rsp=ffffb98e44f39d10 rbp=ffffb98e44f39d88
r8=3326a10410bcd6fa r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!RtlpHpVsChunkSplit+0x590:
fffff800`7fe41920 8b4bf8 mov ecx,dword ptr [rbx-8] ds:ffffffff`fffffff8=????????
Resetting default scope
STACK_TEXT:
ffffb98e`44f398d8 fffff800`80035d15 : 00000000`00000050 ffff9406`2aa86eb0 00000000`00000000 ffffb98e`44f39b80 : nt!KeBugCheckEx
ffffb98e`44f398e0 fffff800`7fe12d00 : 000000fe`00000000 00000000`00000000 ffffb98e`44f39c00 00000000`00000000 : nt!MiSystemFault+0x1ad5c5
ffffb98e`44f399e0 fffff800`7ffebc1e : 00000000`00000000 00000000`00000001 00000000`00000000 fffff780`00000000 : nt!MmAccessFault+0x400
ffffb98e`44f39b80 fffff800`7fe41920 : 00000000`00000000 ffffb98e`44f39d88 00000000`00000022 00000000`00000022 : nt!KiPageFault+0x35e
ffffb98e`44f39d10 fffff800`7fe411ba : 00000004`00000000 ffff9406`39604c90 00000000`00000013 ffffdb09`00000000 : nt!RtlpHpVsChunkSplit+0x590
ffffb98e`44f39dd0 fffff800`7ff13f49 : 00000000`00000000 00000000`00000210 ffff9406`2be00280 00000000`00000000 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffb98e`44f39e30 fffff800`7fe44920 : fffff800`80857f40 ffffb98e`44f39f91 00000000`00000001 00000000`00000008 : nt!RtlpHpVsContextMultiAlloc+0x69
ffffb98e`44f39eb0 fffff800`805c2094 : ffffdb09`510e3000 ffffdb09`53903000 00000000`31306956 fffff800`86e38c59 : nt!ExAllocateHeapPool+0xa70
ffffb98e`44f39ff0 fffff800`890219b6 : 00000000`00000005 ffffb98e`44f3a1f0 00000000`00000002 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffb98e`44f3a040 fffff800`8908b0ab : 00000000`00000005 00000000`00000002 00000000`01001002 00000000`00000000 : dxgmms2!operator new+0x2e
ffffb98e`44f3a070 fffff800`8908966e : 00000000`00000000 ffffdb09`56d5d440 ffffb98e`00000000 00000000`00060000 : dxgmms2!VIDMM_GLOBAL::CreateOneAllocation+0x39b
ffffb98e`44f3a270 fffff800`890216c2 : ffffdb09`00000000 00000000`00000000 ffffdb09`575356a0 fffff800`87047544 : dxgmms2!VIDMM_GLOBAL::CreateAllocation+0xaa
ffffb98e`44f3a330 fffff800`86f35503 : ffffb98e`44f3a900 ffff0858`ab34d8bb 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCreateAllocation+0x72
ffffb98e`44f3a3d0 ffffb98e`44f3a900 : ffff0858`ab34d8bb 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl+0x105503
ffffb98e`44f3a3d8 ffff0858`ab34d8bb : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb98e`44f3a448 : 0xffffb98e`44f3a900
ffffb98e`44f3a3e0 00000000`00000000 : 00000000`00000000 00000000`00000000 ffffb98e`44f3a448 ffffb98e`44f3a900 : 0xffff0858`ab34d8bb
SYMBOL_NAME: dxgmms2!operator new+2e
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2e
FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms2!operator_new
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a06302ce-5000-8a2d-005e-b183536b2481}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffffbbbffe786380
Arg3: 810000009284e005
Arg4: ffffdf8796040920
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8G3PQ7K
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9508
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41201
BUGCHECK_P2: ffffbbbffe786380
BUGCHECK_P3: 810000009284e005
BUGCHECK_P4: ffffdf8796040920
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchFilterHost.exe
STACK_TEXT:
ffff8407`3a637548 fffff801`6f44bf86 : 00000000`0000001a 00000000`00041201 ffffbbbf`fe786380 81000000`9284e005 : nt!KeBugCheckEx
ffff8407`3a637550 fffff801`6f2b5d34 : 00000000`00001000 00000000`00000000 00000000`00000000 ffffdf87`96040920 : nt!MiGetPageProtection+0x195526
ffff8407`3a6375b0 fffff801`6f2a3c1f : 00000000`00000000 00007ffc`f0c70000 00000000`00000282 fffff801`6f21eb3b : nt!MiQueryAddressState+0x2f4
ffff8407`3a6377d0 fffff801`6f66a5dc : ffff8407`3a630000 00000000`00000000 ffffdf87`00000000 ffffdf87`00000000 : nt!MiQueryAddressSpan+0xcf
ffff8407`3a637890 fffff801`6f669d85 : 00000000`00000000 00000000`00000000 00000000`10000000 00000000`10000000 : nt!MmQueryVirtualMemory+0x83c
ffff8407`3a637a40 fffff801`6f3ef478 : 00000000`00000000 00000000`00000001 00000000`000000e0 ffff8407`3a637b80 : nt!NtQueryVirtualMemory+0x25
ffff8407`3a637a90 00007ffc`f10ab1f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007b`87c7ef18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`f10ab1f4
SYMBOL_NAME: nt!MiGetPageProtection+195526
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 195526
FAILURE_BUCKET_ID: 0x1a_41201_nt!MiGetPageProtection
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c1fe3b27-3ba8-d99e-656f-85f3d58dc669}
Followup: MachineOwner
---------