MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000002de5e
Arg3: 00000000a344b185
Arg4: 00000000d93cf3c2
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7749
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs5_release
Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z
Key : WER.OS.Version
Value: 10.0.17763.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 2de5e
BUGCHECK_P3: a344b185
BUGCHECK_P4: d93cf3c2
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffcd86e285a060 -- (.trap 0xffffcd86e285a060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcd86e285a208 rbx=0000000000000000 rcx=ffffd301ce796000
rdx=ffffd301ce796000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800569fe0d0 rsp=ffffcd86e285a1f8 rbp=0000000000000000
r8=0000026e8171b7e0 r9=0000000000000667 r10=0000026e8171be47
r11=0000026e8171bdf1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x40:
fffff800`569fe0d0 418b00 mov eax,dword ptr [r8] ds:0000026e`8171b7e0=????????
Resetting default scope
STACK_TEXT:
ffffcd86`e2859c38 fffff800`56b7c792 : 00000000`0000001a 00000000`0000003f 00000000`0002de5e 00000000`a344b185 : nt!KeBugCheckEx
ffffcd86`e2859c40 fffff800`56a87284 : ffffa00e`f76d35e0 ffffffff`ffffffff 00000000`00000000 ffffa00e`f76d36d0 : nt!MiValidatePagefilePageHash+0x30e
ffffcd86`e2859d20 fffff800`568c732d : 00000000`00000002 ffffcd86`00000000 ffffcd86`e2859e68 ffff85c2`00000000 : nt!MiWaitForInPageComplete+0x1c0564
ffffcd86`e2859e10 fffff800`568e7a8d : 00000000`c0033333 00000000`00000000 0000026e`8171b7e0 ffffa00e`f63b5040 : nt!MiIssueHardFault+0x1ad
ffffcd86`e2859ec0 fffff800`56a6fb83 : 00000000`00000000 ffff85e9`80000000 ffffcd86`e285a488 001ce5fe`000d975c : nt!MmAccessFault+0x3ed
ffffcd86`e285a060 fffff800`569fe0d0 : ffffd301`ce796000 ffffa00e`f63b3050 fffff800`569e1cf0 ffffd301`ce796000 : nt!KiPageFault+0x343
ffffcd86`e285a1f8 fffff800`569e1cf0 : ffffd301`ce796000 ffffd301`ce796000 00000000`00000002 0000026e`8171b7e0 : nt!RtlDecompressBufferXpressLz+0x40
ffffcd86`e285a210 fffff800`569f32ba : 00000000`00000000 00000000`00000001 00000000`00000000 0000026e`81700000 : nt!RtlDecompressBufferEx+0x60
ffffcd86`e285a260 fffff800`569f3154 : 00000000`00000004 ffffcd86`e285a470 00000000`00000000 00000000`0000015f : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x146
ffffcd86`e285a340 fffff800`569f2f02 : 00000000`00000001 00000000`0001b7e0 00000000`0001b7e0 00000000`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
ffffcd86`e285a390 fffff800`569f2d2d : 00000000`ffffffff ffffa00e`ee662000 ffffcd86`e285a470 ffffa00e`f7aa9ca0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
ffffcd86`e285a430 fffff800`569f1e45 : ffffa00e`ee662000 00000000`00000000 00000000`00000001 ffffa00e`f63b4788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc1
ffffcd86`e285a4e0 fffff800`569f1581 : ffffa00e`f63b3000 ffffa00e`f7aa9ca0 ffffa00e`ee662000 ffffa00e`f63b49b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffcd86`e285a560 fffff800`56916118 : ffffa00e`f6234080 ffffa00e`f63b3000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffcd86`e285a590 fffff800`569fb155 : fffff800`569f1560 ffffcd86`e285a640 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffcd86`e285a600 fffff800`569fa7a4 : ffffcd86`e285a700 fffff800`569daeed 00000000`00000000 fffff800`569f6ef4 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffcd86`e285a6d0 fffff800`569fa37e : 00000000`00000000 00000000`00000000 ffffcd86`e285a780 ffffa00e`f7aa9ca0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1b4
ffffcd86`e285a720 fffff800`569f6cbc : 00000000`0000000c 00000000`00000010 ffffa00e`f7aa9ca0 ffffa00e`f27da440 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xce
ffffcd86`e285a7a0 fffff800`569fb09a : 00000000`00000010 ffffa00e`f27da500 ffffa00e`00000000 ffffa00e`f63b3000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x168
ffffcd86`e285a810 fffff800`568c6c67 : ffffa00e`f6f8c980 00000000`00000001 ffffa00e`f6f8ca40 fffff800`568e99a6 : nt!SmPageRead+0x2e
ffffcd86`e285a860 fffff800`568c756d : 00000000`00000002 ffffcd86`e285a8f0 ffffcd86`e285aa58 ffff85c2`c07603a8 : nt!MiIssueHardFaultIo+0x11f
ffffcd86`e285a8b0 fffff800`568e7a8d : 00000000`c0033333 00000000`00000001 000001d8`0ea20008 ffffa00e`f6f8c480 : nt!MiIssueHardFault+0x3ed
ffffcd86`e285a960 fffff800`56a6fb83 : 00000000`00000010 ffffcd86`e285ab80 000001d8`0748f628 ffffa00e`f6dc7d20 : nt!MmAccessFault+0x3ed
ffffcd86`e285ab00 00007ff7`bd790d55 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x343
000000b8`d40ce040 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`bd790d55
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.17763.1
BUILDLAB_STR: rs5_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffac0e1f291300, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4937
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 37763
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs5_release
Key : WER.OS.Timestamp
Value: 2018-09-14T14:34:00Z
Key : WER.OS.Version
Value: 10.0.17763.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffac0e1f291300
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: 0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000
ERROR_CODE: (NTSTATUS) 0x1f359040 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
fffffb8a`bbebbd98 fffff805`26cb41dd : 00000000`000000ef ffffac0e`1f291300 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffb8a`bbebbda0 fffff805`26b8e97b : 00000000`00000001 fffff805`26576fc9 ffffac0e`1f291300 fffff805`26576ef8 : nt!PspCatchCriticalBreak+0xfd
fffffb8a`bbebbe40 fffff805`26a6f7c8 : ffffac0e`00000000 00000000`00000000 ffffac0e`1f291300 ffffac0e`1f2915d8 : nt!PspTerminateAllThreads+0x1cb0ff
fffffb8a`bbebbeb0 fffff805`26a6f599 : ffffffff`ffffffff fffffb8a`bbebbfe0 ffffac0e`1f291300 fffff805`26563000 : nt!PspTerminateProcess+0xe0
fffffb8a`bbebbef0 fffff805`26668285 : 00000000`00000b68 ffffac0e`1f359040 ffffac0e`1f291300 fffffb8a`bbebc130 : nt!NtTerminateProcess+0xa9
fffffb8a`bbebbf60 fffff805`2665ad40 : fffff805`266da76e fffffb8a`bbebca58 fffffb8a`bbebca58 fffffb8a`bbebc130 : nt!KiSystemServiceCopyEnd+0x25
fffffb8a`bbebc0f8 fffff805`266da76e : fffffb8a`bbebca58 fffffb8a`bbebca58 fffffb8a`bbebc130 00000000`000183a0 : nt!KiServiceLinkage
fffffb8a`bbebc100 fffff805`26668942 : 00000000`00001000 fffffb8a`bbebcb00 ffff8000`00000000 000000f8`f4f00ff8 : nt!KiDispatchException+0x12cafe
fffffb8a`bbebc920 fffff805`26664c68 : 00000000`00000001 fffffb8a`bbebcb80 00007fff`d93583a0 ffffac0e`1f31ac01 : nt!KiExceptionDispatch+0xc2
fffffb8a`bbebcb00 00007fff`e705679c : 000000f8`f4f01f90 00007fff`e6ff4709 000000f8`f4f01730 000000f8`f4f01240 : nt!KiPageFault+0x428
000000f8`f4f01000 000000f8`f4f01f90 : 00007fff`e6ff4709 000000f8`f4f01730 000000f8`f4f01240 00000000`00000000 : 0x00007fff`e705679c
000000f8`f4f01008 00007fff`e6ff4709 : 000000f8`f4f01730 000000f8`f4f01240 00000000`00000000 00000000`00000000 : 0x000000f8`f4f01f90
000000f8`f4f01010 000000f8`f4f01730 : 000000f8`f4f01240 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e6ff4709
000000f8`f4f01018 000000f8`f4f01240 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000000f8`f4f01730
000000f8`f4f01020 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000000f8`f4f01240
SYMBOL_NAME: nt!PspCatchCriticalBreak+fd
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.17763.107
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fd
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_1f359040_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.17763.1
BUILDLAB_STR: rs5_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f3eb9033-16cc-efda-6e53-36dbb633c465}
Followup: MachineOwner
---------