MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000041917
Arg3: 0000000057b3c95c
Arg4: 00000000f4b331d3
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 69379
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 41917
BUGCHECK_P3: 57b3c95c
BUGCHECK_P4: f4b331d3
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffb580cc83b010 -- (.trap 0xffffb580cc83b010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb580cc83b268 rbx=0000000000000000 rcx=ffffb580cf931000
rdx=ffffb580cf931000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80056323ed0 rsp=ffffb580cc83b1a0 rbp=ffffb580cf931000
r8=0000000007b6e580 r9=0000000000000461 r10=ffffb580cf931ea0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff800`56323ed0 418b00 mov eax,dword ptr [r8] ds:00000000`07b6e580=????????
Resetting default scope
STACK_TEXT:
ffffb580`cc83ab28 fffff800`563aba0a : 00000000`0000001a 00000000`0000003f 00000000`00041917 00000000`57b3c95c : nt!KeBugCheckEx
ffffb580`cc83ab30 fffff800`5627588a : ffffc585`79c79930 00000000`0000e000 ffffb580`cc83ac80 ffffc585`79c79910 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffb580`cc83ac00 fffff800`56220fe5 : ffffb580`cc83b010 ffffb580`cc83adc0 fffffa00`0003db70 ffffc585`79c79910 : nt!MiWaitForInPageComplete+0x48a
ffffb580`cc83ad30 fffff800`56283a00 : 00000000`c0033333 ffffb580`cc83b010 00000000`00000000 ffffb580`cc83b010 : nt!MiIssueHardFault+0x1b5
ffffb580`cc83ae10 fffff800`5635f5fc : 00000006`7b3fab00 00000101`00000000 00000000`00000000 00020019`0000000c : nt!MmAccessFault+0xca0
ffffb580`cc83b010 fffff800`56323ed0 : ffffb580`cf931000 ffffc585`7ba54050 00000000`07b6e580 fffff800`562bf3e4 : nt!KiPageFault+0x13c
ffffb580`cc83b1a0 fffff800`562bf3e4 : 00000000`00001000 fffff800`5645e2e0 ffffb580`cf931000 fffff800`562ed147 : nt!RtlDecompressBufferXpressLz+0x50
ffffb580`cc83b1c0 fffff800`56316a5b : 00000000`00000002 ffffb580`cf931000 00000000`07b6e580 ffffb580`cf931000 : nt!RtlDecompressBufferEx+0x64
ffffb580`cc83b210 fffff800`563168d3 : 00000000`00000000 ffffc585`7ba54050 00000000`00000000 00000000`0001e580 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157
ffffb580`cc83b2f0 fffff800`56316c61 : 00000000`00000001 00000000`0000213f 00000000`00000001 ffffb580`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffb580`cc83b340 fffff800`56316da0 : 00000000`ffffffff ffffc585`7cafe000 ffffb580`cc83b428 ffffc585`7c843a50 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffb580`cc83b3e0 fffff800`56317bc2 : fffffa7d`00000000 ffffc585`7c843a50 ffffc585`79428ea0 ffffc585`7c843a50 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffb580`cc83b4a0 fffff800`56317d09 : ffffc585`7ba54000 ffffb580`cc83b5b0 fffff800`56317ce8 fffff800`56317ce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffb580`cc83b4f0 fffff800`56270e75 : ffffc585`7c96a7c0 ffffb580`cc83b5b0 ffffc585`79428ea0 fffff800`562bdfec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffb580`cc83b520 fffff800`56310f29 : 00000000`00000003 ffffc585`7cafe000 ffffc585`7ba54000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffb580`cc83b570 fffff800`5631432c : ffffb580`cc83b670 ffffb580`cc83b7b0 ffffc585`7ba54000 fffff800`56311102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffb580`cc83b640 fffff800`56314017 : ffffc585`7ba54000 ffffc585`7c843a50 fffff800`565c7a40 ffffb580`cc83b7b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffb580`cc83b690 fffff800`56310dbf : 00000000`0000000c ffffc585`79428f50 ffffc585`7c843a50 00000000`00000003 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffb580`cc83b710 fffff800`56317ce2 : ffffc585`00000003 ffffc585`79428f50 ffffb580`00000000 ffffc585`7ba54000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffb580`cc83b780 fffff800`562204c9 : 00000000`80000000 ffffc585`796f3901 fffffa3f`ffffff78 fffff400`10804310 : nt!SmPageRead+0x2e
ffffb580`cc83b7d0 fffff800`56220f8d : 00000000`00000002 ffffb580`cc83bb00 ffffc585`79428e50 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffb580`cc83b860 fffff800`56283a00 : 00000000`c0033333 ffffb580`cc83bb00 00000000`00000004 ffffb580`cc83bb00 : nt!MiIssueHardFault+0x15d
ffffb580`cc83b900 fffff800`5635f5fc : ffffc585`7c96a7c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xca0
ffffb580`cc83bb00 00007ff9`105b891f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
00000035`8c7ff1f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`105b891f
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fe5e21968b517, Reserved
Arg2: b3b6f2686be8bc99, Reserved
Arg3: fffff809ca761f60, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 50338
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 109
BUGCHECK_P1: a39fe5e21968b517
BUGCHECK_P2: b3b6f2686be8bc99
BUGCHECK_P3: fffff809ca761f60
BUGCHECK_P4: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffe501`8fc6a038 00000000`00000000 : 00000000`00000109 a39fe5e2`1968b517 b3b6f268`6be8bc99 fffff809`ca761f60 : nt!KeBugCheckEx
CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis
fffff809ca761f60-fffff809ca761f6d 14 bytes - ndis!NdisMSendNetBufferListsComplete
[ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 65 ]
fffff809ca7625b0-fffff809ca7625c2 19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
[ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 9f ]
33 errors : !ndis (fffff809ca761f60-fffff809ca7625c2)
SYMBOL_NAME: ndis!NdisMSendNetBufferListsComplete+0
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
IMAGE_VERSION: 10.0.14393.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: 0x109_1_ndis!NdisMSendNetBufferListsComplete
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1b628e81-9e60-c449-83ff-7d5579c29c83}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffcae540000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8020c231b94, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 114908
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffcae540000000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8020c231b94
READ_ADDRESS: fffff8020c5c1338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020c50ccf8: Unable to get Flags value from nt!KdVersionBlock
ffffcae540000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
DPC_STACK_BASE: FFFFF8020E227FB0
TRAP_FRAME: fffff8020e2274f0 -- (.trap 0xfffff8020e2274f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffcae540000000
rdx=fffff8020e227790 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8020c231b94 rsp=fffff8020e227680 rbp=fffff8020e2276c0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff8020e2273a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExFreeLargePool+0x74:
fffff802`0c231b94 488b0408 mov rax,qword ptr [rax+rcx] ds:ffffcae5`40000000=????????????????
Resetting default scope
STACK_TEXT:
fffff802`0e2273a8 fffff802`0c36f129 : 00000000`0000000a ffffcae5`40000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`0e2273b0 fffff802`0c36d707 : 00000000`00000001 fffff804`26bc3f45 ffff9b0d`4189c710 fffff802`0e227560 : nt!KiBugCheckDispatch+0x69
fffff802`0e2274f0 fffff802`0c231b94 : ffff9b0d`3fcd7030 ffff9b0d`3f9941a0 fffff802`0e227820 ffff8580`f1580004 : nt!KiPageFault+0x247
fffff802`0e227680 fffff802`0c465885 : 00000000`00000000 fffff802`0e227790 00000000`00000000 00001dff`00000000 : nt!ExFreeLargePool+0x74
fffff802`0e227750 fffff804`2939d211 : 00000000`00000000 ffff9b0d`3ff194c0 00000000`00000000 ffff78c3`59acd547 : nt!ExFreePoolWithTag+0x4f5
fffff802`0e227830 00000000`00000000 : ffff9b0d`3ff194c0 00000000`00000000 ffff78c3`59acd547 ffff9b0d`00000001 : athw10x+0x28d211
SYMBOL_NAME: athw10x+28d211
MODULE_NAME: athw10x
IMAGE_NAME: athw10x.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 28d211
FAILURE_BUCKET_ID: AV_athw10x!unknown_function
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b4216231-6f01-b0f6-2216-c84e0358aa2f}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000064813
Arg3: 00000000710a1374
Arg4: 00000000e7ef55ba
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2859
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17975
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 64813
BUGCHECK_P3: 710a1374
BUGCHECK_P4: e7ef55ba
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
STACK_TEXT:
ffffbf01`23c46448 fffff801`6ffbda0a : 00000000`0000001a 00000000`0000003f 00000000`00064813 00000000`710a1374 : nt!KeBugCheckEx
ffffbf01`23c46450 fffff801`6fe8788a : ffffe682`990df6f0 00000000`00020000 ffffbf01`23c46580 ffffe682`990df6d0 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffbf01`23c46520 fffff801`6fe32fe5 : ffffbf01`23c46971 ffffbf01`23c466e0 ffff8700`00105480 ffffe682`990df6d0 : nt!MiWaitForInPageComplete+0x48a
ffffbf01`23c46650 fffff801`6fe95a00 : 00000000`c0033333 ffffbf01`23c46971 00000000`00000000 ffffbf01`23c46971 : nt!MiIssueHardFault+0x1b5
ffffbf01`23c46730 fffff801`6fe88a98 : 00000000`00000001 fffff801`6fe584e1 ffffbf01`203c0180 ffffbf01`ffffffff : nt!MmAccessFault+0xca0
ffffbf01`23c46930 fffff801`6ff2dcdf : 00000000`00000000 ffffe682`90575440 ffffe682`962a47c0 00000000`00000000 : nt!MiProbeLeafFrame+0x3e8
ffffbf01`23c46a30 fffff801`6ff2aa9c : 00000000`00000000 ffffe682`96285838 ffffe682`96285878 ffffe682`96285878 : nt!MmStoreProbeAndLockPages+0x87
ffffbf01`23c46b10 fffff801`6ff29fbd : 00000000`00040000 00000000`00000080 00000000`00000080 fffff801`71e31070 : nt!SmKmProbeAndLockAddress+0x5c
ffffbf01`23c46b40 fffff801`6feba182 : 00000000`00040000 00000000`00000080 ffffe682`962a47c0 00000000`00000004 : nt!SmKmStoreHelperCommandProcess+0xc9
ffffbf01`23c46ba0 fffff801`6feba4bd : ffffe682`962a47c0 00000000`00000080 fffff801`6feba10c ffffe682`96285838 : nt!SmKmStoreHelperWorker+0x76
ffffbf01`23c46c10 fffff801`6ff6d456 : fffff801`70160180 ffffe682`962a47c0 fffff801`6feba47c 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffffbf01`23c46c60 00000000`00000000 : ffffbf01`23c47000 ffffbf01`23c41000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: ffff8e0bb3498834, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000bb3600, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2749
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7184
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: ffff8e0bb3498834
BUGCHECK_P3: 0
BUGCHECK_P4: bb3600
EXCEPTION_PARAMETER2: 0000000000bb3600
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffca00`bb67f088 fffff803`8d1fa14e : 00000000`0000001e ffffffff`80000003 ffff8e0b`b3498834 00000000`00000000 : nt!KeBugCheckEx
ffffca00`bb67f090 fffff803`8d1cc202 : 00000000`00bb35af 00000000`00bb35b9 fffff803`8d39ba40 fffff803`8d113820 : nt! ?? ::FNODOBFM::`string'+0x29f8e
ffffca00`bb67f760 fffff803`8d1c9873 : 00000000`00000000 fffff803`8d077000 ffffca00`bb67faf0 fffff803`8d2c2885 : nt!KiExceptionDispatch+0xc2
ffffca00`bb67f940 ffff8e0b`b3498835 : 00000000`001ef6c3 ffff8e0b`b2f96000 ffff8e0b`b2f96880 ffffca00`bb67fb70 : nt!KiBreakpointTrap+0xf3
ffffca00`bb67fad8 00000000`001ef6c3 : ffff8e0b`b2f96000 ffff8e0b`b2f96880 ffffca00`bb67fb70 ffff8e0b`b34ac1ee : 0xffff8e0b`b3498835
ffffca00`bb67fae0 ffff8e0b`b2f96000 : ffff8e0b`b2f96880 ffffca00`bb67fb70 ffff8e0b`b34ac1ee ffff8e0b`b348a000 : 0x1ef6c3
ffffca00`bb67fae8 ffff8e0b`b2f96880 : ffffca00`bb67fb70 ffff8e0b`b34ac1ee ffff8e0b`b348a000 00000000`000007dd : 0xffff8e0b`b2f96000
ffffca00`bb67faf0 ffffca00`bb67fb70 : ffff8e0b`b34ac1ee ffff8e0b`b348a000 00000000`000007dd 00000000`000007dd : 0xffff8e0b`b2f96880
ffffca00`bb67faf8 ffff8e0b`b34ac1ee : ffff8e0b`b348a000 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffffca00`bb67fb70
ffffca00`bb67fb00 ffff8e0b`b348a000 : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffff8e0b`b34ac1ee
ffffca00`bb67fb08 00000000`000007dd : 00000000`000007dd 00000000`000007dd 00000000`000007dd ffffca00`bb67fb38 : 0xffff8e0b`b348a000
ffffca00`bb67fb10 00000000`000007dd : 00000000`000007dd 00000000`000007dd ffffca00`bb67fb38 ffffca00`bb67fb38 : 0x7dd
ffffca00`bb67fb18 00000000`000007dd : 00000000`000007dd ffffca00`bb67fb38 ffffca00`bb67fb38 00000000`000007dd : 0x7dd
ffffca00`bb67fb20 00000000`000007dd : ffffca00`bb67fb38 ffffca00`bb67fb38 00000000`000007dd 00000000`000007dd : 0x7dd
ffffca00`bb67fb28 ffffca00`bb67fb38 : ffffca00`bb67fb38 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0x7dd
ffffca00`bb67fb30 ffffca00`bb67fb38 : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`000007dd : 0xffffca00`bb67fb38
ffffca00`bb67fb38 00000000`000007dd : 00000000`000007dd 00000000`000007dd 00000000`000007dd 00000000`00000c95 : 0xffffca00`bb67fb38
ffffca00`bb67fb40 00000000`000007dd : 00000000`000007dd 00000000`000007dd 00000000`00000c95 00000000`001ef6c3 : 0x7dd
ffffca00`bb67fb48 00000000`000007dd : 00000000`000007dd 00000000`00000c95 00000000`001ef6c3 00000000`00000000 : 0x7dd
ffffca00`bb67fb50 00000000`000007dd : 00000000`00000c95 00000000`001ef6c3 00000000`00000000 fffff803`8d077000 : 0x7dd
ffffca00`bb67fb58 00000000`00000c95 : 00000000`001ef6c3 00000000`00000000 fffff803`8d077000 ffff8e0b`b34ae408 : 0x7dd
ffffca00`bb67fb60 00000000`001ef6c3 : 00000000`00000000 fffff803`8d077000 ffff8e0b`b34ae408 ffff8e0b`b2f97e80 : 0xc95
ffffca00`bb67fb68 00000000`00000000 : fffff803`8d077000 ffff8e0b`b34ae408 ffff8e0b`b2f97e80 00000000`00000000 : 0x1ef6c3
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29f8e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.14393.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 29f8e
FAILURE_BUCKET_ID: 0x1E_80000003_nt!_??_::FNODOBFM::_string_
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {85ddfc4f-36e8-8725-6d57-f514f47381f8}
Followup: MachineOwner
---------
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 97274
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 19
BUGCHECK_P1: 22
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
POOL_ADDRESS: fffff803741c2338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037410dcf8: Unable to get Flags value from nt!KdVersionBlock
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
DPC_STACK_BASE: FFFFF80375E3BFB0
STACK_TEXT:
fffff803`75e3b678 fffff803`73f7e5d0 : 00000000`00000019 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff803`75e3b680 fffff803`74066885 : 00000000`00000000 fffff803`75e3b790 00000000`00000000 00001e00`00000000 : nt! ?? ::FNODOBFM::`string'+0xa410
fffff803`75e3b750 fffff807`99e5d211 : 00000000`00000000 ffff8587`73e73610 00000000`00000000 fffff647`b6ddfdaf : nt!ExFreePoolWithTag+0x4f5
fffff803`75e3b830 00000000`00000000 : ffff8587`73e73610 00000000`00000000 fffff647`b6ddfdaf 00000000`00000001 : athw10x+0x28d211
SYMBOL_NAME: athw10x+28d211
MODULE_NAME: athw10x
IMAGE_NAME: athw10x.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 28d211
FAILURE_BUCKET_ID: 0x19_22_athw10x!unknown_function
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6389468c-1c97-ca58-db47-c5c836243ee4}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80a9385ff77, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 76121
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: a
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80a9385ff77
WRITE_ADDRESS: fffff80163433338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016337ecf8: Unable to get Flags value from nt!KdVersionBlock
000000000000000a
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
DPC_STACK_BASE: FFFFD80080DADFB0
TRAP_FRAME: ffffd80080dacff0 -- (.trap 0xffffd80080dacff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffff808e53203870
rdx=0000000000000040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80a9385ff77 rsp=ffffd80080dad180 rbp=ffffd80080dad200
r8=0000000000000000 r9=0000000000000040 r10=0000000000000001
r11=ffffd80080dac610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ndis!NdisFreeNetBufferListContext+0x27:
fffff80a`9385ff77 664101780a add word ptr [r8+0Ah],di ds:00000000`0000000a=????
Resetting default scope
STACK_TEXT:
ffffd800`80dacea8 fffff801`631e1129 : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd800`80daceb0 fffff801`631df707 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd800`80dacff0 fffff80a`9385ff77 : 00000000`00000004 ffffd800`80dad388 fffff80a`93d3f580 fffff801`630ecf82 : nt!KiPageFault+0x247
ffffd800`80dad180 fffff80a`93d29874 : ffff808e`53203870 00000000`00000000 00000000`0001d274 fffff80a`93d21f25 : ndis!NdisFreeNetBufferListContext+0x27
ffffd800`80dad1b0 fffff80a`93d260c8 : 00000000`00000000 ffffd800`80dad2a0 00000000`00000001 00000000`00000000 : wfplwfs!L2FreeNetBufferListContext+0x74
ffffd800`80dad1e0 fffff80a`93d21db0 : ffff808e`4f07bad0 ffffd800`80dad2c9 00000000`00000000 ffffd800`80dad368 : wfplwfs!L2ProcessClassifyOut+0xb4
ffffd800`80dad210 fffff80a`93d21c03 : ffffd800`80dad302 00000000`00000000 ffffd800`80dad371 ffff808e`4f07bad0 : wfplwfs!L2p802_3IsNblPermitted+0x178
ffffd800`80dad310 fffff80a`93d219d2 : ffff808e`537da001 ffff808e`537da010 ffffd800`80dad4d0 ffffd800`80dad510 : wfplwfs!L2802_3IsNetBufferListPermitted+0x103
ffffd800`80dad3c0 fffff80a`93d23ef1 : 00000000`00000002 00000000`00000038 ffffd800`80dad518 ffff808e`537da010 : wfplwfs!L2InspectNetBufferLists+0x10a
ffffd800`80dad480 fffff80a`93853e97 : 00000000`00000001 ffff808e`53203870 00000000`00008000 00000000`00000000 : wfplwfs!LwfUpperRecvNetBufferLists+0x81
ffffd800`80dad510 fffff80a`93852c2d : ffff808e`537db3d0 ffffd800`80dad660 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x47
ffffd800`80dad560 ffff808e`538fc063 : ffff9c88`00000000 00000000`00000570 00000000`00000000 00000000`00000001 : ndis!NdisMIndicateReceiveNetBufferLists+0x67d
ffffd800`80dad750 ffff9c88`00000000 : 00000000`00000570 00000000`00000000 00000000`00000001 00000000`00000001 : 0xffff808e`538fc063
ffffd800`80dad758 00000000`00000570 : 00000000`00000000 00000000`00000001 00000000`00000001 fffff80a`968141a9 : 0xffff9c88`00000000
ffffd800`80dad760 00000000`00000000 : 00000000`00000001 00000000`00000001 fffff80a`968141a9 00000000`000000c3 : 0x570
SYMBOL_NAME: wfplwfs!L2FreeNetBufferListContext+74
MODULE_NAME: wfplwfs
IMAGE_NAME: wfplwfs.sys
IMAGE_VERSION: 10.0.14393.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 74
FAILURE_BUCKET_ID: AV_wfplwfs!L2FreeNetBufferListContext
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {01ce207b-35ec-3415-694f-dc8dc30eedcb}
Followup: MachineOwner
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ff366e3caa5ea, Reserved
Arg2: b3b6ffed364b5254, Reserved
Arg3: fffff80919351f60, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13771
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 109
BUGCHECK_P1: a39ff366e3caa5ea
BUGCHECK_P2: b3b6ffed364b5254
BUGCHECK_P3: fffff80919351f60
BUGCHECK_P4: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd280`6bba6678 00000000`00000000 : 00000000`00000109 a39ff366`e3caa5ea b3b6ffed`364b5254 fffff809`19351f60 : nt!KeBugCheckEx
CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis
fffff80919351f60-fffff80919351f6d 14 bytes - ndis!NdisMSendNetBufferListsComplete
[ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 35 ]
fffff809193525b0-fffff809193525c2 19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
[ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 6f ]
33 errors : !ndis (fffff80919351f60-fffff809193525c2)
SYMBOL_NAME: ndis!NdisMSendNetBufferListsComplete+0
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
IMAGE_VERSION: 10.0.14393.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: 0x109_1_ndis!NdisMSendNetBufferListsComplete
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1b628e81-9e60-c449-83ff-7d5579c29c83}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000007df8f
Arg3: 00000000ec709c10
Arg4: 00000000d350d9bb
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3062
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 51193
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 7df8f
BUGCHECK_P3: ec709c10
BUGCHECK_P4: d350d9bb
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffc201ba256260 -- (.trap 0xffffc201ba256260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000060 rbx=0000000000000000 rcx=000002b97a83b000
rdx=000002b97a841000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80163693e01 rsp=ffffc201ba2563f0 rbp=0000000000000002
r8=0000000000000000 r9=000002b97ae1acd0 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ProbeForWrite+0x41:
fffff801`63693e01 0fb601 movzx eax,byte ptr [rcx] ds:000002b9`7a83b000=??
Resetting default scope
STACK_TEXT:
ffffc201`ba255288 fffff801`63429a0a : 00000000`0000001a 00000000`0000003f 00000000`0007df8f 00000000`ec709c10 : nt!KeBugCheckEx
ffffc201`ba255290 fffff801`632f388a : ffff8285`62d18810 00000000`00010000 ffffc201`ba2553c0 ffff8285`62d187f0 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffc201`ba255360 fffff801`6329efe5 : ffffc201`ba255770 ffffc201`ba255520 fffffb80`0001c0b8 ffff8285`62d187f0 : nt!MiWaitForInPageComplete+0x48a
ffffc201`ba255490 fffff801`63301a00 : 00000000`c0033333 ffffc201`ba255770 00000000`00000000 ffffc201`ba255770 : nt!MiIssueHardFault+0x1b5
ffffc201`ba255570 fffff801`633dd5fc : 00000000`00000001 00000000`00000000 fffffb80`5d4b27f8 ffffed00`039d1610 : nt!MmAccessFault+0xca0
ffffc201`ba255770 fffff801`633a1ed0 : ffffc201`bb48d000 ffff8285`649ac050 00000000`03817710 fffff801`6333d3e4 : nt!KiPageFault+0x13c
ffffc201`ba255900 fffff801`6333d3e4 : 00000000`00001000 fffff801`634dc2e0 ffffc201`bb48d000 000000ba`964ff630 : nt!RtlDecompressBufferXpressLz+0x50
ffffc201`ba255920 fffff801`63394a5b : 00000000`00000002 ffffc201`bb48d000 00000000`03817710 ffffc201`bb48d000 : nt!RtlDecompressBufferEx+0x64
ffffc201`ba255970 fffff801`633948d3 : 00000000`00000000 ffff8285`649ac050 00000000`00000000 00000000`00007710 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157
ffffc201`ba255a50 fffff801`63394c61 : 00000000`00000001 00000000`000034da 00000000`00000001 ffffc201`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffc201`ba255aa0 fffff801`63394da0 : 00000000`ffffffff ffff8285`67160000 ffffc201`ba255b88 ffff8285`648d5180 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffc201`ba255b40 fffff801`63395bc2 : 000002b9`00000000 ffff8285`648d5180 00000000`000007c3 ffff8285`648d5180 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffc201`ba255c00 fffff801`63395d09 : ffff8285`649ac000 ffffc201`ba255d10 fffff801`63395ce8 fffff801`63395ce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffc201`ba255c50 fffff801`632eee75 : ffff8285`662ce7c0 ffffc201`ba255d10 ffff8285`661058c0 fffff801`6333bfec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffc201`ba255c80 fffff801`6338ef29 : 00000000`00000003 ffff8285`67160000 ffff8285`649ac000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffc201`ba255cd0 fffff801`6339232c : ffffc201`ba255dd0 ffffc201`ba255f10 ffff8285`649ac000 fffff801`6338f102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffc201`ba255da0 fffff801`63392017 : ffff8285`649ac000 ffff8285`648d5180 fffff801`63645a40 ffffc201`ba255f10 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffc201`ba255df0 fffff801`6338edbf : 00000000`0000000c ffff8285`66105970 ffff8285`648d5180 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffc201`ba255e70 fffff801`63395ce2 : ffff8285`00000001 ffff8285`66105970 ffffc201`00000000 ffff8285`649ac000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffc201`ba255ee0 fffff801`6329e4c9 : 00000000`00000000 00020019`0000000c 0000000b`ffffffff 00000002`00000000 : nt!SmPageRead+0x2e
ffffc201`ba255f30 fffff801`6329ef8d : 00000000`00000002 ffffc201`ba256260 ffff8285`66105870 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffc201`ba255fc0 fffff801`63301a00 : 00000000`c0033333 ffffc201`ba256260 00000000`00000000 ffffc201`ba256260 : nt!MiIssueHardFault+0x15d
ffffc201`ba256060 fffff801`633dd5fc : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`00000001 : nt!MmAccessFault+0xca0
ffffc201`ba256260 fffff801`63693e01 : 00000000`00000000 fffff801`633926a4 00000000`00000000 ffff8285`661058c0 : nt!KiPageFault+0x13c
ffffc201`ba2563f0 fffff80c`213c2d4d : ffff8285`648d5180 00000000`00000000 ffff8285`64320900 ffff8285`5d224b20 : nt!ProbeForWrite+0x41
ffffc201`ba256420 fffff80c`213c2560 : 000000ba`964fe680 00000000`00000070 00000000`00000000 00000000`00000070 : nsiproxy!NsippProbeAndAllocateParameters+0x4ad
ffffc201`ba2565f0 fffff80c`213c2251 : 00000000`00000000 ffff8285`6181a560 ffff8285`6181a490 00000000`00000000 : nsiproxy!NsippEnumerateObjectsAllParameters+0x170
ffffc201`ba2567e0 fffff801`6368aa20 : ffff8285`5e313ef0 00000000`00000000 00000000`00000000 fffff801`634d60a2 : nsiproxy!NsippDispatch+0x61
ffffc201`ba256820 fffff801`63689904 : 00008737`00000000 ffff8285`5e313e04 00000000`00000000 ffffc201`ba256b80 : nt!IopSynchronousServiceTail+0x1a0
ffffc201`ba2568e0 fffff801`63689286 : 00000000`00000008 00000000`0000061c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x674
ffffc201`ba256a20 fffff801`633df070 : ffff8285`662ce7c0 000000ba`964fe4e8 ffffc201`ba256aa8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffc201`ba256a90 00007fff`8c944f34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1d9
000000ba`964fe578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`8c944f34
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39ff6e39aa27a7d, Reserved
Arg2: b3b70369ed2281ff, Reserved
Arg3: fffff8069a051f60, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
8 : Object type
9 : A processor IVT
a : Modification of a system service function
b : A generic session data region
c : Modification of a session function or .pdata
d : Modification of an import table
e : Modification of a session import table
f : Ps Win32 callout modification
10 : Debug switch routine modification
11 : IRP allocator modification
12 : Driver call dispatcher modification
13 : IRP completion dispatcher modification
14 : IRP deallocator modification
15 : A processor control register
16 : Critical floating point control register modification
17 : Local APIC modification
18 : Kernel notification callout modification
19 : Loaded module list modification
1a : Type 3 process list corruption
1b : Type 4 process list corruption
1c : Driver object corruption
1d : Executive callback object modification
1e : Modification of module padding
1f : Modification of a protected process
20 : A generic data region
21 : A page hash mismatch
22 : A session page hash mismatch
23 : Load config directory modification
24 : Inverted function table modification
25 : Session configuration modification
26 : An extended processor control register
27 : Type 1 pool corruption
28 : Type 2 pool corruption
29 : Type 3 pool corruption
2a : Type 4 pool corruption
2b : Modification of a function or .pdata
2c : Image integrity corruption
2d : Processor misconfiguration
2e : Type 5 process list corruption
2f : Process shadow corruption
30 : Retpoline code page corruption
101 : General pool corruption
102 : Modification of win32k.sys
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25722
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 109
BUGCHECK_P1: a39ff6e39aa27a7d
BUGCHECK_P2: b3b70369ed2281ff
BUGCHECK_P3: fffff8069a051f60
BUGCHECK_P4: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff9400`7edff038 00000000`00000000 : 00000000`00000109 a39ff6e3`9aa27a7d b3b70369`ed2281ff fffff806`9a051f60 : nt!KeBugCheckEx
CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis
fffff8069a051f60-fffff8069a051f6d 14 bytes - ndis!NdisMSendNetBufferListsComplete
[ 48 8b c4 48 89 50 10 48:ff 25 00 00 00 00 9b 05 ]
fffff8069a0525b0-fffff8069a0525c2 19 bytes - ndis!NdisMIndicateReceiveNetBufferLists (+0x650)
[ 4c 8b dc 55 57 49 8d ab:ff 25 00 00 00 00 2a 3f ]
33 errors : !ndis (fffff8069a051f60-fffff8069a0525c2)
SYMBOL_NAME: ndis!NdisMSendNetBufferListsComplete+0
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
IMAGE_VERSION: 10.0.14393.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: 0x109_1_ndis!NdisMSendNetBufferListsComplete
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1b628e81-9e60-c449-83ff-7d5579c29c83}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 0000000000008a8c
Arg3: 00000000203ac9d3
Arg4: 00000000e1ab1bda
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15902
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: 8a8c
BUGCHECK_P3: 203ac9d3
BUGCHECK_P4: e1ab1bda
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffffd2010f37a010 -- (.trap 0xffffd2010f37a010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd2010f37a268 rbx=0000000000000000 rcx=ffffd2010fc80000
rdx=ffffd2010fc80000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801d11a7ed0 rsp=ffffd2010f37a1a0 rbp=ffffd2010fc80000
r8=000000000091f400 r9=0000000000000768 r10=ffffd2010fc80ea0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff801`d11a7ed0 418b00 mov eax,dword ptr [r8] ds:00000000`0091f400=????????
Resetting default scope
STACK_TEXT:
ffffd201`0f379b28 fffff801`d122fa0a : 00000000`0000001a 00000000`0000003f 00000000`00008a8c 00000000`203ac9d3 : nt!KeBugCheckEx
ffffd201`0f379b30 fffff801`d10f988a : ffffa909`ee6ad030 00000000`00010000 ffffd201`0f379c80 ffffa909`ee6ad010 : nt! ?? ::FNODOBFM::`string'+0x4684a
ffffd201`0f379c00 fffff801`d10a4fe5 : ffffd201`0f37a010 ffffd201`0f379dc0 ffffcf80`000048f8 ffffa909`ee6ad010 : nt!MiWaitForInPageComplete+0x48a
ffffd201`0f379d30 fffff801`d1107a00 : 00000000`c0033333 ffffd201`0f37a010 00000000`00000000 ffffd201`0f37a010 : nt!MiIssueHardFault+0x1b5
ffffd201`0f379e10 fffff801`d11e35fc : 00000000`ffffffff 00000000`00000000 ffff9883`e89ff5d0 00000000`00000000 : nt!MmAccessFault+0xca0
ffffd201`0f37a010 fffff801`d11a7ed0 : ffffd201`0fc80000 ffffa909`edac6050 00000000`0091f400 fffff801`d11433e4 : nt!KiPageFault+0x13c
ffffd201`0f37a1a0 fffff801`d11433e4 : 00000000`00001000 fffff801`d12e22e0 ffffd201`0fc80000 fffff801`d1171147 : nt!RtlDecompressBufferXpressLz+0x50
ffffd201`0f37a1c0 fffff801`d119aa5b : 00000000`00000002 ffffd201`0fc80000 00000000`0091f400 ffffd201`0fc80000 : nt!RtlDecompressBufferEx+0x64
ffffd201`0f37a210 fffff801`d119a8d3 : 00000000`00000000 ffffa909`edac6050 00000000`00000000 00000000`0000f400 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x157
ffffd201`0f37a2f0 fffff801`d119ac61 : 00000000`00000001 00000000`00000075 00000000`00000001 ffffd201`0000b000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x7b
ffffd201`0f37a340 fffff801`d119ada0 : 00000000`ffffffff ffffa909`ee569000 ffffd201`0f37a428 ffffa909`ef133130 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x199
ffffd201`0f37a3e0 fffff801`d119bbc2 : ffffd201`0f37a4b8 ffffa909`ef133130 ffffe1fa`89f223b8 ffffa909`ef133130 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x98
ffffd201`0f37a4a0 fffff801`d119bd09 : ffffa909`edac6000 ffffd201`0f37a5b0 fffff801`d119bce8 fffff801`d119bce8 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x52
ffffd201`0f37a4f0 fffff801`d10f4e75 : ffffa909`ee231040 ffffd201`0f37a5b0 ffffa909`ee6a7370 fffff801`d1141fec : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffd201`0f37a520 fffff801`d1194f29 : 00000000`00000003 ffffa909`ee569000 ffffa909`edac6000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd201`0f37a570 fffff801`d119832c : ffffd201`0f37a670 ffffd201`0f37a7b0 ffffa909`edac6000 fffff801`d1195102 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xad
ffffd201`0f37a640 fffff801`d1198017 : ffffa909`edac6000 ffffa909`ef133130 fffff801`d144ba40 ffffd201`0f37a7b0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a4
ffffd201`0f37a690 fffff801`d1194dbf : 00000000`0000000c ffffa909`ee6a7420 ffffa909`ef133130 00000000`0000000b : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffd201`0f37a710 fffff801`d119bce2 : ffffa909`0000000b ffffa909`ee6a7420 ffffd201`00000000 ffffa909`edac6000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16b
ffffd201`0f37a780 fffff801`d10a44c9 : ffffd201`0f37ab00 ffffa909`e913bc01 ffffd201`0f37a820 fffffe00`10804310 : nt!SmPageRead+0x2e
ffffd201`0f37a7d0 fffff801`d10a4f8d : 00000000`00000002 ffffd201`0f37ab00 ffffa909`ee6a7320 00000000`00000000 : nt!MiIssueHardFaultIo+0x145
ffffd201`0f37a860 fffff801`d1107a00 : 00000000`c0033333 ffffd201`0f37ab00 00000000`00000004 ffffd201`0f37ab00 : nt!MiIssueHardFault+0x15d
ffffd201`0f37a900 fffff801`d11e35fc : ffffa909`ee231040 00000000`00000000 00000000`00000000 ffffa909`ee231040 : nt!MmAccessFault+0xca0
ffffd201`0f37ab00 00007ffc`e9b81bde : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13c
000000d9`8c3ff340 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e9b81bde
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 76114
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Timestamp
Value: 2016-07-15T16:16:00Z
Key : WER.OS.Version
Value: 10.0.14393.0
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 19
BUGCHECK_P1: 22
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
POOL_ADDRESS: fffff8008ac31338: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8008ab7ccf8: Unable to get Flags value from nt!KdVersionBlock
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
DPC_STACK_BASE: FFFFF8008C83FFB0
STACK_TEXT:
fffff800`8c83f678 fffff800`8a9ed5d0 : 00000000`00000019 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff800`8c83f680 fffff800`8aad5885 : 00000000`00000000 fffff800`8c83f790 00000000`00000000 00001e00`00000000 : nt! ?? ::FNODOBFM::`string'+0xa410
fffff800`8c83f750 fffff804`7965d211 : 00000000`00000000 ffff8b8e`44dcd300 00000000`00000000 ffff7f5e`7cd49cb7 : nt!ExFreePoolWithTag+0x4f5
fffff800`8c83f830 00000000`00000000 : ffff8b8e`44dcd300 00000000`00000000 ffff7f5e`7cd49cb7 ffff8b8e`00000001 : athw10x+0x28d211
SYMBOL_NAME: athw10x+28d211
MODULE_NAME: athw10x
IMAGE_NAME: athw10x.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 28d211
FAILURE_BUCKET_ID: 0x19_22_athw10x!unknown_function
OS_VERSION: 10.0.14393.0
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6389468c-1c97-ca58-db47-c5c836243ee4}
Followup: MachineOwner
---------