Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\051822-7578-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 22000 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Edition build lab: 22000.1.amd64fre.co_release.210604-1628
- Machine Name:
- Kernel base = 0xfffff806`47600000 PsLoadedModuleList = 0xfffff806`48229b90
- Debug session time: Wed May 18 07:00:52.862 2022 (UTC + 3:00)
- System Uptime: 4 days 9:44:47.109
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ..........
- Loading User Symbols
- Loading unloaded module list
- ..................................................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff806`47a16b40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff38b`34c42ef0=0000000000000154
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- UNEXPECTED_STORE_EXCEPTION (154)
- The store component caught an unexpected exception.
- Arguments:
- Arg1: ffffa48827ff4000, Pointer to the store context or data manager
- Arg2: fffff38b34c42fa0, Exception information
- Arg3: 0000000000000002, Reserved
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify checksum for win32k.sys
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 5140
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 33742
- Key : Analysis.Init.CPU.mSec
- Value: 687
- Key : Analysis.Init.Elapsed.mSec
- Value: 65391
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 103
- Key : WER.OS.Branch
- Value: co_release
- Key : WER.OS.Timestamp
- Value: 2021-06-04T16:28:00Z
- Key : WER.OS.Version
- Value: 10.0.22000.1
- FILE_IN_CAB: 051822-7578-01.dmp
- BUGCHECK_CODE: 154
- BUGCHECK_P1: ffffa48827ff4000
- BUGCHECK_P2: fffff38b34c42fa0
- BUGCHECK_P3: 2
- BUGCHECK_P4: 0
- EXCEPTION_RECORD: fffff38b34c43f88 -- (.exr 0xfffff38b34c43f88)
- ExceptionAddress: fffff8064798ab90 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
- ExceptionCode: c0000006 (In-page I/O error)
- ExceptionFlags: 00000000
- NumberParameters: 3
- Parameter[0]: 0000000000000000
- Parameter[1]: 0000022e246852c0
- Parameter[2]: 00000000c0000010
- Inpage operation failed at 0000022e246852c0, due to I/O error 00000000c0000010
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 0000022e246852c0
- CONTEXT: fffff38b34c437a0 -- (.cxr 0xfffff38b34c437a0)
- rax=fffff8064798ab40 rbx=0000022e24685976 rcx=ffffbb0214ab1000
- rdx=ffffbb0214ab1000 rsi=0000022e246852c0 rdi=0000000000001000
- rip=fffff8064798ab90 rsp=fffff38b34c441c0 rbp=ffffbb0214ab1ea0
- r8=0000022e246852c0 r9=00000000000006b6 r10=0000fffff8064798
- r11=0000000000000000 r12=ffffbb0214ab1000 r13=ffffbb0214ab2000
- r14=ffffbb0214ab1000 r15=0000022e24685920
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
- nt!RtlDecompressBufferXpressLz+0x50:
- fffff806`4798ab90 418b08 mov ecx,dword ptr [r8] ds:002b:0000022e`246852c0=????????
- Resetting default scope
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: MemCompression
- ERROR_CODE: (NTSTATUS) 0xc0000006 - The instruction at 0x%p referenced memory at 0x%p. The required data was not placed into memory because of an I/O error status of 0x%x.
- EXCEPTION_CODE_STR: c0000006
- EXCEPTION_PARAMETER3: 00000000c0000010
- EXCEPTION_STR: 0xc0000006
- STACK_TEXT:
- fffff38b`34c441c0 fffff806`47957260 : ffffbb02`14ab1000 ffffbb02`14ab1000 0000022e`246852c0 00000000`00001000 : nt!RtlDecompressBufferXpressLz+0x50
- fffff38b`34c441e0 fffff806`4798d9bb : ffffa488`27ff5788 ffffbb02`14ab1000 0000022e`246852c0 ffff8400`00000000 : nt!RtlDecompressBufferEx+0x60
- fffff38b`34c44230 fffff806`4798d824 : ffffa488`2bac8fd0 00000000`00000001 ffffa488`000152c0 ffffa488`531e2050 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x16b
- fffff38b`34c44300 fffff806`4798d696 : 00000000`00000001 00000000`00000529 ffffa488`27ff4050 ffffa488`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0x8c
- fffff38b`34c44340 fffff806`4798d4ab : 00000001`ffffffff ffffa488`531e2000 fffff38b`34c44420 ffffa488`2bac8fd0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x172
- fffff38b`34c443e0 fffff806`4798d2fe : fffff38b`34c44619 00000000`00000001 ffffbb01`fb048b30 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0x9f
- fffff38b`34c44490 fffff806`4798d201 : ffffa488`27ff4000 ffffa488`2bac8fd0 ffffa488`531e2000 ffffa488`27ff59c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x92
- fffff38b`34c44510 fffff806`479514e8 : ffffa488`360c9080 ffffa488`27ff4000 00000000`00000000 ffffa488`531e2000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
- fffff38b`34c44540 fffff806`4798f80e : fffff806`4798d1e0 fffff38b`34c445e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
- fffff38b`34c445b0 fffff806`47979063 : fffff38b`34c446b0 00000000`31526d73 00000000`000003ff fffff806`48331a00 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xbe
- fffff38b`34c44680 fffff806`47978c48 : 00000000`0000000c 00000000`000003ff fffff38b`34c44730 fffff806`48331a00 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a7
- fffff38b`34c446d0 fffff806`4798efb4 : 00000000`0000000c ffffa488`2bac8fd0 00000000`00000001 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
- fffff38b`34c44760 fffff806`479902eb : ffffa488`00000001 fffff38b`34c44820 fffff38b`00000000 ffffa488`27ff4000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x16c
- fffff38b`34c447f0 fffff806`478983c8 : ffffa488`2c6c5700 00000000`00000001 ffffa488`2c6c57c0 fffff806`479232d1 : nt!SmPageRead+0x33
- fffff38b`34c44840 fffff806`47898d64 : 00000000`00000002 fffff38b`34c448d0 fffff38b`34c44a00 ffffa488`8081e840 : nt!MiIssueHardFaultIo+0x190
- fffff38b`34c44890 fffff806`4791ac8b : 00000000`c0033333 00000000`00000001 00000000`15c43df0 00000000`00000000 : nt!MiIssueHardFault+0x424
- fffff38b`34c44940 fffff806`47a256f5 : 00000000`00000000 00000000`00000000 00000000`0bc3fda0 ffffa488`00000000 : nt!MmAccessFault+0x35b
- fffff38b`34c44ae0 00000000`72b6974c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x335
- 00000000`0e2de400 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72b6974c
- SYMBOL_NAME: nt!RtlDecompressBufferXpressLz+50
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.22000.675
- STACK_COMMAND: .cxr 0xfffff38b34c437a0 ; kb
- BUCKET_ID_FUNC_OFFSET: 50
- FAILURE_BUCKET_ID: 0x154_c0000006_c0000010_nt!RtlDecompressBufferXpressLz
- OS_VERSION: 10.0.22000.1
- BUILDLAB_STR: co_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {8a4be585-9932-44df-c399-947f3eda8d83}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment