J
JanKybe
Guest
[COLOR=rgba(30, 30, 30, 1)]Hi, im having quite a lot of BSOD latetly, and i checked the dump file and it had that kind of error when i was having the issue,[/COLOR]
[COLOR=rgba(30, 30, 30, 1)]tthis one is the minidump created by Windows after bsod. I have AMD Ryzen 3900x and thought it might be RAM issue. But thought i would check it here as well.[/COLOR]
[COLOR=rgba(30, 30, 30, 1)]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff800d92894000, Pointer to the store context or data manager
Arg2: ffffa50908b4e030, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3280
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 30048
Key : Analysis.Init.CPU.mSec
Value: 328
Key : Analysis.Init.Elapsed.mSec
Value: 6166
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 154
BUGCHECK_P1: ffff800d92894000
BUGCHECK_P2: ffffa50908b4e030
BUGCHECK_P3: 2
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffffa50908b4efb8 -- [/COLOR][COLOR=rgba(0, 0, 255, 1)](.exr 0xffffa50908b4efb8)
[/COLOR][COLOR=rgba(30, 30, 30, 1)]ExceptionAddress: fffff804732f4a8d (nt!RtlDecompressBufferXpressLz+0x00000000000000fd)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
EXCEPTION_PARAMETER1: ffff800d8c88b080
EXCEPTION_PARAMETER2: ffffd7001cd3bea0
CONTEXT: ffffa50908b4e7f0 -- [/COLOR][COLOR=rgba(0, 0, 255, 1)](.cxr 0xffffa50908b4e7f0)
[/COLOR][COLOR=rgba(30, 30, 30, 1)]rax=0000000083555418 rbx=ffffd7001cd3b000 rcx=000000005c538902
rdx=ffffd7001cd3b3ad rsi=ffffd7001cd3b39d rdi=0000000000000008
rip=fffff804732f4a8d rsp=ffffa50908b4f1f8 rbp=00000241ccb25fd6
r8=00000241ccb259d6 r9=0000000000000003 r10=ffffd7001cd3bea0
r11=00000241ccb2602c r12=ffffa50908b4f468 r13=ffff800d993d5000
r14=ffffd7001cd3c000 r15=0000000000000000
iopl=0 ov up ei ng nz ac po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a96
nt!RtlDecompressBufferXpressLz+0xfd:
fffff804`732f4a8d eb83 jmp nt!RtlDecompressBufferXpressLz+0x82 (fffff804`732f4a12)
Resetting default scope
BLACKBOXBSD: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxbsd[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXNTFS: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxntfs[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXPNP: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxpnp[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
EXCEPTION_CODE_STR: c000001d
EXCEPTION_STR: 0xc000001d
FAILED_INSTRUCTION_ADDRESS:
nt!RtlDecompressBufferXpressLz+fd
fffff804`732f4a8d eb83 jmp nt!RtlDecompressBufferXpressLz+0x82 (fffff804`732f4a12)
STACK_TEXT:
ffffa509`08b4f1f8 fffff804`732c42d0 : ffffd700`1cd3b000 ffffd700`1cd3b000 00000000`00000002 00000241`ccb257f0 : nt!RtlDecompressBufferXpressLz+0xfd
ffffa509`08b4f210 fffff804`732c4018 : fffff47a`00000001 00000000`00000000 00000000`00000000 ffff800d`8c88b080 : nt!RtlDecompressBufferEx+0x60
ffffa509`08b4f260 fffff804`732c3ea5 : 00000000`00000004 fffff804`732c3a0e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffa509`08b4f320 fffff804`732c36dc : 00000000`00000001 00000000`000157f0 ffff800d`92894000 ffff800d`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffa509`08b4f370 fffff804`732c350c : 00000000`ffffffff ffff800d`993d5000 ffffa509`08b4f450 ffff800d`963b4410 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffa509`08b4f410 fffff804`732c3359 : ffffd700`175ab730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffa509`08b4f4c0 fffff804`732c3211 : ffff800d`92894000 ffff800d`963b4410 ffff800d`993d5000 ffff800d`928959c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffa509`08b4f540 fffff804`73354518 : ffff800d`8c88b080 ffff800d`92894000 00000000`00000000 ffff800d`9afab260 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffa509`08b4f570 fffff804`7330a397 : fffff804`732c31f0 ffffa509`08b4f610 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa509`08b4f5e0 fffff804`7323e0b4 : ffffa509`08b4f6e0 00000000`31526d73 00000000`000003ff fffff804`73d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffa509`08b4f6b0 fffff804`7323dae8 : 00000000`0000000c 00000000`000003ff ffffa509`08b4f760 fffff804`73d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffa509`08b4f700 fffff804`733095f7 : 00000000`0000000c 00000000`00000001 ffff800d`963b4410 ffff800d`9afab260 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffa509`08b4f790 fffff804`7331d3ab : ffff800d`00000001 ffff800d`9afab320 00000000`00000000 ffff800d`92894000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffa509`08b4f800 fffff804`732b6f60 : 0000007f`00000100 00000000`00000000 ffffa509`08b4fa58 fffff804`732b4eb0 : nt!SmPageRead+0x33
ffffa509`08b4f850 fffff804`732b4a0d : 00000000`00000002 ffffa509`08b4f8e0 ffffa509`08b4fa58 ffff800d`9afab210 : nt!MiIssueHardFaultIo+0x10c
ffffa509`08b4f8a0 fffff804`7320c9c8 : 00000000`c0033333 00000000`00000001 00000000`1808e087 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffa509`08b4f960 fffff804`73403f5e : ffff800d`8c88b080 00000000`00000000 ffffa509`08b4fb18 ffffffff`ec549980 : nt!MmAccessFault+0x468
ffffa509`08b4fb00 00000000`778f6252 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0655ea3c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778f6252
SYMBOL_NAME: nt!RtlDecompressBufferXpressLz+fd
MODULE_NAME: [/COLOR][COLOR=rgba(0, 0, 255, 1)]nt
[/COLOR][COLOR=rgba(30, 30, 30, 1)]IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .cxr 0xffffa50908b4e7f0 ; kb
BUCKET_ID_FUNC_OFFSET: fd
FAILURE_BUCKET_ID: 0x154_c000001d_BAD_IP_nt!RtlDecompressBufferXpressLz
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0178e54e-d3f3-be8a-bd80-69b10aa5a6c1}
Followup: MachineOwner
---------[/COLOR]
Continue reading...
[COLOR=rgba(30, 30, 30, 1)]tthis one is the minidump created by Windows after bsod. I have AMD Ryzen 3900x and thought it might be RAM issue. But thought i would check it here as well.[/COLOR]
[COLOR=rgba(30, 30, 30, 1)]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff800d92894000, Pointer to the store context or data manager
Arg2: ffffa50908b4e030, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3280
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 30048
Key : Analysis.Init.CPU.mSec
Value: 328
Key : Analysis.Init.Elapsed.mSec
Value: 6166
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 154
BUGCHECK_P1: ffff800d92894000
BUGCHECK_P2: ffffa50908b4e030
BUGCHECK_P3: 2
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffffa50908b4efb8 -- [/COLOR][COLOR=rgba(0, 0, 255, 1)](.exr 0xffffa50908b4efb8)
[/COLOR][COLOR=rgba(30, 30, 30, 1)]ExceptionAddress: fffff804732f4a8d (nt!RtlDecompressBufferXpressLz+0x00000000000000fd)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
EXCEPTION_PARAMETER1: ffff800d8c88b080
EXCEPTION_PARAMETER2: ffffd7001cd3bea0
CONTEXT: ffffa50908b4e7f0 -- [/COLOR][COLOR=rgba(0, 0, 255, 1)](.cxr 0xffffa50908b4e7f0)
[/COLOR][COLOR=rgba(30, 30, 30, 1)]rax=0000000083555418 rbx=ffffd7001cd3b000 rcx=000000005c538902
rdx=ffffd7001cd3b3ad rsi=ffffd7001cd3b39d rdi=0000000000000008
rip=fffff804732f4a8d rsp=ffffa50908b4f1f8 rbp=00000241ccb25fd6
r8=00000241ccb259d6 r9=0000000000000003 r10=ffffd7001cd3bea0
r11=00000241ccb2602c r12=ffffa50908b4f468 r13=ffff800d993d5000
r14=ffffd7001cd3c000 r15=0000000000000000
iopl=0 ov up ei ng nz ac po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a96
nt!RtlDecompressBufferXpressLz+0xfd:
fffff804`732f4a8d eb83 jmp nt!RtlDecompressBufferXpressLz+0x82 (fffff804`732f4a12)
Resetting default scope
BLACKBOXBSD: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxbsd[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXNTFS: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxntfs[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXPNP: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxpnp[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
EXCEPTION_CODE_STR: c000001d
EXCEPTION_STR: 0xc000001d
FAILED_INSTRUCTION_ADDRESS:
nt!RtlDecompressBufferXpressLz+fd
fffff804`732f4a8d eb83 jmp nt!RtlDecompressBufferXpressLz+0x82 (fffff804`732f4a12)
STACK_TEXT:
ffffa509`08b4f1f8 fffff804`732c42d0 : ffffd700`1cd3b000 ffffd700`1cd3b000 00000000`00000002 00000241`ccb257f0 : nt!RtlDecompressBufferXpressLz+0xfd
ffffa509`08b4f210 fffff804`732c4018 : fffff47a`00000001 00000000`00000000 00000000`00000000 ffff800d`8c88b080 : nt!RtlDecompressBufferEx+0x60
ffffa509`08b4f260 fffff804`732c3ea5 : 00000000`00000004 fffff804`732c3a0e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffa509`08b4f320 fffff804`732c36dc : 00000000`00000001 00000000`000157f0 ffff800d`92894000 ffff800d`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffa509`08b4f370 fffff804`732c350c : 00000000`ffffffff ffff800d`993d5000 ffffa509`08b4f450 ffff800d`963b4410 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffa509`08b4f410 fffff804`732c3359 : ffffd700`175ab730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffa509`08b4f4c0 fffff804`732c3211 : ffff800d`92894000 ffff800d`963b4410 ffff800d`993d5000 ffff800d`928959c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffa509`08b4f540 fffff804`73354518 : ffff800d`8c88b080 ffff800d`92894000 00000000`00000000 ffff800d`9afab260 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffa509`08b4f570 fffff804`7330a397 : fffff804`732c31f0 ffffa509`08b4f610 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa509`08b4f5e0 fffff804`7323e0b4 : ffffa509`08b4f6e0 00000000`31526d73 00000000`000003ff fffff804`73d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffa509`08b4f6b0 fffff804`7323dae8 : 00000000`0000000c 00000000`000003ff ffffa509`08b4f760 fffff804`73d239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffa509`08b4f700 fffff804`733095f7 : 00000000`0000000c 00000000`00000001 ffff800d`963b4410 ffff800d`9afab260 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffa509`08b4f790 fffff804`7331d3ab : ffff800d`00000001 ffff800d`9afab320 00000000`00000000 ffff800d`92894000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffa509`08b4f800 fffff804`732b6f60 : 0000007f`00000100 00000000`00000000 ffffa509`08b4fa58 fffff804`732b4eb0 : nt!SmPageRead+0x33
ffffa509`08b4f850 fffff804`732b4a0d : 00000000`00000002 ffffa509`08b4f8e0 ffffa509`08b4fa58 ffff800d`9afab210 : nt!MiIssueHardFaultIo+0x10c
ffffa509`08b4f8a0 fffff804`7320c9c8 : 00000000`c0033333 00000000`00000001 00000000`1808e087 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffa509`08b4f960 fffff804`73403f5e : ffff800d`8c88b080 00000000`00000000 ffffa509`08b4fb18 ffffffff`ec549980 : nt!MmAccessFault+0x468
ffffa509`08b4fb00 00000000`778f6252 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0655ea3c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778f6252
SYMBOL_NAME: nt!RtlDecompressBufferXpressLz+fd
MODULE_NAME: [/COLOR][COLOR=rgba(0, 0, 255, 1)]nt
[/COLOR][COLOR=rgba(30, 30, 30, 1)]IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .cxr 0xffffa50908b4e7f0 ; kb
BUCKET_ID_FUNC_OFFSET: fd
FAILURE_BUCKET_ID: 0x154_c000001d_BAD_IP_nt!RtlDecompressBufferXpressLz
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0178e54e-d3f3-be8a-bd80-69b10aa5a6c1}
Followup: MachineOwner
---------[/COLOR]
Continue reading...