Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16384.amd64fre.winblue_rtm.130821-1623
Machine Name:
Kernel base = 0xfffff802`8048b000 PsLoadedModuleList = 0xfffff802`807529b0
Debug session time: Fri Dec 12 16:06:18.959 2014 (UTC + 5:30)
System Uptime: 0 days 0:08:22.629
Loading Kernel Symbols
...............................................................
......................................Page 12010d not present in the dump file. Type ".hh dbgerr004" for details
...Page 2b9 not present in the dump file. Type ".hh dbgerr004" for details
.......................
........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00007ff6`353df018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {fffff6e000029048, ffffffffc000003f, 5a76c880, ffffc00005209066}
Page 12010d not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+a187 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6e000029048, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 000000005a76c880, current process (virtual address for lock type 3, or PTE)
Arg4: ffffc00005209066, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
Page 12010d not present in the dump file. Type ".hh dbgerr004" for details
ERROR_CODE: (NTSTATUS) 0xc000003f - {Bad CRC} A cyclic redundancy check (CRC) checksum error occurred.
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.
BUGCHECK_STR: 0x7a_c000003f
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WSHost.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
TRAP_FRAME: ffffd00029e8cfb0 -- (.trap 0xffffd00029e8cfb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd00029551000 rbx=0000000000000000 rcx=ffffe00000bcfbc0
rdx=ffffd00029551000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8028083f5c0 rsp=ffffd00029e8d140 rbp=ffffe00000bcfbc0
r8=ffffc00005209066 r9=00007ffaa7560000 r10=0000000000000004
r11=000000000000000a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiApplyCompressedFixups+0x60:
fffff802`8083f5c0 0fb613 movzx edx,byte ptr [rbx] ds:00000000`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802805f5717 to fffff802805db0a0
STACK_TEXT:
ffffd000`29e8ccb8 fffff802`805f5717 : 00000000`0000007a fffff6e0`00029048 ffffffff`c000003f 00000000`5a76c880 : nt!KeBugCheckEx
ffffd000`29e8ccc0 fffff802`804c0c94 : 00000000`00000002 ffffd000`29e8ce28 fffff802`807d3e80 ffffd000`00000000 : nt! ?? ::FNODOBFM::`string'+0xa187
ffffd000`29e8cdb0 fffff802`804f3bdf : ffffe000`02544080 00000000`c0033333 fffff802`807d3e80 00000000`00000000 : nt!MiIssueHardFault+0x184
ffffd000`29e8ce70 fffff802`805e532f : 00000000`00000000 ffffc000`05209066 bb67ae85`6a09e600 ffffd000`29e8cfb0 : nt!MmAccessFault+0x3cf
ffffd000`29e8cfb0 fffff802`8083f5c0 : 00000000`0000003f fffff802`807d4340 00000000`00000000 ffffe000`031eddf0 : nt!KiPageFault+0x12f
ffffd000`29e8d140 fffff802`8083f4cd : ffffd000`29551000 ffffc000`05209066 00000000`000000cf 00000000`00015f46 : nt!MiApplyCompressedFixups+0x60
ffffd000`29e8d1a0 fffff802`8083f394 : fffff6e8`0014aa88 00000000`00000000 ffffe000`02544400 fffff6e8`0014aa88 : nt!MiPerformFixups+0x8d
ffffd000`29e8d200 fffff802`804ddc3b : ffffe000`00bcfbc0 00000000`00000000 fffffa80`000000cf fffffa80`0194de10 : nt!MiRelocateImagePfn+0x1f8
ffffd000`29e8d270 fffff802`804c4891 : ffffe000`00bcfbc0 ffffe000`02416900 ffffe000`031edde0 ffffe000`00bcfea0 : nt!MiValidateInPage+0x1fb
ffffd000`29e8d2f0 fffff802`804c3a6c : ffffe000`0076a3a0 00000000`00000000 00000000`00000000 ffffe000`00000000 : nt!MiWaitForInPageComplete+0x299
ffffd000`29e8d3e0 fffff802`8083f829 : ffffe000`03041fe8 00000000`00000000 00000000`00000034 00000000`00000001 : nt!MiPfCompletePrefetchIos+0x98
ffffd000`29e8d440 fffff802`80875bff : 00000000`0000006c ffffc000`0e3286f0 ffffe000`02544080 ffffe000`03041e60 : nt!MmPrefetchPages+0x191
ffffd000`29e8d4b0 fffff802`80873da5 : 00000000`00000001 ffffd000`00000000 ffffc000`0699cd08 00000000`00000000 : nt!PfSnPrefetchSections+0x44b
ffffd000`29e8d650 fffff802`80877a7d : 00000000`00000003 00000000`00000000 000000df`a09b201e 00007ffc`33620000 : nt!PfSnPrefetchScenario+0x1a1
ffffd000`29e8d790 fffff802`80877f69 : ffffe000`02416900 ffffd000`29e8d890 00000000`00000000 ffffd000`29e8d8b9 : nt!PfSnBeginScenario+0x271
ffffd000`29e8d840 fffff802`808795da : ffffe000`02416900 00000000`3bd2aa25 ffffd000`29e8db80 ffffe000`02416900 : nt!PfSnBeginAppLaunch+0x119
ffffd000`29e8d920 fffff802`8087a054 : 00007ff6`353dd000 ffffe000`017da940 ffffe000`02416900 ffffe000`02544080 : nt!PfProcessCreateNotification+0x86
ffffd000`29e8d950 fffff802`805e17f5 : ffffd000`201dc180 00000000`00000000 fffff802`80879eec ffffe000`02544080 : nt!PspUserThreadStartup+0x168
ffffd000`29e8d9c0 fffff802`805e1777 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
ffffd000`29e8db00 00007ffc`33696490 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000087`cbb9fd38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`33696490
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+a187
fffff802`805f5717 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+a187
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5215d156
BUCKET_ID_FUNC_OFFSET: a187
FAILURE_BUCKET_ID: 0x7a_c000003f_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0x7a_c000003f_nt!_??_::FNODOBFM::_string_
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7a_c000003f_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {35f7dc2f-9d4e-79ab-5aab-b1994d114d0f}
Followup: MachineOwner
---------