KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffffd50795cd9110, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000010, error status (normally i/o status code)
Arg3: 0000000142562820, current process (virtual address for lock type 3, or PTE)
Arg4: ffffb75ee1ff2a6a, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4882
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 8106
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 7a
BUGCHECK_P1: ffffd50795cd9110
BUGCHECK_P2: ffffffffc0000010
BUGCHECK_P3: 142562820
BUGCHECK_P4: ffffb75ee1ff2a6a
ERROR_CODE: (NTSTATUS) 0xc0000010 - The specified request is not a valid operation for the target device.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Origin.exe
TRAP_FRAME: ffff8c814b77fb10 -- (.trap 0xffff8c814b77fb10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c814b77fd20 rbx=0000000000000000 rcx=ffffb75ee201b250
rdx=ffffb75ee1ff2a6a rsi=0000000000000000 rdi=0000000000000000
rip=ffffb75ee1e6e46c rsp=ffff8c814b77fca0 rbp=ffff8c814b77fdf0
r8=0000000000000000 r9=0000000000000000 r10=ffffb714c41efb7c
r11=ffffb714c41efb30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
win32kbase!tlgWriteTransfer_EtwWriteTransfer+0x4:
ffffb75e`e1e6e46c 0fb602 movzx eax,byte ptr [rdx] ds:ffffb75e`e1ff2a6a=0b
Resetting default scope
STACK_TEXT:
ffff8c81`4b77f768 fffff801`4365df69 : 00000000`0000007a ffffd507`95cd9110 ffffffff`c0000010 00000001`42562820 : nt!KeBugCheckEx
ffff8c81`4b77f770 fffff801`4365bc75 : ffff8c81`00004000 ffff8c81`4b77f800 ffff8c81`4b77f900 fffff801`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffff8c81`4b77f860 fffff801`4369f568 : 00000000`c0033333 00000000`00000000 ffffb75e`e1ff2a6a 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffff8c81`4b77f970 fffff801`4380505e : ffffd507`94583c70 fffff801`43607de2 00000000`00000000 fffff801`436743fa : nt!MmAccessFault+0x468
ffff8c81`4b77fb10 ffffb75e`e1e6e46c : 00000000`00000082 00000000`00000000 ffffb714`c5feb150 00000000`00000082 : nt!KiPageFault+0x35e
ffff8c81`4b77fca0 ffffb75e`e1e6df4f : fffff801`3e603180 fffff801`436ebca0 ffff8f01`c80ecb50 ffffae7a`b9000000 : win32kbase!tlgWriteTransfer_EtwWriteTransfer+0x4
ffff8c81`4b77fcf0 ffffb75e`e1e6d9d1 : ffffb714`c0608620 ffff8f01`ceb7e180 ffff8f01`ceb7e080 00000000`00000000 : win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByRef<16>,_tlgWrapperByVal<1>,_tlgWrapperByVal<1>,_tlgWrapperByRef<16>,_tlgWrapperByRef<16>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperBinary,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<1>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8> >+0x4ff
ffff8c81`4b7800a0 ffffb75e`e1e6d30b : 00000000`00000000 ffffb714`c41efb30 00000000`00000001 00000000`00000001 : win32kbase!CitpInteractionSummaryStopTracking+0x5b9
ffff8c81`4b7803c0 ffffb75e`e1e1b0ab : ffffb714`c740ee60 ffff8c81`4b7803f0 ffff8f01`ceb7e080 00000000`00060001 : win32kbase!CitpInteractionSummaryDelete+0x43
ffff8c81`4b7803f0 ffffb75e`e1e1a9f0 : 00000000`00000000 ffffb714`c745ca20 ffff8f01`ceb7e000 ffff8f01`c83c4d10 : win32kbase!CitProcessCallout+0x123
ffff8c81`4b780440 ffffb75e`e1e1d9d0 : 00000000`00000000 00000000`00000000 ffff8c81`4b7805a0 02100050`4747d7b0 : win32kbase!DestroyProcessInfo+0x1c
ffff8c81`4b7804a0 ffffb75e`e0e289f5 : fffff801`43608500 ffffb75e`e0ee70d1 ffffb714`c745ca20 00000000`00000001 : win32kbase!xxxUserProcessCallout+0x470
ffff8c81`4b7806d0 ffffb75e`e1e12ae8 : 00000000`00000000 00000000`c000001c ffff8c81`4b780a38 fffff801`43607d6b : win32kfull!W32pProcessCallout+0xe5
ffff8c81`4b780710 ffffb75e`e0c410d0 : 00000000`c000001c ffff8c81`4b7809d0 00000000`00000000 ffff8c81`4b780a38 : win32kbase!W32CalloutDispatch+0x488
ffff8c81`4b780920 fffff801`43a02525 : 00000000`00000000 fffff801`4401de30 ffff8f01`c2cc1530 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffff8c81`4b780960 fffff801`43ab0668 : ffff8f01`c805edf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffff8c81`4b780990 fffff801`43ab3bbe : ffff8f01`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x598
ffff8c81`4b780a90 fffff801`438088b8 : ffff8f01`cec770c0 ffff8f01`ceb7e080 ffff8c81`4b780b80 ffff8f01`cec770c0 : nt!NtTerminateProcess+0xde
ffff8c81`4b780b00 00000000`77ce1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00eae7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ce1cfc
SYMBOL_NAME: win32kbase!tlgWriteTransfer_EtwWriteTransfer+4
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1110
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4
FAILURE_BUCKET_ID: 0x7a_c0000010_win32kbase!tlgWriteTransfer_EtwWriteTransfer
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {df1e0b82-da22-7ca8-64e5-e185167c3937}
Followup: MachineOwner
---------