KERNEL_DATA_INPAGE_ERROR hatası

Depolama kaynaklı görünüyor. Yeniden başlattığınızı belirtmişsiniz, bir güncelleme sonrası mı oldu bu? HD Tune Pro ile quick scan kapalı şekilde hata taraması yapın depolama birimlerine. Yine aynı yazılımdaki sağlık kısmındaki bilgileri de test sonuçlarıyla paylaşın.

Kod:
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffffd50795cd9110, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000010, error status (normally i/o status code)
Arg3: 0000000142562820, current process (virtual address for lock type 3, or PTE)
Arg4: ffffb75ee1ff2a6a, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4882

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8106

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffffd50795cd9110

BUGCHECK_P2: ffffffffc0000010

BUGCHECK_P3: 142562820

BUGCHECK_P4: ffffb75ee1ff2a6a

ERROR_CODE: (NTSTATUS) 0xc0000010 - The specified request is not a valid operation for the target device.

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Origin.exe

TRAP_FRAME:  ffff8c814b77fb10 -- (.trap 0xffff8c814b77fb10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c814b77fd20 rbx=0000000000000000 rcx=ffffb75ee201b250
rdx=ffffb75ee1ff2a6a rsi=0000000000000000 rdi=0000000000000000
rip=ffffb75ee1e6e46c rsp=ffff8c814b77fca0 rbp=ffff8c814b77fdf0
 r8=0000000000000000  r9=0000000000000000 r10=ffffb714c41efb7c
r11=ffffb714c41efb30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!tlgWriteTransfer_EtwWriteTransfer+0x4:
ffffb75e`e1e6e46c 0fb602          movzx   eax,byte ptr [rdx] ds:ffffb75e`e1ff2a6a=0b
Resetting default scope

STACK_TEXT: 
ffff8c81`4b77f768 fffff801`4365df69     : 00000000`0000007a ffffd507`95cd9110 ffffffff`c0000010 00000001`42562820 : nt!KeBugCheckEx
ffff8c81`4b77f770 fffff801`4365bc75     : ffff8c81`00004000 ffff8c81`4b77f800 ffff8c81`4b77f900 fffff801`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffff8c81`4b77f860 fffff801`4369f568     : 00000000`c0033333 00000000`00000000 ffffb75e`e1ff2a6a 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffff8c81`4b77f970 fffff801`4380505e     : ffffd507`94583c70 fffff801`43607de2 00000000`00000000 fffff801`436743fa : nt!MmAccessFault+0x468
ffff8c81`4b77fb10 ffffb75e`e1e6e46c     : 00000000`00000082 00000000`00000000 ffffb714`c5feb150 00000000`00000082 : nt!KiPageFault+0x35e
ffff8c81`4b77fca0 ffffb75e`e1e6df4f     : fffff801`3e603180 fffff801`436ebca0 ffff8f01`c80ecb50 ffffae7a`b9000000 : win32kbase!tlgWriteTransfer_EtwWriteTransfer+0x4
ffff8c81`4b77fcf0 ffffb75e`e1e6d9d1     : ffffb714`c0608620 ffff8f01`ceb7e180 ffff8f01`ceb7e080 00000000`00000000 : win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByRef<16>,_tlgWrapperByVal<1>,_tlgWrapperByVal<1>,_tlgWrapperByRef<16>,_tlgWrapperByRef<16>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperBinary,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<1>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8> >+0x4ff
ffff8c81`4b7800a0 ffffb75e`e1e6d30b     : 00000000`00000000 ffffb714`c41efb30 00000000`00000001 00000000`00000001 : win32kbase!CitpInteractionSummaryStopTracking+0x5b9
ffff8c81`4b7803c0 ffffb75e`e1e1b0ab     : ffffb714`c740ee60 ffff8c81`4b7803f0 ffff8f01`ceb7e080 00000000`00060001 : win32kbase!CitpInteractionSummaryDelete+0x43
ffff8c81`4b7803f0 ffffb75e`e1e1a9f0     : 00000000`00000000 ffffb714`c745ca20 ffff8f01`ceb7e000 ffff8f01`c83c4d10 : win32kbase!CitProcessCallout+0x123
ffff8c81`4b780440 ffffb75e`e1e1d9d0     : 00000000`00000000 00000000`00000000 ffff8c81`4b7805a0 02100050`4747d7b0 : win32kbase!DestroyProcessInfo+0x1c
ffff8c81`4b7804a0 ffffb75e`e0e289f5     : fffff801`43608500 ffffb75e`e0ee70d1 ffffb714`c745ca20 00000000`00000001 : win32kbase!xxxUserProcessCallout+0x470
ffff8c81`4b7806d0 ffffb75e`e1e12ae8     : 00000000`00000000 00000000`c000001c ffff8c81`4b780a38 fffff801`43607d6b : win32kfull!W32pProcessCallout+0xe5
ffff8c81`4b780710 ffffb75e`e0c410d0     : 00000000`c000001c ffff8c81`4b7809d0 00000000`00000000 ffff8c81`4b780a38 : win32kbase!W32CalloutDispatch+0x488
ffff8c81`4b780920 fffff801`43a02525     : 00000000`00000000 fffff801`4401de30 ffff8f01`c2cc1530 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffff8c81`4b780960 fffff801`43ab0668     : ffff8f01`c805edf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffff8c81`4b780990 fffff801`43ab3bbe     : ffff8f01`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x598
ffff8c81`4b780a90 fffff801`438088b8     : ffff8f01`cec770c0 ffff8f01`ceb7e080 ffff8c81`4b780b80 ffff8f01`cec770c0 : nt!NtTerminateProcess+0xde
ffff8c81`4b780b00 00000000`77ce1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00eae7d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ce1cfc


SYMBOL_NAME:  win32kbase!tlgWriteTransfer_EtwWriteTransfer+4

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1110

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4

FAILURE_BUCKET_ID:  0x7a_c0000010_win32kbase!tlgWriteTransfer_EtwWriteTransfer

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {df1e0b82-da22-7ca8-64e5-e185167c3937}

Followup:     MachineOwner
---------
 
Depolama kaynaklı görünüyor. Yeniden başlattığınızı belirtmişsiniz, bir güncelleme sonrası mı oldu bu? HD Tune Pro ile quick scan kapalı şekilde hata taraması yapın depolama birimlerine. Yine aynı yazılımdaki sağlık kısmındaki bilgileri de test sonuçlarıyla paylaşın.

Kod:
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffffd50795cd9110, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000010, error status (normally i/o status code)
Arg3: 0000000142562820, current process (virtual address for lock type 3, or PTE)
Arg4: ffffb75ee1ff2a6a, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4882

    Key  : Analysis.Init.CPU.mSec
    Value: 921

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8106

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffffd50795cd9110

BUGCHECK_P2: ffffffffc0000010

BUGCHECK_P3: 142562820

BUGCHECK_P4: ffffb75ee1ff2a6a

ERROR_CODE: (NTSTATUS) 0xc0000010 - The specified request is not a valid operation for the target device.

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Origin.exe

TRAP_FRAME:  ffff8c814b77fb10 -- (.trap 0xffff8c814b77fb10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c814b77fd20 rbx=0000000000000000 rcx=ffffb75ee201b250
rdx=ffffb75ee1ff2a6a rsi=0000000000000000 rdi=0000000000000000
rip=ffffb75ee1e6e46c rsp=ffff8c814b77fca0 rbp=ffff8c814b77fdf0
 r8=0000000000000000  r9=0000000000000000 r10=ffffb714c41efb7c
r11=ffffb714c41efb30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!tlgWriteTransfer_EtwWriteTransfer+0x4:
ffffb75e`e1e6e46c 0fb602          movzx   eax,byte ptr [rdx] ds:ffffb75e`e1ff2a6a=0b
Resetting default scope

STACK_TEXT:
ffff8c81`4b77f768 fffff801`4365df69     : 00000000`0000007a ffffd507`95cd9110 ffffffff`c0000010 00000001`42562820 : nt!KeBugCheckEx
ffff8c81`4b77f770 fffff801`4365bc75     : ffff8c81`00004000 ffff8c81`4b77f800 ffff8c81`4b77f900 fffff801`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffff8c81`4b77f860 fffff801`4369f568     : 00000000`c0033333 00000000`00000000 ffffb75e`e1ff2a6a 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffff8c81`4b77f970 fffff801`4380505e     : ffffd507`94583c70 fffff801`43607de2 00000000`00000000 fffff801`436743fa : nt!MmAccessFault+0x468
ffff8c81`4b77fb10 ffffb75e`e1e6e46c     : 00000000`00000082 00000000`00000000 ffffb714`c5feb150 00000000`00000082 : nt!KiPageFault+0x35e
ffff8c81`4b77fca0 ffffb75e`e1e6df4f     : fffff801`3e603180 fffff801`436ebca0 ffff8f01`c80ecb50 ffffae7a`b9000000 : win32kbase!tlgWriteTransfer_EtwWriteTransfer+0x4
ffff8c81`4b77fcf0 ffffb75e`e1e6d9d1     : ffffb714`c0608620 ffff8f01`ceb7e180 ffff8f01`ceb7e080 00000000`00000000 : win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ptr64>::Write<_tlgWrapperByRef<16>,_tlgWrapperByVal<1>,_tlgWrapperByVal<1>,_tlgWrapperByRef<16>,_tlgWrapperByRef<16>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperBinary,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<1>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<2>,_tlgWrapperByVal<4>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<4>,_tlgWrapperByVal<8>,_tlgWrapperByVal<8> >+0x4ff
ffff8c81`4b7800a0 ffffb75e`e1e6d30b     : 00000000`00000000 ffffb714`c41efb30 00000000`00000001 00000000`00000001 : win32kbase!CitpInteractionSummaryStopTracking+0x5b9
ffff8c81`4b7803c0 ffffb75e`e1e1b0ab     : ffffb714`c740ee60 ffff8c81`4b7803f0 ffff8f01`ceb7e080 00000000`00060001 : win32kbase!CitpInteractionSummaryDelete+0x43
ffff8c81`4b7803f0 ffffb75e`e1e1a9f0     : 00000000`00000000 ffffb714`c745ca20 ffff8f01`ceb7e000 ffff8f01`c83c4d10 : win32kbase!CitProcessCallout+0x123
ffff8c81`4b780440 ffffb75e`e1e1d9d0     : 00000000`00000000 00000000`00000000 ffff8c81`4b7805a0 02100050`4747d7b0 : win32kbase!DestroyProcessInfo+0x1c
ffff8c81`4b7804a0 ffffb75e`e0e289f5     : fffff801`43608500 ffffb75e`e0ee70d1 ffffb714`c745ca20 00000000`00000001 : win32kbase!xxxUserProcessCallout+0x470
ffff8c81`4b7806d0 ffffb75e`e1e12ae8     : 00000000`00000000 00000000`c000001c ffff8c81`4b780a38 fffff801`43607d6b : win32kfull!W32pProcessCallout+0xe5
ffff8c81`4b780710 ffffb75e`e0c410d0     : 00000000`c000001c ffff8c81`4b7809d0 00000000`00000000 ffff8c81`4b780a38 : win32kbase!W32CalloutDispatch+0x488
ffff8c81`4b780920 fffff801`43a02525     : 00000000`00000000 fffff801`4401de30 ffff8f01`c2cc1530 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffff8c81`4b780960 fffff801`43ab0668     : ffff8f01`c805edf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffff8c81`4b780990 fffff801`43ab3bbe     : ffff8f01`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x598
ffff8c81`4b780a90 fffff801`438088b8     : ffff8f01`cec770c0 ffff8f01`ceb7e080 ffff8c81`4b780b80 ffff8f01`cec770c0 : nt!NtTerminateProcess+0xde
ffff8c81`4b780b00 00000000`77ce1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00eae7d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ce1cfc


SYMBOL_NAME:  win32kbase!tlgWriteTransfer_EtwWriteTransfer+4

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1110

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4

FAILURE_BUCKET_ID:  0x7a_c0000010_win32kbase!tlgWriteTransfer_EtwWriteTransfer

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {df1e0b82-da22-7ca8-64e5-e185167c3937}

Followup:     MachineOwner
---------
Hayır, herhangi bir güncelleme yapmadım.

Uygulama böyle bir şey diyor ve açılmıyor.
1627330884355.png
 
Önceden deneme sürümünü indirmişsiniz, süresi geçtiği için bu hatayı veriyor. Silip yüklemek bunu çözmüyor diye biliyorum, kayıt defterinden bir temizlik yapmak gerekiyor ama onunla uğraşmayalım. Normal HD Tune ile yapın o zaman, bilinmeyen parametreleri bir şekilde bulmaya çalışırız.
 
PC'yi açtıktan biraz sonra mavi ekran aldım. 2 tane dump dosyası var.
@Bora Dere
@VesemirDayi
 
Son düzenleme:
PC'yi ilk açtığım zaman oluyor bu mavi ekran, birden fazla minidump dosyası var; hepsini bırakıyorum.

@Enes3078
 

Yeni konular

Geri
Yukarı