KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000001, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000005, error status (normally i/o status code)
Arg3: ffff8803a3042080, current process (virtual address for lock type 3, or PTE)
Arg4: ffff843efa822000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5093
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 19176
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 4663
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 011322-4890-01.dmp
BUGCHECK_CODE: 7a
BUGCHECK_P1: 1
BUGCHECK_P2: ffffffffc0000005
BUGCHECK_P3: ffff8803a3042080
BUGCHECK_P4: ffff843efa822000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: taskhostw.exe
STACK_TEXT:
ffff9881`331410f8 fffff806`66444208 : 00000000`0000007a 00000000`00000001 ffffffff`c0000005 ffff8803`a3042080 : nt!KeBugCheckEx
ffff9881`33141100 fffff806`6629e35b : 00000000`00000001 ffff8803`a3042700 00000000`00000009 00000000`08000000 : nt!MiGetNextPageTablePte+0x1a5478
ffff9881`33141150 fffff806`6629e60b : ffff8442`210fbea0 ffff8803`a3042700 ffff9881`00000001 ffff9881`33141530 : nt!MiWalkPageTablesRecursively+0x5db
ffff9881`331411f0 fffff806`6629e60b : ffff8442`210fb000 ffff8803`a3042700 ffff9881`00000002 ffff9881`33141540 : nt!MiWalkPageTablesRecursively+0x88b
ffff9881`33141290 fffff806`66204f4b : ffff8442`21108840 ffff8803`a3042700 00007df4`00000003 ffff9881`33141550 : nt!MiWalkPageTablesRecursively+0x88b
ffff9881`33141330 fffff806`66242961 : ffff9881`331414d0 ffff8803`00000000 00007df4`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9881`33141430 fffff806`66212aa0 : 00000000`00000001 ffff9881`00000000 ffff8803`a3042550 ffff8803`a1613080 : nt!MiDeletePagablePteRange+0x4f1
ffff9881`33141740 fffff806`666007f3 : ffff8803`a1613080 00000000`00000000 ffff8803`00000000 ffff8803`00000000 : nt!MiDeleteVad+0x360
ffff9881`33141850 fffff806`665feaaf : ffff8803`a1245b00 ffff8803`a1245b00 ffff8803`ac0495f0 ffff8803`a3042080 : nt!MiCleanVad+0x43
ffff9881`33141880 fffff806`6665c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8803`a3042080 : nt!MmCleanProcessAddressSpace+0x137
ffff9881`33141900 fffff806`666b0bd6 : ffff8803`a3042080 ffff9a0b`2bca5900 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9881`33141990 fffff806`666b413e : ffff8803`00000000 00000000`00000001 00000279`66f81250 000000bb`fd693000 : nt!PspExitThread+0x5f6
ffff9881`33141a90 fffff806`66408ab8 : ffff8803`a3042080 ffff8803`a1613080 ffff9881`33141b80 ffff8803`a3042080 : nt!NtTerminateProcess+0xde
ffff9881`33141b00 00007ffd`160ed2f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bb`fd5bf788 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`160ed2f4
SYMBOL_NAME: nt!MiGetNextPageTablePte+1a5478
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1a5478
FAILURE_BUCKET_ID: 0x7a_c0000005_nt!MiGetNextPageTablePte
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4584103-842d-cac6-0c84-edfb0f8fe0b3}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff8004c5f7c240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7281
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 22475
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 3890
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : CriticalProcessDied.ExceptionCode
Value: ce52b080
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 010622-7515-01.dmp
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff8004c5f7c240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001
ERROR_CODE: (NTSTATUS) 0xce52b080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffff288`c1c65638 fffff802`0c907c22 : 00000000`000000ef ffff8004`c5f7c240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff288`c1c65640 fffff802`0c80ea17 : 00000000`00000001 fffff802`0c2fd7cd 00000000`00000002 fffff802`0c2fcde7 : nt!PspCatchCriticalBreak+0x10e
fffff288`c1c656e0 fffff802`0c6b3dd4 : ffff8004`00000000 00000000`00000000 ffff8004`c5f7c240 ffff8004`c5f7c678 : nt!PspTerminateAllThreads+0x15b37b
fffff288`c1c65750 fffff802`0c6b40fc : ffff8004`c5f7c240 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff288`c1c65790 fffff802`0c408ab8 : ffff8004`c5f7c240 ffff8004`ce52b080 fffff288`c1c65880 fffff802`0c720052 : nt!NtTerminateProcess+0x9c
fffff288`c1c65800 fffff802`0c3faf30 : fffff802`0c459e45 fffff288`c1c668c0 fffff288`c1c668c0 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffff288`c1c65998 fffff802`0c459e45 : fffff288`c1c668c0 fffff288`c1c668c0 ffffffff`ffffffff ffffffff`ffffffff : nt!KiServiceLinkage
fffff288`c1c659a0 fffff802`0c51cc92 : 00000000`00000001 fffff288`c1c66200 00000000`c0000023 00000000`00000003 : nt!KiDispatchException+0x174515
fffff288`c1c661d0 fffff802`0c3f7b4b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseException+0x2b2
fffff288`c1c669c0 fffff802`0c408ab8 : ffff8004`ce52b000 ffff8004`cc93ac80 fffff288`c1c66b80 00000000`00002010 : nt!NtRaiseException+0x7b
fffff288`c1c66b00 00007ffe`405bbcca : 00000000`0000003c 00000000`00000000 00000000`00000000 00000000`00003f68 : nt!KiSystemServiceCopyEnd+0x28
0000009c`736fe1e8 00000000`0000003c : 00000000`00000000 00000000`00000000 00000000`00003f68 00000000`00000000 : 0x00007ffe`405bbcca
0000009c`736fe1f0 00000000`00000000 : 00000000`00000000 00000000`00003f68 00000000`00000000 00000000`00000000 : 0x3c
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_ce52b080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d013cd11-c2e7-a54d-6f33-0a1149bbebc0}
Followup: MachineOwner
---------