*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6e000c6a530, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000003f, error status (normally i/o status code)
Arg3: 0000000076534880, current process (virtual address for lock type 3, or PTE)
Arg4: ffffc0018d4a65b8, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 33684
Key : Analysis.Init.CPU.mSec
Value: 1687
Key : Analysis.Init.Elapsed.mSec
Value: 32921
Key : Analysis.Memory.CommitPeak.Mb
Value: 65
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2016-08-12T09:14:00Z
Key : WER.OS.Version
Value: 8.1.9600.18438
BUGCHECK_CODE: 7a
BUGCHECK_P1: fffff6e000c6a530
BUGCHECK_P2: ffffffffc000003f
BUGCHECK_P3: 76534880
BUGCHECK_P4: ffffc0018d4a65b8
ERROR_CODE: (NTSTATUS) 0xc000003f - {Bozuk CRC} D ng sel art kl k denetimi (CRC) sa lama toplam hatas olu tu.
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.The data read from storage does not match the original data written.This indicates the data was corrupted by the storage stack, or device hardware.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffffd00020ca2170 -- (.trap 0xffffd00020ca2170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc00188ab24f0 rbx=0000000000000000 rcx=ffffc00188ab24e0
rdx=ffffc0018a0d4c50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023f2b4a80 rsp=ffffd00020ca2300 rbp=0000000000000047
r8=ffffc00188ab2f40 r9=ffffc0017d41b010 r10=ffffc0018d4a65b0
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExDeferredFreePool+0x210:
fffff802`3f2b4a80 49394208 cmp qword ptr [r10+8],rax ds:ffffc001`8d4a65b8=ffffffffffffffff
Resetting default scope
STACK_TEXT:
ffffd000`20ca1df8 fffff802`3f19de9b : 00000000`0000007a fffff6e0`00c6a530 ffffffff`c000003f 00000000`76534880 : nt!KeBugCheckEx
ffffd000`20ca1e00 fffff802`3f0aed58 : 00000000`00000002 ffffd000`20ca1f68 fffff802`3f36adc0 ffffd000`00000000 : nt! ?? ::FNODOBFM::`string'+0x295db
ffffd000`20ca1ef0 fffff802`3f093b5a : fffff802`3f36adc0 ffffe001`c0078040 00000000`00000000 00000000`00000000 : nt!MiIssueHardFault+0x184
ffffd000`20ca1fb0 fffff802`3f16e62f : 00000000`00000000 00000000`00000001 00000004`7e154000 fffff802`3f0a1002 : nt!MmAccessFault+0x5ba
ffffd000`20ca2170 fffff802`3f2b4a80 : 00000000`00000000 ffffe001`bd235140 00000000`00000000 ffffc001`7dee3ca0 : nt!KiPageFault+0x12f
ffffd000`20ca2300 fffff802`3f2b384e : ffffc001`8860f880 ffffc001`7dee3ca0 00000000`00000000 00000000`00000003 : nt!ExDeferredFreePool+0x210
ffffd000`20ca2380 fffff802`3f3be2b2 : 00000000`00000000 ffffe001`bd88d660 00000000`00000004 00000000`00000021 : nt!ExFreePoolWithTag+0x84e
ffffd000`20ca2470 fffff802`3f05c3ea : ffffd000`20ca2a00 00000000`00000000 00000000`8aaae200 7fffffff`fffffffc : nt!RtlpNewSecurityObject+0xca2
ffffd000`20ca27b0 fffff802`3f3bd495 : 00000000`00000000 ffffd000`20ca2964 00000000`00000000 00000000`00000000 : nt!SeAssignSecurityEx2+0x72
ffffd000`20ca2810 fffff802`3f3bcee2 : ffffd000`00000000 ffffd000`20ca2960 ffffe001`bde01ef0 00000000`00000001 : nt!ObpAssignSecurity+0xbd
ffffd000`20ca28b0 fffff802`3f3bcb72 : ffffe001`00000000 00000000`00000001 00000000`00000000 ffffe001`bd88d660 : nt!ObInsertObjectEx+0x2b2
ffffd000`20ca2b30 fffff802`3f16fbb3 : ffffe001`c0078040 00000000`001f0003 00000079`c056eb28 00000000`00000000 : nt!NtCreateEvent+0x17a
ffffd000`20ca2bd0 00007ffd`82e40b3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000079`c056eb08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`82e40b3a
SYMBOL_NAME: nt!ExDeferredFreePool+210
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 6.3.9600.18438
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 210
FAILURE_BUCKET_ID: 0x7a_c000003f_nt!ExDeferredFreePool
OS_VERSION: 8.1.9600.18438
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {2e68c6c0-1a59-e637-0560-3803132531ee}
Followup: Pool_corruption
---------