Windows 10 Mavi Ekran Hatası Ve Dump Dosyası

Bu konuyu okuyanlar

HEDEC

Asistan
Katılım
19 Haziran 2019
Mesajlar
157
Reaksiyon puanı
37
Puanları
28
Yaş
24
Arkadaşlar merhaba, bugün mavi ekran sorunu ile karşılaştım. Minidump dosyasının metnini aşağıya bırakıyorum. Windows SSD de kurulu. Birkaç gündür D diskinde yavaşlama ve oyunları açmadığını farkettim. Bugün sabah D diskini tarattığımda bad sector ile karşılaştım ve diskin içinde yaklaşık 800mb boyutunda DUMP 2635 adlı dosya oluştuğunu gördüm. (Mavi ekrandan sonra oluştu).
Sorun neden kaynaklanıyor olabilir? Yardımlarınız için şimdiden teşekkür ederim.

D Diskinin tarama sonucu: Screenshot

Windows klasörlerinin içindeki Minidump dosyası:

Kod:
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\042421-13390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff806`38800000 PsLoadedModuleList = 0xfffff806`3942a3d0
Debug session time: Sat Apr 24 10:05:20.018 2021 (UTC + 3:00)
System Uptime: 0 days 0:15:19.687
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
..........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`38bf5e40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffbd0e`d3b9e620=000000000000001a
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 000000000003bd56
Arg3: 00000000f9a22d60
Arg4: 00000000cc260e8f

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2953

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12229

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 95779

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Memory.System.Errors.PageHashErrors
    Value: 1


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: 3bd56

BUGCHECK_P3: f9a22d60

BUGCHECK_P4: cc260e8f

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME:  ffffbd0ed3b9f540 -- (.trap 0xffffbd0ed3b9f540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffad0fc3635048
rdx=ffffad0fc3635000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80638f564f1 rsp=ffffbd0ed3b9f6d0 rbp=fffff80639450c80
r8=ffffbd0ed3b9f630  r9=00000000ffffffff r10=7ffffffffffffffc
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiFreeImageLoadConfig+0x9:
fffff806`38f564f1 488b4910        mov     rcx,qword ptr [rcx+10h] ds:ffffad0f`c3635058=????????????????
Resetting default scope

STACK_TEXT:
ffffbd0e`d3b9e618 fffff806`38d57f5d     : 00000000`0000001a 00000000`0000003f 00000000`0003bd56 00000000`f9a22d60 : nt!KeBugCheckEx
ffffbd0e`d3b9e620 fffff806`38ab69a1     : ffffc40b`2ad7be00 ffffffff`ffffffff 00000000`00000000 ffffd800`cf8afe38 : nt!MiValidatePagefilePageHash+0x331
ffffbd0e`d3b9e700 fffff806`38ab4b35     : ffffbd0e`00010000 ffffbd0e`d3b9e800 ffffbd0e`d3b9e890 fffff806`00000000 : nt!MiWaitForInPageComplete+0x351
ffffbd0e`d3b9e7f0 fffff806`38a0c9c8     : 00000000`c0033333 00000000`00000000 0000019f`15fc7000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffbd0e`d3b9e900 fffff806`38c03f5e     : 00000000`00000001 ffffbd0e`d3b9eb00 00000000`00000002 00000000`00000001 : nt!MmAccessFault+0x468
ffffbd0e`d3b9eaa0 fffff806`38af49e0     : ffff9681`ceb49000 ffffc40b`28742050 fffff806`38ac42d0 ffff9681`ceb49000 : nt!KiPageFault+0x35e
ffffbd0e`d3b9ec38 fffff806`38ac42d0     : ffff9681`ceb49000 ffff9681`ceb49000 00000000`00000002 0000019f`15fc6fa0 : nt!RtlDecompressBufferXpressLz+0x50
ffffbd0e`d3b9ec50 fffff806`38ac4018     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00040000 : nt!RtlDecompressBufferEx+0x60
ffffbd0e`d3b9eca0 fffff806`38ac3ea5     : 00000000`00000004 fffff806`38ac3a0e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffbd0e`d3b9ed60 fffff806`38ac36dc     : 00000000`00000001 00000000`00016fa0 00000000`00000000 ffffc40b`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffbd0e`d3b9edb0 fffff806`38ac350c     : 00000000`ffffffff ffffc40b`2d499000 ffffbd0e`d3b9ee90 ffffc40b`2da79510 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffbd0e`d3b9ee50 fffff806`38ac3359     : ffff9681`cd3b0730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffbd0e`d3b9ef00 fffff806`38ac3211     : ffffc40b`28742000 ffffc40b`2da79510 ffffc40b`2d499000 ffffc40b`287439c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffbd0e`d3b9ef80 fffff806`38b54518     : ffffc40b`2051e040 ffffc40b`28742000 00000000`00000000 ffffc40b`2e1f0830 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffbd0e`d3b9efb0 fffff806`38b0a397     : fffff806`38ac31f0 ffffbd0e`d3b9f050 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbd0e`d3b9f020 fffff806`38a3e0b4     : ffffbd0e`d3b9f120 00000000`31526d73 00000000`000003ff fffff806`395239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffbd0e`d3b9f0f0 fffff806`38a3dae8     : 00000000`0000000c 00000000`000003ff ffffbd0e`d3b9f1a0 fffff806`395239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffbd0e`d3b9f140 fffff806`38b095f7     : 00000000`0000000c 00000000`00000010 ffffc40b`2da79510 ffffc40b`2e1f0830 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffbd0e`d3b9f1d0 fffff806`38b1d3ab     : ffffc40b`00000010 ffffc40b`2e1f08f0 00000000`00000000 ffffc40b`28742000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffbd0e`d3b9f240 fffff806`38ab6f60     : ffffbd0e`00000100 00000000`00000000 ffffbd0e`d3b9f498 fffff806`38ab4eb0 : nt!SmPageRead+0x33
ffffbd0e`d3b9f290 fffff806`38ab4a0d     : 00000000`00000002 ffffbd0e`d3b9f320 ffffbd0e`d3b9f498 ffffc40b`2e1f07e0 : nt!MiIssueHardFaultIo+0x10c
ffffbd0e`d3b9f2e0 fffff806`38a0c9c8     : 00000000`c0033333 00000000`00000000 ffffad0f`c3635058 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffbd0e`d3b9f3a0 fffff806`38c03f5e     : ffffc40b`00000012 ffffad0f`00000004 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
ffffbd0e`d3b9f540 fffff806`38f564f1     : 00000000`00000000 a2e64ead`00000000 ffffbd0e`d3b9f7a0 00000000`00000000 : nt!KiPageFault+0x35e
ffffbd0e`d3b9f6d0 fffff806`38f5649b     : 00000000`00000103 00000000`00000000 fffff806`3944ca00 fffff806`38daff75 : nt!MiFreeImageLoadConfig+0x9
ffffbd0e`d3b9f700 fffff806`38ab9658     : ffffc40b`2c96c230 ffffc40b`2c96c0d0 ffffc40b`2c96c110 00000000`00000000 : nt!MiFreeRelocations+0x43
ffffbd0e`d3b9f750 fffff806`38ab6fb0     : 00000000`00000000 ffffad0f`be738a00 ffffc40b`2c96c0d0 01000000`00100000 : nt!MiDeleteControlArea+0xe0
ffffbd0e`d3b9f7a0 fffff806`38e3e3f8     : 00000000`00000818 00000000`000800a1 fffff806`39450c80 ffffad0f`be738a00 : nt!MiDereferenceControlAreaProbe+0x24
ffffbd0e`d3b9f7d0 fffff806`38b843bd     : 00000000`00000001 00000000`00000000 ffffbd0e`d3b9f8a0 ffffc40b`2c96c0d8 : nt!MiSegmentDelete+0xf4
ffffbd0e`d3b9f820 fffff806`38bb9259     : 00000000`00000000 fffff806`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
ffffbd0e`d3b9f8e0 fffff806`38b17e85     : ffffc40b`2051e040 ffffc40b`2051e040 00000000`00000080 fffff806`38bb9130 : nt!MiDereferenceSegmentThread+0x129
ffffbd0e`d3b9fb10 fffff806`38bfd498     : fffff806`365e2180 ffffc40b`2051e040 fffff806`38b17e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffbd0e`d3b9fb60 00000000`00000000     : ffffbd0e`d3ba0000 ffffbd0e`d3b99000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
 
Üst