Çözüldü Win32kfull.sys mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

2267

Becerikli
Katılım
4 Ocak 2024
Mesajlar
181
Çözümler
1
Beğeniler
184
  • Anakart: HP.
  • İşlemci: i3 2310M.
  • Ekran kartı: HD 3000.
  • İşletim sistemi: Nexus Lite OS 10 1909 X64.

Arkadaşlar az önce TLauncher'den Minecraft 1.16.5 sürümünde ev yaparken, bir anda mavi ekran yedim. Hata kodunu yanlış bilmiyorsam win32kfull.sys olması lazım. Çoğu kişi güncelleme diyor fakat ben Lite versiyon kullanıyorum, yani Windows Update devre dışı. Aşağıda minidump dosyası var bir inceleyip sorunun neden kaynaklandığını yazar mısınız?

minidump:minidumpp
 
Çözüm
Arkadaşlar sorun bendeymiş. Tlauncherre 6 GB RAM ayırmıştım fazla geldi herhalde. 4 GB'ye çekince sorunum çözüldü.
Hocam size bir bellek testi yazıyorum:


Kod:
CRITICAL_STRUCTURE_CORRUPTION (109)
This BugCheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a0075fa618d70f, Reserved
Arg2: b3b713e5f89ba8a1, Reserved
Arg3: ffffea471f35bc78, Failure type dependent information
Arg4: 000000000000000c, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2484

    Key  : Analysis.Elapsed.mSec
    Value: 12558

    Key  : Analysis.IO.Other.Mb
    Value: 15

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 26

    Key  : Analysis.Init.CPU.mSec
    Value: 1359

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12066

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x109

    Key  : Bugcheck.Code.TargetModel
    Value: 0x109

    Key  : Failure.Bucket
    Value: MEMORY_CORRUPTION_ONE_BIT

    Key  : Failure.Hash
    Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  109

BUGCHECK_P1: a3a0075fa618d70f

BUGCHECK_P2: b3b713e5f89ba8a1

BUGCHECK_P3: ffffea471f35bc78

BUGCHECK_P4: c

FILE_IN_CAB:  041024-10296-01.dmp

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
ffffee0f`4c2f3e68 00000000`00000000     : 00000000`00000109 a3a0075f`a618d70f b3b713e5`f89ba8a1 ffffea47`1f35bc78 : nt!KeBugCheckEx


SYMBOL_NAME:  win32kfull!GreCreateDIBBrush+0

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.18362.2271

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}
 
Hocam size bir bellek testi yazıyorum:


Kod:
CRITICAL_STRUCTURE_CORRUPTION (109)
This BugCheck is generated when the kernel detects that critical kernel code or.
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code.
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel.
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware.
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a0075fa618d70f, Reserved.
Arg2: b3b713e5f89ba8a1, Reserved.
Arg3: ffffea471f35bc78, Failure type dependent information.
Arg4: 000000000000000c, Type of corrupted region, can be.
 0 : A generic data region.
 1 : Modification of a function or .pdata
 2 : A processor IDT.
 3 : A processor GDT.
 4 : Type 1 process list corruption.
 5 : Type 2 process list corruption.
 6 : Debug routine modification.
 7 : Critical MSR modification.
 8 : Object type.
 9 : A processor IVT.
 a : Modification of a system service function.
 b : A generic session data region.
 c : Modification of a session function or .pdata
 d : Modification of an import table.
 e : Modification of a session import table.
 f : Ps Win32 callout modification.
 10 : Debug switch routine modification.
 11 : IRP allocator modification.
 12 : Driver call dispatcher modification.
 13 : IRP completion dispatcher modification.
 14 : IRP deallocator modification.
 15 : A processor control register.
 16 : Critical floating point control register modification.
 17 : Local APIC modification.
 18 : Kernel notification callout modification.
 19 : Loaded module list modification.
 1a : Type 3 process list corruption.
 1b : Type 4 process list corruption.
 1c : Driver object corruption.
 1d : Executive callback object modification.
 1e : Modification of module padding.
 1f : Modification of a protected process.
 20 : A generic data region.
 21 : A page hash mismatch.
 22 : A session page hash mismatch.
 23 : Load config directory modification.
 24 : Inverted function table modification.
 25 : Session configuration modification.
 26 : An extended processor control register.
 27 : Type 1 pool corruption.
 28 : Type 2 pool corruption.
 29 : Type 3 pool corruption.
 2a : Type 4 pool corruption.
 2b : Modification of a function or .pdata
 2c : Image integrity corruption.
 2d : Processor misconfiguration.
 2e : Type 5 process list corruption.
 2f : Process shadow corruption.
 30 : Retpoline code page corruption.
 101 : General pool corruption.
 102 : Modification of win32k.sys

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2484.

 Key : Analysis.Elapsed.mSec
 Value: 12558.

 Key : Analysis.IO.Other.Mb
 Value: 15.

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 26.

 Key : Analysis.Init.CPU.mSec
 Value: 1359.

 Key : Analysis.Init.Elapsed.mSec
 Value: 12066.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 87.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x109.

 Key : Bugcheck.Code.TargetModel
 Value: 0x109.

 Key : Failure.Bucket
 Value: MEMORY_CORRUPTION_ONE_BIT

 Key : Failure.Hash
 Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

 Key : WER.OS.Branch
 Value: 19h1_release.

 Key : WER.OS.Version
 Value: 10.0.18362.1

BUGCHECK_CODE: 109.

BUGCHECK_P1: a3a0075fa618d70f.

BUGCHECK_P2: b3b713e5f89ba8a1.

BUGCHECK_P3: ffffea471f35bc78.

BUGCHECK_P4: c

FILE_IN_CAB: 041024-10296-01.dmp

MEMORY_CORRUPTOR: ONE_BIT.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

STACK_TEXT:
ffffee0f`4c2f3e68 00000000`00000000 : 00000000`00000109 a3a0075f`a618d70f b3b713e5`f89ba8a1 ffffea47`1f35bc78 : nt!KeBugCheckEx

SYMBOL_NAME: win32kfull!GreCreateDIBBrush+0

MODULE_NAME: win32kfull.

IMAGE_NAME: win32kfull.sys

IMAGE_VERSION: 10.0.18362.2271

STACK_COMMAND: .cxr; .ecxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Çok uzun sürer mi hocam bu işlem? 8 GB RAM'im var.
 
Son düzenleyen: Moderatör:
Arkadaşlar sorun bendeymiş. Tlauncherre 6 GB RAM ayırmıştım fazla geldi herhalde. 4 GB'ye çekince sorunum çözüldü.
 
Çözüm
Geri
Yukarı Alt