IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

Dosyalarınızı erişime açınız.

1622815176289.png
 
Driverlarının hepsini Güvenli Modda DDU ile kaldırınız.
Galiba sorunlarınız RAM'den tabi ki @PanzerTR hocamız benden daha iyi bilir ama ben sorunların belleklerden olduğunu düşünüyorum Memtest86 ile bellek testi yapmanızı öneririm.
[CODE title="Mavi Ekran Analizi"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd80e7b774123, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001ad11f34, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 57276
Key : Analysis.Init.CPU.mSec
Value: 1702
Key : Analysis.Init.Elapsed.mSec
Value: 140461
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffd80e7b774123
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8001ad11f34
READ_ADDRESS: fffff8001b6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd80e7b774123
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffff96835aaa7500 -- (.trap 0xffff96835aaa7500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8001aa00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001ad11f34 rsp=ffff96835aaa7690 rbp=ffff96835aaa77c0
r8=0000000000000001 r9=0000000000000001 r10=ffffae8f56457628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExFreeHeapPool+0x124:
fffff800`1ad11f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
ffff9683`5aaa73b8 fffff800`1ae08c69 : 00000000`0000000a ffffd80e`7b774123 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9683`5aaa73c0 fffff800`1ae04f69 : ffffae8f`56457080 fffff800`1b0cb8bd ffffd80e`8c121cc0 fffff800`1ad13c0c : nt!KiBugCheckDispatch+0x69
ffff9683`5aaa7500 fffff800`1ad11f34 : 00000000`00000001 00000000`00040286 00000000`00000006 00000000`00002e34 : nt!KiPageFault+0x469
ffff9683`5aaa7690 fffff800`1b3b3149 : fffff800`27ac0000 ffffae8f`4e86dcb0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffff9683`5aaa7770 fffff800`2824ae9e : 00000000`00002e34 ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 : nt!ExFreePool+0x9
ffff9683`5aaa77a0 00000000`00002e34 : ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 : vgk+0x78ae9e
ffff9683`5aaa77a8 ffffae8f`56457080 : fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 00000000`00000001 : 0x2e34
ffff9683`5aaa77b0 fffff800`27ac0000 : 00000000`00000008 fffff800`27ac0000 00000000`00000001 00000000`00000000 : 0xffffae8f`56457080
ffff9683`5aaa77b8 00000000`00000008 : fffff800`27ac0000 00000000`00000001 00000000`00000000 00000000`00002e34 : vgk
ffff9683`5aaa77c0 fffff800`27ac0000 : 00000000`00000001 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 : 0x8
ffff9683`5aaa77c8 00000000`00000001 : 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f : vgk
ffff9683`5aaa77d0 00000000`00000000 : 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f fffff800`1ad60440 : 0x1
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.1023
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------[/CODE]
 
Son düzenleme:
Driverlarının hepsini güvenli modda DDU ile kaldırınız.

Tamam yapıyorum.
Driverlarının hepsini güvenli modda DDU ile kaldırınız.

Galiba sorunlarınız RAM'den tabii ki @PanzerTR hocamız benden daha iyi bilir ama ben sorunların belleklerden olduğunu düşünüyorum Memtest86 ile bellek testi yapmanızı öneririm.
[CODE title="Mavi Ekran Analizi"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd80e7b774123, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001ad11f34, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5374.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 57276.
Key : Analysis.Init.CPU.mSec
Value: 1702.
Key : Analysis.Init.Elapsed.mSec
Value: 140461.
Key : Analysis.Memory.CommitPeak.Mb
Value: 73.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffd80e7b774123.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8001ad11f34.
READ_ADDRESS: fffff8001b6fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffffd80e7b774123.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffff96835aaa7500 -- (.trap 0xffff96835aaa7500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8001aa00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001ad11f34 rsp=ffff96835aaa7690 rbp=ffff96835aaa77c0
r8=0000000000000001 r9=0000000000000001 r10=ffffae8f56457628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!ExFreeHeapPool+0x124:
fffff800`1ad11f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope.
STACK_TEXT:
ffff9683`5aaa73b8 fffff800`1ae08c69 : 00000000`0000000a ffffd80e`7b774123 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9683`5aaa73c0 fffff800`1ae04f69 : ffffae8f`56457080 fffff800`1b0cb8bd ffffd80e`8c121cc0 fffff800`1ad13c0c : nt!KiBugCheckDispatch+0x69
ffff9683`5aaa7500 fffff800`1ad11f34 : 00000000`00000001 00000000`00040286 00000000`00000006 00000000`00002e34 : nt!KiPageFault+0x469
ffff9683`5aaa7690 fffff800`1b3b3149 : fffff800`27ac0000 ffffae8f`4e86dcb0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffff9683`5aaa7770 fffff800`2824ae9e : 00000000`00002e34 ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 : nt!ExFreePool+0x9
ffff9683`5aaa77a0 00000000`00002e34 : ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 : vgk+0x78ae9e
ffff9683`5aaa77a8 ffffae8f`56457080 : fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 00000000`00000001 : 0x2e34.
ffff9683`5aaa77b0 fffff800`27ac0000 : 00000000`00000008 fffff800`27ac0000 00000000`00000001 00000000`00000000 : 0xffffae8f`56457080
ffff9683`5aaa77b8 00000000`00000008 : fffff800`27ac0000 00000000`00000001 00000000`00000000 00000000`00002e34 : vgk.
ffff9683`5aaa77c0 fffff800`27ac0000 : 00000000`00000001 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 : 0x8.
ffff9683`5aaa77c8 00000000`00000001 : 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f : vgk.
ffff9683`5aaa77d0 00000000`00000000 : 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f fffff800`1ad60440 : 0x1.
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption.
IMAGE_VERSION: 10.0.19041.1023
MODULE_NAME: Pool_Corruption.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption.
---------[/CODE]

Şimdi ekran kartı sürücülerini kaldır mıyım mı?
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı