IRQL_NOT_LESS_OR_EQUAL hatası

Eyup demir

Femtopat
Katılım
18 Ekim 2020
Mesajlar
5
Daha fazla  
Cinsiyet
Erkek
Oyun oynarken sıkça bu sorunla karşılaşıyorum, anlayanlar yazarsa sevinirim.
 

Dosya Ekleri

  • 2020.10.22-14.21 (2).png
    2020.10.22-14.21 (2).png
    36,8 KB · Görüntüleme: 66
 
BattlEye'ı kaldırın, ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8050c4e9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6875

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 92635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8050c4e9a1e

WRITE_ADDRESS: fffff8050cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  zula.exe

DPC_STACK_BASE:  FFFFF80511072FB0

TRAP_FRAME:  fffff80511072a20 -- (.trap 0xfffff80511072a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000338fb5ebd176d rbx=0000000000000000 rcx=ffff9d0e17824000
rdx=000338fb00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c4e9a1e rsp=fffff80511072bb0 rbp=fffff80511072cb0
 r8=0000000000000000  r9=0000000000000000 r10=ffff9d0e1dfdbf88
r11=fffff80511072e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`0c4e9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff805`110728d8 fffff805`0c605e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`110728e0 fffff805`0c602169     : 000338fb`5eb96379 00000000`00000000 ffff9d0e`1dd43000 fffff805`23cc9c37 : nt!KiBugCheckDispatch+0x69
fffff805`11072a20 fffff805`0c4e9a1e     : fffff805`0904a240 ffff9d0e`178eb000 fffff805`11072e90 ffff9d0e`00000002 : nt!KiPageFault+0x469
fffff805`11072bb0 fffff805`0c4e8d24     : fffff805`09047180 00000000`00000000 00000000`00000008 00000000`00f62f62 : nt!KiExecuteAllDpcs+0x2ee
fffff805`11072d20 fffff805`0c5faee5     : 00000000`00000000 fffff805`09047180 ffff8801`9e8f8b40 00000000`349226d4 : nt!KiRetireDpcList+0x1f4
fffff805`11072fb0 fffff805`0c5facd0     : fffff805`0c5eff90 fffff805`0c43f03a 00000000`00000000 00000000`2517ff14 : nt!KxRetireDpcList+0x5
ffff850d`b8413ac0 fffff805`0c5fa585     : 00000000`349226d4 fffff805`0c5f5a11 00000000`22bfc138 ffff9d0e`20b33080 : nt!KiDispatchInterruptContinue
ffff850d`b8413af0 fffff805`0c5f5a11     : 00000000`22bfc138 ffff9d0e`20b33080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffff850d`b8413b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
 
BattlEye'ı kaldırın, ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8050c4e9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6875

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 92635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8050c4e9a1e

WRITE_ADDRESS: fffff8050cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  zula.exe

DPC_STACK_BASE:  FFFFF80511072FB0

TRAP_FRAME:  fffff80511072a20 -- (.trap 0xfffff80511072a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000338fb5ebd176d rbx=0000000000000000 rcx=ffff9d0e17824000
rdx=000338fb00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c4e9a1e rsp=fffff80511072bb0 rbp=fffff80511072cb0
r8=0000000000000000  r9=0000000000000000 r10=ffff9d0e1dfdbf88
r11=fffff80511072e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`0c4e9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff805`110728d8 fffff805`0c605e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`110728e0 fffff805`0c602169     : 000338fb`5eb96379 00000000`00000000 ffff9d0e`1dd43000 fffff805`23cc9c37 : nt!KiBugCheckDispatch+0x69
fffff805`11072a20 fffff805`0c4e9a1e     : fffff805`0904a240 ffff9d0e`178eb000 fffff805`11072e90 ffff9d0e`00000002 : nt!KiPageFault+0x469
fffff805`11072bb0 fffff805`0c4e8d24     : fffff805`09047180 00000000`00000000 00000000`00000008 00000000`00f62f62 : nt!KiExecuteAllDpcs+0x2ee
fffff805`11072d20 fffff805`0c5faee5     : 00000000`00000000 fffff805`09047180 ffff8801`9e8f8b40 00000000`349226d4 : nt!KiRetireDpcList+0x1f4
fffff805`11072fb0 fffff805`0c5facd0     : fffff805`0c5eff90 fffff805`0c43f03a 00000000`00000000 00000000`2517ff14 : nt!KxRetireDpcList+0x5
ffff850d`b8413ac0 fffff805`0c5fa585     : 00000000`349226d4 fffff805`0c5f5a11 00000000`22bfc138 ffff9d0e`20b33080 : nt!KiDispatchInterruptContinue
ffff850d`b8413af0 fffff805`0c5f5a11     : 00000000`22bfc138 ffff9d0e`20b33080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffff850d`b8413b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
bilgisayarımda battleye yok
BattlEye'ı kaldırın, ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8050c4e9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6875

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 92635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8050c4e9a1e

WRITE_ADDRESS: fffff8050cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  zula.exe

DPC_STACK_BASE:  FFFFF80511072FB0

TRAP_FRAME:  fffff80511072a20 -- (.trap 0xfffff80511072a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000338fb5ebd176d rbx=0000000000000000 rcx=ffff9d0e17824000
rdx=000338fb00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c4e9a1e rsp=fffff80511072bb0 rbp=fffff80511072cb0
r8=0000000000000000  r9=0000000000000000 r10=ffff9d0e1dfdbf88
r11=fffff80511072e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`0c4e9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff805`110728d8 fffff805`0c605e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`110728e0 fffff805`0c602169     : 000338fb`5eb96379 00000000`00000000 ffff9d0e`1dd43000 fffff805`23cc9c37 : nt!KiBugCheckDispatch+0x69
fffff805`11072a20 fffff805`0c4e9a1e     : fffff805`0904a240 ffff9d0e`178eb000 fffff805`11072e90 ffff9d0e`00000002 : nt!KiPageFault+0x469
fffff805`11072bb0 fffff805`0c4e8d24     : fffff805`09047180 00000000`00000000 00000000`00000008 00000000`00f62f62 : nt!KiExecuteAllDpcs+0x2ee
fffff805`11072d20 fffff805`0c5faee5     : 00000000`00000000 fffff805`09047180 ffff8801`9e8f8b40 00000000`349226d4 : nt!KiRetireDpcList+0x1f4
fffff805`11072fb0 fffff805`0c5facd0     : fffff805`0c5eff90 fffff805`0c43f03a 00000000`00000000 00000000`2517ff14 : nt!KxRetireDpcList+0x5
ffff850d`b8413ac0 fffff805`0c5fa585     : 00000000`349226d4 fffff805`0c5f5a11 00000000`22bfc138 ffff9d0e`20b33080 : nt!KiDispatchInterruptContinue
ffff850d`b8413af0 fffff805`0c5f5a11     : 00000000`22bfc138 ffff9d0e`20b33080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffff850d`b8413b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
Ek olarak ddu dan ekran kartını driverini kaldırırken bilgisayar illa ki güvenli modda olmak zorunlu mu
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı