DRIVER_IRQL_NOT_LESS_OR_EQUAL mavi ekran hataları

Taptic

Terapat
Sosyal Tayfı
Katılım
28 Aralık 2016
Mesajlar
11.639
Makaleler
6
Çözümler
135
Son iki gündür çeşitli mavi ekran hataları alıyorum. "memmory management", "DRIVER_IRQL_NOT_LESS_OR_EQUAL" ya da kafasına başka ne eserse. Bunlar sırayla geliyor. Önceden hiçbir derdim yoktu. OC denemeleri esnasında sistem bazen voltaj yetersizliği sebebiyle kapandı. Windows dosyalarında bir hata mı oluştu ya da sürücü meselesi mi diye bir fikir edinmeye çalışıyorum. Daha önceden yaşayan var mı?
 
Son düzenleyen: Moderatör:
Peki minidump paylaşmaya ne dersiniz :) Atın bi' bakalım.

 
Son iki gündür çeşitli mavi ekran hataları alıyorum. "memmory management", "DRIVER_IRQL_NOT_LESS_OR_EQUAL" ya da kafasına başka ne eserse. Bunlar sırayla geliyor. Önceden hiçbir derdim yoktu. OC denemeleri esnasında sistem bazen voltaj yetersizliği sebebiyle kapandı. Windows dosyalarında bir hata mı oluştu ya da sürücü meselesi mi diye bir fikir edinmeye çalışıyorum. Daha önceden yaşayan var mı?
Hocam Dump dosyalarınızı atın.

Üstte dediğiniz hata RAM sorununa işaret eder, ama emin olmak adına dosya lazım.
 
@Enes3078 @KojiroHyuga04 Galiba RAM sorunu yaşıyorum ama yine de uzman görüşü önemli. minidump.rar Paylaşımda bir hata olduysa belirtin lütfen.

Ekleme; Minidump paylaştığımdan sonra bile 3 kere mavi ekran aldım. Sıklığı arttıkça artıyor. Bir şeyleri bozduk ama umarım yazılımdan çıkar. :)
 
Son düzenleme:
Haklı olabilirsiniz. Her ne kadar Corsair'in yazılımı tetikleyebilecek olsa da Memtest yapmadan olmaz. CMK8GX4M1D3000C16 RAM'leriniz 3000 MHz'de çalıştığı görünüyor ve bu da XMP ya da OC'nin olduğu anlamına gelir. XMP'yi kapatın ve sisteme Memtest uygulayın lütfen. Ardından sonuçları bizimle paylaşırsanız sevinirim.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff00219f57390, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff00219f57390, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10983

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 102683

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3610

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff00219f57390

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff00219f57390

READ_ADDRESS: fffff8021a8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff00219f57390

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8021f690470 -- (.trap 0xfffff8021f690470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff00219f57390 rbx=0000000000000000 rcx=fffff7a700220710
rdx=fffff7a7002205b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff00219f57390 rsp=fffff8021f690608 rbp=fffff8021f690689
 r8=0000008000000000  r9=0000000000000414 r10=0000fffff00219f5
r11=ffff9d7d0e200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
fffff002`19f57390 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff002`19f57390 ??              ???

STACK_TEXT:
fffff802`1f690328 fffff802`1a009169     : 00000000`0000000a fffff002`19f57390 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff802`1f690330 fffff802`1a005469     : 00000000`00000000 ffffd08a`76bc0000 ffffd08a`7638b930 fffff802`19f30a5a : nt!KiBugCheckDispatch+0x69
fffff802`1f690470 fffff002`19f57390     : fffff802`19f58f37 fffff802`1f690680 ffffa156`195d2108 00000000`00000000 : nt!KiPageFault+0x469
fffff802`1f690608 fffff802`19f58f37     : fffff802`1f690680 ffffa156`195d2108 00000000`00000000 ffffd08a`725548b0 : 0xfffff002`19f57390
fffff802`1f690610 fffff802`19e19e67     : 00000000`00020c20 fffff802`16f211c8 00000000`000189ae fffff802`2de52d23 : nt!HalpTimerClockStop+0x37
fffff802`1f690640 fffff802`19e18b46     : 00000000`0000017b 00000000`00000001 0000000a`0d7ac596 fffff802`16f19180 : nt!KeResumeClockTimerFromIdle+0x377
fffff802`1f6906f0 fffff802`19e17274     : 00000000`00000000 00001f80`00000008 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x1756
fffff802`1f690af0 fffff802`19ffacf4     : 00000000`00000000 fffff802`1a926a00 ffffd08a`7a74d080 00000000`00000e40 : nt!PoIdle+0x374
fffff802`1f690c60 00000000`00000000     : fffff802`1f691000 fffff802`1f68b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1165

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd01e227fe70
Arg3: 00000000f9ea6690
Arg4: fffff80513cc2cce

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 12624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 24064

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3608

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffcd01e227fe70

BUGCHECK_P3: f9ea6690

BUGCHECK_P4: fffff80513cc2cce

TRAP_FRAME:  ffffcd01e227fe70 -- (.trap 0xffffcd01e227fe70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80513cc2cce rsp=00000000f9ea6690 rbp=0000000000000000
 r8=0000000000000001  r9=0000000000000000 r10=fffff80513cc27f0
r11=ffff918755421ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!CcSetDirtyPinnedData+0x4de:
fffff805`13cc2cce ff              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  00000000f9ea6690

STACK_TEXT:
ffffcd01`e227fd28 fffff805`13e09169     : 00000000`0000007f 00000000`00000008 ffffcd01`e227fe70 00000000`f9ea6690 : nt!KeBugCheckEx
ffffcd01`e227fd30 fffff805`13e03f83     : 0003eb20`e8c933d2 4d158d48`28244c8b bb2c2444`8bfff0e4 2c244c89`0000000c : nt!KiBugCheckDispatch+0x69
ffffcd01`e227fe70 fffff805`13cc2cce     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`f9ea6690 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcSetDirtyPinnedData+0x4de


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80513cc2cc5 - nt!CcSetDirtyPinnedData+4d5
    [ 84:86 ]
1 error : !nt (fffff80513cc2cc5)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: 00007ffb19d68990
Arg3: 000000000000001d
Arg4: ffffa108f5fe9b00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5656

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7834

    Key  : Analysis.Init.CPU.mSec
    Value: 1014

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3514

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ffb19d68990

BUGCHECK_P3: 1d

BUGCHECK_P4: ffffa108f5fe9b00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT:
ffffa108`f5fe9958 fffff805`13e4438e     : 00000000`0000001a 00000000`00061941 00007ffb`19d68990 00000000`0000001d : nt!KeBugCheckEx
ffffa108`f5fe9960 fffff805`13e0535e     : 000001bf`2f50d4a0 00000000`00000000 ffffffff`fffaf6f0 00000000`00000000 : nt!MmAccessFault+0x1a529e
ffffa108`f5fe9b00 00007ffb`19d68990     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000085`e7faf6b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`19d68990


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------
 

Geri
Yukarı