FX6100 mavi ekran hatası

İşletim sistemi
Windows 10

noXtenn

Hectopat
Katılım
3 Ekim 2020
Mesajlar
1.494
Çözümler
2
Daha fazla  
Cinsiyet
Erkek
CPU: AMD FX6100 6-Core / anakart: ASUS M5A78LM-LX3 / 1.RAM: 1x4 Corsair Vengeance 4 GB 1600 MHz / 2.RAM: 1x4 G.Skill Ripjaws 4 GB 1600 MHz.
/ GPU: AMD HD7670 2 GB DDR3 / 1TB HDD /120 GB Ezcool S400 SSD.
Minidump: 120221-15687-01
 
Minidump dosyanızda "Pool_Corruption" ibaresine rastladım. Sizden Memtest yazılımı ile RAM'lerinizi test edip sonuçları bizlerle paylaşmanızı rica edicem.

Memtest : Memtest86 USB'den Çalışan RAM Test Programı

Ek olarak, aşağıda vereceğim link üzerindeki rehberi takip ederek Vanguard Anti-Cheat yazılımını tamamen kaldırıp test eder misiniz? Gerektiği takdirde sonrasında yeniden kurulabilir.

Link : https://support-valorant.riotgames....t-Vanguard-ı-Kaldırmak-ve-Devre-Dışı-Bırakmak

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9a8526f9c2a3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80766689074, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1796

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1883

    Key  : Analysis.Init.CPU.mSec
    Value: 859

    Key  : Analysis.Init.Elapsed.mSec
    Value: 33883

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73


FILE_IN_CAB:  120221-15687-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: ffff9a8526f9c2a3

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80766689074

READ_ADDRESS: fffff807670fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9a8526f9c2a3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64

TRAP_FRAME:  ffffd28b11453500 -- (.trap 0xffffd28b11453500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80766400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80766689074 rsp=ffffd28b11453690 rbp=ffffd28b114537c0
 r8=0000000000000001  r9=0000000000000000 r10=ffffe703faf10628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!ExFreeHeapPool+0x124:
fffff807`66689074 f646f304        test    byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope

STACK_TEXT:
ffffd28b`114533b8 fffff807`66809269     : 00000000`0000000a ffff9a85`26f9c2a3 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd28b`114533c0 fffff807`66805569     : fffff807`6c117924 00000000`12b9bc76 fffff807`6c309dd7 ffffe703`faf100ff : nt!KiBugCheckDispatch+0x69
ffffd28b`11453500 fffff807`66689074     : 00000000`00000283 00000000`00000001 00000000`00000000 fffff807`6bc00000 : nt!KiPageFault+0x469
ffffd28b`11453690 fffff807`66db1149     : ffffd28b`114537c0 00000000`00001600 00000000`00000004 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffffd28b`11453770 fffff807`6c3d2a34     : fffff807`6672ee40 ffffe703`faf10080 fffff807`6bc00000 00000000`00000008 : nt!ExFreePool+0x9
ffffd28b`114537a0 fffff807`6672ee3f     : ffffe703`faf10080 fffff807`6bc00000 00000000`00000008 fffff807`6bc00000 : vgk+0x7d2a34
ffffd28b`114537a8 ffffe703`faf10080     : fffff807`6bc00000 00000000`00000008 fffff807`6bc00000 00000000`00000001 : nt!PsGetCurrentProcessWow64Process+0x2f
ffffd28b`114537b0 fffff807`6bc00000     : 00000000`00000008 fffff807`6bc00000 00000000`00000001 00000000`00000000 : 0xffffe703`faf10080
ffffd28b`114537b8 00000000`00000008     : fffff807`6bc00000 00000000`00000001 00000000`00000000 00000000`00001658 : vgk
ffffd28b`114537c0 fffff807`6bc00000     : 00000000`00000001 00000000`00000000 00000000`00001658 ffffd28b`11453840 : 0x8
ffffd28b`114537c8 00000000`00000001     : 00000000`00000000 00000000`00001658 ffffd28b`11453840 fffff807`6c38b6f0 : vgk
ffffd28b`114537d0 00000000`00000000     : 00000000`00001658 ffffd28b`11453840 fffff807`6c38b6f0 fffff807`666d7910 : 0x1


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.1348

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_nt!ExFreePool

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup:     Pool_corruption
 
Son düzenleme:

Geri
Yukarı