IRQL_NOT_LESS_OR_EQUAL hatası

Eyup demir

Femtopat
Katılım
18 Ekim 2020
Mesajlar
5
Daha fazla  
Cinsiyet
Erkek
Oyun oynarken sıkça bu sorunla karşılaşıyorum, anlayanlar yazarsa sevinirim.
 

Dosya Ekleri

  • 2020.10.22-14.21 (2).png
    2020.10.22-14.21 (2).png
    36,8 KB · Görüntüleme: 45
 
BattlEye'ı kaldırın, ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8050c4e9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6875

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 92635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8050c4e9a1e

WRITE_ADDRESS: fffff8050cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  zula.exe

DPC_STACK_BASE:  FFFFF80511072FB0

TRAP_FRAME:  fffff80511072a20 -- (.trap 0xfffff80511072a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000338fb5ebd176d rbx=0000000000000000 rcx=ffff9d0e17824000
rdx=000338fb00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c4e9a1e rsp=fffff80511072bb0 rbp=fffff80511072cb0
 r8=0000000000000000  r9=0000000000000000 r10=ffff9d0e1dfdbf88
r11=fffff80511072e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`0c4e9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff805`110728d8 fffff805`0c605e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`110728e0 fffff805`0c602169     : 000338fb`5eb96379 00000000`00000000 ffff9d0e`1dd43000 fffff805`23cc9c37 : nt!KiBugCheckDispatch+0x69
fffff805`11072a20 fffff805`0c4e9a1e     : fffff805`0904a240 ffff9d0e`178eb000 fffff805`11072e90 ffff9d0e`00000002 : nt!KiPageFault+0x469
fffff805`11072bb0 fffff805`0c4e8d24     : fffff805`09047180 00000000`00000000 00000000`00000008 00000000`00f62f62 : nt!KiExecuteAllDpcs+0x2ee
fffff805`11072d20 fffff805`0c5faee5     : 00000000`00000000 fffff805`09047180 ffff8801`9e8f8b40 00000000`349226d4 : nt!KiRetireDpcList+0x1f4
fffff805`11072fb0 fffff805`0c5facd0     : fffff805`0c5eff90 fffff805`0c43f03a 00000000`00000000 00000000`2517ff14 : nt!KxRetireDpcList+0x5
ffff850d`b8413ac0 fffff805`0c5fa585     : 00000000`349226d4 fffff805`0c5f5a11 00000000`22bfc138 ffff9d0e`20b33080 : nt!KiDispatchInterruptContinue
ffff850d`b8413af0 fffff805`0c5f5a11     : 00000000`22bfc138 ffff9d0e`20b33080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffff850d`b8413b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
 
BattlEye'ı kaldırın, ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8050c4e9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6875

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 92635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8050c4e9a1e

WRITE_ADDRESS: fffff8050cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  zula.exe

DPC_STACK_BASE:  FFFFF80511072FB0

TRAP_FRAME:  fffff80511072a20 -- (.trap 0xfffff80511072a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000338fb5ebd176d rbx=0000000000000000 rcx=ffff9d0e17824000
rdx=000338fb00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c4e9a1e rsp=fffff80511072bb0 rbp=fffff80511072cb0
r8=0000000000000000  r9=0000000000000000 r10=ffff9d0e1dfdbf88
r11=fffff80511072e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`0c4e9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff805`110728d8 fffff805`0c605e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`110728e0 fffff805`0c602169     : 000338fb`5eb96379 00000000`00000000 ffff9d0e`1dd43000 fffff805`23cc9c37 : nt!KiBugCheckDispatch+0x69
fffff805`11072a20 fffff805`0c4e9a1e     : fffff805`0904a240 ffff9d0e`178eb000 fffff805`11072e90 ffff9d0e`00000002 : nt!KiPageFault+0x469
fffff805`11072bb0 fffff805`0c4e8d24     : fffff805`09047180 00000000`00000000 00000000`00000008 00000000`00f62f62 : nt!KiExecuteAllDpcs+0x2ee
fffff805`11072d20 fffff805`0c5faee5     : 00000000`00000000 fffff805`09047180 ffff8801`9e8f8b40 00000000`349226d4 : nt!KiRetireDpcList+0x1f4
fffff805`11072fb0 fffff805`0c5facd0     : fffff805`0c5eff90 fffff805`0c43f03a 00000000`00000000 00000000`2517ff14 : nt!KxRetireDpcList+0x5
ffff850d`b8413ac0 fffff805`0c5fa585     : 00000000`349226d4 fffff805`0c5f5a11 00000000`22bfc138 ffff9d0e`20b33080 : nt!KiDispatchInterruptContinue
ffff850d`b8413af0 fffff805`0c5f5a11     : 00000000`22bfc138 ffff9d0e`20b33080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffff850d`b8413b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
bilgisayarımda battleye yok
BattlEye'ı kaldırın, ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8050c4e9a1e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6875

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 92635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8050c4e9a1e

WRITE_ADDRESS: fffff8050cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8050ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  zula.exe

DPC_STACK_BASE:  FFFFF80511072FB0

TRAP_FRAME:  fffff80511072a20 -- (.trap 0xfffff80511072a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000338fb5ebd176d rbx=0000000000000000 rcx=ffff9d0e17824000
rdx=000338fb00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c4e9a1e rsp=fffff80511072bb0 rbp=fffff80511072cb0
r8=0000000000000000  r9=0000000000000000 r10=ffff9d0e1dfdbf88
r11=fffff80511072e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff805`0c4e9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT:
fffff805`110728d8 fffff805`0c605e69     : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`110728e0 fffff805`0c602169     : 000338fb`5eb96379 00000000`00000000 ffff9d0e`1dd43000 fffff805`23cc9c37 : nt!KiBugCheckDispatch+0x69
fffff805`11072a20 fffff805`0c4e9a1e     : fffff805`0904a240 ffff9d0e`178eb000 fffff805`11072e90 ffff9d0e`00000002 : nt!KiPageFault+0x469
fffff805`11072bb0 fffff805`0c4e8d24     : fffff805`09047180 00000000`00000000 00000000`00000008 00000000`00f62f62 : nt!KiExecuteAllDpcs+0x2ee
fffff805`11072d20 fffff805`0c5faee5     : 00000000`00000000 fffff805`09047180 ffff8801`9e8f8b40 00000000`349226d4 : nt!KiRetireDpcList+0x1f4
fffff805`11072fb0 fffff805`0c5facd0     : fffff805`0c5eff90 fffff805`0c43f03a 00000000`00000000 00000000`2517ff14 : nt!KxRetireDpcList+0x5
ffff850d`b8413ac0 fffff805`0c5fa585     : 00000000`349226d4 fffff805`0c5f5a11 00000000`22bfc138 ffff9d0e`20b33080 : nt!KiDispatchInterruptContinue
ffff850d`b8413af0 fffff805`0c5f5a11     : 00000000`22bfc138 ffff9d0e`20b33080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffff850d`b8413b00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2ee

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ee

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
Ek olarak ddu dan ekran kartını driverini kaldırırken bilgisayar illa ki güvenli modda olmak zorunlu mu
 

Geri
Yukarı