IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

İşletim sistemi
Windows 10

Frenoussect

Femtopat
Katılım
19 Ağustos 2020
Mesajlar
57
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Sistem özelliklerini yazamıyorum. Dosyaların sahibiyle yakın değilim. Anlayan arkadaşlar analiz yapabilir mi?

 
Corsair iCUE'yu kaldırsın. Sorun bu yazılımın CPU izleme programından kaynaklı görünüyor. CPU-Z varsa onu da kaldırsın.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000475dbffa08, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8047d1f1dc7, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18628

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9336

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 475dbffa08

BUGCHECK_P2: f

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8047d1f1dc7

WRITE_ADDRESS: fffff8047dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000475dbffa08

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Corsair.Service.CpuIdRemote64.exe

TRAP_FRAME:  ffffda827a741030 -- (.trap 0xffffda827a741030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff7d480222000
rdx=000000475dbffa08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047d1f1dc7 rsp=ffffda827a7411c8 rbp=fffff7d480222000
r8=0000000000000060  r9=0000000000000060 r10=0000fffff8047d1f
r11=ffffb8fb8a600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!HalpPciReadMmConfigUlong+0x7:
fffff804`7d1f1dc7 8902            mov     dword ptr [rdx],eax ds:00000047`5dbffa08=????????
Resetting default scope

STACK_TEXT:
ffffda82`7a740ee8 fffff804`7d207b69     : 00000000`0000000a 00000047`5dbffa08 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
ffffda82`7a740ef0 fffff804`7d203e69     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffda82`7a741030 fffff804`7d1f1dc7     : fffff804`7d1036d2 00000000`00000001 ffff8483`e69649d0 ffff5019`f1254ed0 : nt!KiPageFault+0x469
ffffda82`7a7411c8 fffff804`7d1036d2     : 00000000`00000001 ffff8483`e69649d0 ffff5019`f1254ed0 ffff8483`da04d9e0 : nt!HalpPciReadMmConfigUlong+0x7
ffffda82`7a7411d0 fffff804`7d103502     : 00000000`00000000 00000000`00000004 00000000`00000060 00000000`00000000 : nt!HalpPCIPerformConfigAccess+0x5a
ffffda82`7a741200 fffff804`7d1033d7     : 00000000`00000000 00000000`00000004 00000047`5dbffa08 00000000`00000000 : nt!HalpPciAccessMmConfigSpace+0x82
ffffda82`7a741240 fffff804`7d19b62e     : 00000000`00000000 00000000`00000000 00000047`5dbffa08 00000000`00000004 : nt!HalpPCIConfig+0xa7
ffffda82`7a7412c0 fffff804`7d19b5a6     : 00000000`00000000 00000000`00000060 00000000`00000000 00000000`00000004 : nt!HalpReadPCIConfig+0x5a
ffffda82`7a741310 fffff804`7d19b4a1     : 00000000`00000002 fffff804`7d048727 00000000`00000000 00000000`00000000 : nt!HalpGetPCIData+0xf2
ffffda82`7a7413e0 fffff804`8c174455     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalGetBusDataByOffset+0x41
ffffda82`7a741420 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000060 : cpuz150_x64+0x4455


SYMBOL_NAME:  cpuz150_x64+4455

MODULE_NAME: cpuz150_x64

IMAGE_NAME:  cpuz150_x64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4455

FAILURE_BUCKET_ID:  AV_cpuz150_x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {613679c3-25a8-ff59-4c4a-b7463c7dcc5a}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000054023ff6b8, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80764bf1dc7, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4717

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10995

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12100

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 54023ff6b8

BUGCHECK_P2: f

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80764bf1dc7

WRITE_ADDRESS: fffff807654fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000054023ff6b8

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Corsair.Service.CpuIdRemote64.exe

TRAP_FRAME:  ffff8e81d27aa030 -- (.trap 0xffff8e81d27aa030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff7e380222000
rdx=00000054023ff6b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80764bf1dc7 rsp=ffff8e81d27aa1c8 rbp=fffff7e380222000
r8=0000000000000060  r9=0000000000000060 r10=0000fffff80764bf
r11=ffff85fad5400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!HalpPciReadMmConfigUlong+0x7:
fffff807`64bf1dc7 8902            mov     dword ptr [rdx],eax ds:00000054`023ff6b8=????????
Resetting default scope

STACK_TEXT:
ffff8e81`d27a9ee8 fffff807`64c07b69     : 00000000`0000000a 00000054`023ff6b8 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
ffff8e81`d27a9ef0 fffff807`64c03e69     : ffffe203`390e544c ffff8e81`00000001 00000000`00000001 ffff8e81`00000000 : nt!KiBugCheckDispatch+0x69
ffff8e81`d27aa030 fffff807`64bf1dc7     : fffff807`64b036d2 00000000`00000001 ffffe203`50798a00 ffff45b8`5948e12b : nt!KiPageFault+0x469
ffff8e81`d27aa1c8 fffff807`64b036d2     : 00000000`00000001 ffffe203`50798a00 ffff45b8`5948e12b ffffe203`4c4a6a00 : nt!HalpPciReadMmConfigUlong+0x7
ffff8e81`d27aa1d0 fffff807`64b03502     : 00000000`00000000 00000000`00000004 00000000`00000060 00000000`00000000 : nt!HalpPCIPerformConfigAccess+0x5a
ffff8e81`d27aa200 fffff807`64b033d7     : 00000000`00000000 00000000`00000004 00000054`023ff6b8 00000000`00000000 : nt!HalpPciAccessMmConfigSpace+0x82
ffff8e81`d27aa240 fffff807`64b9b62e     : 00000000`00000000 00000000`00000000 00000054`023ff6b8 00000000`00000004 : nt!HalpPCIConfig+0xa7
ffff8e81`d27aa2c0 fffff807`64b9b5a6     : 00000000`00000000 00000000`00000060 00000000`00000000 00000000`00000004 : nt!HalpReadPCIConfig+0x5a
ffff8e81`d27aa310 fffff807`64b9b4a1     : 00000000`00000002 fffff807`64a48727 ffff8e81`d27aa4d8 fffff807`64a5b200 : nt!HalpGetPCIData+0xf2
ffff8e81`d27aa3e0 fffff807`76934455     : 00000000`00000000 00007ffa`562d4000 00000000`00000029 00000000`00000000 : nt!HalGetBusDataByOffset+0x41
ffff8e81`d27aa420 00000000`00000000     : 00007ffa`562d4000 00000000`00000029 00000000`00000000 fffff807`00000060 : cpuz150_x64+0x4455


SYMBOL_NAME:  cpuz150_x64+4455

MODULE_NAME: cpuz150_x64

IMAGE_NAME:  cpuz150_x64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4455

FAILURE_BUCKET_ID:  AV_cpuz150_x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {613679c3-25a8-ff59-4c4a-b7463c7dcc5a}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000fd243ff528, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8014cff1dc7, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4062

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12167

    Key  : Analysis.Init.CPU.mSec
    Value: 655

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4329

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: fd243ff528

BUGCHECK_P2: f

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8014cff1dc7

WRITE_ADDRESS: fffff8014d8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000fd243ff528

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Corsair.Service.CpuIdRemote64.exe

TRAP_FRAME:  fffffd844d2df030 -- (.trap 0xfffffd844d2df030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff7a4c0222000
rdx=000000fd243ff528 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014cff1dc7 rsp=fffffd844d2df1c8 rbp=fffff7a4c0222000
r8=0000000000000060  r9=0000000000000060 r10=0000fffff8014cff
r11=ffffa4fc55a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!HalpPciReadMmConfigUlong+0x7:
fffff801`4cff1dc7 8902            mov     dword ptr [rdx],eax ds:000000fd`243ff528=????????
Resetting default scope

STACK_TEXT:
fffffd84`4d2deee8 fffff801`4d007b69     : 00000000`0000000a 000000fd`243ff528 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
fffffd84`4d2deef0 fffff801`4d003e69     : ffffe106`6897c6d0 fffff801`4ce66a27 ffffe106`6897c6d0 fffffd84`4d2df0a9 : nt!KiBugCheckDispatch+0x69
fffffd84`4d2df030 fffff801`4cff1dc7     : fffff801`4cf036d2 00000000`00000000 00000000`00000000 ffff1f9d`b92576ef : nt!KiPageFault+0x469
fffffd84`4d2df1c8 fffff801`4cf036d2     : 00000000`00000000 00000000`00000000 ffff1f9d`b92576ef ffffe106`67315c50 : nt!HalpPciReadMmConfigUlong+0x7
fffffd84`4d2df1d0 fffff801`4cf03502     : 00000000`00000000 00000000`00000004 00000000`00000060 00000000`00000000 : nt!HalpPCIPerformConfigAccess+0x5a
fffffd84`4d2df200 fffff801`4cf033d7     : 00000000`00000000 00000000`00000004 000000fd`243ff528 00000000`00000000 : nt!HalpPciAccessMmConfigSpace+0x82
fffffd84`4d2df240 fffff801`4cf9b62e     : 00000000`00000000 00000000`00000000 000000fd`243ff528 00000000`00000004 : nt!HalpPCIConfig+0xa7
fffffd84`4d2df2c0 fffff801`4cf9b5a6     : 00000000`00000000 00000000`00000060 00000000`00000000 00000000`00000004 : nt!HalpReadPCIConfig+0x5a
fffffd84`4d2df310 fffff801`4cf9b4a1     : 00000000`00000002 fffff801`4ce48727 fffffd84`4d2df4d8 fffff801`4ce5b200 : nt!HalpGetPCIData+0xf2
fffffd84`4d2df3e0 fffff801`5f7b4455     : 00000000`00000000 00007ffd`f6004000 00000000`00000029 00000000`00000000 : nt!HalGetBusDataByOffset+0x41
fffffd84`4d2df420 00000000`00000000     : 00007ffd`f6004000 00000000`00000029 00000000`00000000 fffffd84`00000060 : cpuz150_x64+0x4455


SYMBOL_NAME:  cpuz150_x64+4455

MODULE_NAME: cpuz150_x64

IMAGE_NAME:  cpuz150_x64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4455

FAILURE_BUCKET_ID:  AV_cpuz150_x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {613679c3-25a8-ff59-4c4a-b7463c7dcc5a}

Followup:     MachineOwner
---------
 

Geri
Yukarı