IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

Dosyalarınızı erişime açınız.

1622815176289.png
 
Driverlarının hepsini Güvenli Modda DDU ile kaldırınız.
Galiba sorunlarınız RAM'den tabi ki @PanzerTR hocamız benden daha iyi bilir ama ben sorunların belleklerden olduğunu düşünüyorum Memtest86 ile bellek testi yapmanızı öneririm.
[CODE title="Mavi Ekran Analizi"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd80e7b774123, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001ad11f34, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 57276
Key : Analysis.Init.CPU.mSec
Value: 1702
Key : Analysis.Init.Elapsed.mSec
Value: 140461
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffd80e7b774123
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8001ad11f34
READ_ADDRESS: fffff8001b6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd80e7b774123
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffff96835aaa7500 -- (.trap 0xffff96835aaa7500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8001aa00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001ad11f34 rsp=ffff96835aaa7690 rbp=ffff96835aaa77c0
r8=0000000000000001 r9=0000000000000001 r10=ffffae8f56457628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExFreeHeapPool+0x124:
fffff800`1ad11f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
ffff9683`5aaa73b8 fffff800`1ae08c69 : 00000000`0000000a ffffd80e`7b774123 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9683`5aaa73c0 fffff800`1ae04f69 : ffffae8f`56457080 fffff800`1b0cb8bd ffffd80e`8c121cc0 fffff800`1ad13c0c : nt!KiBugCheckDispatch+0x69
ffff9683`5aaa7500 fffff800`1ad11f34 : 00000000`00000001 00000000`00040286 00000000`00000006 00000000`00002e34 : nt!KiPageFault+0x469
ffff9683`5aaa7690 fffff800`1b3b3149 : fffff800`27ac0000 ffffae8f`4e86dcb0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffff9683`5aaa7770 fffff800`2824ae9e : 00000000`00002e34 ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 : nt!ExFreePool+0x9
ffff9683`5aaa77a0 00000000`00002e34 : ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 : vgk+0x78ae9e
ffff9683`5aaa77a8 ffffae8f`56457080 : fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 00000000`00000001 : 0x2e34
ffff9683`5aaa77b0 fffff800`27ac0000 : 00000000`00000008 fffff800`27ac0000 00000000`00000001 00000000`00000000 : 0xffffae8f`56457080
ffff9683`5aaa77b8 00000000`00000008 : fffff800`27ac0000 00000000`00000001 00000000`00000000 00000000`00002e34 : vgk
ffff9683`5aaa77c0 fffff800`27ac0000 : 00000000`00000001 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 : 0x8
ffff9683`5aaa77c8 00000000`00000001 : 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f : vgk
ffff9683`5aaa77d0 00000000`00000000 : 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f fffff800`1ad60440 : 0x1
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.1023
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------[/CODE]
 
Son düzenleme:
Driverlarının hepsini güvenli modda DDU ile kaldırınız.

Tamam yapıyorum.
Driverlarının hepsini güvenli modda DDU ile kaldırınız.

Galiba sorunlarınız RAM'den tabii ki @PanzerTR hocamız benden daha iyi bilir ama ben sorunların belleklerden olduğunu düşünüyorum Memtest86 ile bellek testi yapmanızı öneririm.
[CODE title="Mavi Ekran Analizi"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd80e7b774123, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001ad11f34, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5374.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 57276.
Key : Analysis.Init.CPU.mSec
Value: 1702.
Key : Analysis.Init.Elapsed.mSec
Value: 140461.
Key : Analysis.Memory.CommitPeak.Mb
Value: 73.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffd80e7b774123.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8001ad11f34.
READ_ADDRESS: fffff8001b6fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffffd80e7b774123.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffff96835aaa7500 -- (.trap 0xffff96835aaa7500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8001aa00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8001ad11f34 rsp=ffff96835aaa7690 rbp=ffff96835aaa77c0
r8=0000000000000001 r9=0000000000000001 r10=ffffae8f56457628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!ExFreeHeapPool+0x124:
fffff800`1ad11f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope.
STACK_TEXT:
ffff9683`5aaa73b8 fffff800`1ae08c69 : 00000000`0000000a ffffd80e`7b774123 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9683`5aaa73c0 fffff800`1ae04f69 : ffffae8f`56457080 fffff800`1b0cb8bd ffffd80e`8c121cc0 fffff800`1ad13c0c : nt!KiBugCheckDispatch+0x69
ffff9683`5aaa7500 fffff800`1ad11f34 : 00000000`00000001 00000000`00040286 00000000`00000006 00000000`00002e34 : nt!KiPageFault+0x469
ffff9683`5aaa7690 fffff800`1b3b3149 : fffff800`27ac0000 ffffae8f`4e86dcb0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffff9683`5aaa7770 fffff800`2824ae9e : 00000000`00002e34 ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 : nt!ExFreePool+0x9
ffff9683`5aaa77a0 00000000`00002e34 : ffffae8f`56457080 fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 : vgk+0x78ae9e
ffff9683`5aaa77a8 ffffae8f`56457080 : fffff800`27ac0000 00000000`00000008 fffff800`27ac0000 00000000`00000001 : 0x2e34.
ffff9683`5aaa77b0 fffff800`27ac0000 : 00000000`00000008 fffff800`27ac0000 00000000`00000001 00000000`00000000 : 0xffffae8f`56457080
ffff9683`5aaa77b8 00000000`00000008 : fffff800`27ac0000 00000000`00000001 00000000`00000000 00000000`00002e34 : vgk.
ffff9683`5aaa77c0 fffff800`27ac0000 : 00000000`00000001 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 : 0x8.
ffff9683`5aaa77c8 00000000`00000001 : 00000000`00000000 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f : vgk.
ffff9683`5aaa77d0 00000000`00000000 : 00000000`00002e34 ffff9683`5aaa7840 fffff800`28204e1f fffff800`1ad60440 : 0x1.
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption.
IMAGE_VERSION: 10.0.19041.1023
MODULE_NAME: Pool_Corruption.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption.
---------[/CODE]

Şimdi ekran kartı sürücülerini kaldır mıyım mı?
 

Yeni konular

Geri
Yukarı