Raxeon
Yoctopat
- Katılım
- 30 Temmuz 2025
- Mesajlar
- 3
Daha fazla
- Cinsiyet
- Erkek
- Ekran kartı
- RX580
- Anakart
- gigabyte b450m ds3h
- İşlemci
- amd ryzen 3 3300x 4 core processor 3.80 ghz
2 aydır çözmeye çalıştığım bir sorun var. Çoğunlukla oyunlara girdiğim zaman (LoL, Valorant, Albion Online, Hitman) mavi ekran hatası alıyorum. WinDbg programına dump dosyasını okuttuğumda bu metni verdi. Sorun nerede yardımcı olabilir misiniz?
Not: PSU kablosunu değiştirdim, CMD üzerinden scan yaptım; BIOS ayarlarımı varsayılana geri getirdim, bilgisayarımı temizledim. Prizden kaynaklı olabilir diye odayı değiştirdim fakat işe yaramadı.
Not: PSU kablosunu değiştirdim, CMD üzerinden scan yaptım; BIOS ayarlarımı varsayılana geri getirdim, bilgisayarımı temizledim. Prizden kaynaklı olabilir diye odayı değiştirdim fakat işe yaramadı.
Kod:
-
*******************************************************************************
*
Bugcheck Analysis *
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdcc119411968, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804126a611f, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1593.
Key : Analysis.Elapsed.mSec
Value: 10265.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 26.
Key : Analysis.Init.CPU.mSec
Value: 343.
Key : Analysis.Init.Elapsed.mSec
Value: 54156.
Key : Analysis.Memory.CommitPeak.Mb
Value: 104.
Key : Analysis.Version.DbgEng
Value: 10.0.27871.1001
Key : Analysis.Version.Description
Value: 10.2505.01.02 amd64fre.
Key : Analysis.Version.Ext
Value: 1.2505.1.2
Key : Bugcheck.Code.LegacyAPI
Value: 0xa.
Key : Bugcheck.Code.TargetModel
Value: 0xa.
Key : Dump.Attributes.AsUlong
Value: 0x1008.
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0.
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!MiGetPageProtection
Key : Failure.Exception.IP.Address
Value: 0xfffff804126a611f.
Key : Failure.Exception.IP.Module
Value: nt.
Key : Failure.Exception.IP.Offset
Value: 0x2a611f.
Key : Failure.Hash
Value: {41372a35-237d-1281-82f6-8f5f9bf6044a}
BUGCHECK_CODE: a
BUGCHECK_P1: ffffdcc119411968.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804126a611f.
FILE_IN_CAB: 062224-11234-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008.
Kernel Generated Triage Dump.
FAULTING_THREAD: ffffab0cc19f3040.
READ_ADDRESS: fffff8041311c4a8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffffdcc119411968.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUx.
STACK_TEXT:
fffffa83`a055d268 fffff804`12830129 : 00000000`0000000a ffffdcc1`19411968 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa83`a055d270 fffff804`1282b589 : ffff9981`444d9180 fffff804`12823d77 ffffe6d9`865775bb 00000001`00000069 : nt!KiBugCheckDispatch+0x69
fffffa83`a055d3b0 fffff804`126a611f : ffffbc80`0a5525d8 fffffc7e`3f008370 fffffc7e`0106e2f0 ffffab0c`c19ed140 : nt!KiPageFault+0x489
fffffa83`a055d540 fffff804`126a552d : 00000000`00000000 0000041b`8bc00000 fffffc02`0dc5e008 fffffa83`a055d6a0 : nt!MiGetPageProtection+0xbf
fffffa83`a055d5a0 fffff804`126a5087 : ffffab0c`00000000 ffffab0c`00000000 00000000`00040282 fffff804`12ef63a9 : nt!MiQueryAddressState+0x2ed
fffffa83`a055d7c0 fffff804`12ae89df : ffffab0c`00000000 0000041b`8bc00000 00000000`41b80000 ffffab0c`d5351e10 : nt!MiQueryAddressSpan+0x137
fffffa83`a055d880 fffff804`12ae8285 : ffffab0c`c19f3040 fffffc7e`3f003210 fffffc7e`3f1f0f34 ffffab0c`00501802 : nt!MmQueryVirtualMemory+0x73f
fffffa83`a055da20 fffff804`128300a7 : ffffab0c`c19f3040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
fffffa83`a055da70 00007ffb`f1250404 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x46b
00000013`8b3ff028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f1250404
SYMBOL_NAME: nt!MiGetPageProtection+bf
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .process /r /p 0xffffab0cd93e50c0; .thread 0xffffab0cc19f3040 ; kb.
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: bf.
FAILURE_BUCKET_ID: AV_nt!MiGetPageProtection
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {41372a35-237d-1281-82f6-8f5f9bf6044a}
Followup: MachineOwner.
---------