Windows 10 LoL oynarken mavi ekran

FuNN07

Hectopat
Katılım
2 Temmuz 2020
Mesajlar
185
Çözümler
1
Evet mavi ekran hakkında sanırım 4. konum falan fakat bu sefer alttaki yazıya bakmayı unuttum :D ne mutlu ki minidump tam olarak oluştu. LoL oynuyordum ve altta Zoom açıktı dersteydim :D dün de 2 kere ırql aldım fakat bugün hataya bakmayı unuttum :( Yardımcı olursanız çok sevinirim.
 
Son düzenleme:
MSI Afterburner kaldırın. Ekran kartına hız aşırtma yaptıysanız geri alın. Valorant Anti-cheat kaldırınız. Dersteyken oyun oynamayın.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80203ae9a1e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000020

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiExecuteAllDpcs+2ee
fffff802`03ae9a1e 49894720        mov     qword ptr [r15+20h],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF80209472FB0

TRAP_FRAME:  fffff8020946b6d0 -- (.trap 0xfffff8020946b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000096746f53086 rbx=0000000000000000 rcx=ffffd78eccf46000
rdx=0000096700000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80203ae9a1e rsp=fffff8020946b860 rbp=fffff8020946b960
r8=0000000000000000  r9=0000000000000000 r10=ffffd78ecffbbe38
r11=fffff8020946bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff802`03ae9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80203c05e69 to fffff80203bf3ea0

STACK_TEXT:
fffff802`0946b588 fffff802`03c05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`0946b590 fffff802`03c02169 : ffff9480`3c2fe1f0 ffffd78e`cffec6e8 ffffd78e`d68a6000 fffff802`1929bd87 : nt!KiBugCheckDispatch+0x69
fffff802`0946b6d0 fffff802`03ae9a1e : fffff802`00fdf240 ffffd78e`ce0f1000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff802`0946b860 fffff802`03ae8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff802`0946b9d0 fffff802`03bf7a0e : 00000000`00000000 fffff802`00fdc180 fffff802`04526600 ffffd78e`d83b7080 : nt!KiRetireDpcList+0x1f4
fffff802`0946bc60 00000000`00000000 : fffff802`0946c000 fffff802`09466000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80203ae9c45-fffff80203ae9c46  2 bytes - nt!MiCheckVadSequential+35
    [ 80 f6:00 bd ]
    fffff80203ae9e1e-fffff80203ae9e22  5 bytes - nt!MiCheckVadSequential+20e (+0x1d9)
    [ d7 be 7d fb f6:a7 57 af 5e bd ]
    fffff80203ae9e2b-fffff80203ae9e2f  5 bytes - nt!MiCheckVadSequential+21b (+0x0d)
    [ d0 be 7d fb f6:a0 57 af 5e bd ]
    fffff80203b963ae-fffff80203b963b1  4 bytes - nt!MiFreeUltraMapping+32 (+0xac583)
    [ a0 7d fb f6:40 af 5e bd ]
    fffff80203bf5a18-fffff80203bf5a19  2 bytes - nt!KiInterruptDispatch+b8 (+0x5f66a)
    [ 48 ff:4c 8b ]
    fffff80203bf5a1f-fffff80203bf5a22  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 fc f9 61 ]
22 errors : !nt (fffff80203ae9c45-fffff80203bf5a22)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
DDU ile ekran kartı sürücüsünü kaldırıp güncelini kurunuz.
 
MSI Afterburner kaldırın. Ekran kartına hız aşırtma yaptıysanız geri alın. Valorant Anti-cheat kaldırınız. Dersteyken oyun oynamayın.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80203ae9a1e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000020

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiExecuteAllDpcs+2ee
fffff802`03ae9a1e 49894720        mov     qword ptr [r15+20h],rax

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF80209472FB0

TRAP_FRAME:  fffff8020946b6d0 -- (.trap 0xfffff8020946b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000096746f53086 rbx=0000000000000000 rcx=ffffd78eccf46000
rdx=0000096700000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80203ae9a1e rsp=fffff8020946b860 rbp=fffff8020946b960
r8=0000000000000000  r9=0000000000000000 r10=ffffd78ecffbbe38
r11=fffff8020946bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff802`03ae9a1e 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80203c05e69 to fffff80203bf3ea0

STACK_TEXT:
fffff802`0946b588 fffff802`03c05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`0946b590 fffff802`03c02169 : ffff9480`3c2fe1f0 ffffd78e`cffec6e8 ffffd78e`d68a6000 fffff802`1929bd87 : nt!KiBugCheckDispatch+0x69
fffff802`0946b6d0 fffff802`03ae9a1e : fffff802`00fdf240 ffffd78e`ce0f1000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff802`0946b860 fffff802`03ae8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff802`0946b9d0 fffff802`03bf7a0e : 00000000`00000000 fffff802`00fdc180 fffff802`04526600 ffffd78e`d83b7080 : nt!KiRetireDpcList+0x1f4
fffff802`0946bc60 00000000`00000000 : fffff802`0946c000 fffff802`09466000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80203ae9c45-fffff80203ae9c46  2 bytes - nt!MiCheckVadSequential+35
    [ 80 f6:00 bd ]
    fffff80203ae9e1e-fffff80203ae9e22  5 bytes - nt!MiCheckVadSequential+20e (+0x1d9)
    [ d7 be 7d fb f6:a7 57 af 5e bd ]
    fffff80203ae9e2b-fffff80203ae9e2f  5 bytes - nt!MiCheckVadSequential+21b (+0x0d)
    [ d0 be 7d fb f6:a0 57 af 5e bd ]
    fffff80203b963ae-fffff80203b963b1  4 bytes - nt!MiFreeUltraMapping+32 (+0xac583)
    [ a0 7d fb f6:40 af 5e bd ]
    fffff80203bf5a18-fffff80203bf5a19  2 bytes - nt!KiInterruptDispatch+b8 (+0x5f66a)
    [ 48 ff:4c 8b ]
    fffff80203bf5a1f-fffff80203bf5a22  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 fc f9 61 ]
22 errors : !nt (fffff80203ae9c45-fffff80203bf5a22)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Fakat valorant anti cheat kaldırırsam valorant nasıl oynicam? hız aşırtma yapmadım rx590 kullanıyorum eğer stock ayarlarda kullanırsam warzone oynarken 1-2 saat sonra wattman veriyor o yüzden 1500'e indirmiştim MHz'yi. Son yazdığınız öğüt müydü yoksa mavi ekrana sebep olabilecek bir şey miydi tam anlayamadım orayı :D
 
Neden yeni konu açıyorsunuz? Çözülmemiş bir mavi ekran konunuz var, oradan devam edin.
 
Neden yeni konu açıyorsunuz? Çözülmemiş bir mavi ekran konunuz var, oradan devam edin.
Orada IRQL hatası aldım fakat burada hatanın ne olduğunu göremediğim için yeni konu açtım.
Son yazdığım şey öğüt. Dersteyken niye oyun oynuyorsunuz😀?
Aslında antrenman modundaydım ve bilgisayar mavi ekran vericek mi diye deniyordum dün de 2 kere mavi ekran verdiği için :(
 
Orada IRQL hatası aldım fakat burada hatanın ne olduğunu göremediğim için yeni konu açtım.

Aslında antrenman modundaydım ve bilgisayar mavi ekran vericek mi diye deniyordum dün de 2 kere mavi ekran verdiği için :(
Şimdi öğrendiniz aldığınız hata aynı. İkisi de mavi ekran zaten farklı kodlar için yeni konu açmanıza gerek yok.
 

Geri
Yukarı