Sistemde " WHEA_UNCORRECTABLE_ERROR" mavi ekran hatası

Halludba

Centipat
Katılım
7 Ocak 2023
Mesajlar
14
Daha fazla  
Cinsiyet
Erkek
Birkaç ay önce almıstım bu günlerde birden fazla mavi ekran hatası alıyorum. Minidump dosya içi boş minidumps dosyası içinde bunlar var hatalar. WHEA_UNCORRECTABLE_ERROR, cricital procces died gibi.
 
Son düzenleyen: Moderatör:
Sorunun asıl kaynağı Monster Control Center tamamen silerek de kurtulabilirsin. Ya da aşağıdaki kayıt defteri düzenleyicisi değişikliklerini deneyerek de sorununu çözebilirsin. Eğer hala devam ederse o zaman tamamen silersen sorun çözülecektir.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318} klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318} klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa287aef5b8c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8038c9b32d2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1911

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10120

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  120922-19828-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffa287aef5b8c8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8038c9b32d2

READ_ADDRESS: fffff8035731c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa287aef5b8c8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80353182a00 -- (.trap 0xfffff80353182a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa2835ce88280 rbx=0000000000000000 rcx=ffffa2835ce88280
rdx=00000004520d3648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8038c9b32d2 rsp=fffff80353182b98 rbp=fffff80353182c10
 r8=00000000000000c0  r9=0000000000000038 r10=ffffa2834d6ed000
r11=ffffa287aef5b988 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff803`8c9b32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffa287`aef5b8c8=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff803`531828b8 fffff803`56a3b0a9     : 00000000`0000000a ffffa287`aef5b8c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`531828c0 fffff803`56a36fe8     : ffffa283`4a65a6e8 00000000`00000000 ffffa283`4a65a180 fffff803`72ab2d22 : nt!KiBugCheckDispatch+0x69
fffff803`53182a00 fffff803`8c9b32d2     : fffff803`8c9b5b5d 00000000`a3c0d408 fffff803`53182c10 ffffa283`52ab6aa0 : nt!KiPageFault+0x468
fffff803`53182b98 fffff803`8c9b5b5d     : 00000000`a3c0d408 fffff803`53182c10 ffffa283`52ab6aa0 fffff803`9b8e2d5c : kbdclass!memcpy+0x92
fffff803`53182ba0 fffff803`9dfe1511     : ffffa283`4d20c190 fffff803`53182d68 ffffa283`4a78a310 fffff803`53182d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`53182c40 ffffa283`4d20c190     : fffff803`53182d68 ffffa283`4a78a310 fffff803`53182d68 00000000`00000008 : HKKbdFltr+0x1511
fffff803`53182c48 fffff803`53182d68     : ffffa283`4a78a310 fffff803`53182d68 00000000`00000008 fffff803`53182cc0 : 0xffffa283`4d20c190
fffff803`53182c50 ffffa283`4a78a310     : fffff803`53182d68 00000000`00000008 fffff803`53182cc0 ffffa283`4d20c040 : 0xfffff803`53182d68
fffff803`53182c58 fffff803`53182d68     : 00000000`00000008 fffff803`53182cc0 ffffa283`4d20c040 fffff803`9dfe13f0 : 0xffffa283`4a78a310
fffff803`53182c60 00000000`00000008     : fffff803`53182cc0 ffffa283`4d20c040 fffff803`9dfe13f0 fffff803`52dff180 : 0xfffff803`53182d68
fffff803`53182c68 fffff803`53182cc0     : ffffa283`4d20c040 fffff803`9dfe13f0 fffff803`52dff180 fffff803`9b8eb848 : 0x8
fffff803`53182c70 ffffa283`4d20c040     : fffff803`9dfe13f0 fffff803`52dff180 fffff803`9b8eb848 ffffa283`4d20c190 : 0xfffff803`53182cc0
fffff803`53182c78 fffff803`9dfe13f0     : fffff803`52dff180 fffff803`9b8eb848 ffffa283`4d20c190 fffff803`53182cf9 : 0xffffa283`4d20c040
fffff803`53182c80 fffff803`52dff180     : fffff803`9b8eb848 ffffa283`4d20c190 fffff803`53182cf9 ffffa283`4d33adb0 : HKKbdFltr+0x13f0
fffff803`53182c88 fffff803`9b8eb848     : ffffa283`4d20c190 fffff803`53182cf9 ffffa283`4d33adb0 fffff803`9b8f0258 : 0xfffff803`52dff180
fffff803`53182c90 fffff803`568b98ba     : 00000000`00000000 ffffa283`00000010 00000000`00000000 ffffc901`23856ab0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff803`53182d60 fffff803`568b90c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff803`531832b0 fffff803`56a2c0ae     : 00000000`00000000 fffff803`52dff180 fffff803`5734c6c0 ffffa283`57a7c040 : nt!KiRetireDpcList+0xfe4
fffff803`53183540 00000000`00000000     : fffff803`53184000 fffff803`5317d000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23435.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
 

Yeni konular

Geri
Yukarı