Çözüldü Abra A5 v16.6 laptop mavi ekran veriyor

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 11

alp037

Decapat
Katılım
17 Ağustos 2021
Mesajlar
2
Daha fazla  
Cinsiyet
Erkek
RAM
16 gb ram
Ekran kartı
NVIDIA GeForce GTX 1650 Ti
İşlemci
Intel(R) Core(TM) i5-10200H CPU @ 2.40GHz
Sistem modeli; Abra A5 v16.6.

İki gün üst üste War Thunder oynarken mavi ekran hatası yedim. Laptopu iki yıldan beri kullanıyorum daha önce sıkıntı yaşamadım.
 
Son düzenleyen: Moderatör:
Çözüm
Hâlâ aynı. Bu sefer ekran kartı ile alakalı bir durum yok, direk klavye sürücüsü.

Klavye ile doğrudan bağlantılı bir araç/yazılım kaldı mı laptopta?
Monster araçlarından biri de olabilir, başka bir yazılım da olabilir.
Eğer kaldıysa bunları kaldırmaya çalışın tamamen.

Kaldırmanıza rağmen yine "kbdclass.sys" ile alakalı mavi ekran alırsanız aşağıdaki çözümü deneyebilirsiniz. Ama mutlaka kayıt defterinizin yedeğini alın. Genelde bu yöntemle bu mavi ekran hatası çözülüyor ancak bazı modeller için garantisi yok.

Aynı konu içerisindeki 2 mesajı paylaşıyorum, bunları tek bir mesajmış gibi düşünüp takip edebilirsiniz çözümü. Veya konuyu baştan okuyup ne olup ne bittiği hakkında detaylı fikir sahibi olabilirsiniz.

İlk etapta şu mesaj:

Daha sonra da şu:


Bu arada ekran kartı sürücülerine yeni güncellemeler geldi.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe791e946c048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804710032d2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3015

    Key  : Analysis.Elapsed.mSec
    Value: 4862

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 140

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7379

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 147

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffe791e946c048

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804710032d2

FILE_IN_CAB:  $RNAH3S8.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8041bd1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffe791e946c048

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8041a498ec0 -- (.trap 0xfffff8041a498ec0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe789bd3841c0 rbx=0000000000000000 rcx=ffffe789bd3841c0
rdx=000000082c0e7e88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804710032d2 rsp=fffff8041a499058 rbp=fffff8041a4990d0
 r8=00000000000000c0  r9=0000000000000038 r10=ffffe789afb39000
r11=ffffe791e946c108 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`710032d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffe791`e946c048=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff804`1a498d78 fffff804`1b440fa9     : 00000000`0000000a ffffe791`e946c048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`1a498d80 fffff804`1b43c634     : 00000000`00000000 00000000`00000000 fffff804`00000000 00000007`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`1a498ec0 fffff804`710032d2     : fffff804`71005b5d 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 : nt!KiPageFault+0x474
fffff804`1a499058 fffff804`71005b5d     : 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 fffff804`1b21c43e : kbdclass!memcpy+0x92
fffff804`1a499060 fffff804`70ff1511     : ffffe789`ae975e70 fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`1a499100 ffffe789`ae975e70     : fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 : HKKbdFltr+0x1511
fffff804`1a499108 fffff804`1a499368     : ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 : 0xffffe789`ae975e70
fffff804`1a499110 ffffe789`aedc8310     : fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 00000000`00000000 : 0xfffff804`1a499368
fffff804`1a499118 fffff804`1a499368     : 00000000`00000000 fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 : 0xffffe789`aedc8310
fffff804`1a499120 00000000`00000000     : fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 fffff804`18392180 : 0xfffff804`1a499368


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
Açıkçası dökümü incelerken direkt olarak bazı Monster cihazların kronik problemi olan ve forumda da oldukça meşhur olmuş, üzerine onlarca konu açılan klasik kbdclass.sys hatası diye düşünmüştüm. Öyle görünüyor, ancak akışı incelerken araya Nvidia ekran kartı sürücüsünün de kaynadığını gördüm. :)

Rich (BB code):
00000000`0000000a ffff801b`2f5bc950 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
00000000`00000001 ffff800f`f64af3b0 ffff800f`f202f000 fffff801`5a3c1193 : nt!KiBugCheckDispatch+0x69
fffff801`59f65cc5 ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c : nt!KiPageFault+0x474
ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c fffff801`a84585e0 : kbdclass!memcpy+0x92
ffff800f`eb5ece30 fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 : kbdclass!KeyboardClassServiceCallback+0x2d5
fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce : HKKbdFltr+0x1511
ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 : 0xffff800f`eb5ece30
fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 00000000`00000000 : 0xfffff801`581087d8
fffff801`970e57ce fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 : 0xffff800f`eb737310
fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 : 0xfffff801`581087d8
00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 fffff801`7f3e1d45 : nvlddmkm+0x657ce
fffff801`7f3f10c8 fffff801`58108699 fffff801`581087d8 00000000`00000003 : WppRecorder!WppAutoLogTrace+0x1a3
fffff801`58108699 fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 : klkbdflt+0x2c7b
fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c : klkbdflt+0x110c8
00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 : 0xfffff801`58108699
ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 : 0xfffff801`581087d8
fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 00000000`00000008 : 0x3
00000000`00000051 fffff801`523e12d3 00000000`00000008 fffff801`581086a0 : 0xffff800f`ebb35000
fffff801`7f3e26a0 00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 : i8042prt!WPP_RECORDER_SF_+0x7c
00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 : klkbdflt+0x11458
00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 : klkbdflt+0x26a0
ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 00000000`00000000 : 0xc


Hal böyle olunca, ekran kartı sürücüsüne baktım; birkaç sürüm eski kalmış.

Rich (BB code):
Timestamp:        Saturday April  8 2023  10:19:44  (64311590)

Son sürüme güncelleyin.



Sürücüleri güncelledikten sonra da hata alırsanız aşağıdaki konulara bir bakın. Mesela Monster Control Center ve Monster ile alakalı programların tamamen silinmesi vb. önerilmiş.



Döküm:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff801b2f5bc950, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80159f632d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for klkbdflt.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1952

    Key  : Analysis.Elapsed.mSec
    Value: 7984

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9444

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 146

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff801b2f5bc950

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80159f632d2

FILE_IN_CAB:  052323-32078-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8015691c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff801b2f5bc950

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  aces.exe

DPC_STACK_BASE:  FFFFF80158108FB0

TRAP_FRAME:  fffff80158108330 -- (.trap 0xfffff80158108330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800feb78e934 rbx=0000000000000000 rcx=ffff800feb78e934
rdx=0000000b43e2e01c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80159f632d2 rsp=fffff801581084c8 rbp=fffff80158108540
 r8=000000000000012c  r9=0000000000000000 r10=fffff80155eb23d0
r11=ffff801b2f5bca7c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
kbdclass!memcpy+0x92:
fffff801`59f632d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff801b`2f5bc950=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff801`581081e8 fffff801`56040fa9     : 00000000`0000000a ffff801b`2f5bc950 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`581081f0 fffff801`5603c634     : 00000000`00000001 ffff800f`f64af3b0 ffff800f`f202f000 fffff801`5a3c1193 : nt!KiBugCheckDispatch+0x69
fffff801`58108330 fffff801`59f632d2     : fffff801`59f65cc5 ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c : nt!KiPageFault+0x474
fffff801`581084c8 fffff801`59f65cc5     : ffff800f`eb737310 fffff801`5669eb9e ffff800f`ebc8395c fffff801`a84585e0 : kbdclass!memcpy+0x92
fffff801`581084d0 fffff801`a8451511     : ffff800f`eb5ece30 fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 : kbdclass!KeyboardClassServiceCallback+0x2d5
fffff801`58108570 ffff800f`eb5ece30     : fffff801`581087d8 ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce : HKKbdFltr+0x1511
fffff801`58108578 fffff801`581087d8     : ffff800f`eb737310 fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 : 0xffff800f`eb5ece30
fffff801`58108580 ffff800f`eb737310     : fffff801`581087d8 fffff801`970e57ce fffff801`523e12d3 00000000`00000000 : 0xfffff801`581087d8
fffff801`58108588 fffff801`581087d8     : fffff801`970e57ce fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 : 0xffff800f`eb737310
fffff801`58108590 fffff801`970e57ce     : fffff801`523e12d3 00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 : 0xfffff801`581087d8
fffff801`58108598 fffff801`523e12d3     : 00000000`00000000 ffff800f`ebc83ce0 fffff801`501f6180 fffff801`7f3e1d45 : nvlddmkm+0x657ce
fffff801`581085a0 fffff801`7f3e2c7b     : fffff801`7f3f10c8 fffff801`58108699 fffff801`581087d8 00000000`00000003 : WppRecorder!WppAutoLogTrace+0x1a3
fffff801`58108600 fffff801`7f3f10c8     : fffff801`58108699 fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 : klkbdflt+0x2c7b
fffff801`58108608 fffff801`58108699     : fffff801`581087d8 00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c : klkbdflt+0x110c8
fffff801`58108610 fffff801`581087d8     : 00000000`00000003 ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 : 0xfffff801`58108699
fffff801`58108618 00000000`00000003     : ffff800f`ebb35000 fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 : 0xfffff801`581087d8
fffff801`58108620 ffff800f`ebb35000     : fffff801`a9fd2d5c 00000000`00000051 fffff801`523e12d3 00000000`00000008 : 0x3
fffff801`58108628 fffff801`a9fd2d5c     : 00000000`00000051 fffff801`523e12d3 00000000`00000008 fffff801`581086a0 : 0xffff800f`ebb35000
fffff801`58108630 fffff801`7f3f1458     : fffff801`7f3e26a0 00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 : i8042prt!WPP_RECORDER_SF_+0x7c
fffff801`58108670 fffff801`7f3e26a0     : 00000000`0000000c 00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 : klkbdflt+0x11458
fffff801`58108678 00000000`0000000c     : 00000000`00000000 ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 : klkbdflt+0x26a0
fffff801`58108680 00000000`00000000     : ffff801b`2f5bc950 ffff800f`ebc83ce0 00000000`00000000 00000000`00000000 : 0xc


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Hâlâ aynı. Bu sefer ekran kartı ile alakalı bir durum yok, direk klavye sürücüsü.

Klavye ile doğrudan bağlantılı bir araç/yazılım kaldı mı laptopta?
Monster araçlarından biri de olabilir, başka bir yazılım da olabilir.
Eğer kaldıysa bunları kaldırmaya çalışın tamamen.

Kaldırmanıza rağmen yine "kbdclass.sys" ile alakalı mavi ekran alırsanız aşağıdaki çözümü deneyebilirsiniz. Ama mutlaka kayıt defterinizin yedeğini alın. Genelde bu yöntemle bu mavi ekran hatası çözülüyor ancak bazı modeller için garantisi yok.

Aynı konu içerisindeki 2 mesajı paylaşıyorum, bunları tek bir mesajmış gibi düşünüp takip edebilirsiniz çözümü. Veya konuyu baştan okuyup ne olup ne bittiği hakkında detaylı fikir sahibi olabilirsiniz.

İlk etapta şu mesaj:

Daha sonra da şu:


Bu arada ekran kartı sürücülerine yeni güncellemeler geldi.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe791e946c048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff804710032d2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3015

    Key  : Analysis.Elapsed.mSec
    Value: 4862

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 140

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7379

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 147

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffe791e946c048

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804710032d2

FILE_IN_CAB:  $RNAH3S8.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8041bd1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffe791e946c048

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8041a498ec0 -- (.trap 0xfffff8041a498ec0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe789bd3841c0 rbx=0000000000000000 rcx=ffffe789bd3841c0
rdx=000000082c0e7e88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804710032d2 rsp=fffff8041a499058 rbp=fffff8041a4990d0
 r8=00000000000000c0  r9=0000000000000038 r10=ffffe789afb39000
r11=ffffe791e946c108 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff804`710032d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffe791`e946c048=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff804`1a498d78 fffff804`1b440fa9     : 00000000`0000000a ffffe791`e946c048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`1a498d80 fffff804`1b43c634     : 00000000`00000000 00000000`00000000 fffff804`00000000 00000007`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`1a498ec0 fffff804`710032d2     : fffff804`71005b5d 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 : nt!KiPageFault+0x474
fffff804`1a499058 fffff804`71005b5d     : 00000000`c6bd2478 fffff804`1a4990d0 ffffe789`cb0f77e0 fffff804`1b21c43e : kbdclass!memcpy+0x92
fffff804`1a499060 fffff804`70ff1511     : ffffe789`ae975e70 fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`1a499100 ffffe789`ae975e70     : fffff804`1a499368 ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 : HKKbdFltr+0x1511
fffff804`1a499108 fffff804`1a499368     : ffffe789`aedc8310 fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 : 0xffffe789`ae975e70
fffff804`1a499110 ffffe789`aedc8310     : fffff804`1a499368 00000000`00000000 fffff804`1a9712d3 00000000`00000000 : 0xfffff804`1a499368
fffff804`1a499118 fffff804`1a499368     : 00000000`00000000 fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 : 0xffffe789`aedc8310
fffff804`1a499120 00000000`00000000     : fffff804`1a9712d3 00000000`00000000 ffffe789`b003e4c0 fffff804`18392180 : 0xfffff804`1a499368


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Çözüm

Technopat Haberler

Geri
Yukarı