Rodly
Kilopat
- Katılım
- 4 Nisan 2017
- Mesajlar
- 5
Daha fazla
- Cinsiyet
- Erkek
- RAM
- 16
- Ekran kartı
- Nvidia GTX 1650
- İşlemci
- 11th Gen Intel(R) Core(TM) i5-11400H @ 2.70GHz
Monster Abra A5 v16.7.3 bilgisayarımda oyun oynarken mavi ekran hatası alıyorum. Tüm sürücülerim güncel ve daha yeni formatladım. Minidump dosyasının içeriğini aşağıya yazıyorum.
Kod:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\060823-23328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff807`07a00000 PsLoadedModuleList = 0xfffff807`086134d0
Debug session time: Thu Jun 8 20:34:12.398 2023 (UTC + 3:00)
System Uptime: 0 days 3:32:46.585
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`07e2c0f0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffb90f`d443f320=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff93097c471464, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8074ca932d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1406
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3022
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 2637
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 060823-23328-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff93097c471464
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8074ca932d2
READ_ADDRESS: fffff8070871c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff93097c471464
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RainbowSix.exe
DPC_STACK_BASE: FFFFB90FD443FFB0
TRAP_FRAME: ffffb90fd443f460 -- (.trap 0xffffb90fd443f460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff93038c587a40 rbx=0000000000000000 rcx=ffff93038c587a40
rdx=00000005efee9a24 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8074ca932d2 rsp=ffffb90fd443f5f8 rbp=ffffb90fd443f670
r8=00000000000000c0 r9=0000000000000038 r10=ffff93037baa1000
r11=ffff93097c471524 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff807`4ca932d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9309`7c471464=????????????????????????????????
Resetting default scope
STACK_TEXT:
ffffb90f`d443f318 fffff807`07e417a9 : 00000000`0000000a ffff9309`7c471464 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb90f`d443f320 fffff807`07e3ce34 : 00001f3b`c0aed4ae 00000000`00000000 ffff9303`7b93a180 fffff807`23c52ac2 : nt!KiBugCheckDispatch+0x69
ffffb90f`d443f460 fffff807`4ca932d2 : fffff807`4ca95b5d 00000000`ff2ebb2c ffffb90f`d443f670 ffff9303`8c8c59b0 : nt!KiPageFault+0x474
ffffb90f`d443f5f8 fffff807`4ca95b5d : 00000000`ff2ebb2c ffffb90f`d443f670 ffff9303`8c8c59b0 fffff807`4ca52d5c : kbdclass!memcpy+0x92
ffffb90f`d443f600 fffff807`4ca81511 : ffff9303`7ba5a190 ffffb90f`d443f7c8 ffff9303`7ba5b310 ffffb90f`d443f7c8 : kbdclass!KeyboardClassServiceCallback+0x16d
ffffb90f`d443f6a0 ffff9303`7ba5a190 : ffffb90f`d443f7c8 ffff9303`7ba5b310 ffffb90f`d443f7c8 00000000`00000008 : HKKbdFltr+0x1511
ffffb90f`d443f6a8 ffffb90f`d443f7c8 : ffff9303`7ba5b310 ffffb90f`d443f7c8 00000000`00000008 ffffb90f`d443f720 : 0xffff9303`7ba5a190
ffffb90f`d443f6b0 ffff9303`7ba5b310 : ffffb90f`d443f7c8 00000000`00000008 ffffb90f`d443f720 ffff9303`7ba5a040 : 0xffffb90f`d443f7c8
ffffb90f`d443f6b8 ffffb90f`d443f7c8 : 00000000`00000008 ffffb90f`d443f720 ffff9303`7ba5a040 fffff807`4ca813f0 : 0xffff9303`7ba5b310
ffffb90f`d443f6c0 00000000`00000008 : ffffb90f`d443f720 ffff9303`7ba5a040 fffff807`4ca813f0 ffffa681`3fac5180 : 0xffffb90f`d443f7c8
ffffb90f`d443f6c8 ffffb90f`d443f720 : ffff9303`7ba5a040 fffff807`4ca813f0 ffffa681`3fac5180 fffff807`4ca5b848 : 0x8
ffffb90f`d443f6d0 ffff9303`7ba5a040 : fffff807`4ca813f0 ffffa681`3fac5180 fffff807`4ca5b848 ffff9303`7ba5a190 : 0xffffb90f`d443f720
ffffb90f`d443f6d8 fffff807`4ca813f0 : ffffa681`3fac5180 fffff807`4ca5b848 ffff9303`7ba5a190 ffffb90f`d443f759 : 0xffff9303`7ba5a040
ffffb90f`d443f6e0 ffffa681`3fac5180 : fffff807`4ca5b848 ffff9303`7ba5a190 ffffb90f`d443f759 ffff9303`7ba94040 : HKKbdFltr+0x13f0
ffffb90f`d443f6e8 fffff807`4ca5b848 : ffff9303`7ba5a190 ffffb90f`d443f759 ffff9303`7ba94040 fffff807`4ca60258 : 0xffffa681`3fac5180
ffffb90f`d443f6f0 fffff807`07cb3f6c : 00000000`00000000 ffffa681`00000010 00000000`00000000 ffffa681`43cfcbf0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
ffffb90f`d443f7c0 fffff807`07cb2f5a : 00000000`00000022 ffffa681`3fac5180 00000000`00000000 fffff807`0000000f : nt!KiExecuteAllDpcs+0x42c
ffffb90f`d443fd00 fffff807`07e35565 : fb78f6b7`e5b206e1 00000000`00000000 ffffa681`3fac5180 00000000`10000003 : nt!KiRetireDpcList+0x1ba
ffffb90f`d443ffb0 fffff807`07e3550f : ffffb90f`d8bcf349 fffff807`07c451d5 00000000`00000000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
ffffb90f`d8bcf2b0 fffff807`07c451d5 : 00000000`00000000 00000000`00000000 00000000`003f065c 00000000`000000ff : nt!KiPlatformSwapStacksAndCallReturn
ffffb90f`d8bcf2c0 fffff807`07e34cdb : ffff9303`8760e080 ffffb90f`d8bcf460 ffffb90f`d8bcf460 0000005d`00000000 : nt!KiDispatchInterrupt+0xd5
ffffb90f`d8bcf3b0 fffff807`07e2e311 : 00000000`00000000 ffffa681`43cfcb40 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffffb90f`d8bcf3e0 00007ff8`cf1909c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000005d`ac6cf4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`cf1909c0
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.1774
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: