Çözüldü Abra A5 v17.2.3 kbdclass.sys mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

Canary27

Kilopat
Katılım
8 Aralık 2013
Mesajlar
202
Daha fazla  
Cinsiyet
Erkek
@Plyra bende bu hatayı alıyorum bayağıdır ve Abra A5 v17.2.3 cihaza sahibim konudaki cihazla hemen hemen aynı özelliklere sahip Clevo kasa model. Buna ait konum mevcut lakin hala çözüme ulaştıramadık buradan size de sorarak ve bu konudaki çözümünüze dayanarak benim uygulamamda sakınca olur mu ve uygulayabilir miyim diye sormak için yazdım. Çünkü aynı hata adı ve dosyası bende de çıkıyor. Dosyaları bırakıyorum buraya bakarsanız sevinirim minidump1, minidump2.
 
Çözüm
@Plyra bende bu hatayı alıyorum bayağıdır ve Abra A5 v17.2.3 cihaza sahibim konudaki cihazla hemen hemen aynı özelliklere sahip Clevo kasa model. Buna ait konum mevcut lakin hala çözüme ulaştıramadık buradan size de sorarak ve bu konudaki çözümünüze dayanarak benim uygulamamda sakınca olur mu ve uygulayabilir miyim diye sormak için yazdım. Çünkü aynı hata adı ve dosyası bende de çıkıyor. Dosyaları bırakıyorum buraya bakarsanız sevinirim minidump1, minidump2.

Başka bir konuya şunu yazmıştım, göz atın.
@Enes3078 bu sorunla alakalı bir şeyler yazmak istiyordum, fırsatı değerlendireyim.

Öncelikle problemi anlayalım. Bu sorunun ana kaynağı bütün Clevo kasa cihazlardaki Control Center varyasyonları. Üreticiye göre bu yazılımın adı ve arayüzü değişebiliyor ama hepsi aynı sürücüleri kullanıp aynı işlemleri yapıyor. Cihaz kısayollarını yönetmek için Windows'un ana kbdclass ve mouclass sürücülerinin yanına kendi filtre sürücüsü olan HKKbdFltr sürücüsünü yüklüyor. Bu sürücünün bellek yönetiminde bir problem var. Bu tarz cihaz sürücüleri hatalı bellek erişimi yaparsa Windows doğrudan mavi ekran verir ancak problemli filtre sürücüsü yerine ana sürücüyü suçlu olarak gösterir. Bellek adreslerini içeren ayrıntılı bir incelemeyi daha önceki bir konuda yapmıştım, ilgileniyorsanız oraya bakabilirsiniz.

Mavi ekran sorununun iki çözümü olabilir:
  • HKKbdFltr filtre sürücüsünün düzgün bir sürümünü kurmak. Bu bağlamda Control Center'ı güncellersiniz ve sorunun çözülmesini umut edersiniz. İlk önerim bu olurdu.
  • HKKbdFltr filtre sürücüsünü aradan çıkarmak. Aradan çıkarmak için kayıt defterini düzenlemeniz gerekiyor. Bu çözümü daha önceki konuda önermiştim ve konu sahibinin sorunu çözülmüştü. Ancak başka bir üye bunu yaptığında klavyenin çalışmadığını söyledi. İlgili üye kayıt defterinde hatalı bir işlem yapmıştır veya kayıt defteri anahtarının tamamını silmiştir, bunu bilemiyorum. Ek olarak kayıt defterini düzenledikten sonra başka bir sebeple Control Center'ı güncellerseniz yaptığınız bu işlemi geri alıp filtre sürücüsünü yine koyacağını düşünüyorum. Bunlara rağmen, Control Center'ı güncellemek sorunu çözmediyse kayıt defterinde düzenleme yapmayı öneririm.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc40325a6fc68, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802738e32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11208

    Key  : Analysis.IO.Other.Mb
    Value: 13

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 25

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21601

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  031223-14031-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc40325a6fc68

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802738e32d2

READ_ADDRESS: fffff8023491c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc40325a6fc68

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff802356daa00 -- (.trap 0xfffff802356daa00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40217dab280 rbx=0000000000000000 rcx=ffffc40217dab280
rdx=000000010dcc49e8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802738e32d2 rsp=fffff802356dab98 rbp=fffff802356dac10
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc40209c1d000
r11=ffffc40325a6fd28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff802`738e32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc403`25a6fc68=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff802`356da8b8 fffff802`3403e9a9     : 00000000`0000000a ffffc403`25a6fc68 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`356da8c0 fffff802`3403a034     : 000000a8`2c83ce19 00000000`00000000 00000000`00000002 fffff802`763656c0 : nt!KiBugCheckDispatch+0x69
fffff802`356daa00 fffff802`738e32d2     : fffff802`738e5b5d 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 : nt!KiPageFault+0x474
fffff802`356dab98 fffff802`738e5b5d     : 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 fffff802`738a2d5c : kbdclass!memcpy+0x92
fffff802`356daba0 fffff802`738d1511     : ffffc402`09bae1e0 fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`356dac40 ffffc402`09bae1e0     : fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`356dac48 fffff802`356dad68     : ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 fffff802`356dacc0 : 0xffffc402`09bae1e0
fffff802`356dac50 ffffc402`0a7ec310     : fffff802`356dad68 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 : 0xfffff802`356dad68
fffff802`356dac58 fffff802`356dad68     : 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 : 0xffffc402`0a7ec310
fffff802`356dac60 00000000`00000008     : fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 : 0xfffff802`356dad68
fffff802`356dac68 fffff802`356dacc0     : ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 : 0x8
fffff802`356dac70 ffffc402`09bae090     : fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 : 0xfffff802`356dacc0
fffff802`356dac78 fffff802`738d13f0     : fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 : 0xffffc402`09bae090
fffff802`356dac80 fffff802`2e436180     : fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 : HKKbdFltr+0x13f0
fffff802`356dac88 fffff802`738ab848     : ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 fffff802`738b0258 : 0xfffff802`2e436180
fffff802`356dac90 fffff802`33ebe11a     : 00000000`00000000 fffff802`00000010 00000000`00000000 ffffa100`d1afa970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`356dad60 fffff802`33ebd924     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`356db2b0 fffff802`3402e17e     : 00000000`00000000 fffff802`2e436180 00000000`00000000 fffff802`3494c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`356db540 00000000`00000000     : fffff802`356dc000 fffff802`356d5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.1485

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc804b03767b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80685f932d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2015

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6537

    Key  : Analysis.IO.Other.Mb
    Value: 11

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 311

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26128

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  031123-14671-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc804b03767b8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80685f932d2

READ_ADDRESS: fffff8064d71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc804b03767b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff806505f3a00 -- (.trap 0xfffff806505f3a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8041a4421c0 rbx=0000000000000000 rcx=ffffc8041a4421c0
rdx=0000000095f345f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80685f932d2 rsp=fffff806505f3b98 rbp=fffff806505f3c10
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc804023cc000
r11=ffffc804b0376878 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`85f932d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc804`b03767b8=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff806`505f38b8 fffff806`4ce3e9a9     : 00000000`0000000a ffffc804`b03767b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`505f38c0 fffff806`4ce3a034     : 000003dc`c0e37d79 00000000`00000000 ffffc804`02673180 fffff806`653e2ed2 : nt!KiBugCheckDispatch+0x69
fffff806`505f3a00 fffff806`85f932d2     : fffff806`85f95b5d 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 : nt!KiPageFault+0x474
fffff806`505f3b98 fffff806`85f95b5d     : 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 fffff806`85f52d5c : kbdclass!memcpy+0x92
fffff806`505f3ba0 fffff806`85f81511     : ffffc804`02902550 fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`505f3c40 ffffc804`02902550     : fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 00000000`00000008 : HKKbdFltr+0x1511
fffff806`505f3c48 fffff806`505f3d68     : ffffc804`02911310 fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 : 0xffffc804`02902550
fffff806`505f3c50 ffffc804`02911310     : fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 : 0xfffff806`505f3d68
fffff806`505f3c58 fffff806`505f3d68     : 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 : 0xffffc804`02911310
fffff806`505f3c60 00000000`00000008     : fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 : 0xfffff806`505f3d68
fffff806`505f3c68 fffff806`505f3cc0     : ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 : 0x8
fffff806`505f3c70 ffffc804`02902400     : fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 : 0xfffff806`505f3cc0
fffff806`505f3c78 fffff806`85f813f0     : fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 : 0xffffc804`02902400
fffff806`505f3c80 fffff806`47d1a180     : fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 : HKKbdFltr+0x13f0
fffff806`505f3c88 fffff806`85f5b848     : ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 fffff806`85f60258 : 0xfffff806`47d1a180
fffff806`505f3c90 fffff806`4ccbe11a     : 00000000`00000000 ffffc803`00000010 00000000`00000000 ffffa800`388db970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`505f3d60 fffff806`4ccbd924     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff806`505f42b0 fffff806`4ce2e17e     : 00000000`00000000 fffff806`47d1a180 fffff806`4d74c6c0 ffffc803`ffb25040 : nt!KiRetireDpcList+0xfe4
fffff806`505f4540 00000000`00000000     : fffff806`505f5000 fffff806`505ee000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.1485

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
@Plyra bende bu hatayı alıyorum bayağıdır ve Abra A5 v17.2.3 cihaza sahibim konudaki cihazla hemen hemen aynı özelliklere sahip Clevo kasa model. Buna ait konum mevcut lakin hala çözüme ulaştıramadık buradan size de sorarak ve bu konudaki çözümünüze dayanarak benim uygulamamda sakınca olur mu ve uygulayabilir miyim diye sormak için yazdım. Çünkü aynı hata adı ve dosyası bende de çıkıyor. Dosyaları bırakıyorum buraya bakarsanız sevinirim minidump1, minidump2.

Başka bir konuya şunu yazmıştım, göz atın.
@Enes3078 bu sorunla alakalı bir şeyler yazmak istiyordum, fırsatı değerlendireyim.

Öncelikle problemi anlayalım. Bu sorunun ana kaynağı bütün Clevo kasa cihazlardaki Control Center varyasyonları. Üreticiye göre bu yazılımın adı ve arayüzü değişebiliyor ama hepsi aynı sürücüleri kullanıp aynı işlemleri yapıyor. Cihaz kısayollarını yönetmek için Windows'un ana kbdclass ve mouclass sürücülerinin yanına kendi filtre sürücüsü olan HKKbdFltr sürücüsünü yüklüyor. Bu sürücünün bellek yönetiminde bir problem var. Bu tarz cihaz sürücüleri hatalı bellek erişimi yaparsa Windows doğrudan mavi ekran verir ancak problemli filtre sürücüsü yerine ana sürücüyü suçlu olarak gösterir. Bellek adreslerini içeren ayrıntılı bir incelemeyi daha önceki bir konuda yapmıştım, ilgileniyorsanız oraya bakabilirsiniz.

Mavi ekran sorununun iki çözümü olabilir:
  • HKKbdFltr filtre sürücüsünün düzgün bir sürümünü kurmak. Bu bağlamda Control Center'ı güncellersiniz ve sorunun çözülmesini umut edersiniz. İlk önerim bu olurdu.
  • HKKbdFltr filtre sürücüsünü aradan çıkarmak. Aradan çıkarmak için kayıt defterini düzenlemeniz gerekiyor. Bu çözümü daha önceki konuda önermiştim ve konu sahibinin sorunu çözülmüştü. Ancak başka bir üye bunu yaptığında klavyenin çalışmadığını söyledi. İlgili üye kayıt defterinde hatalı bir işlem yapmıştır veya kayıt defteri anahtarının tamamını silmiştir, bunu bilemiyorum. Ek olarak kayıt defterini düzenledikten sonra başka bir sebeple Control Center'ı güncellerseniz yaptığınız bu işlemi geri alıp filtre sürücüsünü yine koyacağını düşünüyorum. Bunlara rağmen, Control Center'ı güncellemek sorunu çözmediyse kayıt defterinde düzenleme yapmayı öneririm.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc40325a6fc68, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802738e32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11208

    Key  : Analysis.IO.Other.Mb
    Value: 13

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 25

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21601

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  031223-14031-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc40325a6fc68

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802738e32d2

READ_ADDRESS: fffff8023491c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc40325a6fc68

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff802356daa00 -- (.trap 0xfffff802356daa00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40217dab280 rbx=0000000000000000 rcx=ffffc40217dab280
rdx=000000010dcc49e8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802738e32d2 rsp=fffff802356dab98 rbp=fffff802356dac10
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc40209c1d000
r11=ffffc40325a6fd28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff802`738e32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc403`25a6fc68=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff802`356da8b8 fffff802`3403e9a9     : 00000000`0000000a ffffc403`25a6fc68 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`356da8c0 fffff802`3403a034     : 000000a8`2c83ce19 00000000`00000000 00000000`00000002 fffff802`763656c0 : nt!KiBugCheckDispatch+0x69
fffff802`356daa00 fffff802`738e32d2     : fffff802`738e5b5d 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 : nt!KiPageFault+0x474
fffff802`356dab98 fffff802`738e5b5d     : 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 fffff802`738a2d5c : kbdclass!memcpy+0x92
fffff802`356daba0 fffff802`738d1511     : ffffc402`09bae1e0 fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`356dac40 ffffc402`09bae1e0     : fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`356dac48 fffff802`356dad68     : ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 fffff802`356dacc0 : 0xffffc402`09bae1e0
fffff802`356dac50 ffffc402`0a7ec310     : fffff802`356dad68 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 : 0xfffff802`356dad68
fffff802`356dac58 fffff802`356dad68     : 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 : 0xffffc402`0a7ec310
fffff802`356dac60 00000000`00000008     : fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 : 0xfffff802`356dad68
fffff802`356dac68 fffff802`356dacc0     : ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 : 0x8
fffff802`356dac70 ffffc402`09bae090     : fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 : 0xfffff802`356dacc0
fffff802`356dac78 fffff802`738d13f0     : fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 : 0xffffc402`09bae090
fffff802`356dac80 fffff802`2e436180     : fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 : HKKbdFltr+0x13f0
fffff802`356dac88 fffff802`738ab848     : ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 fffff802`738b0258 : 0xfffff802`2e436180
fffff802`356dac90 fffff802`33ebe11a     : 00000000`00000000 fffff802`00000010 00000000`00000000 ffffa100`d1afa970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`356dad60 fffff802`33ebd924     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`356db2b0 fffff802`3402e17e     : 00000000`00000000 fffff802`2e436180 00000000`00000000 fffff802`3494c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`356db540 00000000`00000000     : fffff802`356dc000 fffff802`356d5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.1485

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc804b03767b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80685f932d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2015

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6537

    Key  : Analysis.IO.Other.Mb
    Value: 11

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 311

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26128

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  031123-14671-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc804b03767b8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80685f932d2

READ_ADDRESS: fffff8064d71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc804b03767b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff806505f3a00 -- (.trap 0xfffff806505f3a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8041a4421c0 rbx=0000000000000000 rcx=ffffc8041a4421c0
rdx=0000000095f345f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80685f932d2 rsp=fffff806505f3b98 rbp=fffff806505f3c10
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc804023cc000
r11=ffffc804b0376878 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`85f932d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc804`b03767b8=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff806`505f38b8 fffff806`4ce3e9a9     : 00000000`0000000a ffffc804`b03767b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`505f38c0 fffff806`4ce3a034     : 000003dc`c0e37d79 00000000`00000000 ffffc804`02673180 fffff806`653e2ed2 : nt!KiBugCheckDispatch+0x69
fffff806`505f3a00 fffff806`85f932d2     : fffff806`85f95b5d 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 : nt!KiPageFault+0x474
fffff806`505f3b98 fffff806`85f95b5d     : 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 fffff806`85f52d5c : kbdclass!memcpy+0x92
fffff806`505f3ba0 fffff806`85f81511     : ffffc804`02902550 fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`505f3c40 ffffc804`02902550     : fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 00000000`00000008 : HKKbdFltr+0x1511
fffff806`505f3c48 fffff806`505f3d68     : ffffc804`02911310 fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 : 0xffffc804`02902550
fffff806`505f3c50 ffffc804`02911310     : fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 : 0xfffff806`505f3d68
fffff806`505f3c58 fffff806`505f3d68     : 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 : 0xffffc804`02911310
fffff806`505f3c60 00000000`00000008     : fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 : 0xfffff806`505f3d68
fffff806`505f3c68 fffff806`505f3cc0     : ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 : 0x8
fffff806`505f3c70 ffffc804`02902400     : fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 : 0xfffff806`505f3cc0
fffff806`505f3c78 fffff806`85f813f0     : fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 : 0xffffc804`02902400
fffff806`505f3c80 fffff806`47d1a180     : fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 : HKKbdFltr+0x13f0
fffff806`505f3c88 fffff806`85f5b848     : ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 fffff806`85f60258 : 0xfffff806`47d1a180
fffff806`505f3c90 fffff806`4ccbe11a     : 00000000`00000000 ffffc803`00000010 00000000`00000000 ffffa800`388db970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`505f3d60 fffff806`4ccbd924     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff806`505f42b0 fffff806`4ce2e17e     : 00000000`00000000 fffff806`47d1a180 fffff806`4d74c6c0 ffffc803`ffb25040 : nt!KiRetireDpcList+0xfe4
fffff806`505f4540 00000000`00000000     : fffff806`505f5000 fffff806`505ee000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.1485

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
Çözüm
Başka bir konuya şunu yazmıştım, göz atın.


Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc40325a6fc68, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802738e32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11208

    Key  : Analysis.IO.Other.Mb
    Value: 13

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 25

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 21601

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  031223-14031-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc40325a6fc68

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802738e32d2

READ_ADDRESS: fffff8023491c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc40325a6fc68

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff802356daa00 -- (.trap 0xfffff802356daa00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40217dab280 rbx=0000000000000000 rcx=ffffc40217dab280
rdx=000000010dcc49e8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802738e32d2 rsp=fffff802356dab98 rbp=fffff802356dac10
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc40209c1d000
r11=ffffc40325a6fd28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff802`738e32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc403`25a6fc68=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff802`356da8b8 fffff802`3403e9a9     : 00000000`0000000a ffffc403`25a6fc68 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`356da8c0 fffff802`3403a034     : 000000a8`2c83ce19 00000000`00000000 00000000`00000002 fffff802`763656c0 : nt!KiBugCheckDispatch+0x69
fffff802`356daa00 fffff802`738e32d2     : fffff802`738e5b5d 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 : nt!KiPageFault+0x474
fffff802`356dab98 fffff802`738e5b5d     : 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 fffff802`738a2d5c : kbdclass!memcpy+0x92
fffff802`356daba0 fffff802`738d1511     : ffffc402`09bae1e0 fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`356dac40 ffffc402`09bae1e0     : fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`356dac48 fffff802`356dad68     : ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 fffff802`356dacc0 : 0xffffc402`09bae1e0
fffff802`356dac50 ffffc402`0a7ec310     : fffff802`356dad68 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 : 0xfffff802`356dad68
fffff802`356dac58 fffff802`356dad68     : 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 : 0xffffc402`0a7ec310
fffff802`356dac60 00000000`00000008     : fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 : 0xfffff802`356dad68
fffff802`356dac68 fffff802`356dacc0     : ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 : 0x8
fffff802`356dac70 ffffc402`09bae090     : fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 : 0xfffff802`356dacc0
fffff802`356dac78 fffff802`738d13f0     : fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 : 0xffffc402`09bae090
fffff802`356dac80 fffff802`2e436180     : fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 : HKKbdFltr+0x13f0
fffff802`356dac88 fffff802`738ab848     : ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 fffff802`738b0258 : 0xfffff802`2e436180
fffff802`356dac90 fffff802`33ebe11a     : 00000000`00000000 fffff802`00000010 00000000`00000000 ffffa100`d1afa970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`356dad60 fffff802`33ebd924     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`356db2b0 fffff802`3402e17e     : 00000000`00000000 fffff802`2e436180 00000000`00000000 fffff802`3494c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`356db540 00000000`00000000     : fffff802`356dc000 fffff802`356d5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.1485

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc804b03767b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80685f932d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2015

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6537

    Key  : Analysis.IO.Other.Mb
    Value: 11

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 311

    Key  : Analysis.Init.Elapsed.mSec
    Value: 26128

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  031123-14671-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc804b03767b8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80685f932d2

READ_ADDRESS: fffff8064d71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc804b03767b8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff806505f3a00 -- (.trap 0xfffff806505f3a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8041a4421c0 rbx=0000000000000000 rcx=ffffc8041a4421c0
rdx=0000000095f345f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80685f932d2 rsp=fffff806505f3b98 rbp=fffff806505f3c10
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc804023cc000
r11=ffffc804b0376878 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`85f932d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc804`b03767b8=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff806`505f38b8 fffff806`4ce3e9a9     : 00000000`0000000a ffffc804`b03767b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`505f38c0 fffff806`4ce3a034     : 000003dc`c0e37d79 00000000`00000000 ffffc804`02673180 fffff806`653e2ed2 : nt!KiBugCheckDispatch+0x69
fffff806`505f3a00 fffff806`85f932d2     : fffff806`85f95b5d 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 : nt!KiPageFault+0x474
fffff806`505f3b98 fffff806`85f95b5d     : 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 fffff806`85f52d5c : kbdclass!memcpy+0x92
fffff806`505f3ba0 fffff806`85f81511     : ffffc804`02902550 fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`505f3c40 ffffc804`02902550     : fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 00000000`00000008 : HKKbdFltr+0x1511
fffff806`505f3c48 fffff806`505f3d68     : ffffc804`02911310 fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 : 0xffffc804`02902550
fffff806`505f3c50 ffffc804`02911310     : fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 : 0xfffff806`505f3d68
fffff806`505f3c58 fffff806`505f3d68     : 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 : 0xffffc804`02911310
fffff806`505f3c60 00000000`00000008     : fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 : 0xfffff806`505f3d68
fffff806`505f3c68 fffff806`505f3cc0     : ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 : 0x8
fffff806`505f3c70 ffffc804`02902400     : fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 : 0xfffff806`505f3cc0
fffff806`505f3c78 fffff806`85f813f0     : fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 : 0xffffc804`02902400
fffff806`505f3c80 fffff806`47d1a180     : fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 : HKKbdFltr+0x13f0
fffff806`505f3c88 fffff806`85f5b848     : ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 fffff806`85f60258 : 0xfffff806`47d1a180
fffff806`505f3c90 fffff806`4ccbe11a     : 00000000`00000000 ffffc803`00000010 00000000`00000000 ffffa800`388db970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`505f3d60 fffff806`4ccbd924     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff806`505f42b0 fffff806`4ce2e17e     : 00000000`00000000 fffff806`47d1a180 fffff806`4d74c6c0 ffffc803`ffb25040 : nt!KiRetireDpcList+0xfe4
fffff806`505f4540 00000000`00000000     : fffff806`505f5000 fffff806`505ee000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.1485

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

Çözümünüz cidden sorunumu sona erdirdi genelde 15 gün içerisinde hep hata alırken çözümünüzü uyguladığım tarihten itibaren 23 gündür hata almıyorum sorun çözüldü. Teşekkürler.
 
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı