@Plyra bende bu hatayı alıyorum bayağıdır ve Abra A5 v17.2.3 cihaza sahibim konudaki cihazla hemen hemen aynı özelliklere sahip Clevo kasa model. Buna ait konum mevcut lakin hala çözüme ulaştıramadık buradan size de sorarak ve bu konudaki çözümünüze dayanarak benim uygulamamda sakınca olur mu ve uygulayabilir miyim diye sormak için yazdım. Çünkü aynı hata adı ve dosyası bende de çıkıyor. Dosyaları bırakıyorum buraya bakarsanız sevinirim minidump1, minidump2.
@Enes3078 bu sorunla alakalı bir şeyler yazmak istiyordum, fırsatı değerlendireyim.
Öncelikle problemi anlayalım. Bu sorunun ana kaynağı bütün Clevo kasa cihazlardaki Control Center varyasyonları. Üreticiye göre bu yazılımın adı ve arayüzü değişebiliyor ama hepsi aynı sürücüleri kullanıp aynı işlemleri yapıyor. Cihaz kısayollarını yönetmek için Windows'un anakbdclass
vemouclass
sürücülerinin yanına kendi filtre sürücüsü olanHKKbdFltr
sürücüsünü yüklüyor. Bu sürücünün bellek yönetiminde bir problem var. Bu tarz cihaz sürücüleri hatalı bellek erişimi yaparsa Windows doğrudan mavi ekran verir ancak problemli filtre sürücüsü yerine ana sürücüyü suçlu olarak gösterir. Bellek adreslerini içeren ayrıntılı bir incelemeyi daha önceki bir konuda yapmıştım, ilgileniyorsanız oraya bakabilirsiniz.
Mavi ekran sorununun iki çözümü olabilir:
HKKbdFltr
filtre sürücüsünün düzgün bir sürümünü kurmak. Bu bağlamda Control Center'ı güncellersiniz ve sorunun çözülmesini umut edersiniz. İlk önerim bu olurdu.HKKbdFltr
filtre sürücüsünü aradan çıkarmak. Aradan çıkarmak için kayıt defterini düzenlemeniz gerekiyor. Bu çözümü daha önceki konuda önermiştim ve konu sahibinin sorunu çözülmüştü. Ancak başka bir üye bunu yaptığında klavyenin çalışmadığını söyledi. İlgili üye kayıt defterinde hatalı bir işlem yapmıştır veya kayıt defteri anahtarının tamamını silmiştir, bunu bilemiyorum. Ek olarak kayıt defterini düzenledikten sonra başka bir sebeple Control Center'ı güncellerseniz yaptığınız bu işlemi geri alıp filtre sürücüsünü yine koyacağını düşünüyorum. Bunlara rağmen, Control Center'ı güncellemek sorunu çözmediyse kayıt defterinde düzenleme yapmayı öneririm.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc40325a6fc68, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802738e32d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11208
Key : Analysis.IO.Other.Mb
Value: 13
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 25
Key : Analysis.Init.CPU.mSec
Value: 390
Key : Analysis.Init.Elapsed.mSec
Value: 21601
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 031223-14031-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffc40325a6fc68
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802738e32d2
READ_ADDRESS: fffff8023491c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc40325a6fc68
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff802356daa00 -- (.trap 0xfffff802356daa00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40217dab280 rbx=0000000000000000 rcx=ffffc40217dab280
rdx=000000010dcc49e8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802738e32d2 rsp=fffff802356dab98 rbp=fffff802356dac10
r8=00000000000000c0 r9=0000000000000038 r10=ffffc40209c1d000
r11=ffffc40325a6fd28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff802`738e32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc403`25a6fc68=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff802`356da8b8 fffff802`3403e9a9 : 00000000`0000000a ffffc403`25a6fc68 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`356da8c0 fffff802`3403a034 : 000000a8`2c83ce19 00000000`00000000 00000000`00000002 fffff802`763656c0 : nt!KiBugCheckDispatch+0x69
fffff802`356daa00 fffff802`738e32d2 : fffff802`738e5b5d 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 : nt!KiPageFault+0x474
fffff802`356dab98 fffff802`738e5b5d : 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 fffff802`738a2d5c : kbdclass!memcpy+0x92
fffff802`356daba0 fffff802`738d1511 : ffffc402`09bae1e0 fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`356dac40 ffffc402`09bae1e0 : fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`356dac48 fffff802`356dad68 : ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 fffff802`356dacc0 : 0xffffc402`09bae1e0
fffff802`356dac50 ffffc402`0a7ec310 : fffff802`356dad68 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 : 0xfffff802`356dad68
fffff802`356dac58 fffff802`356dad68 : 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 : 0xffffc402`0a7ec310
fffff802`356dac60 00000000`00000008 : fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 : 0xfffff802`356dad68
fffff802`356dac68 fffff802`356dacc0 : ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 : 0x8
fffff802`356dac70 ffffc402`09bae090 : fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 : 0xfffff802`356dacc0
fffff802`356dac78 fffff802`738d13f0 : fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 : 0xffffc402`09bae090
fffff802`356dac80 fffff802`2e436180 : fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 : HKKbdFltr+0x13f0
fffff802`356dac88 fffff802`738ab848 : ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 fffff802`738b0258 : 0xfffff802`2e436180
fffff802`356dac90 fffff802`33ebe11a : 00000000`00000000 fffff802`00000010 00000000`00000000 ffffa100`d1afa970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`356dad60 fffff802`33ebd924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`356db2b0 fffff802`3402e17e : 00000000`00000000 fffff802`2e436180 00000000`00000000 fffff802`3494c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`356db540 00000000`00000000 : fffff802`356dc000 fffff802`356d5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.1485
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc804b03767b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80685f932d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2015
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6537
Key : Analysis.IO.Other.Mb
Value: 11
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 311
Key : Analysis.Init.Elapsed.mSec
Value: 26128
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 031123-14671-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffc804b03767b8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80685f932d2
READ_ADDRESS: fffff8064d71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc804b03767b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff806505f3a00 -- (.trap 0xfffff806505f3a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8041a4421c0 rbx=0000000000000000 rcx=ffffc8041a4421c0
rdx=0000000095f345f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80685f932d2 rsp=fffff806505f3b98 rbp=fffff806505f3c10
r8=00000000000000c0 r9=0000000000000038 r10=ffffc804023cc000
r11=ffffc804b0376878 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`85f932d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc804`b03767b8=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff806`505f38b8 fffff806`4ce3e9a9 : 00000000`0000000a ffffc804`b03767b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`505f38c0 fffff806`4ce3a034 : 000003dc`c0e37d79 00000000`00000000 ffffc804`02673180 fffff806`653e2ed2 : nt!KiBugCheckDispatch+0x69
fffff806`505f3a00 fffff806`85f932d2 : fffff806`85f95b5d 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 : nt!KiPageFault+0x474
fffff806`505f3b98 fffff806`85f95b5d : 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 fffff806`85f52d5c : kbdclass!memcpy+0x92
fffff806`505f3ba0 fffff806`85f81511 : ffffc804`02902550 fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`505f3c40 ffffc804`02902550 : fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 00000000`00000008 : HKKbdFltr+0x1511
fffff806`505f3c48 fffff806`505f3d68 : ffffc804`02911310 fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 : 0xffffc804`02902550
fffff806`505f3c50 ffffc804`02911310 : fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 : 0xfffff806`505f3d68
fffff806`505f3c58 fffff806`505f3d68 : 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 : 0xffffc804`02911310
fffff806`505f3c60 00000000`00000008 : fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 : 0xfffff806`505f3d68
fffff806`505f3c68 fffff806`505f3cc0 : ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 : 0x8
fffff806`505f3c70 ffffc804`02902400 : fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 : 0xfffff806`505f3cc0
fffff806`505f3c78 fffff806`85f813f0 : fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 : 0xffffc804`02902400
fffff806`505f3c80 fffff806`47d1a180 : fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 : HKKbdFltr+0x13f0
fffff806`505f3c88 fffff806`85f5b848 : ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 fffff806`85f60258 : 0xfffff806`47d1a180
fffff806`505f3c90 fffff806`4ccbe11a : 00000000`00000000 ffffc803`00000010 00000000`00000000 ffffa800`388db970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`505f3d60 fffff806`4ccbd924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff806`505f42b0 fffff806`4ce2e17e : 00000000`00000000 fffff806`47d1a180 fffff806`4d74c6c0 ffffc803`ffb25040 : nt!KiRetireDpcList+0xfe4
fffff806`505f4540 00000000`00000000 : fffff806`505f5000 fffff806`505ee000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.1485
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
@Plyra bende bu hatayı alıyorum bayağıdır ve Abra A5 v17.2.3 cihaza sahibim konudaki cihazla hemen hemen aynı özelliklere sahip Clevo kasa model. Buna ait konum mevcut lakin hala çözüme ulaştıramadık buradan size de sorarak ve bu konudaki çözümünüze dayanarak benim uygulamamda sakınca olur mu ve uygulayabilir miyim diye sormak için yazdım. Çünkü aynı hata adı ve dosyası bende de çıkıyor. Dosyaları bırakıyorum buraya bakarsanız sevinirim minidump1, minidump2.
@Enes3078 bu sorunla alakalı bir şeyler yazmak istiyordum, fırsatı değerlendireyim.
Öncelikle problemi anlayalım. Bu sorunun ana kaynağı bütün Clevo kasa cihazlardaki Control Center varyasyonları. Üreticiye göre bu yazılımın adı ve arayüzü değişebiliyor ama hepsi aynı sürücüleri kullanıp aynı işlemleri yapıyor. Cihaz kısayollarını yönetmek için Windows'un anakbdclass
vemouclass
sürücülerinin yanına kendi filtre sürücüsü olanHKKbdFltr
sürücüsünü yüklüyor. Bu sürücünün bellek yönetiminde bir problem var. Bu tarz cihaz sürücüleri hatalı bellek erişimi yaparsa Windows doğrudan mavi ekran verir ancak problemli filtre sürücüsü yerine ana sürücüyü suçlu olarak gösterir. Bellek adreslerini içeren ayrıntılı bir incelemeyi daha önceki bir konuda yapmıştım, ilgileniyorsanız oraya bakabilirsiniz.
Mavi ekran sorununun iki çözümü olabilir:
HKKbdFltr
filtre sürücüsünün düzgün bir sürümünü kurmak. Bu bağlamda Control Center'ı güncellersiniz ve sorunun çözülmesini umut edersiniz. İlk önerim bu olurdu.HKKbdFltr
filtre sürücüsünü aradan çıkarmak. Aradan çıkarmak için kayıt defterini düzenlemeniz gerekiyor. Bu çözümü daha önceki konuda önermiştim ve konu sahibinin sorunu çözülmüştü. Ancak başka bir üye bunu yaptığında klavyenin çalışmadığını söyledi. İlgili üye kayıt defterinde hatalı bir işlem yapmıştır veya kayıt defteri anahtarının tamamını silmiştir, bunu bilemiyorum. Ek olarak kayıt defterini düzenledikten sonra başka bir sebeple Control Center'ı güncellerseniz yaptığınız bu işlemi geri alıp filtre sürücüsünü yine koyacağını düşünüyorum. Bunlara rağmen, Control Center'ı güncellemek sorunu çözmediyse kayıt defterinde düzenleme yapmayı öneririm.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc40325a6fc68, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802738e32d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11208
Key : Analysis.IO.Other.Mb
Value: 13
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 25
Key : Analysis.Init.CPU.mSec
Value: 390
Key : Analysis.Init.Elapsed.mSec
Value: 21601
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 031223-14031-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffc40325a6fc68
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802738e32d2
READ_ADDRESS: fffff8023491c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc40325a6fc68
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff802356daa00 -- (.trap 0xfffff802356daa00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40217dab280 rbx=0000000000000000 rcx=ffffc40217dab280
rdx=000000010dcc49e8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802738e32d2 rsp=fffff802356dab98 rbp=fffff802356dac10
r8=00000000000000c0 r9=0000000000000038 r10=ffffc40209c1d000
r11=ffffc40325a6fd28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff802`738e32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc403`25a6fc68=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff802`356da8b8 fffff802`3403e9a9 : 00000000`0000000a ffffc403`25a6fc68 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`356da8c0 fffff802`3403a034 : 000000a8`2c83ce19 00000000`00000000 00000000`00000002 fffff802`763656c0 : nt!KiBugCheckDispatch+0x69
fffff802`356daa00 fffff802`738e32d2 : fffff802`738e5b5d 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 : nt!KiPageFault+0x474
fffff802`356dab98 fffff802`738e5b5d : 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 fffff802`738a2d5c : kbdclass!memcpy+0x92
fffff802`356daba0 fffff802`738d1511 : ffffc402`09bae1e0 fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`356dac40 ffffc402`09bae1e0 : fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 : HKKbdFltr+0x1511
fffff802`356dac48 fffff802`356dad68 : ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 fffff802`356dacc0 : 0xffffc402`09bae1e0
fffff802`356dac50 ffffc402`0a7ec310 : fffff802`356dad68 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 : 0xfffff802`356dad68
fffff802`356dac58 fffff802`356dad68 : 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 : 0xffffc402`0a7ec310
fffff802`356dac60 00000000`00000008 : fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 : 0xfffff802`356dad68
fffff802`356dac68 fffff802`356dacc0 : ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 : 0x8
fffff802`356dac70 ffffc402`09bae090 : fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 : 0xfffff802`356dacc0
fffff802`356dac78 fffff802`738d13f0 : fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 : 0xffffc402`09bae090
fffff802`356dac80 fffff802`2e436180 : fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 : HKKbdFltr+0x13f0
fffff802`356dac88 fffff802`738ab848 : ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 fffff802`738b0258 : 0xfffff802`2e436180
fffff802`356dac90 fffff802`33ebe11a : 00000000`00000000 fffff802`00000010 00000000`00000000 ffffa100`d1afa970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`356dad60 fffff802`33ebd924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff802`356db2b0 fffff802`3402e17e : 00000000`00000000 fffff802`2e436180 00000000`00000000 fffff802`3494c6c0 : nt!KiRetireDpcList+0xfe4
fffff802`356db540 00000000`00000000 : fffff802`356dc000 fffff802`356d5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.1485
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc804b03767b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80685f932d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2015
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6537
Key : Analysis.IO.Other.Mb
Value: 11
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 311
Key : Analysis.Init.Elapsed.mSec
Value: 26128
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 031123-14671-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffc804b03767b8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80685f932d2
READ_ADDRESS: fffff8064d71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc804b03767b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff806505f3a00 -- (.trap 0xfffff806505f3a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc8041a4421c0 rbx=0000000000000000 rcx=ffffc8041a4421c0
rdx=0000000095f345f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80685f932d2 rsp=fffff806505f3b98 rbp=fffff806505f3c10
r8=00000000000000c0 r9=0000000000000038 r10=ffffc804023cc000
r11=ffffc804b0376878 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff806`85f932d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc804`b03767b8=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff806`505f38b8 fffff806`4ce3e9a9 : 00000000`0000000a ffffc804`b03767b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`505f38c0 fffff806`4ce3a034 : 000003dc`c0e37d79 00000000`00000000 ffffc804`02673180 fffff806`653e2ed2 : nt!KiBugCheckDispatch+0x69
fffff806`505f3a00 fffff806`85f932d2 : fffff806`85f95b5d 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 : nt!KiPageFault+0x474
fffff806`505f3b98 fffff806`85f95b5d : 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 fffff806`85f52d5c : kbdclass!memcpy+0x92
fffff806`505f3ba0 fffff806`85f81511 : ffffc804`02902550 fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`505f3c40 ffffc804`02902550 : fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 00000000`00000008 : HKKbdFltr+0x1511
fffff806`505f3c48 fffff806`505f3d68 : ffffc804`02911310 fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 : 0xffffc804`02902550
fffff806`505f3c50 ffffc804`02911310 : fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 : 0xfffff806`505f3d68
fffff806`505f3c58 fffff806`505f3d68 : 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 : 0xffffc804`02911310
fffff806`505f3c60 00000000`00000008 : fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 : 0xfffff806`505f3d68
fffff806`505f3c68 fffff806`505f3cc0 : ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 : 0x8
fffff806`505f3c70 ffffc804`02902400 : fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 : 0xfffff806`505f3cc0
fffff806`505f3c78 fffff806`85f813f0 : fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 : 0xffffc804`02902400
fffff806`505f3c80 fffff806`47d1a180 : fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 : HKKbdFltr+0x13f0
fffff806`505f3c88 fffff806`85f5b848 : ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 fffff806`85f60258 : 0xfffff806`47d1a180
fffff806`505f3c90 fffff806`4ccbe11a : 00000000`00000000 ffffc803`00000010 00000000`00000000 ffffa800`388db970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`505f3d60 fffff806`4ccbd924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff806`505f42b0 fffff806`4ce2e17e : 00000000`00000000 fffff806`47d1a180 fffff806`4d74c6c0 ffffc803`ffb25040 : nt!KiRetireDpcList+0xfe4
fffff806`505f4540 00000000`00000000 : fffff806`505f5000 fffff806`505ee000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.1485
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Başka bir konuya şunu yazmıştım, göz atın.
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffc40325a6fc68, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff802738e32d2, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1624 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 11208 Key : Analysis.IO.Other.Mb Value: 13 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 25 Key : Analysis.Init.CPU.mSec Value: 390 Key : Analysis.Init.Elapsed.mSec Value: 21601 Key : Analysis.Memory.CommitPeak.Mb Value: 89 Key : Bugcheck.Code.DumpHeader Value: 0xd1 Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 031223-14031-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage Dump BUGCHECK_CODE: d1 BUGCHECK_P1: ffffc40325a6fc68 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff802738e32d2 READ_ADDRESS: fffff8023491c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffc40325a6fc68 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff802356daa00 -- (.trap 0xfffff802356daa00) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc40217dab280 rbx=0000000000000000 rcx=ffffc40217dab280 rdx=000000010dcc49e8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff802738e32d2 rsp=fffff802356dab98 rbp=fffff802356dac10 r8=00000000000000c0 r9=0000000000000038 r10=ffffc40209c1d000 r11=ffffc40325a6fd28 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc kbdclass!memcpy+0x92: fffff802`738e32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc403`25a6fc68=???????????????????????????????? Resetting default scope STACK_TEXT: fffff802`356da8b8 fffff802`3403e9a9 : 00000000`0000000a ffffc403`25a6fc68 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff802`356da8c0 fffff802`3403a034 : 000000a8`2c83ce19 00000000`00000000 00000000`00000002 fffff802`763656c0 : nt!KiBugCheckDispatch+0x69 fffff802`356daa00 fffff802`738e32d2 : fffff802`738e5b5d 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 : nt!KiPageFault+0x474 fffff802`356dab98 fffff802`738e5b5d : 00000000`e11c4018 fffff802`356dac10 ffffc402`11715970 fffff802`738a2d5c : kbdclass!memcpy+0x92 fffff802`356daba0 fffff802`738d1511 : ffffc402`09bae1e0 fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 : kbdclass!KeyboardClassServiceCallback+0x16d fffff802`356dac40 ffffc402`09bae1e0 : fffff802`356dad68 ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 : HKKbdFltr+0x1511 fffff802`356dac48 fffff802`356dad68 : ffffc402`0a7ec310 fffff802`356dad68 00000000`00000008 fffff802`356dacc0 : 0xffffc402`09bae1e0 fffff802`356dac50 ffffc402`0a7ec310 : fffff802`356dad68 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 : 0xfffff802`356dad68 fffff802`356dac58 fffff802`356dad68 : 00000000`00000008 fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 : 0xffffc402`0a7ec310 fffff802`356dac60 00000000`00000008 : fffff802`356dacc0 ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 : 0xfffff802`356dad68 fffff802`356dac68 fffff802`356dacc0 : ffffc402`09bae090 fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 : 0x8 fffff802`356dac70 ffffc402`09bae090 : fffff802`738d13f0 fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 : 0xfffff802`356dacc0 fffff802`356dac78 fffff802`738d13f0 : fffff802`2e436180 fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 : 0xffffc402`09bae090 fffff802`356dac80 fffff802`2e436180 : fffff802`738ab848 ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 : HKKbdFltr+0x13f0 fffff802`356dac88 fffff802`738ab848 : ffffc402`09bae1e0 fffff802`356dacf9 ffffc402`09bae720 fffff802`738b0258 : 0xfffff802`2e436180 fffff802`356dac90 fffff802`33ebe11a : 00000000`00000000 fffff802`00000010 00000000`00000000 ffffa100`d1afa970 : i8042prt!I8042KeyboardIsrDpc+0x1a8 fffff802`356dad60 fffff802`33ebd924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a fffff802`356db2b0 fffff802`3402e17e : 00000000`00000000 fffff802`2e436180 00000000`00000000 fffff802`3494c6c0 : nt!KiRetireDpcList+0xfe4 fffff802`356db540 00000000`00000000 : fffff802`356dc000 fffff802`356d5000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.22621.1485 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffc804b03767b8, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff80685f932d2, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2015 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 6537 Key : Analysis.IO.Other.Mb Value: 11 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 24 Key : Analysis.Init.CPU.mSec Value: 311 Key : Analysis.Init.Elapsed.mSec Value: 26128 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : Bugcheck.Code.DumpHeader Value: 0xd1 Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 031123-14671-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage Dump BUGCHECK_CODE: d1 BUGCHECK_P1: ffffc804b03767b8 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80685f932d2 READ_ADDRESS: fffff8064d71c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffc804b03767b8 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff806505f3a00 -- (.trap 0xfffff806505f3a00) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffc8041a4421c0 rbx=0000000000000000 rcx=ffffc8041a4421c0 rdx=0000000095f345f8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80685f932d2 rsp=fffff806505f3b98 rbp=fffff806505f3c10 r8=00000000000000c0 r9=0000000000000038 r10=ffffc804023cc000 r11=ffffc804b0376878 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc kbdclass!memcpy+0x92: fffff806`85f932d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc804`b03767b8=???????????????????????????????? Resetting default scope STACK_TEXT: fffff806`505f38b8 fffff806`4ce3e9a9 : 00000000`0000000a ffffc804`b03767b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff806`505f38c0 fffff806`4ce3a034 : 000003dc`c0e37d79 00000000`00000000 ffffc804`02673180 fffff806`653e2ed2 : nt!KiBugCheckDispatch+0x69 fffff806`505f3a00 fffff806`85f932d2 : fffff806`85f95b5d 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 : nt!KiPageFault+0x474 fffff806`505f3b98 fffff806`85f95b5d : 00000000`51fe1d48 fffff806`505f3c10 ffffc804`1b404010 fffff806`85f52d5c : kbdclass!memcpy+0x92 fffff806`505f3ba0 fffff806`85f81511 : ffffc804`02902550 fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 : kbdclass!KeyboardClassServiceCallback+0x16d fffff806`505f3c40 ffffc804`02902550 : fffff806`505f3d68 ffffc804`02911310 fffff806`505f3d68 00000000`00000008 : HKKbdFltr+0x1511 fffff806`505f3c48 fffff806`505f3d68 : ffffc804`02911310 fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 : 0xffffc804`02902550 fffff806`505f3c50 ffffc804`02911310 : fffff806`505f3d68 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 : 0xfffff806`505f3d68 fffff806`505f3c58 fffff806`505f3d68 : 00000000`00000008 fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 : 0xffffc804`02911310 fffff806`505f3c60 00000000`00000008 : fffff806`505f3cc0 ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 : 0xfffff806`505f3d68 fffff806`505f3c68 fffff806`505f3cc0 : ffffc804`02902400 fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 : 0x8 fffff806`505f3c70 ffffc804`02902400 : fffff806`85f813f0 fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 : 0xfffff806`505f3cc0 fffff806`505f3c78 fffff806`85f813f0 : fffff806`47d1a180 fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 : 0xffffc804`02902400 fffff806`505f3c80 fffff806`47d1a180 : fffff806`85f5b848 ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 : HKKbdFltr+0x13f0 fffff806`505f3c88 fffff806`85f5b848 : ffffc804`02902550 fffff806`505f3cf9 ffffc804`02902a90 fffff806`85f60258 : 0xfffff806`47d1a180 fffff806`505f3c90 fffff806`4ccbe11a : 00000000`00000000 ffffc803`00000010 00000000`00000000 ffffa800`388db970 : i8042prt!I8042KeyboardIsrDpc+0x1a8 fffff806`505f3d60 fffff806`4ccbd924 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a fffff806`505f42b0 fffff806`4ce2e17e : 00000000`00000000 fffff806`47d1a180 fffff806`4d74c6c0 ffffc803`ffb25040 : nt!KiRetireDpcList+0xfe4 fffff806`505f4540 00000000`00000000 : fffff806`505f5000 fffff806`505ee000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: kbdclass!memcpy+92 MODULE_NAME: kbdclass IMAGE_NAME: kbdclass.sys IMAGE_VERSION: 10.0.22621.1485 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 92 FAILURE_BUCKET_ID: AV_kbdclass!memcpy OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner ---------