GTX1650 Ti oyundayken mavi ekran hatası

İşletim sistemi
Windows 10

alperkens

Femtopat
Katılım
26 Ocak 2021
Mesajlar
20
Daha fazla  
Cinsiyet
Erkek
Merhabalar. Laptopumu dün bakıma götürdüm. Bugün Mount & Blade: Bannerlord oynarken 1-2 saat sonra ve Valheim oynarken 1 saat sonra birer defa mavi ekran hatası aldım. Takılıyor gibi oldu böyle rrrr diye bi ses geldi hata anında. Valorant da oynadım ondan sonra 3-4 saat şu anda hala da açık laptop fakat herhangi bir hata almadım. Bir sıkıntı olup olmadığını danışmak istedim. Bir müdahale gerekir mi yoksa kendi kendine düzelme ihtimali var mıdır? Minidump dosyalarım aşağıda.
Monster Abra A7 12.2.1 Laptop.

Sistem özelliklerim;
NVIDIA GTX1650 Ti
Intel i5 10300H
16 GB (2x8GB) DDR4 1.2V 2933MHz SO-DIMM
Mobile Intel® HM470 Chipset

 
Aslında sorun Clevo Kontrol Merkezi kaynaklı. Monster Kontrol Merkezi üzerinden bir ayar yaptıysanız sıfırlayın hatta silebiliyorsanız silin. Yine de işe yaramazsa aşağıdaki linkten Kontrol Merkezi yazılımını tekrar indirip kurun.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd00e36d42d7c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80a8f7d2f92, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5780

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 30769

Key : Analysis.Init.CPU.mSec
Value: 1390

Key : Analysis.Init.Elapsed.mSec
Value: 8538

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: d1

BUGCHECK_P1: ffffd00e36d42d7c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80a8f7d2f92

READ_ADDRESS: fffff80638efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd00e36d42d7c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff8063e05d400 -- (.trap 0xfffff8063e05d400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0078becb5c0 rbx=0000000000000000 rcx=ffffd0078becb5c0
rdx=00000006aae777bc rsi=0000000000000000 rdi=0000000000000000
rip=fffff80a8f7d2f92 rsp=fffff8063e05d598 rbp=fffff8063e05d610
r8=00000000000000c0 r9=ffffd0077fab70a8 r10=ffffd0077fab7fc0
r11=ffffd00e36d42e3c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass+0x2f92:
fffff80a`8f7d2f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffd00e`36d42d7c=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff806`3e05d2b8 fffff806`38607b69 : 00000000`0000000a ffffd00e`36d42d7c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`3e05d2c0 fffff806`38603e69 : 00000000`00000000 00000000`00000000 ffffd007`87f096c8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`3e05d400 fffff80a`8f7d2f92 : fffff80a`8f7d56dd 00000000`40ec1744 fffff806`3e05d610 ffffd007`8c6da010 : nt!KiPageFault+0x469
fffff806`3e05d598 fffff80a`8f7d56dd : 00000000`40ec1744 fffff806`3e05d610 ffffd007`8c6da010 fffff806`3bbc129b : kbdclass+0x2f92
fffff806`3e05d5a0 fffff80a`93261511 : ffffd007`7fa941e0 fffff806`3e05d768 ffffd007`7fee2310 fffff806`3e05d768 : kbdclass+0x56dd
fffff806`3e05d640 ffffd007`7fa941e0 : fffff806`3e05d768 ffffd007`7fee2310 fffff806`3e05d768 00000000`00000008 : HKKbdFltr+0x1511
fffff806`3e05d648 fffff806`3e05d768 : ffffd007`7fee2310 fffff806`3e05d768 00000000`00000008 fffff806`3e05d6c0 : 0xffffd007`7fa941e0
fffff806`3e05d650 ffffd007`7fee2310 : fffff806`3e05d768 00000000`00000008 fffff806`3e05d6c0 fffff80a`932613f0 : 0xfffff806`3e05d768
fffff806`3e05d658 fffff806`3e05d768 : 00000000`00000008 fffff806`3e05d6c0 fffff80a`932613f0 ffffd007`7f5d0790 : 0xffffd007`7fee2310
fffff806`3e05d660 00000000`00000008 : fffff806`3e05d6c0 fffff80a`932613f0 ffffd007`7f5d0790 000013fa`c9cc6aa2 : 0xfffff806`3e05d768
fffff806`3e05d668 fffff806`3e05d6c0 : fffff80a`932613f0 ffffd007`7f5d0790 000013fa`c9cc6aa2 fffff80a`8f7a60db : 0x8
fffff806`3e05d670 fffff80a`932613f0 : ffffd007`7f5d0790 000013fa`c9cc6aa2 fffff80a`8f7a60db ffffd007`7fa941e0 : 0xfffff806`3e05d6c0
fffff806`3e05d678 ffffd007`7f5d0790 : 000013fa`c9cc6aa2 fffff80a`8f7a60db ffffd007`7fa941e0 fffff806`3e05d6f9 : HKKbdFltr+0x13f0
fffff806`3e05d680 000013fa`c9cc6aa2 : fffff80a`8f7a60db ffffd007`7fa941e0 fffff806`3e05d6f9 fffff806`3e05da01 : 0xffffd007`7f5d0790
fffff806`3e05d688 fffff80a`8f7a60db : ffffd007`7fa941e0 fffff806`3e05d6f9 fffff806`3e05da01 fffff80a`8f7af000 : 0x000013fa`c9cc6aa2
fffff806`3e05d690 fffff806`3840781e : fffff806`34370240 00000000`00000010 00000000`00000000 fffff806`3e05da20 : i8042prt!I8042KeyboardIsrDpc+0x1bb
fffff806`3e05d760 fffff806`38406b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`3e05d8d0 fffff806`385f97be : 00000000`00000000 fffff806`3436d180 fffff806`38f27600 ffffd007`89bea080 : nt!KiRetireDpcList+0x1f4
fffff806`3e05db60 00000000`00000000 : fffff806`3e05e000 fffff806`3e057000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: kbdclass+2f92

MODULE_NAME: kbdclass

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2f92

FAILURE_BUCKET_ID: AV_kbdclass!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b3bf3956-b8c1-c245-14d4-596c62dd153b}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa40b026845d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80ff9752f92, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9953

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 74835

Key : Analysis.Init.CPU.mSec
Value: 1405

Key : Analysis.Init.Elapsed.mSec
Value: 166328

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: d1

BUGCHECK_P1: ffffa40b026845d0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80ff9752f92

READ_ADDRESS: fffff8012e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa40b026845d0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffff868bd582f400 -- (.trap 0xffff868bd582f400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa4049340d5c0 rbx=0000000000000000 rcx=ffffa4049340d5c0
rdx=000000066f277010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80ff9752f92 rsp=ffff868bd582f598 rbp=ffff868bd582f610
r8=00000000000000c0 r9=ffffa404811350a8 r10=ffffa40481135b28
r11=ffffa40b02684690 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff80f`f9752f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa40b`026845d0=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff868b`d582f2b8 fffff801`2de07b69 : 00000000`0000000a ffffa40b`026845d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff868b`d582f2c0 fffff801`2de03e69 : 000000cd`6f850095 00000000`00000000 00000000`00000000 ffffa404`81031030 : nt!KiBugCheckDispatch+0x69
ffff868b`d582f400 fffff80f`f9752f92 : fffff80f`f97556dd 00000000`7e6a2400 ffff868b`d582f610 ffffa404`89c7fa20 : nt!KiPageFault+0x469
ffff868b`d582f598 fffff80f`f97556dd : 00000000`7e6a2400 ffff868b`d582f610 ffffa404`89c7fa20 fffff801`32dc129b : kbdclass!memcpy+0x92
ffff868b`d582f5a0 fffff80f`fd7f1511 : ffffa404`78e2baa0 ffff868b`d582f768 ffffa404`807c5310 ffff868b`d582f768 : kbdclass!KeyboardClassServiceCallback+0x16d
ffff868b`d582f640 ffffa404`78e2baa0 : ffff868b`d582f768 ffffa404`807c5310 ffff868b`d582f768 00000000`00000008 : HKKbdFltr+0x1511
ffff868b`d582f648 ffff868b`d582f768 : ffffa404`807c5310 ffff868b`d582f768 00000000`00000008 ffff868b`d582f6c0 : 0xffffa404`78e2baa0
ffff868b`d582f650 ffffa404`807c5310 : ffff868b`d582f768 00000000`00000008 ffff868b`d582f6c0 fffff80f`fd7f13f0 : 0xffff868b`d582f768
ffff868b`d582f658 ffff868b`d582f768 : 00000000`00000008 ffff868b`d582f6c0 fffff80f`fd7f13f0 ffffa404`80d3cc90 : 0xffffa404`807c5310
ffff868b`d582f660 00000000`00000008 : ffff868b`d582f6c0 fffff80f`fd7f13f0 ffffa404`80d3cc90 00006b03`1af5fdd7 : 0xffff868b`d582f768
ffff868b`d582f668 ffff868b`d582f6c0 : fffff80f`fd7f13f0 ffffa404`80d3cc90 00006b03`1af5fdd7 fffff80f`f97260db : 0x8
ffff868b`d582f670 fffff80f`fd7f13f0 : ffffa404`80d3cc90 00006b03`1af5fdd7 fffff80f`f97260db ffffa404`78e2baa0 : 0xffff868b`d582f6c0
ffff868b`d582f678 ffffa404`80d3cc90 : 00006b03`1af5fdd7 fffff80f`f97260db ffffa404`78e2baa0 ffff868b`d582f6f9 : HKKbdFltr+0x13f0
ffff868b`d582f680 00006b03`1af5fdd7 : fffff80f`f97260db ffffa404`78e2baa0 ffff868b`d582f6f9 ffff868b`d582fa01 : 0xffffa404`80d3cc90
ffff868b`d582f688 fffff80f`f97260db : ffffa404`78e2baa0 ffff868b`d582f6f9 ffff868b`d582fa01 fffff80f`f972f000 : 0x00006b03`1af5fdd7
ffff868b`d582f690 fffff801`2dc0781e : ffffb701`ad5d5240 00000000`00000010 00000000`00000000 ffff868b`d582fa20 : i8042prt!I8042KeyboardIsrDpc+0x1bb
ffff868b`d582f760 fffff801`2dc06b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffff868b`d582f8d0 fffff801`2ddf97be : ffffffff`00000000 ffffb701`ad5d2180 ffffb701`ad5dd240 ffffa404`8b75d080 : nt!KiRetireDpcList+0x1f4
ffff868b`d582fb60 00000000`00000000 : ffff868b`d5830000 ffff868b`d5829000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 92

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner
---------[/CODE]
 
O halde mesajınızı yazdığınızda bildirimin gelmesi amacıyla bu mesajı yazıyorum. Bu saatten sonra sorun çözülürse ya da devam ederse yazın. İyi kullanımlar. :)
 
O halde mesajınızı yazdığınızda bildirimin gelmesi amacıyla bu mesajı yazıyorum. Bu saatten sonra sorun çözülürse ya da devam ederse yazın. İyi kullanımlar.
Sorun çözülmüş gibi görünüyor. Herhangi bir mavi ekran hatası almadım. 24 saattir. Umarım tekrar yazmak zorunda kalmam ilginiz için teşekkürler :)
 

Geri
Yukarı