Capgras
Hectopat
- Katılım
- 27 Eylül 2020
- Mesajlar
- 381
Daha fazla
- Cinsiyet
- Erkek
- RAM
- 8+8 16 GB
- SSD veya HDD modeli
- Samsung 980 Evo Plus 1 TB+ İntel 480 gb ssd
- Ekran kartı
- 1650 Ti
- İşlemci
- İ5 10200H
GPU nuzun sürücülerü güncel midir hocam.
Termal bakımlar ve temizlik tammı hararet ne seviyede.
Termal bakımı daha birkaç hafta önce yaptım.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318
} klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318}
klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff948a9a0d79a0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80255fa32d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2921
Key : Analysis.Elapsed.mSec
Value: 4202
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 358
Key : Analysis.Init.Elapsed.mSec
Value: 6620
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff948a9a0d79a0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80255fa32d2
FILE_IN_CAB: 070423-14562-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8021771c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff948a9a0d79a0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTA5.exe
DPC_STACK_BASE: FFFFF80214ADCFB0
TRAP_FRAME: fffff80214adc460 -- (.trap 0xfffff80214adc460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9489c3f23240 rbx=0000000000000000 rcx=ffff9489c3f23240
rdx=00000000d61b4760 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80255fa32d2 rsp=fffff80214adc5f8 rbp=fffff80214adc670
r8=00000000000000c0 r9=0000000000000038 r10=ffff9489b89f3000
r11=ffff948a9a0d7a60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff802`55fa32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff948a`9a0d79a0=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff802`14adc318 fffff802`16e418a9 : 00000000`0000000a ffff948a`9a0d79a0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`14adc320 fffff802`16e3cf34 : 00000000`00000000 00000000`00000000 ffff9489`bf12b6c8 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff802`14adc460 fffff802`55fa32d2 : fffff802`55fa5b5d 00000000`21958330 fffff802`14adc670 ffff9489`c3795a20 : nt!KiPageFault+0x474
fffff802`14adc5f8 fffff802`55fa5b5d : 00000000`21958330 fffff802`14adc670 ffff9489`c3795a20 fffff802`55f62d5c : kbdclass!memcpy+0x92
fffff802`14adc600 fffff802`55f91511 : ffff9489`b8766aa0 fffff802`14adc7c8 ffff9489`b8775310 fffff802`14adc7c8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`14adc6a0 ffff9489`b8766aa0 : fffff802`14adc7c8 ffff9489`b8775310 fffff802`14adc7c8 00000000`00000008 : HKKbdFltr+0x1511
fffff802`14adc6a8 fffff802`14adc7c8 : ffff9489`b8775310 fffff802`14adc7c8 00000000`00000008 fffff802`14adc720 : 0xffff9489`b8766aa0
fffff802`14adc6b0 ffff9489`b8775310 : fffff802`14adc7c8 00000000`00000008 fffff802`14adc720 ffff9489`b8766950 : 0xfffff802`14adc7c8
fffff802`14adc6b8 fffff802`14adc7c8 : 00000000`00000008 fffff802`14adc720 ffff9489`b8766950 fffff802`55f913f0 : 0xffff9489`b8775310
fffff802`14adc6c0 00000000`00000008 : fffff802`14adc720 ffff9489`b8766950 fffff802`55f913f0 fffff802`133a8180 : 0xfffff802`14adc7c8
fffff802`14adc6c8 fffff802`14adc720 : ffff9489`b8766950 fffff802`55f913f0 fffff802`133a8180 fffff802`55f6b848 : 0x8
fffff802`14adc6d0 ffff9489`b8766950 : fffff802`55f913f0 fffff802`133a8180 fffff802`55f6b848 ffff9489`b8766aa0 : 0xfffff802`14adc720
fffff802`14adc6d8 fffff802`55f913f0 : fffff802`133a8180 fffff802`55f6b848 ffff9489`b8766aa0 fffff802`14adc759 : 0xffff9489`b8766950
fffff802`14adc6e0 fffff802`133a8180 : fffff802`55f6b848 ffff9489`b8766aa0 fffff802`14adc759 ffff9489`b9591280 : HKKbdFltr+0x13f0
fffff802`14adc6e8 fffff802`55f6b848 : ffff9489`b8766aa0 fffff802`14adc759 ffff9489`b9591280 fffff802`55f70258 : 0xfffff802`133a8180
fffff802`14adc6f0 fffff802`16ca7a4c : 00000000`00000000 ffff8101`00000010 00000000`00000000 ffff8101`50aa7bf0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`14adc7c0 fffff802`16ca6a3a : 00000000`00000022 fffff802`133a8180 00000000`023a83b5 00000000`00000010 : nt!KiExecuteAllDpcs+0x42c
fffff802`14adcd00 fffff802`16e356f5 : 00000000`00000000 00000000`00000000 fffff802`133a8180 000001fa`9d8dff01 : nt!KiRetireDpcList+0x1ba
fffff802`14adcfb0 fffff802`16e3569f : ffffca80`f965f949 fffff802`16c418a5 00000000`43800000 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
ffffca80`f965f8b0 fffff802`16c418a5 : 00000000`43800000 00000000`00000000 00000000`43800000 00000000`00000000 : nt!KiPlatformSwapStacksAndCallReturn
ffffca80`f965f8c0 fffff802`16e34e6b : 00000000`00000000 00000088`f14df000 00000000`00000000 00000088`f14df000 : nt!KiDispatchInterrupt+0xd5
ffffca80`f965f9b0 fffff802`16e2e4a1 : 0000000a`4115c200 ffff8101`50aa7000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffffca80`f965f9e0 00007ffe`3f842530 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000088`f493fca0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3f842530
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23435.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.