*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd694f7a68d30, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8025ae032d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1578
Key : Analysis.Elapsed.mSec
Value: 5242
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 77
Key : Analysis.Init.Elapsed.mSec
Value: 1581
Key : Analysis.Memory.CommitPeak.Mb
Value: 147
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffd694f7a68d30
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8025ae032d2
FILE_IN_CAB: 060323-11375-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff8021bf1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd694f7a68d30
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
DPC_STACK_BASE: FFFFF8021F308FB0
TRAP_FRAME: fffff8021f308470 -- (.trap 0xfffff8021f308470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd68cb8102dc0 rbx=0000000000000000 rcx=ffffd68cb8102dc0
rdx=000000083f965f70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025ae032d2 rsp=fffff8021f308608 rbp=fffff8021f308680
r8=00000000000000c0 r9=0000000000000038 r10=ffffd68cac5cb000
r11=ffffd694f7a68df0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff802`5ae032d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffd694`f7a68d30=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff802`1f308328 fffff802`1b640fa9 : 00000000`0000000a ffffd694`f7a68d30 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`1f308330 fffff802`1b63c634 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff802`1f308470 fffff802`5ae032d2 : fffff802`5ae05b5d 00000000`b45b6230 fffff802`1f308680 ffffd68c`ba9f1aa0 : nt!KiPageFault+0x474
fffff802`1f308608 fffff802`5ae05b5d : 00000000`b45b6230 fffff802`1f308680 ffffd68c`ba9f1aa0 fffff802`5adc2d5c : kbdclass!memcpy+0x92
fffff802`1f308610 fffff802`5adf1511 : ffffd68c`ac06baa0 fffff802`1f3087d8 ffffd68c`ac35a310 fffff802`1f3087d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`1f3086b0 ffffd68c`ac06baa0 : fffff802`1f3087d8 ffffd68c`ac35a310 fffff802`1f3087d8 00000000`00000008 : HKKbdFltr+0x1511
fffff802`1f3086b8 fffff802`1f3087d8 : ffffd68c`ac35a310 fffff802`1f3087d8 00000000`00000008 fffff802`1f308730 : 0xffffd68c`ac06baa0
fffff802`1f3086c0 ffffd68c`ac35a310 : fffff802`1f3087d8 00000000`00000008 fffff802`1f308730 ffffd68c`ac06b950 : 0xfffff802`1f3087d8
fffff802`1f3086c8 fffff802`1f3087d8 : 00000000`00000008 fffff802`1f308730 ffffd68c`ac06b950 fffff802`5adf13f0 : 0xffffd68c`ac35a310
fffff802`1f3086d0 00000000`00000008 : fffff802`1f308730 ffffd68c`ac06b950 fffff802`5adf13f0 fffff802`17e2f180 : 0xfffff802`1f3087d8
fffff802`1f3086d8 fffff802`1f308730 : ffffd68c`ac06b950 fffff802`5adf13f0 fffff802`17e2f180 fffff802`5adcb848 : 0x8
fffff802`1f3086e0 ffffd68c`ac06b950 : fffff802`5adf13f0 fffff802`17e2f180 fffff802`5adcb848 ffffd68c`ac06baa0 : 0xfffff802`1f308730
fffff802`1f3086e8 fffff802`5adf13f0 : fffff802`17e2f180 fffff802`5adcb848 ffffd68c`ac06baa0 fffff802`1f308769 : 0xffffd68c`ac06b950
fffff802`1f3086f0 fffff802`17e2f180 : fffff802`5adcb848 ffffd68c`ac06baa0 fffff802`1f308769 ffffd68c`ac0838d0 : HKKbdFltr+0x13f0
fffff802`1f3086f8 fffff802`5adcb848 : ffffd68c`ac06baa0 fffff802`1f308769 ffffd68c`ac0838d0 fffff802`5add0258 : 0xfffff802`17e2f180
fffff802`1f308700 fffff802`1b42a1da : 00000000`00000000 ffffd68c`00000010 00000000`00000000 ffff9401`c1debe70 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`1f3087d0 fffff802`1b4299e4 : fffff802`00000001 ffffd68c`000cd4cb fffff802`00000000 00000000`0000000f : nt!KiExecuteAllDpcs+0x54a
fffff802`1f308d20 fffff802`1b634d65 : 00000000`00000000 00000000`00000000 ffffd68c`bbdc0080 00000000`17814da4 : nt!KiRetireDpcList+0xfe4
fffff802`1f308fb0 fffff802`1b634d0f : ffffe80d`9ca9f949 fffff802`1b42c0c9 00000000`00000000 18327768`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
ffffe80d`9ca9f8b0 fffff802`1b42c0c9 : 00000000`00000000 18327768`00000000 00000001`00000000 00000001`176ce6f0 : nt!KiPlatformSwapStacksAndCallReturn
ffffe80d`9ca9f8c0 fffff802`1b6344db : 00000000`00000000 ffffd68c`bbdc0080 ffffd68c`bbdc0080 00000000`00298000 : nt!KiDispatchInterrupt+0xd9
ffffe80d`9ca9f9b0 fffff802`1b62db11 : 00000000`1780d380 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffffe80d`9ca9f9e0 00000000`1eb82379 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`2d36ea50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1eb82379
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.