Monster Abra A7 mavi ekran sorunu

eagg

Hectopat
Katılım
17 Temmuz 2020
Mesajlar
123
Monster Abra A7 oyun oynarken mavi ekran hatası aldım. Bilgisayar yeniden başlatılacak dedi. Sıcaklıktan dolayı mı donanımsal mı acaba ne yapmam gerek?
 
 
Emin değilim ama klavye ile ilgili bir sorun olabilir. Yine de bir bellek testi yapın.


Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8808d799bec0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8058b1c2f92, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-R85UVBR

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16500

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8808d799bec0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8058b1c2f92

READ_ADDRESS: fffff8056c6fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff8808d799bec0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8057165c400 -- (.trap 0xfffff8057165c400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0
rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610
 r8=00000000000000c0  r9=ffff8805456380a8 r10=ffff880545638b28
r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`8b1c2f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff805`7165c2b8 fffff805`6bdefa29     : 00000000`0000000a ffff8808`d799bec0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`7165c2c0 fffff805`6bdebd29     : 00000000`00010002 00000000`00000000 ffff8805`493db6c8 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff805`7165c400 fffff805`8b1c2f92     : fffff805`8b1c56dd 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 : nt!KiPageFault+0x469
fffff805`7165c598 fffff805`8b1c56dd     : 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 fffff805`6f4b129b : kbdclass!memcpy+0x92
fffff805`7165c5a0 fffff805`8b1b1511     : ffff8805`44fd6190 fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`7165c640 ffff8805`44fd6190     : fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 : HKKbdFltr+0x1511
fffff805`7165c648 fffff805`7165c768     : ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 : 0xffff8805`44fd6190
fffff805`7165c650 ffff8805`44fd7310     : fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 : 0xfffff805`7165c768
fffff805`7165c658 fffff805`7165c768     : 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 : 0xffff8805`44fd7310
fffff805`7165c660 00000000`00000008     : fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a : 0xfffff805`7165c768
fffff805`7165c668 fffff805`7165c6c0     : fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db : 0x8
fffff805`7165c670 fffff805`8b1b13f0     : ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 : 0xfffff805`7165c6c0
fffff805`7165c678 ffff8805`44fd66d0     : 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 : HKKbdFltr+0x13f0
fffff805`7165c680 0000cc3f`b94b8d3a     : fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 : 0xffff8805`44fd66d0
fffff805`7165c688 fffff805`8b1860db     : ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 fffff805`8b18f000 : 0x0000cc3f`b94b8d3a
fffff805`7165c690 fffff805`6bc3a6be     : fffff805`687fa240 00000000`00000010 00000000`00000000 fffff805`7165ca20 : i8042prt!I8042KeyboardIsrDpc+0x1bb
fffff805`7165c760 fffff805`6bc399a4     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`7165c8d0 fffff805`6bde16ce     : 00000000`00000000 fffff805`687f7180 fffff805`6c726600 ffff8805`4bb79080 : nt!KiRetireDpcList+0x1f4
fffff805`7165cb60 00000000`00000000     : fffff805`7165d000 fffff805`71656000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

0: kd> lmvm kbdclass
Browse full module list
start             end                 module name
fffff805`8b1c0000 fffff805`8b1d4000   kbdclass # (pdb symbols)          C:\ProgramData\Dbg\sym\kbdclass.pdb\D57039F36E70898559E7A4155D2435C61\kbdclass.pdb
    Loaded symbol image file: kbdclass.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3156654A14000\kbdclass.sys
    Image path: \SystemRoot\System32\drivers\kbdclass.sys
    Image name: kbdclass.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        3156654A (This is a reproducible build file hash, not a timestamp)
    CheckSum:         0001CE1A
    ImageSize:        00014000
    File version:     10.0.19041.1030
    Product version:  10.0.19041.1030
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     kbdclass.sys
        OriginalFilename: kbdclass.sys
        ProductVersion:   10.0.19041.1030
        FileVersion:      10.0.19041.1030 (WinBuild.160101.0800)
        FileDescription:  Keyboard Class Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
0: kd> .trap 0xfffff8057165c400
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0
rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610
 r8=00000000000000c0  r9=ffff8805456380a8 r10=ffff880545638b28
r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`8b1c2f92 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=????????????????????????????????
0: kd> ln fffff8058b1c2f92
Browse module
Set bu breakpoint

(fffff805`8b1c2f00)   kbdclass!memcpy+0x92   |  (fffff805`8b1c31c0)   kbdclass!memset
 
Emin değilim ama klavye ile ilgili bir sorun olabilir. Yine de bir bellek testi yapın.


Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8808d799bec0, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8058b1c2f92, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys.
*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8734.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-R85UVBR.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 16500.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 88.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffff8808d799bec0.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8058b1c2f92.

READ_ADDRESS: fffff8056c6fa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock.
fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffff8808d799bec0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8057165c400 -- (.trap 0xfffff8057165c400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0.
rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610.
r8=00000000000000c0 r9=ffff8805456380a8 r10=ffff880545638b28.
r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
kbdclass!memcpy+0x92:
fffff805`8b1c2f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff805`7165c2b8 fffff805`6bdefa29 : 00000000`0000000a ffff8808`d799bec0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff805`7165c2c0 fffff805`6bdebd29 : 00000000`00010002 00000000`00000000 ffff8805`493db6c8 00000000`00000001 : nt!KiBugCheckDispatch+0x69.
fffff805`7165c400 fffff805`8b1c2f92 : fffff805`8b1c56dd 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 : nt!KiPageFault+0x469.
fffff805`7165c598 fffff805`8b1c56dd : 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 fffff805`6f4b129b : kbdclass!memcpy+0x92.
fffff805`7165c5a0 fffff805`8b1b1511 : ffff8805`44fd6190 fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 : kbdclass!KeyboardClassServiceCallback+0x16d.
fffff805`7165c640 ffff8805`44fd6190 : fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 : HKKbdFltr+0x1511.
fffff805`7165c648 fffff805`7165c768 : ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 : 0xffff8805`44fd6190.
fffff805`7165c650 ffff8805`44fd7310 : fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 : 0xfffff805`7165c768.
fffff805`7165c658 fffff805`7165c768 : 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 : 0xffff8805`44fd7310.
fffff805`7165c660 00000000`00000008 : fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a : 0xfffff805`7165c768.
fffff805`7165c668 fffff805`7165c6c0 : fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db : 0x8.
fffff805`7165c670 fffff805`8b1b13f0 : ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 : 0xfffff805`7165c6c0.
fffff805`7165c678 ffff8805`44fd66d0 : 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 : HKKbdFltr+0x13f0.
fffff805`7165c680 0000cc3f`b94b8d3a : fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 : 0xffff8805`44fd66d0.
fffff805`7165c688 fffff805`8b1860db : ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 fffff805`8b18f000 : 0x0000cc3f`b94b8d3a.
fffff805`7165c690 fffff805`6bc3a6be : fffff805`687fa240 00000000`00000010 00000000`00000000 fffff805`7165ca20 : i8042prt!I8042KeyboardIsrDpc+0x1bb.
fffff805`7165c760 fffff805`6bc399a4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e.
fffff805`7165c8d0 fffff805`6bde16ce : 00000000`00000000 fffff805`687f7180 fffff805`6c726600 ffff8805`4bb79080 : nt!KiRetireDpcList+0x1f4.
fffff805`7165cb60 00000000`00000000 : fffff805`7165d000 fffff805`71656000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: kbdclass!memcpy+92.

MODULE_NAME: kbdclass.

IMAGE_NAME: kbdclass.sys.

IMAGE_VERSION: 10.0.19041.1030.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 92.

FAILURE_BUCKET_ID: AV_kbdclass!memcpy.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner.
---------

0: kd> lmvm kbdclass.
Browse full module list.
start end module name.
fffff805`8b1c0000 fffff805`8b1d4000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\D57039F36E70898559E7A4155D2435C61\kbdclass.pdb.
Loaded symbol image file: kbdclass.sys.
Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3156654A14000\kbdclass.sys.
Image path: \SystemRoot\System32\drivers\kbdclass.sys.
Image name: kbdclass.sys.
Browse all global symbols functions data.
Image was built with /Brepro flag.
Timestamp: 3156654A (This is a reproducible build file hash, not a timestamp)
CheckSum: 0001CE1A.
ImageSize: 00014000.
File version: 10.0.19041.1030.
Product version: 10.0.19041.1030.
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32.
File type: 3.7 Driver.
File date: 00000000.00000000.
Translations: 0409.04b0.
Information from resource tables:
CompanyName: Microsoft Corporation.
ProductName: Microsoft® Windows® Operating System.
InternalName: kbdclass.sys.
OriginalFilename: kbdclass.sys.
ProductVersion: 10.0.19041.1030.
FileVersion: 10.0.19041.1030 (WinBuild.160101.0800)
FileDescription: Keyboard Class Driver.
LegalCopyright: © Microsoft Corporation. All rights reserved.
0: kd> .trap 0xfffff8057165c400.
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0.
rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610.
r8=00000000000000c0 r9=ffff8805456380a8 r10=ffff880545638b28.
r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
kbdclass!memcpy+0x92:
fffff805`8b1c2f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=????????????????????????????????
0: kd> ln fffff8058b1c2f92.
Browse module.
Set bu breakpoint.

(fffff805`8b1c2f00) kbdclass!memcpy+0x92 | (fffff805`8b1c31c0) kbdclass!memset.

Az önce bitti, hata çıkmadı.
 

Dosya Ekleri

  • IMG-20200728-WA0022.jpeg
    IMG-20200728-WA0022.jpeg
    527,2 KB · Görüntüleme: 77
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı