DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8808d799bec0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8058b1c2f92, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-R85UVBR
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16500
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff8808d799bec0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8058b1c2f92
READ_ADDRESS: fffff8056c6fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8808d799bec0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8057165c400 -- (.trap 0xfffff8057165c400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0
rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610
r8=00000000000000c0 r9=ffff8805456380a8 r10=ffff880545638b28
r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`8b1c2f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff805`7165c2b8 fffff805`6bdefa29 : 00000000`0000000a ffff8808`d799bec0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`7165c2c0 fffff805`6bdebd29 : 00000000`00010002 00000000`00000000 ffff8805`493db6c8 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff805`7165c400 fffff805`8b1c2f92 : fffff805`8b1c56dd 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 : nt!KiPageFault+0x469
fffff805`7165c598 fffff805`8b1c56dd : 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 fffff805`6f4b129b : kbdclass!memcpy+0x92
fffff805`7165c5a0 fffff805`8b1b1511 : ffff8805`44fd6190 fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`7165c640 ffff8805`44fd6190 : fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 : HKKbdFltr+0x1511
fffff805`7165c648 fffff805`7165c768 : ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 : 0xffff8805`44fd6190
fffff805`7165c650 ffff8805`44fd7310 : fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 : 0xfffff805`7165c768
fffff805`7165c658 fffff805`7165c768 : 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 : 0xffff8805`44fd7310
fffff805`7165c660 00000000`00000008 : fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a : 0xfffff805`7165c768
fffff805`7165c668 fffff805`7165c6c0 : fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db : 0x8
fffff805`7165c670 fffff805`8b1b13f0 : ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 : 0xfffff805`7165c6c0
fffff805`7165c678 ffff8805`44fd66d0 : 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 : HKKbdFltr+0x13f0
fffff805`7165c680 0000cc3f`b94b8d3a : fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 : 0xffff8805`44fd66d0
fffff805`7165c688 fffff805`8b1860db : ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 fffff805`8b18f000 : 0x0000cc3f`b94b8d3a
fffff805`7165c690 fffff805`6bc3a6be : fffff805`687fa240 00000000`00000010 00000000`00000000 fffff805`7165ca20 : i8042prt!I8042KeyboardIsrDpc+0x1bb
fffff805`7165c760 fffff805`6bc399a4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`7165c8d0 fffff805`6bde16ce : 00000000`00000000 fffff805`687f7180 fffff805`6c726600 ffff8805`4bb79080 : nt!KiRetireDpcList+0x1f4
fffff805`7165cb60 00000000`00000000 : fffff805`7165d000 fffff805`71656000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------
0: kd> lmvm kbdclass
Browse full module list
start end module name
fffff805`8b1c0000 fffff805`8b1d4000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\D57039F36E70898559E7A4155D2435C61\kbdclass.pdb
Loaded symbol image file: kbdclass.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3156654A14000\kbdclass.sys
Image path: \SystemRoot\System32\drivers\kbdclass.sys
Image name: kbdclass.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 3156654A (This is a reproducible build file hash, not a timestamp)
CheckSum: 0001CE1A
ImageSize: 00014000
File version: 10.0.19041.1030
Product version: 10.0.19041.1030
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: kbdclass.sys
OriginalFilename: kbdclass.sys
ProductVersion: 10.0.19041.1030
FileVersion: 10.0.19041.1030 (WinBuild.160101.0800)
FileDescription: Keyboard Class Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
0: kd> .trap 0xfffff8057165c400
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0
rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610
r8=00000000000000c0 r9=ffff8805456380a8 r10=ffff880545638b28
r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`8b1c2f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=????????????????????????????????
0: kd> ln fffff8058b1c2f92
Browse module
Set bu breakpoint
(fffff805`8b1c2f00) kbdclass!memcpy+0x92 | (fffff805`8b1c31c0) kbdclass!memset
Emin değilim ama klavye ile ilgili bir sorun olabilir. Yine de bir bellek testi yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffff8808d799bec0, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff8058b1c2f92, address which referenced memory. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for HKKbdFltr.sys. *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 8734. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-R85UVBR. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 16500. Key : Analysis.Memory.CommitPeak.Mb. Value: 88. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: d1. BUGCHECK_P1: ffff8808d799bec0. BUGCHECK_P2: 2. BUGCHECK_P3: 0. BUGCHECK_P4: fffff8058b1c2f92. READ_ADDRESS: fffff8056c6fa388: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock. fffff8056c60f2a8: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffff8808d799bec0. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. TRAP_FRAME: fffff8057165c400 -- (.trap 0xfffff8057165c400) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0. rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610. r8=00000000000000c0 r9=ffff8805456380a8 r10=ffff880545638b28. r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl nz na po nc. kbdclass!memcpy+0x92: fffff805`8b1c2f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=???????????????????????????????? Resetting default scope. STACK_TEXT: fffff805`7165c2b8 fffff805`6bdefa29 : 00000000`0000000a ffff8808`d799bec0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx. fffff805`7165c2c0 fffff805`6bdebd29 : 00000000`00010002 00000000`00000000 ffff8805`493db6c8 00000000`00000001 : nt!KiBugCheckDispatch+0x69. fffff805`7165c400 fffff805`8b1c2f92 : fffff805`8b1c56dd 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 : nt!KiPageFault+0x469. fffff805`7165c598 fffff805`8b1c56dd : 00000000`6e7ac0c0 fffff805`7165c610 ffff8805`4d8b1010 fffff805`6f4b129b : kbdclass!memcpy+0x92. fffff805`7165c5a0 fffff805`8b1b1511 : ffff8805`44fd6190 fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 : kbdclass!KeyboardClassServiceCallback+0x16d. fffff805`7165c640 ffff8805`44fd6190 : fffff805`7165c768 ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 : HKKbdFltr+0x1511. fffff805`7165c648 fffff805`7165c768 : ffff8805`44fd7310 fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 : 0xffff8805`44fd6190. fffff805`7165c650 ffff8805`44fd7310 : fffff805`7165c768 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 : 0xfffff805`7165c768. fffff805`7165c658 fffff805`7165c768 : 00000000`00000008 fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 : 0xffff8805`44fd7310. fffff805`7165c660 00000000`00000008 : fffff805`7165c6c0 fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a : 0xfffff805`7165c768. fffff805`7165c668 fffff805`7165c6c0 : fffff805`8b1b13f0 ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db : 0x8. fffff805`7165c670 fffff805`8b1b13f0 : ffff8805`44fd66d0 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 : 0xfffff805`7165c6c0. fffff805`7165c678 ffff8805`44fd66d0 : 0000cc3f`b94b8d3a fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 : HKKbdFltr+0x13f0. fffff805`7165c680 0000cc3f`b94b8d3a : fffff805`8b1860db ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 : 0xffff8805`44fd66d0. fffff805`7165c688 fffff805`8b1860db : ffff8805`44fd6190 fffff805`7165c6f9 fffff805`7165ca01 fffff805`8b18f000 : 0x0000cc3f`b94b8d3a. fffff805`7165c690 fffff805`6bc3a6be : fffff805`687fa240 00000000`00000010 00000000`00000000 fffff805`7165ca20 : i8042prt!I8042KeyboardIsrDpc+0x1bb. fffff805`7165c760 fffff805`6bc399a4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e. fffff805`7165c8d0 fffff805`6bde16ce : 00000000`00000000 fffff805`687f7180 fffff805`6c726600 ffff8805`4bb79080 : nt!KiRetireDpcList+0x1f4. fffff805`7165cb60 00000000`00000000 : fffff805`7165d000 fffff805`71656000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e. SYMBOL_NAME: kbdclass!memcpy+92. MODULE_NAME: kbdclass. IMAGE_NAME: kbdclass.sys. IMAGE_VERSION: 10.0.19041.1030. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 92. FAILURE_BUCKET_ID: AV_kbdclass!memcpy. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c} Followup: MachineOwner. --------- 0: kd> lmvm kbdclass. Browse full module list. start end module name. fffff805`8b1c0000 fffff805`8b1d4000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\D57039F36E70898559E7A4155D2435C61\kbdclass.pdb. Loaded symbol image file: kbdclass.sys. Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3156654A14000\kbdclass.sys. Image path: \SystemRoot\System32\drivers\kbdclass.sys. Image name: kbdclass.sys. Browse all global symbols functions data. Image was built with /Brepro flag. Timestamp: 3156654A (This is a reproducible build file hash, not a timestamp) CheckSum: 0001CE1A. ImageSize: 00014000. File version: 10.0.19041.1030. Product version: 10.0.19041.1030. File flags: 0 (Mask 3F) File OS: 40004 NT Win32. File type: 3.7 Driver. File date: 00000000.00000000. Translations: 0409.04b0. Information from resource tables: CompanyName: Microsoft Corporation. ProductName: Microsoft® Windows® Operating System. InternalName: kbdclass.sys. OriginalFilename: kbdclass.sys. ProductVersion: 10.0.19041.1030. FileVersion: 10.0.19041.1030 (WinBuild.160101.0800) FileDescription: Keyboard Class Driver. LegalCopyright: © Microsoft Corporation. All rights reserved. 0: kd> .trap 0xfffff8057165c400. NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff88054f5e04c0 rbx=0000000000000000 rcx=ffff88054f5e04c0. rdx=00000003883bba00 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8058b1c2f92 rsp=fffff8057165c598 rbp=fffff8057165c610. r8=00000000000000c0 r9=ffff8805456380a8 r10=ffff880545638b28. r11=ffff8808d799bf80 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl nz na po nc. kbdclass!memcpy+0x92: fffff805`8b1c2f92 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8808`d799bec0=???????????????????????????????? 0: kd> ln fffff8058b1c2f92. Browse module. Set bu breakpoint. (fffff805`8b1c2f00) kbdclass!memcpy+0x92 | (fffff805`8b1c31c0) kbdclass!memset.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.