Monster Abra A7 v13.2 mavi ekran hatası

İşletim sistemi
Windows 11

Bauglir

Picopat
Katılım
30 Haziran 2023
Mesajlar
10
Daha fazla  
Cinsiyet
Erkek
RAM
16GB (2x8GB) DDR4 1.2V 3200MHz SODIMM
SSD veya HDD modeli
1 Tb M2 Nvme
Ekran kartı
Rtx 3050 Ti 4gb Laptop Gpu
İşlemci
Intel i5-11400H 2.7GHz > 4.5GHz; 45W
Son düzenleyen: Moderatör:
Bazı Monster modellerde kronikleşmiş kbdclass.sys hatası.

Çözümü Control Center'ı güncellemek.

Güncel versiyonda da problem yaşıyorsanız Monster ile ilgili araçları tamamen kaldırmanız gerekiyor. Bu araçlar Monster tarafından doğru düzgün güncellenene kadar bu mavi ekran hataları maalesef devam edecek.



Döküm:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8012fa031740, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff805af7832d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1562

    Key  : Analysis.Elapsed.mSec
    Value: 2561

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 140

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7340

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 153

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_kbdclass!memcpy

    Key  : Failure.Hash
    Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1417df84

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 21631230

    Key  : Hypervisor.Flags.ValueHex
    Value: 14a10fe

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffff8012fa031740

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805af7832d2

FILE_IN_CAB:  062923-16250-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8058611c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8012fa031740

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff805876ff9f0 -- (.trap 0xfffff805876ff9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800ba81e7d80 rbx=0000000000000000 rcx=ffff800ba81e7d80
rdx=0000000751e499c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805af7832d2 rsp=fffff805876ffb88 rbp=fffff805876ffc00
 r8=00000000000000c0  r9=0000000000000038 r10=ffff800b9402a000
r11=ffff8012fa031800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`af7832d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffff8012`fa031740=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff805`876ff8a8 fffff805`858442a9     : 00000000`0000000a ffff8012`fa031740 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`876ff8b0 fffff805`8583f934     : 0000e54d`2dae90b7 00000000`00000000 ffff800b`97949180 fffff805`9db12ab2 : nt!KiBugCheckDispatch+0x69
fffff805`876ff9f0 fffff805`af7832d2     : fffff805`af785b5d 00000000`9d808d80 fffff805`876ffc00 ffff800b`a754e010 : nt!KiPageFault+0x474
fffff805`876ffb88 fffff805`af785b5d     : 00000000`9d808d80 fffff805`876ffc00 ffff800b`a754e010 fffff805`c1bd2d5c : kbdclass!memcpy+0x92
fffff805`876ffb90 fffff805`bf481511     : ffff800b`93da8ae0 fffff805`876ffd58 ffff800b`93fba310 fffff805`876ffd58 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff805`876ffc30 ffff800b`93da8ae0     : fffff805`876ffd58 ffff800b`93fba310 fffff805`876ffd58 00000000`00000008 : HKKbdFltr+0x1511
fffff805`876ffc38 fffff805`876ffd58     : ffff800b`93fba310 fffff805`876ffd58 00000000`00000008 fffff805`876ffcb0 : 0xffff800b`93da8ae0
fffff805`876ffc40 ffff800b`93fba310     : fffff805`876ffd58 00000000`00000008 fffff805`876ffcb0 ffff800b`93da8990 : 0xfffff805`876ffd58
fffff805`876ffc48 fffff805`876ffd58     : 00000000`00000008 fffff805`876ffcb0 ffff800b`93da8990 fffff805`bf4813f0 : 0xffff800b`93fba310
fffff805`876ffc50 00000000`00000008     : fffff805`876ffcb0 ffff800b`93da8990 fffff805`bf4813f0 fffff805`802c1180 : 0xfffff805`876ffd58
fffff805`876ffc58 fffff805`876ffcb0     : ffff800b`93da8990 fffff805`bf4813f0 fffff805`802c1180 fffff805`c1bdb848 : 0x8
fffff805`876ffc60 ffff800b`93da8990     : fffff805`bf4813f0 fffff805`802c1180 fffff805`c1bdb848 ffff800b`93da8ae0 : 0xfffff805`876ffcb0
fffff805`876ffc68 fffff805`bf4813f0     : fffff805`802c1180 fffff805`c1bdb848 ffff800b`93da8ae0 fffff805`876ffce9 : 0xffff800b`93da8990
fffff805`876ffc70 fffff805`802c1180     : fffff805`c1bdb848 ffff800b`93da8ae0 fffff805`876ffce9 ffff800b`97930de0 : HKKbdFltr+0x13f0
fffff805`876ffc78 fffff805`c1bdb848     : ffff800b`93da8ae0 fffff805`876ffce9 ffff800b`97930de0 fffff805`c1be0258 : 0xfffff805`802c1180
fffff805`876ffc80 fffff805`856a838c     : 00000000`00000000 ffff9280`00000010 00000000`00000000 ffff9280`e43ccab0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff805`876ffd50 fffff805`856a737a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
fffff805`87700290 fffff805`85833a6e     : 00000000`00000000 fffff805`802c1180 fffff805`8614c6c0 ffff800b`988b5080 : nt!KiRetireDpcList+0x1ba
fffff805`87700540 00000000`00000000     : fffff805`87701000 fffff805`876fa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.22621.601

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı