Tulpar T5 v23.2 mavi ekran hatası

desertfox12

Centipat
Katılım
13 Ekim 2023
Mesajlar
6
Daha fazla  
Cinsiyet
Erkek
System model: Tulpar T5 v23.2
BIOS: 1.07.05tfb (type: UEFI)
Processor: 12th gen Intel(R) Core(tm) i7-12650H (16 cpus), ~2.3GHz
Memory: 32768MB RAM.
Available OS Memory: 32488MB RAM.
Card name: NVIDIA GeForce RTX 4060 laptop GPU.
Manufacturer: NVIDIA.

Red Dead Redemption 2 oynarken iki kere mavi ekran hatası verdi. Yardımcı olabilir misiniz?
Minidump dosyaları:
 
Monster'a ait tüm yazılımları ve klavyeye ait tüm yazılımları kaldır. İntel driver assistant'ı indirip tüm güncellemeleri de yap. Ardından tekrar RDR2 girip mavi ekranların kesilip kesilmediğini bildir.

 
Monster'a ait tüm yazılımları ve klavyeye ait tüm yazılımları kaldır. Intel driver Assistant'ı indirip tüm güncellemeleri de yap. Ardından tekrar RDR2 girip mavi ekranların kesilip kesilmediğini bildir.


Teşekkür ederim yaptıktan sonra geri dönüş sağlayacağım.

Monster'a ait tüm yazılımları ve klavyeye ait tüm yazılımları kaldır. Intel driver Assistant'ı indirip tüm güncellemeleri de yap. Ardından tekrar RDR2 girip mavi ekranların kesilip kesilmediğini bildir.


Hala mavi ekran hatası almaya devam ediyorum.

************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.281 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\101623-15765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22621.1928.amd64fre.ni_release_svc_prod3.230622-0951
Kernel base = 0xfffff805`73e00000 PsLoadedModuleList = 0xfffff805`74a130c0
Debug session time: Mon Oct 16 01:02:14.571 2023 (UTC + 3:00)
System Uptime: 0 days 3:19:18.619
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........................
Loading User Symbols

Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`74212740 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb07`9be46ef0=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa98e55dde200, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff805afe032d2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1656

Key : Analysis.Elapsed.mSec
Value: 11244

Key : Analysis.IO.Other.Mb
Value: 13

Key : Analysis.IO.Read.Mb
Value: 13

Key : Analysis.IO.Write.Mb
Value: 38

Key : Analysis.Init.CPU.mSec
Value: 280

Key : Analysis.Init.Elapsed.mSec
Value: 78122

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Bugcheck.Code.LegacyAPI
Value: 0xd1

Key : Failure.Bucket
Value: AV_kbdclass!memcpy

Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 1

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1

Key : Hypervisor.Flags.Phase0InitDone
Value: 1

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 1

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 21631230

Key : Hypervisor.Flags.ValueHex
Value: 14a10fe

Key : Hypervisor.Flags.VpAssistPage
Value: 1

Key : Hypervisor.Flags.VsmAvailable
Value: 1

Key : Hypervisor.RootFlags.AccessStats
Value: 1

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 1

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1

Key : Hypervisor.RootFlags.MceEnlightened
Value: 1

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1

Key : Hypervisor.RootFlags.Value
Value: 1015

Key : Hypervisor.RootFlags.ValueHex
Value: 3f7

Key : WER.OS.Branch
Value: ni_release_svc_prod3

Key : WER.OS.Version
Value: 10.0.22621.1928


BUGCHECK_CODE: d1

BUGCHECK_P1: ffffa98e55dde200

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805afe032d2

FILE_IN_CAB: 101623-15765-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b


READ_ADDRESS: fffff80574b1d468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa98e55dde200

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffffb079be47030 -- (.trap 0xfffffb079be47030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa98b30202a40 rbx=0000000000000000 rcx=ffffa98b30202a40
rdx=0000000325bdb7c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805afe032d2 rsp=fffffb079be471c8 rbp=fffffb079be47240
r8=00000000000000c0 r9=0000000000000038 r10=ffffa98b16ea7000
r11=ffffa98e55dde2c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff805`afe032d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa98e`55dde200=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffffb07`9be46ee8 fffff805`74227da9 : 00000000`0000000a ffffa98e`55dde200 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb07`9be46ef0 fffff805`74223434 : 00000000`000003d4 00000000`00000000 00000000`00000002 fffff805`af475698 : nt!KiBugCheckDispatch+0x69
fffffb07`9be47030 fffff805`afe032d2 : fffff805`afe05b5d 00000000`c0c4a2c0 fffffb07`9be47240 ffffa98b`207168f0 : nt!KiPageFault+0x474
fffffb07`9be471c8 fffff805`afe05b5d : 00000000`c0c4a2c0 fffffb07`9be47240 ffffa98b`207168f0 fffff805`afdc2d5c : kbdclass!memcpy+0x92
fffffb07`9be471d0 fffff805`afdf1511 : ffffa98b`16e698d0 fffffb07`9be47398 ffffa98b`16e21310 fffffb07`9be47398 : kbdclass!KeyboardClassServiceCallback+0x16d
fffffb07`9be47270 ffffa98b`16e698d0 : fffffb07`9be47398 ffffa98b`16e21310 fffffb07`9be47398 00000000`00000008 : HKKbdFltr+0x1511
fffffb07`9be47278 fffffb07`9be47398 : ffffa98b`16e21310 fffffb07`9be47398 00000000`00000008 fffffb07`9be472f0 : 0xffffa98b`16e698d0
fffffb07`9be47280 ffffa98b`16e21310 : fffffb07`9be47398 00000000`00000008 fffffb07`9be472f0 ffffa98b`16e69780 : 0xfffffb07`9be47398
fffffb07`9be47288 fffffb07`9be47398 : 00000000`00000008 fffffb07`9be472f0 ffffa98b`16e69780 fffff805`afdf13f0 : 0xffffa98b`16e21310
fffffb07`9be47290 00000000`00000008 : fffffb07`9be472f0 ffffa98b`16e69780 fffff805`afdf13f0 ffffc000`3ff11180 : 0xfffffb07`9be47398
fffffb07`9be47298 fffffb07`9be472f0 : ffffa98b`16e69780 fffff805`afdf13f0 ffffc000`3ff11180 fffff805`afdcb848 : 0x8
fffffb07`9be472a0 ffffa98b`16e69780 : fffff805`afdf13f0 ffffc000`3ff11180 fffff805`afdcb848 ffffa98b`16e698d0 : 0xfffffb07`9be472f0
fffffb07`9be472a8 fffff805`afdf13f0 : ffffc000`3ff11180 fffff805`afdcb848 ffffa98b`16e698d0 fffffb07`9be47329 : 0xffffa98b`16e69780
fffffb07`9be472b0 ffffc000`3ff11180 : fffff805`afdcb848 ffffa98b`16e698d0 fffffb07`9be47329 ffffa98b`16a26de0 : HKKbdFltr+0x13f0
fffffb07`9be472b8 fffff805`afdcb848 : ffffa98b`16e698d0 fffffb07`9be47329 ffffa98b`16a26de0 fffff805`afdd0258 : 0xffffc000`3ff11180
fffffb07`9be472c0 fffff805`7402a72c : 00000000`00000000 ffffc000`00000010 00000000`00000000 ffffc000`4024b1f0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffffb07`9be47390 fffff805`74029731 : 00000000`00000000 fffffb07`9be479d0 00000000`00000000 00000000`00000296 : nt!KiExecuteAllDpcs+0x42c
fffffb07`9be478d0 fffff805`7421753e : 00000000`00000000 ffffc000`3ff11180 ffffa98b`0ef44080 ffffa98b`20bf4080 : nt!KiRetireDpcList+0x1b1
fffffb07`9be47b80 00000000`00000000 : fffffb07`9be48000 fffffb07`9be41000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.22621.1774

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 92

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.22621.1928

BUILDLAB_STR: ni_release_svc_prod3

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner

@181951
 
Son düzenleme:

Technopat Haberler

Geri
Yukarı