drive.google.com
drive.google.com
www.asus.com
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000845f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80322a19fa2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 6
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 845f
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80322a19fa2
WRITE_ADDRESS: fffff803173733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031722a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8031722a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000845f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HD-Player.exe
TRAP_FRAME: ffffa904f343bb20 -- (.trap 0xffffa904f343bb20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000007cb rbx=0000000000000000 rcx=0000000000000020
rdx=00000000000007c9 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80322a19fa2 rsp=ffffa904f343bcb0 rbp=ffffcf86cad16290
r8=0000000000000f92 r9=0000000000000000 r10=00000000000007ca
r11=00000000000007ca r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
rt640x64!NICSendNetBufferHPQ+0x5fa:
fffff803`22a19fa2 6646894cc004 mov word ptr [rax+r8*8+4],r9w ds:00000000`0000845f=????
Resetting default scope
STACK_TEXT:
ffffa904`f343b9d8 fffff803`16fd41e9 : 00000000`0000000a 00000000`0000845f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffa904`f343b9e0 fffff803`16fd0529 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa904`f343bb20 fffff803`22a19fa2 : ffffa904`f343bcc0 00000000`00000000 00000000`ddb1fb00 00000000`00000000 : nt!KiPageFault+0x469
ffffa904`f343bcb0 fffff803`22a18f35 : ffffcf86`cad10000 ffffcf86`c7920000 ffffcf86`c7928828 ffffcf86`c7925000 : rt640x64!NICSendNetBufferHPQ+0x5fa
ffffa904`f343bd20 fffff803`16d80c41 : ffffcf86`ccc15a20 ffffcf86`caafad50 ffffcf86`cb351b00 00000000`00000000 : rt640x64!MpProcessSGList+0x385
ffffa904`f343bdb0 fffff803`16d808d4 : ffffcf86`c3043050 ffffcf86`caafad50 ffffcf86`cb0ea901 ffffcf86`00000000 : hal!HalpAllocateAdapterCallbackV2+0x171
ffffa904`f343be40 fffff803`16d80195 : fffff803`16d80ad0 00000000`00000002 ffffcf86`c3043050 ffffcf86`c7b392f0 : hal!HalAllocateAdapterChannelV2+0x148
ffffa904`f343be90 fffff803`16d77025 : ffffcf86`c3043050 ffffcf86`c7b392f0 ffffcf86`cad16290 00000000`00000084 : hal!HalAllocateAdapterChannel+0x45
ffffa904`f343bed0 fffff803`1b02ed5e : ffffcf86`c7b391b0 ffffcf86`c3043050 fffff803`000000a0 ffffcf86`c7b392f0 : hal!HalBuildScatterGatherListV2+0x18385
ffffa904`f343bf60 fffff803`22a14819 : ffffcf86`c7925000 ffffa904`f343c0b9 ffffcf86`cad16290 ffffcf86`c7b391b0 : ndis!NdisMAllocateNetBufferSGList+0x11e
ffffa904`f343c030 fffff803`22a04f41 : ffffcf86`c7925000 fffff803`22a04d10 ffffcf86`c7925000 ffffcf86`c7b39001 : rt640x64!MiniportSendNetBufferList+0x4a9
ffffa904`f343c0d0 fffff803`22a04d57 : 00000000`00000000 ffffcf86`c30431a0 fffff803`1b02dc70 ffffcf86`c7b39030 : rt640x64!MPSendNetBufferListsNPQ+0x1e5
ffffa904`f343c120 fffff803`1b02dd8f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : rt640x64!MPSendNetBufferLists+0x47
ffffa904`f343c150 fffff803`1b02dc7e : ffffcf86`c8d89b00 ffffcf86`c7b39030 ffffcf86`00000000 fffff803`1b02dc70 : ndis!ndisMSendNBLToMiniportInternal+0xff
ffffa904`f343c220 fffff803`1b02ea48 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMSendNBLToMiniport+0xe
ffffa904`f343c260 fffff803`1b060900 : 00000000`00000000 ffffa904`f343c329 ffffcf86`c30431a0 00000000`00000000 : ndis!ndisCallSendHandler+0x58
ffffa904`f343c2b0 fffff803`1b02c13f : 00000000`00000000 ffffcf86`c30431a0 ffffcf86`c9d06df0 00000000`00000500 : ndis!ndisInvokeNextSendHandler+0x194
ffffa904`f343c380 fffff803`1b2e2a55 : ffffcf86`c8c18010 ffffcf86`c7b39030 ffffcf86`00000000 ffffcf86`00000000 : ndis!NdisSendNetBufferLists+0x1af
ffffa904`f343c480 fffff803`1b2e277c : ffffcf86`c68b9e90 00000000`00000000 00000000`00000800 00000000`00000000 : tcpip!FlpSendPacketsHelper+0x2b5
ffffa904`f343c530 fffff803`1b2fa696 : 00000000`00000000 ffffcf86`c8209570 ffffcf86`c27b98e8 00000000`00000000 : tcpip!FlSendPackets+0x5c
ffffa904`f343c560 fffff803`1b2f9aa5 : ffffcf86`c9d00004 00000000`00000000 fffff803`1b4ae2e0 fffff803`1b2fa060 : tcpip!IppFragmentPackets+0x2b6
ffffa904`f343c640 fffff803`1b2f9742 : 00000000`00000000 ffffcf86`cc72b654 00000000`00000000 ffffcf86`00000014 : tcpip!IppDispatchSendPacketHelper+0xa5
ffffa904`f343c710 fffff803`1b2f7ecc : 00000000`00000004 00000000`00000004 ffffcf86`c27b99b8 ffffcf86`c27b98e8 : tcpip!IppPacketizeDatagrams+0x302
ffffa904`f343c850 fffff803`1b2daf00 : ffffcf86`c2807000 00000000`00000000 fffff803`1b4ae2e0 ffffcf86`cff234e0 : tcpip!IppSendDatagramsCommon+0x40c
ffffa904`f343c9d0 fffff803`1b2d0be0 : 00000000`a5947040 00000000`00000000 00000000`0000511d 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40
ffffa904`f343ca10 fffff803`1b2cf6b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpSendMessagesOnPath+0x1040
ffffa904`f343ceb0 fffff803`1b2cf435 : ffffcf86`cd4664a0 ffffa904`f343d470 ffffa904`f343d360 ffffa904`f343d360 : tcpip!UdpSendMessages+0x262
ffffa904`f343d250 fffff803`16ec00e8 : 00000000`00000006 00000000`00000000 0000003e`38e723d2 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffffa904`f343d280 fffff803`16ec005d : fffff803`1b2cf420 ffffa904`f343d360 ffffcf86`bfba7290 ffffe386`022ff001 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa904`f343d2f0 fffff803`1b2d7593 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`22435020 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffa904`f343d330 fffff803`2245602f : ffffcf86`cb6285c0 ffffa904`f343db80 ffffcf86`cb3518b0 ffffa904`f343db80 : tcpip!UdpTlProviderSendMessages+0x73
ffffa904`f343d3b0 fffff803`22434ef3 : ffffcf86`cb6285c0 ffffa904`f343d6d0 00000000`00000034 00000000`00000000 : afd!AfdFastDatagramSend+0x62f
ffffa904`f343d520 fffff803`174b2a2b : 00000000`00000000 00000000`00000000 ffffa904`f343db80 00000000`00012023 : afd!AfdFastIoDeviceControl+0x1863
ffffa904`f343d900 fffff803`174b22f6 : cf86cfdd`4730c3fb 00000000`00001424 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x71b
ffffa904`f343da20 fffff803`16fd3c18 : 00000000`00000001 ffffa904`f343db01 ffffcf86`c8f6e080 00000000`29ecfac8 : nt!NtDeviceIoControlFile+0x56
ffffa904`f343da90 00007ff8`23bfc154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`29ecf858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`23bfc154
SYMBOL_NAME: rt640x64!NICSendNetBufferHPQ+5fa
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
IMAGE_VERSION: 9.1.409.2015
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5fa
FAILURE_BUCKET_ID: AV_rt640x64!NICSendNetBufferHPQ
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {109d326d-7b39-305b-5c70-7d045df945c1}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000089, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8061df7d509, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
Key : Dump.Attributes.RequiredDumpfileSize
Value: 0xB01728A4
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: 89
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8061df7d509
READ_ADDRESS: fffff8061fb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061fa2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8061fa2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000089
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HD-Player.exe
TRAP_FRAME: ffffa50439099480 -- (.trap 0xffffa50439099480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000100 rbx=0000000000000000 rcx=ffffcc806c38e000
rdx=ffffcc806cabd000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061df7d509 rsp=ffffa50439099618 rbp=ffffa50439099690
r8=ffffcc806c397000 r9=ffffa50439099690 r10=ffffbc06752fb880
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz ac po nc
BstkVMMR0_bgp+0x1d509:
fffff806`1df7d509 104889 adc byte ptr [rax-77h],cl ds:00000000`00000089=??
Resetting default scope
MISALIGNED_IP:
BstkVMMR0_bgp+1d509
fffff806`1df7d509 104889 adc byte ptr [rax-77h],cl
STACK_TEXT:
ffffa504`39099338 fffff806`1f7d41e9 : 00000000`0000000a 00000000`00000089 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffa504`39099340 fffff806`1f7d0529 : ffffbc06`7f35f080 fffff806`1f713f04 ffffbc06`7f35f080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa504`39099480 fffff806`1df7d509 : fffff806`1df7e80e ffffcc80`483f46b7 ffffcc80`6c397000 ffffcc80`6c38e000 : nt!KiPageFault+0x469
ffffa504`39099618 fffff806`1df7e80e : ffffcc80`483f46b7 ffffcc80`6c397000 ffffcc80`6c38e000 ffffa504`39099690 : BstkVMMR0_bgp+0x1d509
ffffa504`39099620 ffffcc80`483f46b7 : ffffcc80`6c397000 ffffcc80`6c38e000 ffffa504`39099690 ffffbc06`7e470020 : BstkVMMR0_bgp+0x1e80e
ffffa504`39099628 ffffcc80`6c397000 : ffffcc80`6c38e000 ffffa504`39099690 ffffbc06`7e470020 ffffcc80`6c3947e0 : 0xffffcc80`483f46b7
ffffa504`39099630 ffffcc80`6c38e000 : ffffa504`39099690 ffffbc06`7e470020 ffffcc80`6c3947e0 ffffcc80`6c397000 : 0xffffcc80`6c397000
ffffa504`39099638 ffffa504`39099690 : ffffbc06`7e470020 ffffcc80`6c3947e0 ffffcc80`6c397000 fffff806`1df80ed3 : 0xffffcc80`6c38e000
ffffa504`39099640 ffffbc06`7e470020 : ffffcc80`6c3947e0 ffffcc80`6c397000 fffff806`1df80ed3 ffffcc80`6c38e000 : 0xffffa504`39099690
ffffa504`39099648 ffffcc80`6c3947e0 : ffffcc80`6c397000 fffff806`1df80ed3 ffffcc80`6c38e000 ffffcc80`6c38e000 : 0xffffbc06`7e470020
ffffa504`39099650 ffffcc80`6c397000 : fffff806`1df80ed3 ffffcc80`6c38e000 ffffcc80`6c38e000 ffffcc80`6c35e000 : 0xffffcc80`6c3947e0
ffffa504`39099658 fffff806`1df80ed3 : ffffcc80`6c38e000 ffffcc80`6c38e000 ffffcc80`6c35e000 00000000`00000000 : 0xffffcc80`6c397000
ffffa504`39099660 ffffcc80`6c38e000 : ffffcc80`6c38e000 ffffcc80`6c35e000 00000000`00000000 ffffbc06`8229b010 : BstkVMMR0_bgp+0x20ed3
ffffa504`39099668 ffffcc80`6c38e000 : ffffcc80`6c35e000 00000000`00000000 ffffbc06`8229b010 ffffbc06`7e470020 : 0xffffcc80`6c38e000
ffffa504`39099670 ffffcc80`6c35e000 : 00000000`00000000 ffffbc06`8229b010 ffffbc06`7e470020 00000000`00040202 : 0xffffcc80`6c38e000
ffffa504`39099678 00000000`00000000 : ffffbc06`8229b010 ffffbc06`7e470020 00000000`00040202 000002e1`a15b9bd8 : 0xffffcc80`6c35e000
SYMBOL_NAME: BstkVMMR0_bgp+1d509
MODULE_NAME: hardware
IMAGE_NAME: hardware
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_BstkVMMR0_bgp.r0
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {48989485-5dd4-f4ce-1042-58f41538c6b1}
Followup: MachineOwner
---------
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 000000000000dc15, Incorrect checksum
Arg4: 0000000000000b3a, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: dc15
BUGCHECK_P4: b3a
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff9c04`74179648 fffff805`56da5b46 : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`0000dc15 : nt!KeBugCheckEx
ffff9c04`74179650 fffff805`56daf204 : 00000000`00000001 ffffbd0f`430e2a90 00000003`fbd86000 ffffbd0f`5c9f7000 : nt!PopHiberChecksumHiberFileData+0xd236
ffff9c04`741796b0 fffff805`56da5d41 : 00000001`905eb000 ffffcd88`b5131f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x78
ffff9c04`74179720 fffff805`56d9a3fe : 00004c30`e029693d ffffcd88`b5131f38 00000000`00000000 fffff805`572b88f8 : nt!PopRestoreHiberContext+0xd001
ffff9c04`741797b0 fffff805`56d9a14a : fffff805`56c6a010 ffff9c04`74179930 fffff805`56c6a010 ffffbd0f`430e2a90 : nt!PopHandleNextState+0x20e
ffff9c04`74179800 fffff805`56d99ebf : 00000000`00000100 00000000`00989680 ffffbd0f`430e2a90 ffffbd0f`430e2a90 : nt!PopIssueNextState+0x1a
ffff9c04`74179830 fffff805`56d98cec : 00000000`0000000c ffff9a80`000077c0 00000000`00000000 fffff805`56930a94 : nt!PopInvokeSystemStateHandler+0x35b
ffff9c04`74179a30 fffff805`56d9f74a : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffff9c04`74179af0 fffff805`56d9f485 : 00000000`00000000 00000000`00000000 00000017`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x26e
ffff9c04`74179b80 fffff805`5686bcd5 : ffffbd0f`48a7c000 ffffbd0f`48a7c040 fffff805`56d9f360 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffff9c04`74179c10 fffff805`569c9998 : ffff8300`7f340180 ffffbd0f`48a7c040 fffff805`5686bc80 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff9c04`74179c60 00000000`00000000 : ffff9c04`7417a000 ffff9c04`74174000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+d236
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d236
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.