IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016d085fa5, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 10
BUGCHECK_P2: ff
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8016d085fa5
WRITE_ADDRESS: fffff8016d3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvlpAcquireHypercallPage+79
fffff801`6d085fa5 488b4e10 mov rcx,qword ptr [rsi+10h]
CPU_COUNT: c
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: opera.exe
ANALYSIS_SESSION_HOST: DESKTOP-VJAA6DJ
ANALYSIS_SESSION_TIME: 02-01-2020 19:22:24.0330
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffffe08b63e19d0 -- (.trap 0xfffffe08b63e19d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9c0189f20180 rbx=0000000000000000 rcx=fffffe08b63e1be0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016d085fa5 rsp=fffffe08b63e1b60 rbp=0000000000000001
r8=fffffe08b63e1c00 r9=0000000000000018 r10=fffffe08b63e1f08
r11=fffffe08b63e1cc8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!HvlpAcquireHypercallPage+0x79:
fffff801`6d085fa5 488b4e10 mov rcx,qword ptr [rsi+10h] ds:00000000`00000010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8016cfd32e9 to fffff8016cfc14e0
STACK_TEXT:
fffffe08`b63e1888 fffff801`6cfd32e9 : 00000000`0000000a 00000000`00000010 00000000`000000ff 00000000`00000001 : nt!KeBugCheckEx
fffffe08`b63e1890 fffff801`6cfcf62b : ffff24b9`71134d4d 00000000`0000000c fffffe08`b63e1fd4 fffffe08`b63e1fe8 : nt!KiBugCheckDispatch+0x69
fffffe08`b63e19d0 fffff801`6d085fa5 : ffff24b9`00019a02 00000050`000000a0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
fffffe08`b63e1b60 fffff801`6d08eaae : 00000000`00000000 00000000`00000001 fffffe08`b63e1ca0 00000000`00000000 : nt!HvlpAcquireHypercallPage+0x79
fffffe08`b63e1bb0 fffff801`6d08e70f : 00000000`00000001 fffffe08`b63e1f00 00000000`00000048 00000000`0000075d : nt!HvlpSlowFlushListTb+0x6a
fffffe08`b63e1c70 fffff801`6d08e1d3 : fffffe08`b63e1c88 00000000`00000008 fffffe08`b63e1c90 00000000`00000008 : nt!HvlpFlushRangeListTb+0xa7
fffffe08`b63e1cd0 fffff801`6d027678 : fffffe08`b63e1cb0 00000000`00000008 fffffe08`b63e1cb8 00000000`00000008 : nt!HvlFlushRangeListTb+0x63
fffffe08`b63e1d20 fffff801`6ceb16ec : 1a000000`853de867 00000000`00000000 fffffe08`b63e1f70 ffffc601`54008400 : nt!MiFlushTbList+0x174338
fffffe08`b63e1e70 fffff801`6ceb11a3 : 00000000`00000003 fffffe08`b63e2540 ffffc601`54008400 fffffe08`b63e2490 : nt!MiTerminateWsleCluster+0x38c
fffffe08`b63e2010 fffff801`6ceacd12 : 00000000`00000000 ffffc601`54008400 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x23
fffffe08`b63e2040 fffff801`6ceacea1 : fffffe08`b63e2490 ffffc663`00aa0040 00000000`00000000 0a000000`853de867 : nt!MiWalkPageTablesRecursively+0x512
fffffe08`b63e2100 fffff801`6ceacea1 : fffffe08`b63e2490 ffffc663`31805500 00000000`00000000 0a000000`6e5b6867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffe08`b63e21c0 fffff801`6ceacea1 : fffffe08`b63e2490 ffffc663`3198c028 ffffc663`00000000 0a000002`a28bb867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffe08`b63e2280 fffff801`6ceac62c : fffffe08`b63e2490 00000000`00000000 00000000`00000000 ffff818e`17fe2680 : nt!MiWalkPageTablesRecursively+0x6a1
fffffe08`b63e2340 fffff801`6ceaaa98 : fffffe08`b63e2490 ffff9300`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffffe08`b63e2440 fffff801`6ceb8bf0 : ffffffff`ffffffff ffff818e`17fe23f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffffe08`b63e27e0 fffff801`6d3c7a5d : 000000de`00000000 00000000`2a801070 ffff818e`19b79c20 00000000`00000000 : nt!MiDeleteVad+0x860
fffffe08`b63e29a0 fffff801`6d3c7853 : ffff818e`19b79c20 00000000`00000000 000002a8`01070000 00000000`00000000 : nt!MiUnmapVad+0x49
fffffe08`b63e29d0 fffff801`6d3c76e9 : ffff818e`17fe2080 00000000`00000008 ffff818e`0969d7a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
fffffe08`b63e2ab0 fffff801`6cfd2d18 : ffff818e`19ac9080 000002a8`01070000 00000000`00006a50 ffff818e`17fe2080 : nt!NtUnmapViewOfSectionEx+0x99
fffffe08`b63e2b00 00007fff`7969f974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000de`199fe698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`7969f974
THREAD_SHA1_HASH_MOD_FUNC: c10a63507ab8401416e49f9e0c17ec5735bf7fba
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fc1eba2fbd24a93ae601f126405683fda2fea14a
THREAD_SHA1_HASH_MOD: 7c2b727fe0ab8515945a4d96a0f6fa917ccf2d6e
FOLLOWUP_IP:
nt!HvlpAcquireHypercallPage+79
fffff801`6d085fa5 488b4e10 mov rcx,qword ptr [rsi+10h]
FAULT_INSTR_CODE: 104e8b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!HvlpAcquireHypercallPage+79
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 79
FAILURE_BUCKET_ID: AV_nt!HvlpAcquireHypercallPage
BUCKET_ID: AV_nt!HvlpAcquireHypercallPage
PRIMARY_PROBLEM_CLASS: AV_nt!HvlpAcquireHypercallPage
TARGET_TIME: 2020-01-30T18:41:20.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: a133
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!hvlpacquirehypercallpage
FAILURE_ID_HASH: {5f2c2460-79e3-135a-b68f-e7ecc89389a8}
Followup: MachineOwner
---------
aa - Google Drive hata devam ediyor anlamadım.Logitech araçlarını kaldır. Nvidia sürücünü DDU ile kaldır ve güncelle. Malwarebyte kaldır.
SSD varsa sitemde FW güncellemesini kontrol et.
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000010, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8016d085fa5, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: 10 BUGCHECK_P2: ff BUGCHECK_P3: 1 BUGCHECK_P4: fffff8016d085fa5 WRITE_ADDRESS: fffff8016d3733b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 0000000000000010 CURRENT_IRQL: 2 FAULTING_IP: nt!HvlpAcquireHypercallPage+79 fffff801`6d085fa5 488b4e10 mov rcx,qword ptr [rsi+10h] CPU_COUNT: c CPU_MHZ: d48 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: opera.exe ANALYSIS_SESSION_HOST: DESKTOP-VJAA6DJ ANALYSIS_SESSION_TIME: 02-01-2020 19:22:24.0330 ANALYSIS_VERSION: 10.0.18362.1 amd64fre TRAP_FRAME: fffffe08b63e19d0 -- (.trap 0xfffffe08b63e19d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff9c0189f20180 rbx=0000000000000000 rcx=fffffe08b63e1be0 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8016d085fa5 rsp=fffffe08b63e1b60 rbp=0000000000000001 r8=fffffe08b63e1c00 r9=0000000000000018 r10=fffffe08b63e1f08 r11=fffffe08b63e1cc8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz na pe nc nt!HvlpAcquireHypercallPage+0x79: fffff801`6d085fa5 488b4e10 mov rcx,qword ptr [rsi+10h] ds:00000000`00000010=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8016cfd32e9 to fffff8016cfc14e0 STACK_TEXT: fffffe08`b63e1888 fffff801`6cfd32e9 : 00000000`0000000a 00000000`00000010 00000000`000000ff 00000000`00000001 : nt!KeBugCheckEx fffffe08`b63e1890 fffff801`6cfcf62b : ffff24b9`71134d4d 00000000`0000000c fffffe08`b63e1fd4 fffffe08`b63e1fe8 : nt!KiBugCheckDispatch+0x69 fffffe08`b63e19d0 fffff801`6d085fa5 : ffff24b9`00019a02 00000050`000000a0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b fffffe08`b63e1b60 fffff801`6d08eaae : 00000000`00000000 00000000`00000001 fffffe08`b63e1ca0 00000000`00000000 : nt!HvlpAcquireHypercallPage+0x79 fffffe08`b63e1bb0 fffff801`6d08e70f : 00000000`00000001 fffffe08`b63e1f00 00000000`00000048 00000000`0000075d : nt!HvlpSlowFlushListTb+0x6a fffffe08`b63e1c70 fffff801`6d08e1d3 : fffffe08`b63e1c88 00000000`00000008 fffffe08`b63e1c90 00000000`00000008 : nt!HvlpFlushRangeListTb+0xa7 fffffe08`b63e1cd0 fffff801`6d027678 : fffffe08`b63e1cb0 00000000`00000008 fffffe08`b63e1cb8 00000000`00000008 : nt!HvlFlushRangeListTb+0x63 fffffe08`b63e1d20 fffff801`6ceb16ec : 1a000000`853de867 00000000`00000000 fffffe08`b63e1f70 ffffc601`54008400 : nt!MiFlushTbList+0x174338 fffffe08`b63e1e70 fffff801`6ceb11a3 : 00000000`00000003 fffffe08`b63e2540 ffffc601`54008400 fffffe08`b63e2490 : nt!MiTerminateWsleCluster+0x38c fffffe08`b63e2010 fffff801`6ceacd12 : 00000000`00000000 ffffc601`54008400 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x23 fffffe08`b63e2040 fffff801`6ceacea1 : fffffe08`b63e2490 ffffc663`00aa0040 00000000`00000000 0a000000`853de867 : nt!MiWalkPageTablesRecursively+0x512 fffffe08`b63e2100 fffff801`6ceacea1 : fffffe08`b63e2490 ffffc663`31805500 00000000`00000000 0a000000`6e5b6867 : nt!MiWalkPageTablesRecursively+0x6a1 fffffe08`b63e21c0 fffff801`6ceacea1 : fffffe08`b63e2490 ffffc663`3198c028 ffffc663`00000000 0a000002`a28bb867 : nt!MiWalkPageTablesRecursively+0x6a1 fffffe08`b63e2280 fffff801`6ceac62c : fffffe08`b63e2490 00000000`00000000 00000000`00000000 ffff818e`17fe2680 : nt!MiWalkPageTablesRecursively+0x6a1 fffffe08`b63e2340 fffff801`6ceaaa98 : fffffe08`b63e2490 ffff9300`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c fffffe08`b63e2440 fffff801`6ceb8bf0 : ffffffff`ffffffff ffff818e`17fe23f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 fffffe08`b63e27e0 fffff801`6d3c7a5d : 000000de`00000000 00000000`2a801070 ffff818e`19b79c20 00000000`00000000 : nt!MiDeleteVad+0x860 fffffe08`b63e29a0 fffff801`6d3c7853 : ffff818e`19b79c20 00000000`00000000 000002a8`01070000 00000000`00000000 : nt!MiUnmapVad+0x49 fffffe08`b63e29d0 fffff801`6d3c76e9 : ffff818e`17fe2080 00000000`00000008 ffff818e`0969d7a0 00000000`00000000 : nt!MiUnmapViewOfSection+0x133 fffffe08`b63e2ab0 fffff801`6cfd2d18 : ffff818e`19ac9080 000002a8`01070000 00000000`00006a50 ffff818e`17fe2080 : nt!NtUnmapViewOfSectionEx+0x99 fffffe08`b63e2b00 00007fff`7969f974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000de`199fe698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`7969f974 THREAD_SHA1_HASH_MOD_FUNC: c10a63507ab8401416e49f9e0c17ec5735bf7fba THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fc1eba2fbd24a93ae601f126405683fda2fea14a THREAD_SHA1_HASH_MOD: 7c2b727fe0ab8515945a4d96a0f6fa917ccf2d6e FOLLOWUP_IP: nt!HvlpAcquireHypercallPage+79 fffff801`6d085fa5 488b4e10 mov rcx,qword ptr [rsi+10h] FAULT_INSTR_CODE: 104e8b48 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!HvlpAcquireHypercallPage+79 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0 IMAGE_VERSION: 10.0.18362.592 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 79 FAILURE_BUCKET_ID: AV_nt!HvlpAcquireHypercallPage BUCKET_ID: AV_nt!HvlpAcquireHypercallPage PRIMARY_PROBLEM_CLASS: AV_nt!HvlpAcquireHypercallPage TARGET_TIME: 2020-01-30T18:41:20.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: a133 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!hvlpacquirehypercallpage FAILURE_ID_HASH: {5f2c2460-79e3-135a-b68f-e7ecc89389a8} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.