11.01.2011, 18:04
E8400
Sparkle GTX 260-216
Audigy 2ZS
4x1GB A-Data 1066MHz
Chieftec 450W
Wszystko chodziło do czasu reinstalacji systemu, po tym fakcie mam regularne BSoD'y za każdym razem, jest to L1E62x64.sys , a przynajmniej tak wyniki z analizy minidumpów, aktualizacje/zmiany sterownika nie pomagają.
Sparkle GTX 260-216
Audigy 2ZS
4x1GB A-Data 1066MHz
Chieftec 450W
Wszystko chodziło do czasu reinstalacji systemu, po tym fakcie mam regularne BSoD'y za każdym razem, jest to L1E62x64.sys , a przynajmniej tak wyniki z analizy minidumpów, aktualizacje/zmiany sterownika nie pomagają.
Kod:
Loading Dump File [C: \Users\Damian\Desktop\011111-14305-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c: \symbols*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time: Tue Jan 11 17: 18: 19.651 2011 (UTC + 1: 00)
System Uptime: 0 days 6: 24: 18.103
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80002ff17f7}
Unable to load image \SystemRoot\system32\DRIVERS\L1E62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for L1E62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for L1E62x64.sys
Probably caused by : L1E62x64.sys ( L1E62x64+81f3 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ff17f7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb90e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000 r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`09e89748 fffff800`02a80ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 : 00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 : fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 : nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 : fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 : hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 : fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 : fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 : L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 : fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 : 0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 : fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 : 0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 : fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 : 0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 : fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 : 0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 : fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 : 0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 : fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 : L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 : 00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 : 0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 : fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 : L1E62x64+0x2134
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+81f3
fffff880`069cf1f3 ? ?
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: L1E62x64+81f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb00bac
FAILURE_BUCKET_ID: X64_0xA_L1E62x64+81f3
BUCKET_ID: X64_0xA_L1E62x64+81f3
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ff17f7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000 r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`09e89748 fffff800`02a80ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 : 00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 : fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 : nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 : fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 : hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 : fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 : fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 : L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 : fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 : 0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 : fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 : 0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 : fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 : 0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 : fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 : 0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 : fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 : 0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 : fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 : L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 : 00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 : 0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 : fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 : L1E62x64+0x2134
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+81f3
fffff880`069cf1f3 ? ?
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: L1E62x64+81f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb00bac
FAILURE_BUCKET_ID: X64_0xA_L1E62x64+81f3
BUCKET_ID: X64_0xA_L1E62x64+81f3
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ff17f7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000 r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`09e89748 fffff800`02a80ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 : 00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 : fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 : nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 : fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 : hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 : fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 : fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 : L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 : fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 : 0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 : fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 : 0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 : fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 : 0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 : fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 : 0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 : fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 : 0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 : fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 : L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 : 00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 : 0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 : fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 : L1E62x64+0x2134
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+81f3
fffff880`069cf1f3 ? ?
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: L1E62x64+81f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb00bac
FAILURE_BUCKET_ID: X64_0xA_L1E62x64+81f3
BUCKET_ID: X64_0xA_L1E62x64+81f3
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ff17f7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000 r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`09e89748 fffff800`02a80ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 : 00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 : fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 : nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 : fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 : hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 : fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 : fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 : L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 : fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 : 0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 : fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 : 0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 : fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 : 0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 : fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 : 0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 : fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 : 0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 : fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 : L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 : 00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 : 0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 : fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 : L1E62x64+0x2134
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+81f3
fffff880`069cf1f3 ? ?
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: L1E62x64+81f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb00bac
FAILURE_BUCKET_ID: X64_0xA_L1E62x64+81f3
BUCKET_ID: X64_0xA_L1E62x64+81f3
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ff17f7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000 r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`09e89748 fffff800`02a80ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 : 00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 : fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 : nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 : fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 : hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 : fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 : fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 : L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 : fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 : 0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 : fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 : 0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 : fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 : 0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 : fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 : 0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 : fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 : 0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 : fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 : L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 : 00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 : 0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 : fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 : L1E62x64+0x2134
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+81f3
fffff880`069cf1f3 ? ?
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: L1E62x64+81f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb00bac
FAILURE_BUCKET_ID: X64_0xA_L1E62x64+81f3
BUCKET_ID: X64_0xA_L1E62x64+81f3
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ff17f7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000 r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408 mov r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`09e89748 fffff800`02a80ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 : 00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 : fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 : nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 : fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 : hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 : fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 : fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 : L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 : fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 : 0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 : fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 : 0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 : fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 : 0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 : fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 : 0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 : fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 : 0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 : fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 : L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 : 00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 : 0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 : fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 : L1E62x64+0x2134
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+81f3
fffff880`069cf1f3 ? ?
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: L1E62x64+81f3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb00bac
FAILURE_BUCKET_ID: X64_0xA_L1E62x64+81f3
BUCKET_ID: X64_0xA_L1E62x64+81f3
Followup: MachineOwner