Wątek zamknięty

[Rozwiązany] Regularne BSoDy - analiza minidumpa (rozwiązany)

 
FeXXer
Wdrażany
Liczba postów: 38
Post: #1
Lightbulb 

Regularne BSoDy - analiza minidumpa (rozwiązany)


E8400
Sparkle GTX 260-216
Audigy 2ZS
4x1GB A-Data 1066MHz
Chieftec 450W

Wszystko chodziło do czasu reinstalacji systemu, po tym fakcie mam regularne BSoD'y za każdym razem, jest to L1E62x64.sys , a przynajmniej tak wyniki z analizy minidumpów, aktualizacje/zmiany sterownika nie pomagają.

Kod:
Loading Dump File [C: \Users\Damian\Desktop\011111-14305-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  SRV*c: \symbols*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time:  Tue Jan 11 17: 18: 19.651 2011 (UTC + 1: 00)
System Uptime:  0 days 6: 24: 18.103
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8, 2, 0, fffff80002ff17f7}

Unable to load image \SystemRoot\system32\DRIVERS\L1E62x64.sys, Win32 error 0n2
*** WARNING:  Unable to verify timestamp for L1E62x64.sys
*** ERROR:  Module load completed but symbols could not be loaded for L1E62x64.sys
Probably caused by :  L1E62x64.sys ( L1E62x64+81f3 )

Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  0000000000000008, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff80002ff17f7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff80002cb90e0
0000000000000008

CURRENT_IRQL:   2

FAULTING_IP:  
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000  r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`09e89748 fffff800`02a80ca9 :  00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 :  00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 :  nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 :  fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 :  nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 :  fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 :  hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 :  fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 :  ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 :  fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 :  L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 :  fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 :  0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 :  fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 :  0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 :  fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 :  0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 :  fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 :  0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 :  fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 :  0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 :  fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 :  L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 :  00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 :  0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 :  fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 :  L1E62x64+0x2134


STACK_COMMAND:   kb

FOLLOWUP_IP:  
L1E62x64+81f3
fffff880`069cf1f3 ?              ?

SYMBOL_STACK_INDEX:   5

SYMBOL_NAME:   L1E62x64+81f3

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  L1E62x64

IMAGE_NAME:   L1E62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4bb00bac

FAILURE_BUCKET_ID:   X64_0xA_L1E62x64+81f3

BUCKET_ID:   X64_0xA_L1E62x64+81f3

Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  0000000000000008, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff80002ff17f7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:   0000000000000008

CURRENT_IRQL:   2

FAULTING_IP:  
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000  r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`09e89748 fffff800`02a80ca9 :  00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 :  00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 :  nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 :  fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 :  nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 :  fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 :  hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 :  fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 :  ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 :  fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 :  L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 :  fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 :  0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 :  fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 :  0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 :  fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 :  0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 :  fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 :  0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 :  fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 :  0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 :  fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 :  L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 :  00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 :  0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 :  fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 :  L1E62x64+0x2134


STACK_COMMAND:   kb

FOLLOWUP_IP:  
L1E62x64+81f3
fffff880`069cf1f3 ?              ?

SYMBOL_STACK_INDEX:   5

SYMBOL_NAME:   L1E62x64+81f3

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  L1E62x64

IMAGE_NAME:   L1E62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4bb00bac

FAILURE_BUCKET_ID:   X64_0xA_L1E62x64+81f3

BUCKET_ID:   X64_0xA_L1E62x64+81f3

Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  0000000000000008, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff80002ff17f7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:   0000000000000008

CURRENT_IRQL:   2

FAULTING_IP:  
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000  r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`09e89748 fffff800`02a80ca9 :  00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 :  00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 :  nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 :  fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 :  nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 :  fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 :  hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 :  fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 :  ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 :  fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 :  L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 :  fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 :  0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 :  fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 :  0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 :  fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 :  0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 :  fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 :  0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 :  fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 :  0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 :  fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 :  L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 :  00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 :  0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 :  fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 :  L1E62x64+0x2134


STACK_COMMAND:   kb

FOLLOWUP_IP:  
L1E62x64+81f3
fffff880`069cf1f3 ?              ?

SYMBOL_STACK_INDEX:   5

SYMBOL_NAME:   L1E62x64+81f3

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  L1E62x64

IMAGE_NAME:   L1E62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4bb00bac

FAILURE_BUCKET_ID:   X64_0xA_L1E62x64+81f3

BUCKET_ID:   X64_0xA_L1E62x64+81f3

Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  0000000000000008, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff80002ff17f7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:   0000000000000008

CURRENT_IRQL:   2

FAULTING_IP:  
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000  r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`09e89748 fffff800`02a80ca9 :  00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 :  00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 :  nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 :  fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 :  nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 :  fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 :  hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 :  fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 :  ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 :  fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 :  L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 :  fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 :  0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 :  fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 :  0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 :  fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 :  0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 :  fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 :  0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 :  fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 :  0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 :  fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 :  L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 :  00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 :  0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 :  fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 :  L1E62x64+0x2134


STACK_COMMAND:   kb

FOLLOWUP_IP:  
L1E62x64+81f3
fffff880`069cf1f3 ?              ?

SYMBOL_STACK_INDEX:   5

SYMBOL_NAME:   L1E62x64+81f3

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  L1E62x64

IMAGE_NAME:   L1E62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4bb00bac

FAILURE_BUCKET_ID:   X64_0xA_L1E62x64+81f3

BUCKET_ID:   X64_0xA_L1E62x64+81f3

Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  0000000000000008, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff80002ff17f7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:   0000000000000008

CURRENT_IRQL:   2

FAULTING_IP:  
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000  r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`09e89748 fffff800`02a80ca9 :  00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 :  00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 :  nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 :  fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 :  nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 :  fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 :  hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 :  fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 :  ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 :  fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 :  L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 :  fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 :  0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 :  fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 :  0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 :  fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 :  0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 :  fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 :  0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 :  fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 :  0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 :  fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 :  L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 :  00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 :  0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 :  fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 :  L1E62x64+0x2134


STACK_COMMAND:   kb

FOLLOWUP_IP:  
L1E62x64+81f3
fffff880`069cf1f3 ?              ?

SYMBOL_STACK_INDEX:   5

SYMBOL_NAME:   L1E62x64+81f3

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  L1E62x64

IMAGE_NAME:   L1E62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4bb00bac

FAILURE_BUCKET_ID:   X64_0xA_L1E62x64+81f3

BUCKET_ID:   X64_0xA_L1E62x64+81f3

Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  0000000000000008, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff80002ff17f7, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:   0000000000000008

CURRENT_IRQL:   2

FAULTING_IP:  
hal!HalPutScatterGatherList+a7
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff88009e89890 -- (.trap 0xfffff88009e89890)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff17f7 rsp=fffff88009e89a20 rbp=0000000000000e00
r8=0000000000000000  r9=fffffa8008090e00 r10=fffffffffffffffd
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
hal!HalPutScatterGatherList+0xa7:
fffff800`02ff17f7 4d8b642408      mov     r12,qword ptr [r12+8] ds: 9610: 00000000`00000008=?
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff80002a80ca9 to fffff80002a81740

STACK_TEXT:  
fffff880`09e89748 fffff800`02a80ca9 :  00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`09e89750 fffff800`02a7f920 :  00000000`00000010 fffffa80`05ab9c78 fffff880`09e898b0 00000000`00000018 :  nt!KiBugCheckDispatch+0x69
fffff880`09e89890 fffff800`02ff17f7 :  fffffa80`05ab9c78 fffffa80`08090e00 00000000`00000058 fffffa80`08090db8 :  nt!KiPageFault+0x260
fffff880`09e89a20 fffff880`014c28a1 :  fffffa80`07067710 fffffa80`05492940 fffffa80`054a3a78 00000000`00000000 :  hal!HalPutScatterGatherList+0xa7
fffff880`09e89a80 fffff880`069cf1f3 :  fffffa80`054a3000 fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 :  ndis!NdisMFreeNetBufferSGList+0x31
fffff880`09e89ac0 fffffa80`054a3000 :  fffffa80`054a3a78 fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 :  L1E62x64+0x81f3
fffff880`09e89ac8 fffffa80`054a3a78 :  fffffa80`05492940 fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 :  0xfffffa80`054a3000
fffff880`09e89ad0 fffffa80`05492940 :  fffffa80`054a3000 fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 :  0xfffffa80`054a3a78
fffff880`09e89ad8 fffffa80`054a3000 :  fffffa80`00000002 fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 :  0xfffffa80`05492940
fffff880`09e89ae0 fffffa80`00000002 :  fffff880`069c9034 fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 :  0xfffffa80`054a3000
fffff880`09e89ae8 fffff880`069c9034 :  fffffa80`0549e5a8 fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 :  0xfffffa80`00000002
fffff880`09e89af0 fffffa80`0549e5a8 :  fffff880`069c9134 00000000`00000000 fffff880`09e89bd8 00000000`05820000 :  L1E62x64+0x2034
fffff880`09e89af8 fffff880`069c9134 :  00000000`00000000 fffff880`09e89bd8 00000000`05820000 00000000`00000000 :  0xfffffa80`0549e5a8
fffff880`09e89b00 00000000`00000000 :  fffff880`09e89bd8 00000000`05820000 00000000`00000000 fffffa80`054a3000 :  L1E62x64+0x2134


STACK_COMMAND:   kb

FOLLOWUP_IP:  
L1E62x64+81f3
fffff880`069cf1f3 ?              ?

SYMBOL_STACK_INDEX:   5

SYMBOL_NAME:   L1E62x64+81f3

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  L1E62x64

IMAGE_NAME:   L1E62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4bb00bac

FAILURE_BUCKET_ID:   X64_0xA_L1E62x64+81f3

BUCKET_ID:   X64_0xA_L1E62x64+81f3

Followup:  MachineOwner

11.01.2011 18:04

Znajdź wszystkie posty użytkownika
Wątek zamknięty


Wiadomości w tym wątku
Regularne BSoDy - analiza minidumpa (rozwiązany) - FeXXer - 11.01.2011 18:04
Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
Niespodziewane BSODy, logi z BlueScreenView do analizy Namess4 9 2.097 11.02.2014 19:50
Ostatni post: thermalfake
Jak naprawić BSODy w trakcie grania w gry? Deathknife 1 1.819 22.08.2012 00:35
Ostatni post: thermalfake
BSoDy - powrót problemu FeXXer 13 2.476 14.02.2011 04:20
Ostatni post: FeXXer
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 0 głosów.