*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c17806, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0b100
000000000000002d
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalPutScatterGatherList+b6
fffff800`02c17806 8b6f2c mov ebp,dword ptr [rdi+2Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff8000400e820 -- (.trap 0xfffff8000400e820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c17806 rsp=fffff8000400e9b0 rbp=00000000000002a0
r8=fffffa8007425e80 r9=00000000000002a0 r10=fffffa8007674c20
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
hal!HalPutScatterGatherList+0xb6:
fffff800`02c17806 8b6f2c mov ebp,dword ptr [rdi+2Ch] ds:06c0:00000000`0000002c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cdb2a9 to fffff80002cdbd00
STACK_TEXT:
fffff800`0400e6d8 fffff800`02cdb2a9 : 00000000`0000000a 00000000`0000002d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`0400e6e0 fffff800`02cd9f20 : 00000000`00000000 00000000`00000000 fffffa80`069940c0 fffffa80`06ad7d50 : nt!KiBugCheckDispatch+0x69
fffff800`0400e820 fffff800`02c17806 : fffffa80`06ad7d50 00000000`000002a0 00000000`000000c0 fffffa80`069b65a0 : nt!KiPageFault+0x260
fffff800`0400e9b0 fffff880`00e5dc65 : 00000000`00000002 fffffa80`081cb210 fffffa80`069b8320 fffff880`0452b39f : hal!HalPutScatterGatherList+0xb6
fffff800`0400ea10 fffff880`00e5d793 : fffffa80`06ad7e10 00000000`00000018 fffffa80`07242300 fffff800`02cd7947 : Wdf01000!FxDmaScatterGatherTransaction::ReleaseResources+0x39
fffff800`0400ea40 fffff880`00e5b38a : 00000000`0e213000 fffffa80`06871820 00000000`00000001 00000000`00000000 : Wdf01000!FxDmaTransactionBase::ReleaseForReuse+0x63
fffff800`0400ea90 fffff880`04535815 : fffffa80`06ad7e10 fffffa80`081cb210 00000000`0e213000 fffffa80`069b8320 : Wdf01000!imp_WdfDmaTransactionRelease+0x82
fffff800`0400ead0 fffff880`00e97f70 : 0000057f`f9647dd8 00000000`00000000 00000000`00000000 fffffa80`069b82e0 : 1394ohci!IsochTx::WdfEvtNotificationDpc+0x179
fffff800`0400eb60 fffff800`02ce710c : fffff800`02e4ee80 00000006`0258bace fffffa80`069b8220 fffffa80`069b8288 : Wdf01000!FxDpc::FxDpcThunk+0x78
fffff800`0400eb90 fffff800`02cd3a2a : fffff800`02e4ee80 fffff800`02e5ccc0 00000000`00000000 fffff880`00e97ef8 : nt!KiRetireDpcList+0x1bc
fffff800`0400ec40 00000000`00000000 : fffff800`0400f000 fffff800`04009000 fffff800`0400ec00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
1394ohci!IsochTx::WdfEvtNotificationDpc+179
fffff880`04535815 450fb6ee movzx r13d,r14b
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: 1394ohci!IsochTx::WdfEvtNotificationDpc+179
FOLLOWUP_NAME: MachineOwner
[COLOR=#ff0000]MODULE_NAME: 1394ohci[/COLOR]
[COLOR=#ff0000]IMAGE_NAME: 1394ohci.sys[/COLOR]
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a6a8
FAILURE_BUCKET_ID: X64_0xA_1394ohci!IsochTx::WdfEvtNotificationDpc+179
BUCKET_ID: X64_0xA_1394ohci!IsochTx::WdfEvtNotificationDpc+179
Followup: MachineOwner
---------