Jerre

New Member
Joined
Feb 21, 2011
Messages
2
Hi,

earlier today out of a sudden (I wasn't using the PC) I got a BSOD.
Ever since I'm not able to do a normal boot (after I'm logged in I get a BSOD).
Sometimes I even get a BSOD after logging in into safemode.

The errors in the BSOD's can be different - I've attached an SF Diagnostic with the minidumps.

I came accross some suggestions that the cause could be SPTD. I used a tool to uninstall it, however it said that SPTD was already uninstalled.
When I ran cmd->driverqery SPTD was still there, so I want in to system32\drivers and renamed the file. This resulted in other errors while booting, so I put the original SPTD file back in place.

I've also removed the Graphics driver, and tested the RAM memory slots seperatly, without any satisfying result.
I also detached all unnecessary equipment (additional network card, DVD burner, ...), but still no luck.

OS: Windows 7 64 bit Professional

Link Removed
 


Solution
1. Update ASUS ATK0110 ACPI Utility
ASACPI.sys Sun Mar 27 22:30:36 2005


2. Update Logitech SetPoint
LEqdUsb.Sys Wed Jun 17 12:49:54 2009


3. I suspect your hardware,

Link Removed






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022111-29983-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by...
1. Update ASUS ATK0110 ACPI Utility
ASACPI.sys Sun Mar 27 22:30:36 2005


2. Update Logitech SetPoint
LEqdUsb.Sys Wed Jun 17 12:49:54 2009


3. I suspect your hardware,

Link Removed






Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022111-29983-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02208000 PsLoadedModuleList = 0xfffff800`02445e50
Debug session time: Mon Feb 21 17:45:13.134 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:41.774
Loading Kernel Symbols
...............................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8, 2, 0, fffff80002254d19}

Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002254d19, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800024b00e0
 0000000000000008 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiInsertQueueApc+1e9
fffff800`02254d19 488b5108        mov     rdx,qword ptr [rcx+8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9a650 -- (.trap 0xfffff80000b9a650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80059da648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002254d19 rsp=fffff80000b9a7e0 rbp=fffff800023f2e80
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02254d19 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002277ca9 to fffff80002278740

STACK_TEXT:  
fffff800`00b9a508 fffff800`02277ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9a510 fffff800`02276920 : fffffa80`00000002 fffffa80`05f11b60 fffffa80`05b5b010 fffff880`00e45e92 : nt!KiBugCheckDispatch+0x69
fffff800`00b9a650 fffff800`02254d19 : fffffa80`05b5b0e0 00000000`00001000 00000000`00000000 fffff800`0232c0e4 : nt!KiPageFault+0x260
fffff800`00b9a7e0 fffff800`02257fec : fffffa80`05f11b60 00000000`00000002 00000000`00000000 fffffa80`059da648 : nt!KiInsertQueueApc+0x1e9
fffff800`00b9a810 fffff800`0227b55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`00b9a870 fffff880`00e4341a : 00000000`00001000 00000000`00000001 fffffa80`059d3980 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`00b9a950 fffff880`00e43242 : fffffa80`059d3980 fffff880`00e45b3b fffffa80`05b5b010 fffffa80`0566b1b0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`00b9a980 fffff880`00e3de32 : 00000000`00000000 00000000`00000000 fffffa80`04877500 fffffa80`0566b1b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`00b9a9b0 fffff880`00e467ed : fffffa80`048761a0 fffffa80`059d3980 00000000`00000000 fffffa80`059d3980 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`00b9aae0 fffff880`00e460ec : fffffa80`048761a0 00000000`00000000 fffffa80`048761a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`00b9ac10 fffff800`02283bfc : fffff800`023f2e80 fffff800`0238227e fffffa80`04876050 fffffa80`04876118 : ataport!IdePortCompletionDpc+0x1a8
fffff800`00b9acd0 fffff800`02280eea : fffff800`023f2e80 fffff800`02400c40 00000000`00000000 fffff880`00e45f44 : nt!KiRetireDpcList+0x1bc
fffff800`00b9ad80 00000000`00000000 : fffff800`00b9b000 fffff800`00b95000 fffff800`00b9ad40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!IdeCompleteScsiIrp+62
fffff880`00e4341a 8bc3            mov     eax,ebx

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

Followup: MachineOwner
---------















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022111-31527-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50
Debug session time: Mon Feb 21 17:42:44.737 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:13.782
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 0, fffff80002ed92b3}

Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ed92b3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f10e0
 0000000000000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!IopCompleteRequest+ae3
fffff800`02ed92b3 488b09          mov     rcx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  TSVNCache.exe

IRP_ADDRESS:  ffffffffffffff89

TRAP_FRAME:  fffff88006eba3e0 -- (.trap 0xfffff88006eba3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88006d99418 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed92b3 rsp=fffff88006eba570 rbp=0000000000000000
 r8=fffffa80067a1df0  r9=fffff88006eba670 r10=0000000000000002
r11=fffffa8006c11e00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02ed92b3 488b09          mov     rcx,qword ptr [rcx] ds:a570:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002eb8ca9 to fffff80002eb9740

STACK_TEXT:  
fffff880`06eba298 fffff800`02eb8ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06eba2a0 fffff800`02eb7920 : 00000000`00000000 fffffa80`062cc010 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`06eba3e0 fffff800`02ed92b3 : fffffa80`04ae7060 fffff800`02ebf5da fffff8a0`00000000 fffff8a0`002c3000 : nt!KiPageFault+0x260
fffff880`06eba570 fffff800`02e960b7 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`06eba640 fffff800`02ec0b9d : fffff800`030375e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`06eba6c0 fffff800`02ec2cff : fffffa80`05917180 fffff8a0`0cb4eed8 fffff8a0`0000009b 00000000`00000024 : nt!KiCommitThreadWait+0x3dd
fffff880`06eba750 fffff800`02e82232 : fffffa80`0593e800 00000000`0000001b 00000000`00000000 fffff800`03033e00 : nt!KeWaitForSingleObject+0x19f
fffff880`06eba7f0 fffff800`02ec15ac : ffffffff`ffb3b4c0 fffffa80`05ea6160 fffffa80`0593e870 fffff880`0103a787 : nt!ExpWaitForResource+0xae
fffff880`06eba860 fffff880`012505d3 : 00000000`c00000d8 fffff8a0`001bd510 fffff880`06d993a0 fffff880`0125310b : nt!ExAcquireResourceExclusiveLite+0x14f
fffff880`06eba8d0 fffff880`012e48a1 : fffff8a0`001bd510 fffff880`06d99600 fffff8a0`001bd640 00000000`00000004 : Ntfs!NtfsAcquireExclusiveFcb+0x73
fffff880`06eba920 fffff880`01253aa9 : fffffa80`06ffae40 fffffa80`04ab5010 fffff880`06d99300 fffffa80`04ae7060 : Ntfs!NtfsCommonCleanup+0x271
fffff880`06ebad30 fffff800`02eb15c7 : fffff880`06d99300 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`06ebad60 fffff800`02eb1581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`06d991d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiPageFault+260
fffff800`02eb7920 440f20c0        mov     rax,cr8

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+260

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260

BUCKET_ID:  X64_0xA_nt!KiPageFault+260

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022111-29515-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02219000 PsLoadedModuleList = 0xfffff800`02456e50
Debug session time: Mon Feb 21 17:00:32.327 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:58.968
Loading Kernel Symbols
...............................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8, 2, 0, fffff80002265d19}

Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002265d19, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800024c10e0
 0000000000000008 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiInsertQueueApc+1e9
fffff800`02265d19 488b5108        mov     rdx,qword ptr [rcx+8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  winlogon.exe

TRAP_FRAME:  fffff80005594880 -- (.trap 0xfffff80005594880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80022c3b58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002265d19 rsp=fffff80005594a10 rbp=fffff80002403e80
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02265d19 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002288ca9 to fffff80002289740

STACK_TEXT:  
fffff800`05594738 fffff800`02288ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`05594740 fffff800`02287920 : 00000000`00000000 fffffa80`027e2b60 fffff800`02403e80 fffff800`0228d871 : nt!KiBugCheckDispatch+0x69
fffff800`05594880 fffff800`02265d19 : fffff800`02403e80 fffffa80`022c3b01 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
fffff800`05594a10 fffff800`02268fec : fffffa80`027e2b60 00000000`00000002 00000000`00000000 fffffa80`022c3b58 : nt!KiInsertQueueApc+0x1e9
fffff800`05594a40 fffff800`0228c55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`05594aa0 fffff880`00e0941a : 00000000`00020000 00000000`00000001 fffffa80`022236f0 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`05594b80 fffff880`00e09242 : fffffa80`022236f0 fffff880`00e0bb3b fffffa80`02223b80 fffffa80`01a321b0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`05594bb0 fffff880`00e03e32 : 00000000`00000000 00000000`00000000 fffffa80`015b6500 fffffa80`01a321b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`05594be0 fffff880`00e0c7ed : fffffa80`015b51a0 fffffa80`022236f0 00000000`00000000 fffffa80`022236f0 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`05594d10 fffff880`00e0c0ec : fffffa80`015b51a0 00000000`00000000 fffffa80`015b51a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`05594e40 fffff800`02294bfc : fffff800`02403e80 fffffa80`00000ec2 fffffa80`015b5050 fffffa80`015b5118 : ataport!IdePortCompletionDpc+0x1a8
fffff800`05594f00 fffff800`0228f865 : 00000000`00000000 fffffa80`02343990 00000000`00000000 fffff880`00e0bf44 : nt!KiRetireDpcList+0x1bc
fffff800`05594fb0 fffff800`0228f67c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`02f21be0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!IdeCompleteScsiIrp+62
fffff880`00e0941a 8bc3            mov     eax,ebx

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

Followup: MachineOwner
---------






Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\022111-30217-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02251000 PsLoadedModuleList = 0xfffff800`0248ee50
Debug session time: Mon Feb 21 17:47:35.067 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:34.692
Loading Kernel Symbols
...............................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8, 2, 0, fffff8000229dd19}

Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000229dd19, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800024f90e0
 0000000000000008 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiInsertQueueApc+1e9
fffff800`0229dd19 488b5108        mov     rdx,qword ptr [rcx+8]

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  explorer.exe

TRAP_FRAME:  fffff80005594880 -- (.trap 0xfffff80005594880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8004893a58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000229dd19 rsp=fffff80005594a10 rbp=fffff8000243be80
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`0229dd19 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800022c0ca9 to fffff800022c1740

STACK_TEXT:  
fffff800`05594738 fffff800`022c0ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`05594740 fffff800`022bf920 : fffffa80`00000002 fffffa80`057e7a40 fffffa80`0587e330 fffff880`00e35e92 : nt!KiBugCheckDispatch+0x69
fffff800`05594880 fffff800`0229dd19 : fffffa80`0587e400 00000000`00000a00 00000000`00000000 fffff800`023750e4 : nt!KiPageFault+0x260
fffff800`05594a10 fffff800`022a0fec : fffffa80`057e7a40 00000000`00000002 00000000`00000000 fffffa80`04893a58 : nt!KiInsertQueueApc+0x1e9
fffff800`05594a40 fffff800`022c455b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`05594aa0 fffff880`00e3341a : 00000000`00000a00 00000000`00000001 fffffa80`05c50b80 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`05594b80 fffff880`00e33242 : fffffa80`05c50b80 fffff880`00e35b3b fffffa80`0587e330 fffffa80`056651b0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`05594bb0 fffff880`00e2de32 : 00000000`00000000 00000000`00000000 fffffa80`04877500 fffffa80`056651b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`05594be0 fffff880`00e367ed : fffffa80`048761a0 fffffa80`05c50b80 00000000`00000000 fffffa80`05c50b80 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`05594d10 fffff880`00e360ec : fffffa80`048761a0 00000000`00000000 fffffa80`048761a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`05594e40 fffff800`022ccbfc : fffff800`0243be80 fffffa80`000017b5 fffffa80`04876050 fffffa80`04876118 : ataport!IdePortCompletionDpc+0x1a8
fffff800`05594f00 fffff800`022c7865 : 00000000`00000000 fffffa80`05c86610 00000000`00000000 fffff880`00e35f44 : nt!KiRetireDpcList+0x1bc
fffff800`05594fb0 fffff800`022c767c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`03da6670 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ataport!IdeCompleteScsiIrp+62
fffff880`00e3341a 8bc3            mov     eax,ebx

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ataport

IMAGE_NAME:  ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118

FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62

Followup: MachineOwner
---------




Drivers:

Code:
start             end                 module name
fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`00e54000 fffff880`00e5f000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`0140c000 fffff880`01414000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
fffff880`00e21000 fffff880`00e2a000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e2a000 fffff880`00e54000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff960`00b60000 fffff960`00bc1000   ATMFD    ATMFD.DLL    Fri Jan 07 00:49:20 2011 (4D26A960)
fffff880`01685000 fffff880`0168c000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`011b6000 fffff880`011c7000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`00cde000 fffff880`00d9e000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c80000 fffff880`00cde000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0148c000 fffff880`014ff000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`011c7000 fffff880`011d7000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0279d000 fffff880`027ab000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`015da000 fffff880`015f0000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`027b7000 fffff880`027c0000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`027ab000 fffff880`027b7000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`027c0000 fffff880`027d3000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`027d3000 fffff880`027df000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff960`00440000 fffff960`0045e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`011a9000 fffff880`011b6000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00d9e000 fffff880`00db2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`026f6000 fffff880`02701000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`00e5f000 fffff880`00eab000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff960`00900000 fffff960`00909000   framebuf framebuf.dll Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01510000 fffff880`0151a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`015a0000 fffff880`015da000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0162b000 fffff880`01675000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02208000 fffff800`02251000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`01111000 fffff880`01135000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0272e000 fffff880`02747000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`02747000 fffff880`0274f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`02720000 fffff880`0272e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`017f7000 fffff880`01800000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`011f8000 fffff880`01200000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`00ddc000 fffff880`00deb000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02767000 fffff880`02775000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00b96000 fffff800`00b99000   kdcom    kdcom.dll    Thu Feb 17 06:33:32 2011 (4D5D078C)
fffff880`02647000 fffff880`0268a000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`01472000 fffff880`0148c000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01600000 fffff880`0162b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`02750000 fffff880`02767000   LEqdUsb  LEqdUsb.Sys  Wed Jun 17 12:49:54 2009 (4A391EB2)
fffff880`02782000 fffff880`0278a000   LHidEqd  LHidEqd.Sys  Wed Jun 17 12:49:56 2009 (4A391EB4)
fffff880`0278a000 fffff880`0279d000   LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
fffff880`00c28000 fffff880`00c6c000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`00deb000 fffff880`00dfa000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02775000 fffff880`02782000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e07000 fffff880`00e21000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`010f5000 fffff880`01100000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01414000 fffff880`01472000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`00db2000 fffff880`00dbd000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0168d000 fffff880`0169f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`016a5000 fffff880`01797000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01797000 fffff880`017f7000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01100000 fffff880`01111000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff800`02251000 fffff800`0282e000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01256000 fffff880`013f9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0124c000 fffff880`01255000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0109d000 fffff880`010b2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f60000 fffff880`00f93000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e00000 fffff880`00e07000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fef000 fffff880`00fff000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014ff000 fffff880`01510000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c6c000 fffff880`00c80000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`00dbd000 fffff880`00dc8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01566000 fffff880`015a0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`01800000 fffff880`01801480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`00dc8000 fffff880`00ddc000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`006f0000 fffff960`006fa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`0268a000 fffff880`0269c000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`02701000 fffff880`0271e000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0271e000 fffff880`0271ff00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`01198000 fffff880`011a9000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0269c000 fffff880`026f6000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`01142000 fffff880`01198000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`01135000 fffff880`01142000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`010b2000 fffff880`010c0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`010c0000 fffff880`010e5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01675000 fffff880`01685000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`011e3000 fffff880`011f8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f93000 fffff880`00fef000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`0151a000 fffff880`01566000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`010e5000 fffff880`010f5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ead000 fffff880`00f51000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f51000 fffff880`00f60000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff960`000c0000 fffff960`003d0000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
fffff880`011da000 fffff880`011e3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`027df000 fffff880`02800000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`015f0000 fffff880`015fe000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01400000 fffff880`0140c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01230000 fffff880`01239000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01239000 fffff880`0124c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`01685000 fffff880`0168d000   spldr.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00008000
fffff880`010b4000 fffff880`011da000   sptd.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00126000
 


Solution
Back
Top