BSOD IRQL_NOT_LESS_OR_EQUAL or SYSTEM_SERVICE_EXCEPTION

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Jerre, Feb 21, 2011.

  1. Jerre

    Jerre New Member

    Joined:
    Feb 21, 2011
    Messages:
    2
    Likes Received:
    0
    Hi,

    earlier today out of a sudden (I wasn't using the PC) I got a BSOD.
    Ever since I'm not able to do a normal boot (after I'm logged in I get a BSOD).
    Sometimes I even get a BSOD after logging in into safemode.

    The errors in the BSOD's can be different - I've attached an SF Diagnostic with the minidumps.

    I came accross some suggestions that the cause could be SPTD. I used a tool to uninstall it, however it said that SPTD was already uninstalled.
    When I ran cmd->driverqery SPTD was still there, so I want in to system32\drivers and renamed the file. This resulted in other errors while booting, so I put the original SPTD file back in place.

    I've also removed the Graphics driver, and tested the RAM memory slots seperatly, without any satisfying result.
    I also detached all unnecessary equipment (additional network card, DVD burner, ...), but still no luck.

    OS: Windows 7 64 bit Professional

    View attachment Seven Forums.rar
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1. Update ASUS ATK0110 ACPI Utility
    ASACPI.sys Sun Mar 27 22:30:36 2005


    2. Update Logitech SetPoint
    LEqdUsb.Sys Wed Jun 17 12:49:54 2009


    3. I suspect your hardware,

    http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html






    Crash Dumps:

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022111-29983-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02208000 PsLoadedModuleList = 0xfffff800`02445e50
    Debug session time: Mon Feb 21 17:45:13.134 2011 (UTC - 5:00)
    System Uptime: 0 days 0:01:41.774
    Loading Kernel Symbols
    ...............................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8, 2, 0, fffff80002254d19}
    
    Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002254d19, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800024b00e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiInsertQueueApc+1e9
    fffff800`02254d19 488b5108        mov     rdx,qword ptr [rcx+8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff80000b9a650 -- (.trap 0xfffff80000b9a650)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa80059da648 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002254d19 rsp=fffff80000b9a7e0 rbp=fffff800023f2e80
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiInsertQueueApc+0x1e9:
    fffff800`02254d19 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002277ca9 to fffff80002278740
    
    STACK_TEXT:  
    fffff800`00b9a508 fffff800`02277ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff800`00b9a510 fffff800`02276920 : fffffa80`00000002 fffffa80`05f11b60 fffffa80`05b5b010 fffff880`00e45e92 : nt!KiBugCheckDispatch+0x69
    fffff800`00b9a650 fffff800`02254d19 : fffffa80`05b5b0e0 00000000`00001000 00000000`00000000 fffff800`0232c0e4 : nt!KiPageFault+0x260
    fffff800`00b9a7e0 fffff800`02257fec : fffffa80`05f11b60 00000000`00000002 00000000`00000000 fffffa80`059da648 : nt!KiInsertQueueApc+0x1e9
    fffff800`00b9a810 fffff800`0227b55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
    fffff800`00b9a870 fffff880`00e4341a : 00000000`00001000 00000000`00000001 fffffa80`059d3980 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
    fffff800`00b9a950 fffff880`00e43242 : fffffa80`059d3980 fffff880`00e45b3b fffffa80`05b5b010 fffffa80`0566b1b0 : ataport!IdeCompleteScsiIrp+0x62
    fffff800`00b9a980 fffff880`00e3de32 : 00000000`00000000 00000000`00000000 fffffa80`04877500 fffffa80`0566b1b0 : ataport!IdeCommonCrbCompletion+0x5a
    fffff800`00b9a9b0 fffff880`00e467ed : fffffa80`048761a0 fffffa80`059d3980 00000000`00000000 fffffa80`059d3980 : ataport!IdeTranslateCompletedRequest+0x236
    fffff800`00b9aae0 fffff880`00e460ec : fffffa80`048761a0 00000000`00000000 fffffa80`048761a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
    fffff800`00b9ac10 fffff800`02283bfc : fffff800`023f2e80 fffff800`0238227e fffffa80`04876050 fffffa80`04876118 : ataport!IdePortCompletionDpc+0x1a8
    fffff800`00b9acd0 fffff800`02280eea : fffff800`023f2e80 fffff800`02400c40 00000000`00000000 fffff880`00e45f44 : nt!KiRetireDpcList+0x1bc
    fffff800`00b9ad80 00000000`00000000 : fffff800`00b9b000 fffff800`00b95000 fffff800`00b9ad40 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ataport!IdeCompleteScsiIrp+62
    fffff880`00e4341a 8bc3            mov     eax,ebx
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ataport
    
    IMAGE_NAME:  ataport.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118
    
    FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022111-31527-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50
    Debug session time: Mon Feb 21 17:42:44.737 2011 (UTC - 5:00)
    System Uptime: 0 days 0:02:13.782
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 0, fffff80002ed92b3}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ed92b3, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f10e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!IopCompleteRequest+ae3
    fffff800`02ed92b3 488b09          mov     rcx,qword ptr [rcx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  TSVNCache.exe
    
    IRP_ADDRESS:  ffffffffffffff89
    
    TRAP_FRAME:  fffff88006eba3e0 -- (.trap 0xfffff88006eba3e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88006d99418 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ed92b3 rsp=fffff88006eba570 rbp=0000000000000000
     r8=fffffa80067a1df0  r9=fffff88006eba670 r10=0000000000000002
    r11=fffffa8006c11e00 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po cy
    nt!IopCompleteRequest+0xae3:
    fffff800`02ed92b3 488b09          mov     rcx,qword ptr [rcx] ds:a570:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002eb8ca9 to fffff80002eb9740
    
    STACK_TEXT:  
    fffff880`06eba298 fffff800`02eb8ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`06eba2a0 fffff800`02eb7920 : 00000000`00000000 fffffa80`062cc010 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`06eba3e0 fffff800`02ed92b3 : fffffa80`04ae7060 fffff800`02ebf5da fffff8a0`00000000 fffff8a0`002c3000 : nt!KiPageFault+0x260
    fffff880`06eba570 fffff800`02e960b7 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
    fffff880`06eba640 fffff800`02ec0b9d : fffff800`030375e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
    fffff880`06eba6c0 fffff800`02ec2cff : fffffa80`05917180 fffff8a0`0cb4eed8 fffff8a0`0000009b 00000000`00000024 : nt!KiCommitThreadWait+0x3dd
    fffff880`06eba750 fffff800`02e82232 : fffffa80`0593e800 00000000`0000001b 00000000`00000000 fffff800`03033e00 : nt!KeWaitForSingleObject+0x19f
    fffff880`06eba7f0 fffff800`02ec15ac : ffffffff`ffb3b4c0 fffffa80`05ea6160 fffffa80`0593e870 fffff880`0103a787 : nt!ExpWaitForResource+0xae
    fffff880`06eba860 fffff880`012505d3 : 00000000`c00000d8 fffff8a0`001bd510 fffff880`06d993a0 fffff880`0125310b : nt!ExAcquireResourceExclusiveLite+0x14f
    fffff880`06eba8d0 fffff880`012e48a1 : fffff8a0`001bd510 fffff880`06d99600 fffff8a0`001bd640 00000000`00000004 : Ntfs!NtfsAcquireExclusiveFcb+0x73
    fffff880`06eba920 fffff880`01253aa9 : fffffa80`06ffae40 fffffa80`04ab5010 fffff880`06d99300 fffffa80`04ae7060 : Ntfs!NtfsCommonCleanup+0x271
    fffff880`06ebad30 fffff800`02eb15c7 : fffff880`06d99300 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCleanupCallout+0x19
    fffff880`06ebad60 fffff800`02eb1581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
    fffff880`06d991d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiPageFault+260
    fffff800`02eb7920 440f20c0        mov     rax,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+260
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022111-29515-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02219000 PsLoadedModuleList = 0xfffff800`02456e50
    Debug session time: Mon Feb 21 17:00:32.327 2011 (UTC - 5:00)
    System Uptime: 0 days 0:00:58.968
    Loading Kernel Symbols
    ...............................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8, 2, 0, fffff80002265d19}
    
    Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002265d19, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800024c10e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiInsertQueueApc+1e9
    fffff800`02265d19 488b5108        mov     rdx,qword ptr [rcx+8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  winlogon.exe
    
    TRAP_FRAME:  fffff80005594880 -- (.trap 0xfffff80005594880)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa80022c3b58 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002265d19 rsp=fffff80005594a10 rbp=fffff80002403e80
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiInsertQueueApc+0x1e9:
    fffff800`02265d19 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002288ca9 to fffff80002289740
    
    STACK_TEXT:  
    fffff800`05594738 fffff800`02288ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff800`05594740 fffff800`02287920 : 00000000`00000000 fffffa80`027e2b60 fffff800`02403e80 fffff800`0228d871 : nt!KiBugCheckDispatch+0x69
    fffff800`05594880 fffff800`02265d19 : fffff800`02403e80 fffffa80`022c3b01 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
    fffff800`05594a10 fffff800`02268fec : fffffa80`027e2b60 00000000`00000002 00000000`00000000 fffffa80`022c3b58 : nt!KiInsertQueueApc+0x1e9
    fffff800`05594a40 fffff800`0228c55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
    fffff800`05594aa0 fffff880`00e0941a : 00000000`00020000 00000000`00000001 fffffa80`022236f0 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
    fffff800`05594b80 fffff880`00e09242 : fffffa80`022236f0 fffff880`00e0bb3b fffffa80`02223b80 fffffa80`01a321b0 : ataport!IdeCompleteScsiIrp+0x62
    fffff800`05594bb0 fffff880`00e03e32 : 00000000`00000000 00000000`00000000 fffffa80`015b6500 fffffa80`01a321b0 : ataport!IdeCommonCrbCompletion+0x5a
    fffff800`05594be0 fffff880`00e0c7ed : fffffa80`015b51a0 fffffa80`022236f0 00000000`00000000 fffffa80`022236f0 : ataport!IdeTranslateCompletedRequest+0x236
    fffff800`05594d10 fffff880`00e0c0ec : fffffa80`015b51a0 00000000`00000000 fffffa80`015b51a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
    fffff800`05594e40 fffff800`02294bfc : fffff800`02403e80 fffffa80`00000ec2 fffffa80`015b5050 fffffa80`015b5118 : ataport!IdePortCompletionDpc+0x1a8
    fffff800`05594f00 fffff800`0228f865 : 00000000`00000000 fffffa80`02343990 00000000`00000000 fffff880`00e0bf44 : nt!KiRetireDpcList+0x1bc
    fffff800`05594fb0 fffff800`0228f67c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
    fffff880`02f21be0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ataport!IdeCompleteScsiIrp+62
    fffff880`00e0941a 8bc3            mov     eax,ebx
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ataport
    
    IMAGE_NAME:  ataport.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118
    
    FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\022111-30217-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0xfffff800`02251000 PsLoadedModuleList = 0xfffff800`0248ee50
    Debug session time: Mon Feb 21 17:47:35.067 2011 (UTC - 5:00)
    System Uptime: 0 days 0:01:34.692
    Loading Kernel Symbols
    ...............................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8, 2, 0, fffff8000229dd19}
    
    Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff8000229dd19, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800024f90e0
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiInsertQueueApc+1e9
    fffff800`0229dd19 488b5108        mov     rdx,qword ptr [rcx+8]
    
    CUSTOMER_CRASH_COUNT:  2
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  explorer.exe
    
    TRAP_FRAME:  fffff80005594880 -- (.trap 0xfffff80005594880)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa8004893a58 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000229dd19 rsp=fffff80005594a10 rbp=fffff8000243be80
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiInsertQueueApc+0x1e9:
    fffff800`0229dd19 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800022c0ca9 to fffff800022c1740
    
    STACK_TEXT:  
    fffff800`05594738 fffff800`022c0ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff800`05594740 fffff800`022bf920 : fffffa80`00000002 fffffa80`057e7a40 fffffa80`0587e330 fffff880`00e35e92 : nt!KiBugCheckDispatch+0x69
    fffff800`05594880 fffff800`0229dd19 : fffffa80`0587e400 00000000`00000a00 00000000`00000000 fffff800`023750e4 : nt!KiPageFault+0x260
    fffff800`05594a10 fffff800`022a0fec : fffffa80`057e7a40 00000000`00000002 00000000`00000000 fffffa80`04893a58 : nt!KiInsertQueueApc+0x1e9
    fffff800`05594a40 fffff800`022c455b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
    fffff800`05594aa0 fffff880`00e3341a : 00000000`00000a00 00000000`00000001 fffffa80`05c50b80 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
    fffff800`05594b80 fffff880`00e33242 : fffffa80`05c50b80 fffff880`00e35b3b fffffa80`0587e330 fffffa80`056651b0 : ataport!IdeCompleteScsiIrp+0x62
    fffff800`05594bb0 fffff880`00e2de32 : 00000000`00000000 00000000`00000000 fffffa80`04877500 fffffa80`056651b0 : ataport!IdeCommonCrbCompletion+0x5a
    fffff800`05594be0 fffff880`00e367ed : fffffa80`048761a0 fffffa80`05c50b80 00000000`00000000 fffffa80`05c50b80 : ataport!IdeTranslateCompletedRequest+0x236
    fffff800`05594d10 fffff880`00e360ec : fffffa80`048761a0 00000000`00000000 fffffa80`048761a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
    fffff800`05594e40 fffff800`022ccbfc : fffff800`0243be80 fffffa80`000017b5 fffffa80`04876050 fffffa80`04876118 : ataport!IdePortCompletionDpc+0x1a8
    fffff800`05594f00 fffff800`022c7865 : 00000000`00000000 fffffa80`05c86610 00000000`00000000 fffff880`00e35f44 : nt!KiRetireDpcList+0x1bc
    fffff800`05594fb0 fffff800`022c767c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
    fffff880`03da6670 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    ataport!IdeCompleteScsiIrp+62
    fffff880`00e3341a 8bc3            mov     eax,ebx
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  ataport!IdeCompleteScsiIrp+62
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: ataport
    
    IMAGE_NAME:  ataport.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc118
    
    FAILURE_BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    BUCKET_ID:  X64_0xA_ataport!IdeCompleteScsiIrp+62
    
    Followup: MachineOwner
    ---------
    
    
    
    



    Drivers:

    Code:
    start             end                 module name
    fffff880`0102f000 fffff880`01086000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`00e54000 fffff880`00e5f000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`0140c000 fffff880`01414000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
    fffff880`00e21000 fffff880`00e2a000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00e2a000 fffff880`00e54000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff960`00b60000 fffff960`00bc1000   ATMFD    ATMFD.DLL    Fri Jan 07 00:49:20 2011 (4D26A960)
    fffff880`01685000 fffff880`0168c000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`011b6000 fffff880`011c7000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`00cde000 fffff880`00d9e000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01200000 fffff880`01230000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c80000 fffff880`00cde000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0148c000 fffff880`014ff000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`011c7000 fffff880`011d7000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`0279d000 fffff880`027ab000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`015da000 fffff880`015f0000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`027b7000 fffff880`027c0000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`027ab000 fffff880`027b7000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`027c0000 fffff880`027d3000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`027d3000 fffff880`027df000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff960`00440000 fffff960`0045e000   dxg      dxg.sys      Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`011a9000 fffff880`011b6000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`00d9e000 fffff880`00db2000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`026f6000 fffff880`02701000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
    fffff880`00e5f000 fffff880`00eab000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff960`00900000 fffff960`00909000   framebuf framebuf.dll Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01510000 fffff880`0151a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`015a0000 fffff880`015da000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0162b000 fffff880`01675000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02208000 fffff800`02251000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`01111000 fffff880`01135000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`0272e000 fffff880`02747000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`02747000 fffff880`0274f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`02720000 fffff880`0272e000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`017f7000 fffff880`01800000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`011f8000 fffff880`01200000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`00ddc000 fffff880`00deb000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`02767000 fffff880`02775000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00b96000 fffff800`00b99000   kdcom    kdcom.dll    Thu Feb 17 06:33:32 2011 (4D5D078C)
    fffff880`02647000 fffff880`0268a000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`01472000 fffff880`0148c000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01600000 fffff880`0162b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`02750000 fffff880`02767000   LEqdUsb  LEqdUsb.Sys  Wed Jun 17 12:49:54 2009 (4A391EB2)
    fffff880`02782000 fffff880`0278a000   LHidEqd  LHidEqd.Sys  Wed Jun 17 12:49:56 2009 (4A391EB4)
    fffff880`0278a000 fffff880`0279d000   LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)
    fffff880`00c28000 fffff880`00c6c000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`00deb000 fffff880`00dfa000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`02775000 fffff880`02782000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e07000 fffff880`00e21000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`010f5000 fffff880`01100000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`01086000 fffff880`01090000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01414000 fffff880`01472000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`00db2000 fffff880`00dbd000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`0168d000 fffff880`0169f000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`016a5000 fffff880`01797000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`01797000 fffff880`017f7000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`01100000 fffff880`01111000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff800`02251000 fffff800`0282e000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
    fffff880`01256000 fffff880`013f9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`0124c000 fffff880`01255000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`0109d000 fffff880`010b2000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f60000 fffff880`00f93000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00e00000 fffff880`00e07000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00fef000 fffff880`00fff000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`014ff000 fffff880`01510000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`00c6c000 fffff880`00c80000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`00dbd000 fffff880`00dc8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01566000 fffff880`015a0000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`01000000 fffff880`0102f000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`01800000 fffff880`01801480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`00dc8000 fffff880`00ddc000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`006f0000 fffff960`006fa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`0268a000 fffff880`0269c000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`02701000 fffff880`0271e000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`0271e000 fffff880`0271ff00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`01198000 fffff880`011a9000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`0269c000 fffff880`026f6000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`01142000 fffff880`01198000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`01135000 fffff880`01142000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`01090000 fffff880`0109d000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`010b2000 fffff880`010c0000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`010c0000 fffff880`010e5000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`01675000 fffff880`01685000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`011e3000 fffff880`011f8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f93000 fffff880`00fef000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`0151a000 fffff880`01566000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`010e5000 fffff880`010f5000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00ead000 fffff880`00f51000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f51000 fffff880`00f60000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff960`000c0000 fffff960`003d0000   win32k   win32k.sys   Tue Jan 04 22:59:44 2011 (4D23ECB0)
    fffff880`011da000 fffff880`011e3000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`027df000 fffff880`02800000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`015f0000 fffff880`015fe000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`01400000 fffff880`0140c000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`01230000 fffff880`01239000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01239000 fffff880`0124c000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`01685000 fffff880`0168d000   spldr.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
    fffff880`010b4000 fffff880`011da000   sptd.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00126000
    
    
     

Share This Page

Loading...