Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020411-37955-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16397.amd64fre.win7_gdr_staging.090720-1852
Machine Name:
Kernel base = 0xfffff800`0301b000 PsLoadedModuleList = 0xfffff800`03258e50
Debug session time: Fri Feb 4 12:50:36.546 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:02.042
Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
WARNING: .reload failed, module list may be incomplete
Debugger can not determine kernel base address
Loading Kernel Symbols
.Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80003069571}
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003069571, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
0000000000000008
CURRENT_IRQL: 0
FAULTING_IP:
+3239613234303530
fffff800`03069571 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from fffff8000308c4a9 to fffff8000308cf40
STACK_TEXT:
fffff800`0591f738 fffff800`0308c4a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : 0xfffff800`0308cf40
fffff800`0591f740 00000000`0000000a : 00000000`00000008 00000000`00000002 00000000`00000000 fffff800`03069571 : 0xfffff800`0308c4a9
fffff800`0591f748 00000000`00000008 : 00000000`00000002 00000000`00000000 fffff800`03069571 fffffa80`024566a8 : 0xa
fffff800`0591f750 00000000`00000002 : 00000000`00000000 fffff800`03069571 fffffa80`024566a8 00000000`00000000 : 0x8
fffff800`0591f758 00000000`00000000 : fffff800`03069571 fffffa80`024566a8 00000000`00000000 00000000`00000000 : 0x2
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020411-37471-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16397.amd64fre.win7_gdr_staging.090720-1852
Machine Name:
Kernel base = 0xfffff800`02455000 PsLoadedModuleList = 0xfffff800`02692e50
Debug session time: Fri Feb 4 12:16:56.708 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:05.379
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
...............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff800024a3571}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800024a3571, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800026fd0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`024a3571 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff80000ba0880 -- (.trap 0xfffff80000ba0880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80038e9e08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800024a3571 rsp=fffff80000ba0a10 rbp=fffff8000263fe80
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`024a3571 488b5108 mov rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800024c64a9 to fffff800024c6f40
STACK_TEXT:
fffff800`00ba0738 fffff800`024c64a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba0740 fffff800`024c5120 : 00000000`00000001 fffffa80`03c23650 fffffa80`024296a8 fffff880`00c87656 : nt!KiBugCheckDispatch+0x69
fffff800`00ba0880 fffff800`024a3571 : fffff800`0263fe80 fffffa80`038e9e01 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
fffff800`00ba0a10 fffff800`024a6830 : fffffa80`03c23650 00000000`00000002 00000000`00000000 fffffa80`038e9e08 : nt!KiInsertQueueApc+0x1e9
fffff800`00ba0a40 fffff800`024c9d4b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`00ba0aa0 fffff880`00dbc41a : 00000000`00007a00 00000000`00000001 fffffa80`038f4010 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`00ba0b80 fffff880`00dbc242 : fffffa80`038f4010 fffff880`00dbeb3b fffffa80`03bcfa50 fffffa80`0311a7d0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`00ba0bb0 fffff880`00db6e32 : 00000000`00000000 00000000`00000000 fffffa80`02429500 fffffa80`0311a7d0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`00ba0be0 fffff880`00dbf7ed : fffffa80`024281a0 fffffa80`038f4010 00000000`00000000 fffffa80`038f4010 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`00ba0d10 fffff880`00dbf0ec : fffffa80`024281a0 00000000`00000000 fffffa80`024281a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`00ba0e40 fffff800`024d25dc : fffff800`0263fe80 fffffa80`00001011 fffffa80`02428050 fffffa80`02428118 : ataport!IdePortCompletionDpc+0x1a8
fffff800`00ba0f00 fffff800`024cd065 : 00000000`00000000 fffffa80`03b8f2e0 00000000`00000000 fffff880`00dbef44 : nt!KiRetireDpcList+0x1bc
fffff800`00ba0fb0 fffff800`024cce7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`02f31800 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00dbc41a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------