Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-38797-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sat Jan 29 01:34:11.208 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:58.112
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80002aa9d29}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002aa9d29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`02aa9d29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002f1b610 -- (.trap 0xfffff88002f1b610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80024af528 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aa9d29 rsp=fffff88002f1b7a0 rbp=fffff880009e4180
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02aa9d29 488b5108 mov rdx,qword ptr [rcx+8] ds:0004:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002accca9 to fffff80002acd740
STACK_TEXT:
fffff880`02f1b4c8 fffff800`02accca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1b4d0 fffff800`02acb920 : 00000000`00000001 fffffa80`03fbeb60 fffffa80`025196a8 fffff880`00e1b656 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b610 fffff800`02aa9d29 : fffffa80`033a1010 fffff880`018da947 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
fffff880`02f1b7a0 fffff800`02aacfec : fffffa80`03fbeb60 00000000`00000002 00000000`00000000 fffffa80`024af528 : nt!KiInsertQueueApc+0x1e9
fffff880`02f1b7d0 fffff800`02ad055b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff880`02f1b830 fffff880`00e2c41a : 00000000`00004000 00000000`00000001 fffffa80`04dd76f0 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff880`02f1b910 fffff880`00e2c242 : fffffa80`04dd76f0 fffff880`00e2eb3b fffffa80`037b4010 fffffa80`02eb37d0 : ataport!IdeCompleteScsiIrp+0x62
fffff880`02f1b940 fffff880`00e26e32 : 00000000`00000000 00000000`00000000 fffffa80`02519500 fffffa80`02eb37d0 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`02f1b970 fffff880`00e2f7ed : fffffa80`025181a0 fffffa80`04dd76f0 00000000`00000000 fffffa80`04dd76f0 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`02f1baa0 fffff880`00e2f0ec : fffffa80`025181a0 00000000`00000000 fffffa80`025181a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`02f1bbd0 fffff800`02ad8bfc : fffff880`009e4180 00000000`08251b56 fffffa80`02518050 fffffa80`02518118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02f1bc90 fffff800`02ad5eea : fffff880`009e4180 fffff880`009eef40 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd40 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e2c41a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-36847-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
Debug session time: Sat Jan 29 02:15:58.457 2011 (UTC - 5:00)
System Uptime: 0 days 0:25:54.361
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002a6c5a1, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiApcInterrupt+1f1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a6c5a1, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiApcInterrupt+1f1
fffff800`02a6c5a1 48cf iretq
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc70e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: wow_helper.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88005b714d8 -- (.exr 0xfffff88005b714d8)
ExceptionAddress: fffff80002a6c5a1 (nt!KiApcInterrupt+0x00000000000001f1)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000008
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88005b71580 -- (.trap 0xfffff88005b71580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000001c1 rbx=0000000000000000 rcx=00000000000000cc
rdx=00000000000001c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a6c5a1 rsp=fffff88005b71718 rbp=fffffa80033a2667
r8=0000000000000002 r9=00000000000000c1 r10=00000000000000c1
r11=0000000000000200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po nc
nt!KiApcInterrupt+0x1f1:
fffff800`02a6c5a1 48cf iretq
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac9a39 to fffff80002a8f740
STACK_TEXT:
fffff880`05b70d08 fffff800`02ac9a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a6c5a1 00000000`00000000 : nt!KeBugCheckEx
fffff880`05b70d10 fffff800`02a8ed82 : fffff880`05b714d8 00000000`000001c1 fffff880`05b71580 00000000`0000003c : nt!KiDispatchException+0x1b9
fffff880`05b713a0 fffff800`02a8d68a : 00000000`00000000 fffffa80`033a2650 fffffa80`033a3970 00000000`0000003c : nt!KiExceptionDispatch+0xc2
fffff880`05b71580 fffff800`02a6c5a1 : fffffa80`0339b151 00000000`00000000 00000000`00000200 00000001`05b71740 : nt!KiGeneralProtectionFault+0x10a
fffff880`05b71718 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x1f1
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiApcInterrupt+1f1
fffff800`02a6c5a1 48cf iretq
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiApcInterrupt+1f1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
BUCKET_ID: X64_0x1E_c0000005_nt!KiApcInterrupt+1f1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-33134-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sat Jan 29 06:11:37.037 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:50.941
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fbc30, 2, 1, fffff80002ad1cd8}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000fbc30, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ad1cd8, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
00000000000fbc30
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`02ad1cd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: WUDFHost.exe
TRAP_FRAME: fffff8800581add0 -- (.trap 0xfffff8800581add0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800580d3e8 rbx=0000000000000000 rcx=fffff880009e4180
rdx=000007feff76b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ad1cd8 rsp=fffff8800581af60 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=0000000000000002
r11=fffffa8004f85590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`02ad1cd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:3b60:00000000`00000040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002accca9 to fffff80002acd740
STACK_TEXT:
fffff880`0581ac88 fffff800`02accca9 : 00000000`0000000a 00000000`000fbc30 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0581ac90 fffff800`02acb920 : 00000980`00000000 00000000`000fbbf0 fffff880`0581ae58 fffff8a0`029559e0 : nt!KiBugCheckDispatch+0x69
fffff880`0581add0 fffff800`02ad1cd8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0581af60 fffff800`02b48f74 : fffffa80`052865e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
fffff880`0581afc0 fffff800`02aaa0c7 : 00000000`000fbbd2 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3ca30
fffff880`0581b090 fffff800`02ad4b9d : fffffa80`04f03b60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`0581b110 fffff800`02ad0d4b : 00000000`00000000 00000000`00001f80 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3dd
fffff880`0581b1a0 fffff800`02dc92ef : fffffa80`00000005 fffff880`0581b4e0 00000000`00000001 00000000`00000006 : nt!KeWaitForMultipleObjects+0x271
fffff880`0581b450 fffff800`02dc9bf2 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000001 : nt!ObpWaitForMultipleObjects+0x294
fffff880`0581b920 fffff800`02acc993 : fffffa80`04f03b60 00000000`0185f878 fffff880`0581bb88 fffff8a0`029f4a00 : nt!NtWaitForMultipleObjects+0xe5
fffff880`0581bb70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`02ad1cd8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012911-35240-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Sat Jan 29 06:13:15.852 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:06.632
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80002a4fd29}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a4fd29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`02a4fd29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80005845610 -- (.trap 0xfffff80005845610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80052a3b98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a4fd29 rsp=fffff800058457a0 rbp=fffff80002bede80
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02a4fd29 488b5108 mov rdx,qword ptr [rcx+8] ds:2240:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a72ca9 to fffff80002a73740
STACK_TEXT:
fffff800`058454c8 fffff800`02a72ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`058454d0 fffff800`02a71920 : 00000000`00000001 fffffa80`05674b60 fffffa80`025246a8 fffff880`00e1b656 : nt!KiBugCheckDispatch+0x69
fffff800`05845610 fffff800`02a4fd29 : fffffa80`033aa010 fffff880`01896947 fffffa80`055f2240 00000000`00000000 : nt!KiPageFault+0x260
fffff800`058457a0 fffff800`02a52fec : fffffa80`05674b60 00000000`00000002 00000000`00000000 fffffa80`052a3b98 : nt!KiInsertQueueApc+0x1e9
fffff800`058457d0 fffff800`02a7655b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`05845830 fffff880`00e2c41a : 00000000`00020000 00000000`00000001 fffffa80`04252010 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`05845910 fffff880`00e2c242 : fffffa80`04252010 fffff880`00e2eb3b fffffa80`04256b80 fffffa80`02f2c1b0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`05845940 fffff880`00e26e32 : 00000000`00000000 00000000`00000000 fffffa80`02524500 fffffa80`02f2c1b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`05845970 fffff880`00e2f7ed : fffffa80`025231a0 fffffa80`04252010 00000000`00000000 fffffa80`04252010 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`05845aa0 fffff880`00e2f0ec : fffffa80`025231a0 00000000`00000000 fffffa80`025231a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`05845bd0 fffff800`02a7ebfc : fffff800`02bede80 00000000`09552696 fffffa80`02523050 fffffa80`02523118 : ataport!IdePortCompletionDpc+0x1a8
fffff800`05845c90 fffff800`02a7beea : fffff800`02bede80 fffff800`02bfbc40 00000000`00000000 fffff880`00e2ef44 : nt!KiRetireDpcList+0x1bc
fffff800`05845d40 00000000`00000000 : fffff800`05846000 fffff800`05840000 fffff800`05845d00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e2c41a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------