Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-25318-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03063000 PsLoadedModuleList = 0xfffff800`032a0e50
Debug session time: Sat Dec 18 19:06:16.128 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:07.658
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff800030afd29}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030afd29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330b0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`030afd29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002ffb570 -- (.trap 0xfffff88002ffb570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80068984b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030afd29 rsp=fffff88002ffb700 rbp=fffff88002fd3180
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`030afd29 488b5108 mov rdx,qword ptr [rcx+8] ds:7000:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d2ca9 to fffff800030d3740
STACK_TEXT:
fffff880`02ffb428 fffff800`030d2ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02ffb430 fffff800`030d1920 : fffffa80`00000002 fffffa80`06859630 fffffa80`050226f0 fffff880`00e9ae92 : nt!KiBugCheckDispatch+0x69
fffff880`02ffb570 fffff800`030afd29 : fffffa80`050227c0 00000000`00008000 00000000`00000000 fffff800`031870e4 : nt!KiPageFault+0x260
fffff880`02ffb700 fffff800`030b2fec : fffffa80`06859630 00000000`00000002 00000000`00000000 fffffa80`068984b8 : nt!KiInsertQueueApc+0x1e9
fffff880`02ffb730 fffff800`030d655b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff880`02ffb790 fffff880`00e9841a : 00000000`00008000 00000000`00000001 fffffa80`0488bb80 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff880`02ffb870 fffff880`00e98242 : fffffa80`0488bb80 fffff880`00e9ab3b fffffa80`050226f0 fffffa80`0454d1b0 : ataport!IdeCompleteScsiIrp+0x62
fffff880`02ffb8a0 fffff880`00e92e32 : 00000000`00000000 00000000`00000000 fffffa80`03633500 fffffa80`0454d1b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`02ffb8d0 fffff880`00e9b7ed : fffffa80`036321a0 fffffa80`0488bb80 00000000`00000000 fffffa80`0488bb80 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`02ffba00 fffff880`00e9b0ec : fffffa80`036321a0 00000000`00000000 fffffa80`036321a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`02ffbb30 fffff880`0107b4ce : fffffa80`043f5000 fffff880`02ffbc18 fffffa80`03632050 fffffa80`043f5750 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02ffbbf0 fffffa80`043f5000 : fffff880`02ffbc18 fffffa80`03632050 fffffa80`043f5750 fffff880`02fd3180 : sptd+0x424ce
fffff880`02ffbbf8 fffff880`02ffbc18 : fffffa80`03632050 fffffa80`043f5750 fffff880`02fd3180 00000000`00000000 : 0xfffffa80`043f5000
fffff880`02ffbc00 fffffa80`03632050 : fffffa80`043f5750 fffff880`02fd3180 00000000`00000000 fffff880`02fd7f40 : 0xfffff880`02ffbc18
fffff880`02ffbc08 fffffa80`043f5750 : fffff880`02fd3180 00000000`00000000 fffff880`02fd7f40 00000000`00000022 : 0xfffffa80`03632050
fffff880`02ffbc10 fffff880`02fd3180 : 00000000`00000000 fffff880`02fd7f40 00000000`00000022 00000000`00000000 : 0xfffffa80`043f5750
fffff880`02ffbc18 00000000`00000000 : fffff880`02fd7f40 00000000`00000022 00000000`00000000 00000000`00000000 : 0xfffff880`02fd3180
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e9841a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-24991-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03063000 PsLoadedModuleList = 0xfffff800`032a0e50
Debug session time: Sat Dec 18 19:09:32.173 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:56.703
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff800030afd29}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030afd29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330b0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`030afd29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c570 -- (.trap 0xfffff80000b9c570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80067e1288 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030afd29 rsp=fffff80000b9c700 rbp=fffff8000324de80
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`030afd29 488b5108 mov rdx,qword ptr [rcx+8] ds:8650:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d2ca9 to fffff800030d3740
STACK_TEXT:
fffff800`00b9c428 fffff800`030d2ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c430 fffff800`030d1920 : fffffa80`00000002 fffffa80`048f3740 fffffa80`05d765e0 fffff880`00e0be92 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c570 fffff800`030afd29 : fffffa80`05d766b0 00000000`00000200 00000000`00000000 fffff800`031870e4 : nt!KiPageFault+0x260
fffff800`00b9c700 fffff800`030b2fec : fffffa80`048f3740 00000000`00000002 00000000`00000000 fffffa80`067e1288 : nt!KiInsertQueueApc+0x1e9
fffff800`00b9c730 fffff800`030d655b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`00b9c790 fffff880`00e0941a : 00000000`00000200 00000000`00000001 fffffa80`0502b6f0 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`00b9c870 fffff880`00e09242 : fffffa80`0502b6f0 fffff880`00e0bb3b fffffa80`05d765e0 fffffa80`0454c1b0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`00b9c8a0 fffff880`00e03e32 : 00000000`00000000 00000000`00000000 fffffa80`044bb500 fffffa80`0454c1b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`00b9c8d0 fffff880`00e0c7ed : fffffa80`044ba1a0 fffffa80`0502b6f0 00000000`00000000 fffffa80`0502b6f0 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`00b9ca00 fffff880`00e0c0ec : fffffa80`044ba1a0 00000000`00000000 fffffa80`044ba1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`00b9cb30 fffff880`011074ce : fffffa80`043f3000 fffff800`00b9cc18 fffffa80`044ba050 fffffa80`043f3750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`00b9cbf0 fffffa80`043f3000 : fffff800`00b9cc18 fffffa80`044ba050 fffffa80`043f3750 fffff800`0324de80 : sptd+0x424ce
fffff800`00b9cbf8 fffff800`00b9cc18 : fffffa80`044ba050 fffffa80`043f3750 fffff800`0324de80 00000000`00000000 : 0xfffffa80`043f3000
fffff800`00b9cc00 fffffa80`044ba050 : fffffa80`043f3750 fffff800`0324de80 00000000`00000000 fffff800`00b96080 : 0xfffff800`00b9cc18
fffff800`00b9cc08 fffffa80`043f3750 : fffff800`0324de80 00000000`00000000 fffff800`00b96080 00000000`00000022 : 0xfffffa80`044ba050
fffff800`00b9cc10 fffff800`0324de80 : 00000000`00000000 fffff800`00b96080 00000000`00000022 00000000`00000000 : 0xfffffa80`043f3750
fffff800`00b9cc18 00000000`00000000 : fffff800`00b96080 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KiInitialPCR+0x180
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e0941a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-27144-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03066000 PsLoadedModuleList = 0xfffff800`032a3e50
Debug session time: Sat Dec 18 19:07:43.071 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:48.990
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff800030b2d29}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030b2d29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330e0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`030b2d29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b570 -- (.trap 0xfffff88002f8b570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8005699378 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030b2d29 rsp=fffff88002f8b700 rbp=fffff88002f63180
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`030b2d29 488b5108 mov rdx,qword ptr [rcx+8] ds:a650:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d5ca9 to fffff800030d6740
STACK_TEXT:
fffff880`02f8b428 fffff800`030d5ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f8b430 fffff800`030d4920 : fffffa80`00000002 fffffa80`0662d9c0 fffffa80`05f28b80 fffff880`01188e92 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b570 fffff800`030b2d29 : fffffa80`05f28c50 00000000`00000200 00000000`00000000 fffff800`0318a0e4 : nt!KiPageFault+0x260
fffff880`02f8b700 fffff800`030b5fec : fffffa80`0662d9c0 00000000`00000002 00000000`00000000 fffffa80`05699378 : nt!KiInsertQueueApc+0x1e9
fffff880`02f8b730 fffff800`030d955b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff880`02f8b790 fffff880`0118641a : 00000000`00000200 00000000`00000001 fffffa80`0473fb80 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff880`02f8b870 fffff880`01186242 : fffffa80`0473fb80 fffff880`01188b3b fffffa80`05f28b80 fffffa80`0454d1b0 : ataport!IdeCompleteScsiIrp+0x62
fffff880`02f8b8a0 fffff880`01180e32 : 00000000`00000000 00000000`00000000 fffffa80`0405c500 fffffa80`0454d1b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`02f8b8d0 fffff880`011897ed : fffffa80`0405b1a0 fffffa80`0473fb80 00000000`00000000 fffffa80`0473fb80 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`02f8ba00 fffff880`011890ec : fffffa80`0405b1a0 00000000`00000000 fffffa80`0405b1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`02f8bb30 fffff880`00f104ce : fffffa80`0362f000 fffff880`02f8bc18 fffffa80`0405b050 fffffa80`0362f750 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02f8bbf0 fffffa80`0362f000 : fffff880`02f8bc18 fffffa80`0405b050 fffffa80`0362f750 fffff880`02f63180 : sptd+0x424ce
fffff880`02f8bbf8 fffff880`02f8bc18 : fffffa80`0405b050 fffffa80`0362f750 fffff880`02f63180 00000000`00000000 : 0xfffffa80`0362f000
fffff880`02f8bc00 fffffa80`0405b050 : fffffa80`0362f750 fffff880`02f63180 00000000`00000000 fffff880`02f67f40 : 0xfffff880`02f8bc18
fffff880`02f8bc08 fffffa80`0362f750 : fffff880`02f63180 00000000`00000000 fffff880`02f67f40 00000000`00000022 : 0xfffffa80`0405b050
fffff880`02f8bc10 fffff880`02f63180 : 00000000`00000000 fffff880`02f67f40 00000000`00000022 00000000`00000000 : 0xfffffa80`0362f750
fffff880`02f8bc18 00000000`00000000 : fffff880`02f67f40 00000000`00000022 00000000`00000000 00000000`00000000 : 0xfffff880`02f63180
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`0118641a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-25911-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03008000 PsLoadedModuleList = 0xfffff800`03245e50
Debug session time: Sat Dec 18 19:11:36.379 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:50.299
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff80003054d29}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003054d29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b00e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`03054d29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c570 -- (.trap 0xfffff80000b9c570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8005cc6f58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003054d29 rsp=fffff80000b9c700 rbp=fffff800031f2e80
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`03054d29 488b5108 mov rdx,qword ptr [rcx+8] ds:6650:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003077ca9 to fffff80003078740
STACK_TEXT:
fffff800`00b9c428 fffff800`03077ca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c430 fffff800`03076920 : fffffa80`00000002 fffffa80`0656aa50 fffffa80`04f546f0 fffff880`00e0be92 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c570 fffff800`03054d29 : fffffa80`04f547c0 00000000`00000200 00000000`00000000 fffff800`0312c0e4 : nt!KiPageFault+0x260
fffff800`00b9c700 fffff800`03057fec : fffffa80`0656aa50 00000000`00000002 00000000`00000000 fffffa80`05cc6f58 : nt!KiInsertQueueApc+0x1e9
fffff800`00b9c730 fffff800`0307b55b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`00b9c790 fffff880`00e0941a : 00000000`00000200 00000000`00000001 fffffa80`04f52b80 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`00b9c870 fffff880`00e09242 : fffffa80`04f52b80 fffff880`00e0bb3b fffffa80`04f546f0 fffffa80`0453d1b0 : ataport!IdeCompleteScsiIrp+0x62
fffff800`00b9c8a0 fffff880`00e03e32 : 00000000`00000000 00000000`00000000 fffffa80`0403d500 fffffa80`0453d1b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff800`00b9c8d0 fffff880`00e0c7ed : fffffa80`0403c1a0 fffffa80`04f52b80 00000000`00000000 fffffa80`04f52b80 : ataport!IdeTranslateCompletedRequest+0x236
fffff800`00b9ca00 fffff880`00e0c0ec : fffffa80`0403c1a0 00000000`00000000 fffffa80`0403c1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff800`00b9cb30 fffff880`010f74ce : fffffa80`043db000 fffff800`00b9cc18 fffffa80`0403c050 fffffa80`043db750 : ataport!IdePortCompletionDpc+0x1a8
fffff800`00b9cbf0 fffffa80`043db000 : fffff800`00b9cc18 fffffa80`0403c050 fffffa80`043db750 fffff800`031f2e80 : sptd+0x424ce
fffff800`00b9cbf8 fffff800`00b9cc18 : fffffa80`0403c050 fffffa80`043db750 fffff800`031f2e80 00000000`00000000 : 0xfffffa80`043db000
fffff800`00b9cc00 fffffa80`0403c050 : fffffa80`043db750 fffff800`031f2e80 00000000`00000000 fffff800`00b96080 : 0xfffff800`00b9cc18
fffff800`00b9cc08 fffffa80`043db750 : fffff800`031f2e80 00000000`00000000 fffff800`00b96080 00000000`00000022 : 0xfffffa80`0403c050
fffff800`00b9cc10 fffff800`031f2e80 : 00000000`00000000 fffff800`00b96080 00000000`00000022 00000000`00000000 : 0xfffffa80`043db750
fffff800`00b9cc18 00000000`00000000 : fffff800`00b96080 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KiInitialPCR+0x180
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e0941a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------