Hi,
Could a wizard please translate this Minidump please,
I have tried the things mentioned on the sticky before I posted and memtest shows all is good.
Also ran TDSSkiller as mentioned on some other boards.
Thanks for the help
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000104, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 827918ab, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82178848
Unable to read MiSystemVaType memory at 82157e20
00000104
CURRENT_IRQL: 2
FAULTING_IP:
ataport!CrbAddSrbDataBuffer+b
827918ab 8b5104 mov edx,dword ptr [ecx+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 82136a8c -- (.trap 0xffffffff82136a8c)
ErrCode = 00000000
eax=87a91c78 ebx=8419f920 ecx=00000100 edx=00000001 esi=8419f698 edi=87a91c78
eip=827918ab esp=82136b00 ebp=82136b00 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
ataport!CrbAddSrbDataBuffer+0xb:
827918ab 8b5104 mov edx,dword ptr [ecx+4] ds:0023:00000104=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 827918ab to 8205066b
STACK_TEXT:
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!CrbAddSrbDataBuffer+b
827918ab 8b5104 mov edx,dword ptr [ecx+4]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: ataport!CrbAddSrbDataBuffer+b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce788e8
FAILURE_BUCKET_ID: 0xD1_ataport!CrbAddSrbDataBuffer+b
BUCKET_ID: 0xD1_ataport!CrbAddSrbDataBuffer+b
Followup: MachineOwner
---------
Could a wizard please translate this Minidump please,
I have tried the things mentioned on the sticky before I posted and memtest shows all is good.
Also ran TDSSkiller as mentioned on some other boards.
Thanks for the help
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000104, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 827918ab, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82178848
Unable to read MiSystemVaType memory at 82157e20
00000104
CURRENT_IRQL: 2
FAULTING_IP:
ataport!CrbAddSrbDataBuffer+b
827918ab 8b5104 mov edx,dword ptr [ecx+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 82136a8c -- (.trap 0xffffffff82136a8c)
ErrCode = 00000000
eax=87a91c78 ebx=8419f920 ecx=00000100 edx=00000001 esi=8419f698 edi=87a91c78
eip=827918ab esp=82136b00 ebp=82136b00 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
ataport!CrbAddSrbDataBuffer+0xb:
827918ab 8b5104 mov edx,dword ptr [ecx+4] ds:0023:00000104=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 827918ab to 8205066b
STACK_TEXT:
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!CrbAddSrbDataBuffer+b
827918ab 8b5104 mov edx,dword ptr [ecx+4]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: ataport!CrbAddSrbDataBuffer+b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce788e8
FAILURE_BUCKET_ID: 0xD1_ataport!CrbAddSrbDataBuffer+b
BUCKET_ID: 0xD1_ataport!CrbAddSrbDataBuffer+b
Followup: MachineOwner
---------