I'll just repost what a user sent me. Is there a chance you need to fix something on your side?
--
Hi. Using 4.3.8.2631 in an updated Win7 x64 I suffered BSOD. My DVD is detected ok. If there is a need of more information, please ask. Thank you.
Windbg results:
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efe100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+3736613634376231
00000000`00000000 ?? ???
PROCESS_NAME: cdbxpp.exe
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffff88002f22d20 -- (.trap 0xfffff88002f22d20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005a23c80 rbx=0000000000000000 rcx=fffffa8005a23c60
rdx=fffffa8005a23c60 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff88002f22eb8 rbp=fffffa80043e9060
r8=fffffa8005a23c80 r9=0000000000000000 r10=fffffa80043e9290
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ccb1e9 to fffff80002ccbc40
FAILED_INSTRUCTION_ADDRESS:
+3736613634376231
00000000`00000000 ?? ???
STACK_TEXT:
fffff880`02f22eb8 fffff880`010b3553 : 00000000`00000002 fffffa80`05dfb000 00000000`0000001e fffffa80`05dfc158 : 0x0
fffff880`02f22ec0 fffff800`02cd70ac : fffff880`009e8180 fffffa80`00000000 fffffa80`043e9128 fffffa80`05dfb410 : storport!RaidpAdapterDpcRoutine+0x53
fffff880`02f22f00 fffff800`02cce765 : 00000000`00000000 fffffa80`06f26b60 00000000`00000000 fffff880`010b3500 : nt!KiRetireDpcList+0x1bc
fffff880`02f22fb0 fffff800`02cce57c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KyRetireDpcList+0x5
fffff880`0c894be0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: .trap 0xfffff88002f22d20 ; kb
FOLLOWUP_IP:
storport!RaidpAdapterDpcRoutine+53
fffff880`010b3553 ff442448 inc dword ptr [rsp+48h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: storport!RaidpAdapterDpcRoutine+53
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: storport
IMAGE_NAME: storport.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d79a55f
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_storport!RaidpAdapterDpcRoutine+53
BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_storport!RaidpAdapterDpcRoutine+53
Followup: MachineOwner