Dear Members,
Thanks for the input. I am doing this in my dispatch write routine. The IRQL at this is PASSIVE_LEVEL. I think the MDL will be locked by the kernel first and then the IRP given to my dispatch routine for writing to the device. I myself have not locked the MDL.
Sometimes DRIVER_IRQL_NOT_LESS_OR_EQUAL and sometimes IRQL_NOT_LESS_OR_EQUAL are coming.
If a DbgPrint viewer is open then this bug check occurs if the viewer is not running then bug check does not come. The sys file mentioned on BSD is DbgPrnHk.sys
Below is the output of !analyze -v command:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a47000 PsLoadedModuleList = 0x82b8f810
Debug session time: Wed May 15 01:05:50.191 2013 (UTC - 4:00)
System Uptime: 0 days 0:02:50.204
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 87801000, memory referenced
Arg2: 000000ff, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: aa8b11bb, address which referenced memory
Debugging Details:
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: GetPointerFromAddress: unable to read from 82baf718
Unable to read MiSystemVaType memory at 82b8f160
87801000
CURRENT_IRQL: 0
FAULTING_IP:
DbgPrnHk+31bb
aa8b11bb f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
TRAP_FRAME: b88bcb14 – (.trap 0xffffffffb88bcb14)
ErrCode = 00000000
eax=00000068 ebx=852cde80 ecx=00000018 edx=00000068 esi=87801000 edi=852cdea0
eip=aa8b11bb esp=b88bcb88 ebp=b88bcc64 iopl=0 nv up di pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010002
DbgPrnHk+0x31bb:
aa8b11bb f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope
LAST_CONTROL_TRANSFER: from aa8b11bb to 82a8d7eb
STACK_TEXT:
b88bcb14 aa8b11bb badb0d00 00000068 00010000 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
b88bcc64 aa8b1525 00000000 87800ff8 fda1b00f DbgPrnHk+0x31bb
b88bcc88 aa8b158c 00000065 00000003 8fd180cc DbgPrnHk+0x3525
b88bccb8 82a4828e 00000065 00000003 8fd180cc DbgPrnHk+0x358c
b88bccd8 8fd14725 8fd180cc b88bcd04 b88bcd28 nt!DbgPrint+0x1d
b88bccf8 82a834bc 864b0e00 8520a000 8ab0f0c0 DTSC4Own+0x1725
b88bcd10 88a2991c 8ab0f020 b88bcd34 82ab710e nt!IofCallDriver+0x63
b88bcd1c 82ab710e 8ab0f0c0 00000000 ffffffff Ntfs!NtfsStorageDriverCallout+0x14
b88bcd1c 82ab7205 8ab0f0c0 00000000 ffffffff nt!KiSwapKernelStackAndExit+0x15a
8ab0f030 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31
STACK_COMMAND: kb
FOLLOWUP_IP:
DbgPrnHk+31bb
aa8b11bb f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: DbgPrnHk+31bb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: DbgPrnHk
IMAGE_NAME: DbgPrnHk.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d871ac0
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_DbgPrnHk+31bb
BUCKET_ID: DISABLED_INTERRUPT_FAULT_DbgPrnHk+31bb
Followup: MachineOwner
This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
I want to see the contents of the write request.
Thanks,
Uzair Lakhani