i’ve already posted mail in this list…
my problem is my driver runs fine with interrupts disabled… but if device
generates interrupt the system crashes…(this happens when i am handling
Ioctls… FastIoctl Entry Point in my driver). However there’s nothing
wrong in the ISR since i’ve put an ASSERT(0) macro as first line in ISR
for me to know for sure that ISR is called. However this is not a
consistent behaviour…
As suggested by members of this list i’ve downloaded the latest WinDbg &
copied my symbols file(VINIC.pdb) in WINNT\Symbols\sys folder.
Now the result of executing ::
!analyze -ve is as shown below… Can anybody please track down the problem
for me… moreover if following doesn’t give adequate information… please
do let me know what else 'am i supposed to do…
VipkHandleIoctls : VIOCTL_UNBINDVI…(Is my routine. called from my
FastIoctl EntryPoint)
MM:***PAGE FAULT AT IRQL > 1 Va ED0644AA, IRQL 9
*** Fatal System Error: 0x000000d1
(0xED0644AA,0x00000009,0x00000000,0xED0644AA)
Break instruction exception - code 80000003 (first chance)
A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.
A fatal system error has occurred.
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ed0644aa, 9, 0, ed0644aa}
*** WARNING: symbols timestamp is wrong 0x3d65d74c 0x3a651aea for
explorer.exe
Probably caused by : VINIC.sys ( VINIC+44aa )
Followup: MachineOwner
nt!RtlpBreakWithStatusInstruction:
804a9bcc cc int 3
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pagable (or completely invalid) address at
an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ed0644aa, memory referenced
Arg2: 00000009, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: ed0644aa, address which referenced memory
Debugging Details:
READ_ADDRESS: ed0644aa Nonpaged pool
CURRENT_IRQL: 9
FAULTING_IP:
VINIC+44aa
ed0644aa ?? ???
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 80438bab to 804a9bcc
STACK_TEXT:
ba789698 80438bab 00000003 ba7896e0 ed0644aa
nt!RtlpBreakWithStatusInstruction
ba7896c8 8043919e 00000003 ed0644aa ed0644aa nt!KiBugCheckDebugBreak+0x31
ba789a54 804c2160 00000000 ed0644aa 00000009 nt!KeBugCheckEx+0x390
ba789a54 ed0644aa 00000000 ed0644aa 00000009 nt!KiTrap0E+0x2a4
WARNING: Frame IP not in any known module. Following frames may be wrong.
ba789ae0 804c3119 817c2b08 815e90e8 804c30ac 0xed0644aa
ba789af8 804c30b9 ba789b00 000000a3 ba789bd0
nt!KiChainedDispatch2ndLvl+0x4d
ba789af8 8049ee04 ba789b00 000000a3 ba789bd0 nt!KiChainedDispatch+0x29
ba789bd0 8055a30b 00000024 00000000 8188b3a8
nt!ObReferenceObjectByHandle+0x2b0
ba789d44 804be60a 00000024 0012f7f4 0012f7f4
nt!NtRequestWaitReplyPort+0x1ed
ba789d44 77f790ff 00000024 0012f7f4 0012f7f4 nt!KiSystemService+0x10a
0012f7ac 77f7a523 00000024 0012f7f4 0012f7f4
NTDLL!ZwRequestWaitReplyPort+0xb
0012f7cc 77e8c896 0012f7f4 00000000 0002021e
NTDLL!CsrClientCallServer+0x92
0012f8b4 77e8c91d 00000007 0012f954 00000021
KERNEL32!WriteConsoleInternal+0xd3
0012f8d0 77e68aee 00000007 0012f954 00000021 KERNEL32!WriteConsoleA+0x16
0012f92c 1000f513 00000007 0012f954 00000021 KERNEL32!WriteFile+0x80
0012fd68 1000f399 00000001 00334010 0000001f 0x1000f513
0012fd80 1000e41c 00000001 00334010 0000001f 0x1000f399
0012fda0 1000acde 10017038 00000028 0012f8b4 0x1000e41c
0012fdbc 10006dce 00000001 10017038 00000028 0x1000acde
0012fde4 10001e82 10013560 00000000 00332828 0x10006dce
0012fe10 10001820 00332782 7ffdf000 00332780 0x10001e82
0012fe24 004023e8 00332782 00000000 004400d0 0x10001820
0012fe38 00401b28 0000002d 00000000 0012fe78 explorer!c_szHotkeys+0x178
0012ff80 004068e3 00000001 00351100 00351128 explorer!string'+0xc 0012ffc0 77e7afff 00000028 0012f8b4 7ffdf000 explorer!
string’+0xf
0012fff0 00000000 0040682f 00000000 0000018a
KERNEL32!BaseProcessStart+0x3d
FAILED_INSTRUCTION_ADDRESS:
VINIC+44aa
ed0644aa ?? ???
FOLLOWUP_IP:
VINIC+44aa
ed0644aa ?? ???
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: VINIC+44aa
MODULE_NAME:
IMAGE_NAME: VINIC.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3d84d615
STACK_COMMAND: kb
BUCKET_ID: 0xD1_BAD_IP_VINIC+44aa