Hi,
Please find the kernel dump for my code. I have tried changing the unused KEYBOARD_INPUT_DATA InputDataEnd structure as well. Following in the result. Can you please help me to solve this.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 00000000, address which referenced memory
Debugging Details:
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: kernel32!pNlsUserInfo ***
*** ***
*************************************************************************
READ_ADDRESS: 00000000 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
+0
00000000 ?? ???
PROCESS_NAME: toast.exe
DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 8042a025 to 80452f6c
FAILED_INSTRUCTION_ADDRESS:
+0
00000000 ?? ???
STACK_TEXT:
ef592750 8042a025 00000003 ef592798 00000000 nt!ObGetSecurityMode
ef592780 8042a603 00000003 00000000 00000000 nt!IopGetDevicePDO+0x4d
ef5927e0 80468ce2 8205bf90 80481b00 81b9e010 nt!MapperConstructRootEnumTree+0xcd
ef5927e0 183bb000 8205bf90 80481b00 81b9e010 nt!KiUnexpectedInterruptTail+0x113
WARNING: Frame IP not in any known module. Following frames may be wrong.
00001000 00000000 00000000 00000000 00000000 0x183bb000
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IopGetDevicePDO+4d
8042a025 834dfcff or dword ptr [ebp-4],0FFFFFFFFh
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!IopGetDevicePDO+4d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 384d5a76
FAILURE_BUCKET_ID: 0xD1_VRF_CODE_AV_NULL_IP_nt!IopGetDevicePDO+4d
BUCKET_ID: 0xD1_VRF_CODE_AV_NULL_IP_nt!IopGetDevicePDO+4d
Followup: MachineOwner