Hello -
I was starting a test driver on my xp system when I got the crash dump below. Looks like a memory corruption problem. Does anyone know what may cause this? Thanks!
!analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000001c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 805188cc, address which referenced memory
Debugging Details:
WRITE_ADDRESS: 0000001c
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDecrementCloneBlockReference+8
805188cc ff4b1c dec dword ptr [ebx+0x1c]
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 80517bb7 to 805188cc
TRAP_FRAME: ff5da748 -- (.trap ffffffffff5da748)
.trap ffffffffff5da748
ErrCode = 00000002
eax=00000000 ebx=00000000 ecx=c0001000 edx=893026dc esi=f66a9554
edi=00000000
eip=805188cc esp=ff5da7bc ebp=ff5da7c4 iopl=0 nv up ei pl zr na
po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
nt!MiDecrementCloneBlockReference+0x8:
805188cc ff4b1c dec dword ptr [ebx+0x1c]
ds:0023:0000001c=????????
.trap
Resetting default scope
STACK_TEXT:
ff5da7c4 80517bb7 00000000 f66a9554 893025b8
nt!MiDecrementCloneBlockReference+0x8
ff5da7fc 80517dfd c0001000 00400000 00000000 nt!MiDeletePte+0x32b
ff5da8bc 80510417 e1460288 00a11fff 00000000
nt!MiDeleteVirtualAddresses+0x149
ff5da968 8059673c 893025b8 00000001 ff5da9d8
nt!MiRemoveMappedView+0x211
ff5da9ac 8059681a 880339e0 856bc6f8 00000000
nt!MiUnmapViewOfSection+0x12a
ff5da9c8 805311b4 ffffffff 893025b8 00000000
nt!NtUnmapViewOfSection+0x52
ff5da9c8 804fb675 ffffffff 893025b8 00000000 nt!KiSystemService+0xc9
ff5daa48 805917fb ffffffff 00170000 8054c278
nt!ZwUnmapViewOfSection+0x11
ff5daae8 80591f1e 8000128c 00000000 8054c278
nt!MmCheckSystemImage+0x12f
ff5dac88 8056793b ff5dad48 00000000 00000000 nt!MmLoadSystemImage+0x25e
ff5dad54 80567d0d 00001298 00000001 00000000 nt!IopLoadDriver+0x311
ff5dad7c 80529055 00001298 00000000 892ff020
nt!IopLoadUnloadDriver+0x43
ff5dadac 805b27f2 96377cf4 00000000 00000000 nt!ExpWorkerThread+0xed
ff5daddc 805358f6 80528f68 00000001 00000000
nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
FOLLOWUP_IP:
nt!MiDecrementCloneBlockReference+8
805188cc ff4b1c dec dword ptr [ebx+0x1c]
SYMBOL_STACK_INDEX: 0
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!MiDecrementCloneBlockReference+8
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 3f8d8ab2
STACK_COMMAND: .trap ffffffffff5da748 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_W_nt!MiDecrementCloneBlockReference+8
BUCKET_ID: 0xA_W_nt!MiDecrementCloneBlockReference+8