Hi all.
Has anyone tried running multiple instances of pnpdtest on different devices
at the same time?
I tried running pnpdtest on two identical cards at the same time and it
bombed.
Below is the !analyze -v output (it looks like it crashed while dispatching
an ioctl.
Thanks
GV
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at
an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: d4053174, memory referenced
Arg2: 0000001c, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on
chips which support this level of status)
Arg4: 8082311e, address which referenced memory
Debugging Details:
Page effc not present in the dump file. Type “.hh dbgerr004” for details
READ_ADDRESS: d4053174
CURRENT_IRQL: 1c
FAULTING_IP:
nt!KeSetEvent+32
8082311e 66394616 cmp word ptr [esi+16h],ax
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: pnpdtest.exe
TRAP_FRAME: f199fb90 – (.trap 0xfffffffff199fb90)
ErrCode = 00000000
eax=00000001 ebx=84314700 ecx=843147dc edx=00000000 esi=d405315e
edi=4f1b2120
eip=8082311e esp=f199fc04 ebp=f199fc10 iopl=0 nv up ei pl nz na po
nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010202
nt!KeSetEvent+0x32:
8082311e 66394616 cmp word ptr [esi+16h],ax
ds:0023:d4053174=???
Resetting default scope
LAST_CONTROL_TRANSFER: from 8082311e to 8086c930
STACK_TEXT:
f199fb90 8082311e badb0d00 00000000 c4653600 nt!KiTrap0E+0x238
f199fc10 f78e42be 843147dc 00000000 00000000 nt!KeSetEvent+0x32
WARNING: Stack unwind information not available. Following frames may be
wrong.
f199fc40 80818095 00000000 8617f538 80a0d410 pnpfiltr+0x22be
f199fc50 808a770a 8617f5a8 85b8e2d8 8617f538 nt!IopfCallDriver+0x31
f199fc64 808a856d 862b9620 8617f538 85b8e2d8
nt!IopSynchronousServiceTail+0x60
f199fd00 808a10c2 00000708 00000000 00000000 nt!IopXxxControlFile+0x5c5
f199fd34 8086986c 00000708 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
f199fd34 7c90eb94 00000708 00000000 00000000 nt!KiFastCallEntry+0xfc
00e7fca4 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
pnpfiltr+22be
f78e42be 685c4f8ef7 push offset pnpfiltr+0x2f5c (f78e4f5c)
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: pnpfiltr+22be
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pnpfiltr
IMAGE_NAME: pnpfiltr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4549e30b
FAILURE_BUCKET_ID: 0xA_pnpfiltr+22be
BUCKET_ID: 0xA_pnpfiltr+22be