Ok, so “!analyze -v” shows me some information, but not enough to make
progress. A code review didnt show any mis-usage of spin locks or events.
The memory location at fault when disassembeled gives me a pointer to NT
code which by itself without a meaningful stacktrace in which *my driver* is
present, makes no sense to me. “kv” gives me no FPO/trap frame information
so I cannot change the context record to point to one of my interest. There
has to be another way to get a menaingful stack, if you dont have a trap
frame address, right??.
Any help appreciated!
-Johnny
=====
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pagable (or completely invalid) address at
an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000016, memory referenced
Arg2: 0000001c, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8042b0c1, address which referenced memory
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: A
LAST_CONTROL_TRANSFER: from 8042a94a to 80453e90
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be
wrong.
f24ab928 8042a94a 00000003 00000016 8042b0c1 nt!DbgBreakPointWithStatus+0x4
f24abcb4 80466f7c 00000000 00000016 0000001c nt!KeBugCheckEx+0x390
f24abcd0 804681d9 f24abcf4 00000000 820216e0 nt!Kei386EoiHelper+0x2ae4
00000246 00000000 00000000 00000000 00000000 nt!KiUnexpectedInterrupt+0x29f
FOLLOWUP_IP:
nt!DbgBreakPointWithStatus+4
80453e90 cc int 3
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!DbgBreakPointWithStatus+4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp
STACK_COMMAND: kb
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
1: kd> u 8042b0c1
nt!KeSetEvent+31:
8042b0c1 66394616 cmp [esi+0x16],ax
8042b0c5 7511 jnz nt!KeSetEvent+0x48 (8042b0d8)
8042b0c7 0fb75614 movzx edx,word ptr [esi+0x14]
8042b0cb ff750c push dword ptr [ebp+0xc]
8042b0ce 8b4e08 mov ecx,[esi+0x8]
8042b0d1 e8c2740000 call nt!ZwYieldExecution+0x1f90 (80432598)
8042b0d6 eb0f jmp nt!KeSetEvent+0x57 (8042b0e7)
8042b0d8 85ff test edi,edi
=====
>From: “Gary G. Little”
> >Reply-To: “NT Developers Interest List”
> >To: “NT Developers Interest List”
> >Subject: [ntdev] Re: 0xa bugcheck
> >Date: Tue, 12 Mar 2002 08:13:54 -0800
> >
> >My suggestion is to subscribe … It’s easy … and it’s free … well
>…
> >you do have to pay of a computer which isn’t free … or borrow someone’s
> >… or use someone’s … and you or they do have to have access to an ISP
> >… which isn’t free … oh never mind …
> >
> >Try running !analyze -v. If on SMP try “0kb/v” and or “1kb/v”.
> >
> >Barring that, who is at 8042CCA2 that was trying to access address 16?
> >
> >ewwwww … stinky …
> > ntoskrnl!KiReleaseSpinLock makes me wonder if you might not have an
> >un-initialized spin lock that you have attempted to access, or perhaps
>you
> >are passing a bogus spinlock address to KeReleaseSpinlock.
> >–
> >Gary G. Little
> >xxxxx@broadstor.com
> >xxxxx@inland.net
> >
> >“Johnny D” wrote in message news:xxxxx@ntdev…
> > >
> > > I got a 0xa bugcheck such as the following. I am unable to get a
>useful
> >trap
> > > frame address by doing “kv”, and so cannot do !trap to
> >get
> > > true frame. Is there some known way of getting around this. Please
> >include
> > > me in all your replies as I not subscribed directly.
> > >
> > > Thanks
> > > -Johnny
> > >
> > >
> > > *** Fatal System Error: 0x0000000a
> > > (0x00000016,0x00000002,0x00000000,0x8042CCA2)
> > >
> > >
> > > i386kd: A fatal system error has occurred.
> > > i386kd: Debugger entered on first try; Bugcheck callbacks have not
>been
> > > invoked.
> > >
> > >
> > > i386kd: A fatal system error has occurred.
> > >
> > > ntoskrnl!DbgBreakPointWithStatus+4:
> > > 80455994 cc int 3
> > > eax=00000003 ebx=0000000a ecx=f74c3dcc edx=00000000 esi=00000016
> > > edi=f74c3940
> > > eip=80455994 esp=f74c38fc ebp=f74c3928 iopl=0 nv up ei pl zr
>na
> >po
> > > nc
> > > cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
> > > efl=00000246
> > > ntoskrnl!DbgBreakPointWithStatus+4:
> > > 80455994 cc int 3
> > > ChildEBP RetAddr Args to Child
> > > f74c3928 8042c2bb 00000003 00000016 8042cca2
> > > ntoskrnl!DbgBreakPointWithStatus+0x
> > > 4
> > > f74c3cb4 80467e7f 00000000 00000016 00000002
>ntoskrnl!KeBugCheckEx+0x169
> > > f74c3cd0 804024d7 f74c3cf4 00000000 813903a0
> >ntoskrnl!Kei386EoiHelper+0x2ac9
> > > 00000246 00000000 00000000 00000000 00000000
> > > ntoskrnl!KiReleaseSpinLock+0x1c7
> > > 80481b20 0000000a 00000016 00000002 00000000
> > > 80481b30 8042cca2
> > >
> > >
> > >
> > > MSN Photos is the easiest way to share and print your photos:
> > > http://photos.msn.com/support/worldwide.aspx
> > >
> > >
> > >
> >
> >
> >
> >—
> >You are currently subscribed to ntdev as: xxxxx@hotmail.com
> >To unsubscribe send a blank email to %%email.unsub%%
>
>
>
>Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.
_________________________________________________________________
Send and receive Hotmail on your mobile device: http://mobile.msn.com