Hi,
I am doing a CCID implementation within embedded device. I am running into BSOD
on the XP (SP3) when sending back the ATR from the card.
Can anybody help me what can go wrong here?
Thanks,
BugCheck 50, {aef3c000, 0, b03732f1, 0}
*** ERROR: Module load completed but symbols could not be loaded for USBlyzer.sys
Probably caused by : usbccid.sys ( usbccid!UsbScReadWrite+f9 )
Followup: MachineOwner
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: aef3c000, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: b03732f1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
READ_ADDRESS: aef3c000
FAULTING_IP:
usbccid!UsbScReadWrite+f9
b03732f1 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
MM_INTERNAL_CODE: 0
IMAGE_NAME: usbccid.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 448ff89b
MODULE_NAME: usbccid
FAULTING_MODULE: b0372000 usbccid
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: scardsvr.exe
TRAP_FRAME: aef3b920 -- (.trap 0xffffffffaef3b920)
ErrCode = 00000000
eax=0f000000 ebx=aef3ba28 ecx=03bffe8d edx=a6380001 esi=aef3bffe edi=8903186c
eip=b03732f1 esp=aef3b994 ebp=aef3b9d4 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
usbccid!UsbScReadWrite+0xf9:
b03732f1 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope
LAST_CONTROL_TRANSFER: from 805241e0 to 80533846
STACK_TEXT:
aef3b8bc 805241e0 00000050 aef3c000 00000000 nt!KeBugCheckEx+0x1b
aef3b908 804e172b 00000000 aef3c000 00000000 nt!MmAccessFault+0x6f5
aef3b908 b03732f1 00000000 aef3c000 00000000 nt!KiTrap0E+0xcc
aef3b9d4 b0373c11 88de18d0 aef3ba14 aef3ba28 usbccid!UsbScReadWrite+0xf9
aef3ba90 afc850f2 88de18d0 8910a2e8 88de18d0 usbccid!UsbScCardPower+0x17b
aef3baac afc84651 88de18d0 8910a2e8 89824700 SMCLIB!SmartcardDeviceIoControl+0x7ee
aef3bbd8 b037685a 00000003 0110a2e8 00000038 SMCLIB!SmartcardDeviceControl+0x123
aef3bc18 b8e9b682 88de1810 8910a2e8 89232e38 usbccid!ScUtil_DeviceIOControl+0xa0
WARNING: Stack unwind information not available. Following frames may be wrong.
aef3bc34 804e3807 88de1810 88c9ea90 806f02d0 USBlyzer+0x1682
aef3bc44 80567f71 8910a40c 89232e38 8910a2e8 nt!IopfCallDriver+0x31
aef3bc58 8057ac7f 88de1810 8910a2e8 89232e38 nt!IopSynchronousServiceTail+0x70
aef3bd00 805883d4 00000158 000000d8 00000000 nt!IopXxxControlFile+0x611
aef3bd34 804de7ec 00000158 000000d8 00000000 nt!NtDeviceIoControlFile+0x2a
aef3bd34 7c90e514 00000158 000000d8 00000000 nt!KiFastCallEntry+0xf8
006efe08 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
usbccid!UsbScReadWrite+f9
b03732f1 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbccid!UsbScReadWrite+f9
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: 0x50_usbccid!UsbScReadWrite+f9
BUCKET_ID: 0x50_usbccid!UsbScReadWrite+f9