Hi All,
I got a bug check when I was testing with my wdf driver with WdfTester. The crash dump shows the crash due to a DbgPrint in wdftester. Somebody please help me with some suggestions as to what could be the reason?
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 86e00265, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82a99b1e, address which referenced memory
Debugging Details:
READ_ADDRESS: 86e00265
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlUnicodeToMultiByteN+f2
82a99b1e 8a1c33 mov bl,byte ptr [ebx+esi]
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: 8078a4b0 – (.trap 0xffffffff8078a4b0)
ErrCode = 00000000
eax=8078a54c ebx=00000043 ecx=8078a7ca edx=00000001 esi=86e00222 edi=00000001
eip=82a99b1e esp=8078a524 ebp=8078a530 iopl=0 nv up ei ng nz ac po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010293
nt!RtlUnicodeToMultiByteN+0xf2:
Page 28842 not present in the dump file. Type “.hh dbgerr004” for details
82a99b1e 8a1c33 mov bl,byte ptr [ebx+esi] ds:0023:86e00265=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 82a99b1e to 8287e82b
STACK_TEXT:
8078a4b0 82a99b1e badb0d00 00000001 8078a4f8 nt!KiTrap0E+0x2cf
8078a530 828412c4 8078a7d8 00000006 8078a560 nt!RtlUnicodeToMultiByteN+0xf2
8078a554 82841250 8078a5a0 00000001 00000006 nt!_wctomb_s_l+0x6a
8078a570 828fbfd7 8078a5a0 8078a7d8 00000006 nt!wctomb_s+0x18
8078a7e4 828fc611 8078a808 a9d9fc1a 00000000 nt!_output_l+0x833
8078a828 828fc11a 8078a8a8 000001ff a9d9fc18 nt!_vsnprintf_l+0x72
8078a844 828fc66e 8078a8a8 000001ff a9d9fc18 nt!_vsnprintf+0x18
8078a864 828fb525 a9d9fc18 8078aaf4 acaa0b9e nt!RtlStringCbVPrintfA+0x30
8078aac8 8283928e 00000065 00000003 a9d9fc18 nt!vDbgPrintExWithPrefixInternal+0x88
8078aae8 a9d91608 a9d9fc18 a9691da8 a9d9b29e nt!DbgPrint+0x1d
8078ab28 81e02fe6 84b8f9d0 769f65f8 8078ab6c wdftester!wdftester_WdfWorkItemEnqueue+0x6a
8078ab38 81e0a900 769f65f8 00220004 8078ab74 SrBtPort!WdfWorkItemEnqueue+0x16 [tools\wdk\7600.16385.0\inc\wdf\kmdf\1.9\wdfworkitem.h @ 136]
8078ab6c 84248317 70574d38 590f0c90 84b9ffa4 SrBtPort!EvtSrSendIoctlToRemoteIOTargetCompletionRoutineForRx+0x490
8078ab98 8422cc36 b0130e90 a6f0f368 00000000 Wdf01000!FxRequestBase::CompleteSubmitted+0xf6
8078abb4 8422ccde 01a8b2c0 a6f2f140 8078abec Wdf01000!FxIoTarget::RequestCompletionRoutine+0x12d
8078abc4 828c18b6 00000000 b0130e90 8fa8b2c0 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x35
8078abec 82b67cd4 00000000 b0130e90 a6f2f140 nt!IopUnloadSafeCompletion+0x45
8078ac1c 828a0b33 00000000 b0130e90 8078ac94 nt!IovpLocalCompletionRoutine+0x14b
8078ac64 82b67b64 00000000 95f13970 8427bc00 nt!IopfCompleteRequest+0x128
8078accc 84245d6b 95f13970 0000000d 00000000 nt!IovCompleteRequest+0x133
8078acf4 84238757 00000000 00000000 95f13a48 Wdf01000!FxRequest::CompleteInternal+0x379
8078ad10 92cd1c79 00000002 95f13970 00000000 Wdf01000!imp_WdfRequestComplete+0x108
WARNING: Stack unwind information not available. Following frames may be wrong.
8078ad44 84248317 6a0ec688 6dc4f928 86db939c srusb+0x2c79
8078ad70 8422cc36 b0130e90 923b06d0 00000000 Wdf01000!FxRequestBase::CompleteSubmitted+0xf6
8078ad8c 8422ccde 01f13970 923f5d10 8078adc4 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x12d
8078ad9c 828c18b6 922e8020 b0130e90 95f13970 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x35
8078adc4 82b67cd4 922e8020 b0130e90 923f5d10 nt!IopUnloadSafeCompletion+0x45
8078adf4 828a0b33 922e8020 b0130e90 8078ae68 nt!IovpLocalCompletionRoutine+0x14b
8078ae38 82b67b64 8c5900f0 84bbe1f8 8c590028 nt!IopfCompleteRequest+0x128
8078aea0 8f1ac868 82878354 84bbe1f8 00000000 nt!IovCompleteRequest+0x133
8078aed0 8f1ad178 89638258 b0130e90 86db93e4 USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x6e0
8078aefc 8f1b09af 8c590028 8c5900f0 8c590a98 USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x33b
8078af24 8f1aad18 8c590028 8c590a98 8c590002 USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xbc
8078af48 828a03b5 8c590aa4 8c590002 00000000 USBPORT!USBPORT_Xdpc_Worker+0x173
8078afa4 828a0218 82961d20 8fbe23b8 00000000 nt!KiExecuteAllDpcs+0xf9
8078aff4 8289f9dc acea44fc 00000000 00000000 nt!KiRetireDpcList+0xd5
8078aff8 acea44fc 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c
8289f9dc 00000000 0000001a 00d6850f bb830000 0xacea44fc
STACK_COMMAND: kb
FOLLOWUP_IP:
wdftester!wdftester_WdfWorkItemEnqueue+6a
a9d91608 83c40c add esp,0Ch
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: wdftester!wdftester_WdfWorkItemEnqueue+6a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: wdftester
IMAGE_NAME: wdftester.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc82f
FAILURE_BUCKET_ID: 0xA_VRF_wdftester!wdftester_WdfWorkItemEnqueue+6a
BUCKET_ID: 0xA_VRF_wdftester!wdftester_WdfWorkItemEnqueue+6a