So, I’m trying to do the right thing, and set up WPP tracing in my driver.
However, I’ve already hit about 5 bugchecks in this debugging session, and
that’s WITHOUT any of my device drivers even loaded. An example follows.
This is a Windows XP machine, SP2 and all WU-supplied patches. Any clues
would be appreciated. Again, this is WITHOUT any of my code loaded on the
machine – everything else is stock XP drivers. I can supply dump files, if
necessary.
– arlie
kd> !analyze -v
****************************************************************************
***
*
*
* Bugcheck Analysis
*
*
*
****************************************************************************
***
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by
try-except,
it must be protected by a Probe. Typically the address is just plain bad or
it
is pointing at freed memory.
Arguments:
Arg1: eeb76c98, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 805f9872, If non-zero, the instruction address which referenced the
bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
READ_ADDRESS: eeb76c98
FAULTING_IP:
nt!WmipForwardWmiIrp+6c
805f9872 ff10 call dword ptr [eax]
MM_INTERNAL_CODE: 0
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
LAST_CONTROL_TRANSFER: from 804f780d to 80526da8
STACK_TEXT:
b88e9384 804f780d 00000003 eeb76c98 00000000
nt!RtlpBreakWithStatusInstruction
b88e93d0 804f83fa 00000003 00000000 c0775bb0 nt!KiBugCheckDebugBreak+0x19
b88e97b0 804f8925 00000050 eeb76c98 00000000 nt!KeBugCheck2+0x574
b88e97d0 8051bf07 00000050 eeb76c98 00000000 nt!KeBugCheckEx+0x1b
b88e9830 8053f6ec 00000000 eeb76c98 00000000 nt!MmAccessFault+0x8e7
b88e9830 805f9872 00000000 eeb76c98 00000000 nt!KiTrap0E+0xcc
b88e98f4 805f9a4d 86c3ee28 00000004 00000000 nt!WmipForwardWmiIrp+0x6c
b88e9920 805f6f1e 00000004 eeb76c98 b88e9aa4 nt!WmipSendWmiIrp+0x59
b88e9950 805f7133 00000004 e14544dc b88e9a8c nt!WmipDeliverWnodeToDS+0x2e
b88e9ad0 805f727a 00000004 e147f04c 00000001
nt!WmipSendEnableDisableRequest+0x1b7
b88e9afc 805f74d0 e147f05c 00000004 e147f001 nt!WmipSendEnableRequest+0x72
b88e9b2c 805f770f e147f001 00224148 b88e9b73
nt!WmipEnableCollectOrEvent+0xb2
b88e9b64 805fa4bc 00224148 00ed6738 865ae9f0 nt!WmipEnableDisableTrace+0x1a9
b88e9c10 804eddf9 865ae9f0 86ac2e48 806d02e8 nt!WmipIoControl+0x3ea
b88e9c20 8064b5a8 864ae230 806d02d0 86ac2e48 nt!IopfCallDriver+0x31
b88e9c44 80573b3a 86ac2fd8 85867e98 86ac2e48 nt!IovCallDriver+0xa0
b88e9c58 805749c9 865ae9f0 86ac2e48 85867e98
nt!IopSynchronousServiceTail+0x60
b88e9d00 8056d326 000004c8 000004c4 00000000 nt!IopXxxControlFile+0x5e7
b88e9d34 8053c808 000004c8 000004c4 00000000 nt!NtDeviceIoControlFile+0x2a
b88e9d34 7c90eb94 000004c8 000004c4 00000000 nt!KiFastCallEntry+0xf8
0006f8b4 7c90d8ef 7c8016be 000004c8 000004c4 ntdll!KiFastSystemCallRet
0006f8b8 7c8016be 000004c8 000004c4 00000000 ntdll!ZwDeviceIoControlFile+0xc
0006f918 77dfd310 000004c8 00224148 0006f9a8 kernel32!DeviceIoControl+0x78
0006f960 77e0615a 00000000 00224148 0006f9a8
ADVAPI32!WmipSendWmiKMRequest+0xad
0006f9f4 77e2a437 0006fa60 00000001 00000000
ADVAPI32!WmipNotificationRegistration+0xe9
0006fa8c 01027ca3 00000001 00000003 00000002 ADVAPI32!EnableTrace+0x1fb
0006fae8 01028bfc 0000ffff 00000000 00000003
traceview!CLogSession::UpdateOrEnableTracing+0xcf
0006fb4c 0101dc38 00000000 009ca6c0 009ca318
traceview!CLogSession::BeginTrace+0x6a8
0006fb7c 0102eda0 00000000 0027a900 01008838
traceview!CDisplayDlg::BeginTrace+0xe9
0006fbb4 01030302 009ca318 72832680 01008838
traceview!CMainFrame::AddModifyLogSession+0x269
0006fbbc 72832680 01008838 00000111 0006fbfc
traceview!CMainFrame::OnFileNewLogSession+0x7
0006fbcc 728325f7 0027a900 00000083 00000000 MFC42u!_AfxDispatchCmdMsg+0x82
0006fbfc 72832aee 00000083 00000000 00000000
MFC42u!CCmdTarget::OnCmdMsg+0x10a
0006fc2c 7283339e 00000083 00000000 00000000 MFC42u!CFrameWnd::OnCmdMsg+0x53
0006fc7c 72833451 00000000 00000000 0027a900 MFC42u!CWnd::OnCommand+0x53
0006fc94 72831ce0 00000083 00000000 0027a900
MFC42u!CFrameWnd::OnCommand+0x73
0006fd14 72831c8a 00000111 00000083 00000000 MFC42u!CWnd::OnWndMsg+0x2f
0006fd34 72831bf4 00000111 00000083 00000000 MFC42u!CWnd::WindowProc+0x24
0006fd94 72831b47 0027a900 00000000 00000111 MFC42u!AfxCallWndProc+0x91
0006fdb4 728c724e 0007010e 00000111 00000083 MFC42u!AfxWndProc+0x36
0006fde0 77d48734 0007010e 00000111 00000083 MFC42u!AfxWndProcBase+0x39
0006fe0c 77d48816 728c7215 0007010e 00000111 USER32!InternalCallWinProc+0x28
0006fe74 77d489cd 00000000 728c7215 0007010e
USER32!UserCallWinProcCheckWow+0x150
0006fed4 77d48a10 01058544 00000000 01058544
USER32!DispatchMessageWorker+0x306
0006fee4 72831327 01058544 00000001 01058510 USER32!DispatchMessageW+0xf
0006fef4 7283f7b2 01058510 01058510 0006ffc0
MFC42u!CWinThread::PumpMessage+0x3c
0006ff0c 7284258d ffffffff 00000002 7ffdf000 MFC42u!CWinThread::Run+0x48
0006ff1c 01045c28 01000000 00000000 000206da MFC42u!AfxWinMain+0x6a
0006ffc0 7c816d4f 0000001a 00000000 7ffdf000
traceview!wWinMainCRTStartup+0x199
0006fff0 00000000 01045a8f 00000000 78746341 kernel32!BaseProcessStart+0x23
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!WmipForwardWmiIrp+6c
805f9872 ff10 call dword ptr [eax]
FAULTING_SOURCE_CODE:
SYMBOL_STACK_INDEX: 6
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!WmipForwardWmiIrp+6c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlpa.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 42250a1d
FAILURE_BUCKET_ID: 0x50_VRF_nt!WmipForwardWmiIrp+6c
BUCKET_ID: 0x50_VRF_nt!WmipForwardWmiIrp+6c