阅读:2507回复:0
BSOD在mouclass.sys nt!IoCancelIrp+0x2c
我的driver是mouclass.sys 下的一hid.sys driver 但是插拔会BSOD. 有人有类似的经验或解决吗?
IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff9800250ad34, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003c2dc9c, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003eb20e0 fffff9800250ad34 CURRENT_IRQL: 2 FAULTING_IP: nt!IoCancelIrp+2c fffff800`03c2dc9c c6434401 mov byte ptr [rbx+44h],1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff880045d65c0 -- (.trap 0xfffff880045d65c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000002 rbx=0000000000000000 rcx=fffff80003df5560 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003c2dc9c rsp=fffff880045d6750 rbp=fffff9800e182fb0 r8=fffff9800250ad00 r9=0000000000000000 r10=fffff9800250acf0 r11=000000000000000b r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!IoCancelIrp+0x2c: fffff800`03c2dc9c c6434401 mov byte ptr [rbx+44h],1 ds:2fb0:00000000`00000044=?? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003c7b469 to fffff80003c7bf00 STACK_TEXT: fffff880`045d6478 fffff800`03c7b469 : 00000000`0000000a fffff980`0250ad34 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`045d6480 fffff800`03c7a0e0 : 00000000`0192a680 fffff980`0250acf0 00000000`00000003 fffff800`03ca8e28 : nt!KiBugCheckDispatch+0x69 fffff880`045d65c0 fffff800`03c2dc9c : fffffa80`036df850 fffff980`0250acf0 fffff980`0e182fb0 00000000`00000000 : nt!KiPageFault+0x260 fffff880`045d6750 fffff880`05223e1b : 00000000`00000000 fffffa80`03d92390 fffffa80`03d92390 fffffa80`03d92240 : nt!IoCancelIrp+0x2c fffff880`045d6790 fffff880`05224331 : fffffa80`00000001 fffff980`0e182d30 fffff980`0e182fb0 fffffa80`03d92390 : mouclass!MouseClassRemoveDevice+0x37 fffff880`045d67c0 fffff800`04121c16 : fffff980`0e182d30 00000000`00000002 fffffa80`03d92240 fffffa80`047e62f0 : mouclass!MousePnP+0x17d fffff880`045d6820 fffff800`03ee7419 : fffffa80`03d92240 00000000`c00000bb fffff880`045d6938 fffffa80`047e62f0 : nt!IovCallDriver+0x566 fffff880`045d6880 fffff800`04065391 : fffffa80`03caa060 00000000`00000000 fffffa80`03cd99d0 00000000`00000801 : nt!IopSynchronousCall+0xc5 fffff880`045d68f0 fffff800`03d7bb93 : fffff8a0`018c5780 fffff8a0`018c5780 00000000`00000016 00000000`00000000 : nt!IopRemoveDevice+0x101 fffff880`045d69b0 fffff800`04064ee4 : fffffa80`03cd99d0 00000000`00000000 00000000`00000002 00000000`00000018 : nt!PnpRemoveLockedDeviceNode+0x1a3 fffff880`045d6a00 fffff800`04064ff0 : 00000000`00000000 fffff8a0`0217f301 fffff8a0`021838c0 ffffed06`c7023955 : nt!PnpDeleteLockedDeviceNode+0x44 fffff880`045d6a30 fffff800`040f54d4 : 00000000`00000002 00000000`00000000 fffffa80`03cd99d0 fffff8a0`00000000 : nt!PnpDeleteLockedDeviceNodes+0xa0 fffff880`045d6aa0 fffff800`040f5b2c : fffff880`00000000 00000000`00010200 fffff880`045d6c00 00000000`00000000 : nt!PnpProcessQueryRemoveAndEject+0xc34 fffff880`045d6be0 fffff800`03fe0c48 : 00000000`00000000 fffffa80`047e50d0 fffff8a0`0201c010 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0x4c fffff880`045d6c10 fffff800`03c89161 : fffff800`03ee6fc0 fffff8a0`0217f380 fffff800`03e1f5f8 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x5abab fffff880`045d6c70 fffff800`03f1f166 : 95e58b00`172000e3 fffffa80`0192a680 00000000`00000080 fffffa80`0184eb30 : nt!ExpWorkerThread+0x111 fffff880`045d6d00 fffff800`03c5a486 : fffff880`009e7180 fffffa80`0192a680 fffff880`009f1f40 9d9b9a42`4b7e68b7 : nt!PspSystemThreadStartup+0x5a fffff880`045d6d40 00000000`00000000 : fffff880`045d7000 fffff880`045d1000 fffff880`045d5fc0 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: mouclass!MouseClassRemoveDevice+37 fffff880`05223e1b 488b0b mov rcx,qword ptr [rbx] SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: mouclass!MouseClassRemoveDevice+37 FOLLOWUP_NAME: MachineOwner MODULE_NAME: mouclass IMAGE_NAME: mouclass.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc116 FAILURE_BUCKET_ID: X64_0xA_VRF_mouclass!MouseClassRemoveDevice+37 BUCKET_ID: X64_0xA_VRF_mouclass!MouseClassRemoveDevice+37 Followup: MachineOwner |
|