Operating System: Windows Server 2003, US English, with all current hotfixes
Burning Software: Ahead Nero 6.3.1.25
Anti-virus Software: McAfee VirusScan Enterprise 8.0i (buffer overrun protection disabled)
DAEMON Tools Version: 3.47
Hi,
I've experienced two crashes (BugChecks) after installing DT 3.47; I didn't have a single one with DT 3.46 which I ran much longer under the same OS installation. Minidumps were created for both crashes, and both show that DT called NtQueryKey (or ZwQueryKey) at IRQL != PASSIVE_LEVEL (it was in fact 2 = DISPATCH_LEVEL).
I can send you both minidumps if you like. Here are some information from one of them (by WinDBG's !analyze -- the bus driver was renamed during installation to cjbbusx.sys):
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 7fff0000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 805f54be, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 7fff0000
CURRENT_IRQL: 2
FAULTING_IP:
nt!NtQueryKey+18f
805f54be c70000000000 mov dword ptr [eax],0x0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from f744d833 to 805f54be
TRAP_FRAME: bab26c38 -- (.trap ffffffffbab26c38)
ErrCode = 00000002
eax=7fff0000 ebx=bab26d54 ecx=00000002 edx=00000001 esi=e395cc08 edi=00000000
eip=805f54be esp=bab26cac ebp=bab26d20 iopl=0 ov up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010a02
nt!NtQueryKey+0x18f:
805f54be c70000000000 mov dword ptr [eax],0x0 ds:0023:7fff0000=????????
Resetting default scope
STACK_TEXT:
bab26d20 f744d833 00000238 00000000 bab26d3c nt!NtQueryKey+0x18f
WARNING: Stack unwind information not available. Following frames may be wrong.
bab26d58 804e7a8c 00000238 00000000 00000000 cjbbusx+0xd833
bab26d58 7ffe0304 00000238 00000000 00000000 nt!KiSystemService+0xcb
0038f7b0 00000000 00000000 00000000 00000000 SharedUserData!SystemCallStub+0x4
FOLLOWUP_IP:
cjbbusx+d833
f744d833 ?? ???
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: cjbbusx+d833
MODULE_NAME: cjbbusx
IMAGE_NAME: cjbbusx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4128a01d
STACK_COMMAND: .trap ffffffffbab26c38 ; kb
BUCKET_ID: 0xA_W_cjbbusx+d833
Followup: MachineOwner
---------
If you want those minidumps, just say so!
Burning Software: Ahead Nero 6.3.1.25
Anti-virus Software: McAfee VirusScan Enterprise 8.0i (buffer overrun protection disabled)
DAEMON Tools Version: 3.47
Hi,
I've experienced two crashes (BugChecks) after installing DT 3.47; I didn't have a single one with DT 3.46 which I ran much longer under the same OS installation. Minidumps were created for both crashes, and both show that DT called NtQueryKey (or ZwQueryKey) at IRQL != PASSIVE_LEVEL (it was in fact 2 = DISPATCH_LEVEL).
I can send you both minidumps if you like. Here are some information from one of them (by WinDBG's !analyze -- the bus driver was renamed during installation to cjbbusx.sys):
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 7fff0000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 805f54be, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 7fff0000
CURRENT_IRQL: 2
FAULTING_IP:
nt!NtQueryKey+18f
805f54be c70000000000 mov dword ptr [eax],0x0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from f744d833 to 805f54be
TRAP_FRAME: bab26c38 -- (.trap ffffffffbab26c38)
ErrCode = 00000002
eax=7fff0000 ebx=bab26d54 ecx=00000002 edx=00000001 esi=e395cc08 edi=00000000
eip=805f54be esp=bab26cac ebp=bab26d20 iopl=0 ov up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010a02
nt!NtQueryKey+0x18f:
805f54be c70000000000 mov dword ptr [eax],0x0 ds:0023:7fff0000=????????
Resetting default scope
STACK_TEXT:
bab26d20 f744d833 00000238 00000000 bab26d3c nt!NtQueryKey+0x18f
WARNING: Stack unwind information not available. Following frames may be wrong.
bab26d58 804e7a8c 00000238 00000000 00000000 cjbbusx+0xd833
bab26d58 7ffe0304 00000238 00000000 00000000 nt!KiSystemService+0xcb
0038f7b0 00000000 00000000 00000000 00000000 SharedUserData!SystemCallStub+0x4
FOLLOWUP_IP:
cjbbusx+d833
f744d833 ?? ???
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: cjbbusx+d833
MODULE_NAME: cjbbusx
IMAGE_NAME: cjbbusx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4128a01d
STACK_COMMAND: .trap ffffffffbab26c38 ; kb
BUCKET_ID: 0xA_W_cjbbusx+d833
Followup: MachineOwner
---------
If you want those minidumps, just say so!
Comment