Kernel Mode Debugging - Scenario 1: Lighting up a third party driver
kd> !analyze -v
*******************************************************************************
* Bugcheck Analysis
*******************************************************************************
WORKER_THREAD_RETURNED_AT_BAD_IRQL (e1)
Arguments:
Arg1: 804219e4, address of worker routine (do ln on this to find guilty driver)
Arg2: 00000002, IRQL returned at (should have been 0, but isn't).
Arg3: 819b7328, workitem parameter
Arg4: 819b7328, workitem address
Debugging Details:
FAULTING_IP:
nt!IopProcessWorkItem+0
804219e4 8b442404 mov eax,dword ptr [esp+4]
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xE1
LAST_CONTROL_TRANSFER: from 80454faf to 80418c8e
STACK_TEXT:
f2453da8 80454faf 819b7328 00000000 00000000 nt!ExpWorkerThread+0xf3
f2453ddc 80468ec2 80418b84 00000001 00000000 nt!PspSystemThreadStartup+0x69
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!IopProcessWorkItem+0
804219e4 8b442404 mov eax,dword ptr [esp+4]
SYMBOL_NAME: nt!IopProcessWorkItem+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ad7ad60
FAILURE_BUCKET_ID: 0xE1_nt!IopProcessWorkItem+0
BUCKET_ID: 0xE1_nt!IopProcessWorkItem+0
Followup: MachineOwner
kd> dps 819b7328
819b7328 819b7368
819b732c 000012e6
819b7330 804219e4 nt!IopProcessWorkItem
819b7334 819b7328
819b7338 f21e3c40 ABC+0x3c40
819b733c 81a19030
819b7340 819b7328
819b7344 e1d7d128
819b7348 e1d7d140
819b734c c0000000
819b7350 00000000
819b7354 00000000
819b7358 00000000
819b735c 00310001
819b7360 02010002
819b7364 ee657645
819b7368 819a2c08
819b736c 00000000
819b7370 bad0b0b0
819b7374 02000000
819b7378 00000001
819b737c 00000000
819b7380 81044701
819b7384 00000000
819b7388 819b7388
819b738c 819b7388
819b7390 00000000
819b7394 00000000
819b7398 00000000
819b739c 00000000
819b73a0 02018002
819b73a4 64504443
kd> lmvm cdp
start end module name
f21e0000 f21ee200 ABC (no symbols)
Loaded symbol image file: ABC.sys
Image path: \SystemRoot\System32\DRIVERS\ABC.sys
Image name: ABC.sys
Timestamp: Tue Jan 08 15:21:57 2002 (3C3B7F15)
CheckSum: 000193A8
ImageSize: 0000E200
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
kd> .sympath+ c:\temp\symbols\scenario1
kd> .reload
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
kd> dps 819b7328
819b7328 819b7368
819b732c 000012e6
819b7330 804219e4 nt!IopProcessWorkItem
819b7334 819b7328
819b7338 f21e3c40 cdp!SendCDPPacketRoutine [d:\vob\fmm\ABC\driver\device.cpp @ 209]
819b733c 81a19030
819b7340 819b7328
819b7344 e1d7d128
819b7348 e1d7d140
819b734c c0000000
819b7350 00000000
819b7354 00000000
819b7358 00000000
819b735c 00310001
819b7360 02010002
819b7364 ee657645
819b7368 819a2c08
819b736c 00000000
819b7370 bad0b0b0
819b7374 02000000
819b7378 00000001
819b737c 00000000
819b7380 81044701
819b7384 00000000
819b7388 819b7388
819b738c 819b7388
819b7390 00000000
819b7394 00000000
819b7398 00000000
819b739c 00000000
819b73a0 02018002
819b73a4 64504443