Serial port problems: DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

Hi friends,

I am running a software application on a Windows XP 32 bits computer and
using an USB-to-RS232 cable converter (TRENDNET model TU-S9) to
communicate with an I/O external module. Every 4 hours 10 minutes, the software
crashes and the computer reboots. The Minidump files indicate a problem with the USB-to-RS232 converter. Moreover, the problem disappears when I
communicate the computer with the I/O module directly through an RS232
port. Minidump files seem to indicate something is wrong with ser2pl.sys
and serenum.sys drivers. Among other things, Bugcheck Analysis says DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) and Probably caused by : ser2pl.sys ( ser2pl+97f0 ). I upgraded ser2pl.sys to the last available version, as suggested by TRENDNET tech support, but the problem doesn´t dissappear. I have copied below and attached two .dmp files, one generated before and the other after driver update. They are a bit different. Any help will be very appreciated.
Thanks.

### minidump before driver update ###


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini082311-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Tue Aug 23 19:40:01.718 2011 (UTC - 3:00)
System Uptime: 10 days 18:47:22.302
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
..........................................................
Loading User Symbols
Loading unloaded module list
...................
Unable to load image ser2pl.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ser2pl.sys
*** ERROR: Module load completed but symbols could not be loaded for ser2pl.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {60, 2, 0, f879f7f0}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*** WARNING: Unable to verify timestamp for serenum.sys
*** ERROR: Module load completed but symbols could not be loaded for serenum.sys
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
Probably caused by : ser2pl.sys ( ser2pl+97f0 )

Followup: MachineOwner
---------

kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000060, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: f879f7f0, address which referenced memory

Debugging Details:
------------------

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************

ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

MODULE_NAME: ser2pl

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 42e0acfd

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
00000060

CURRENT_IRQL: 2

FAULTING_IP:
ser2pl+97f0
f879f7f0 8b4760 mov eax,dword ptr [edi+60h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

LAST_CONTROL_TRANSFER: from f879f9d4 to f879f7f0

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
f3fe3a78 f879f9d4 822502d0 81d9a238 00000001 ser2pl+0x97f0
f3fe3aa4 f8796617 822502d0 00000001 82250560 ser2pl+0x99d4
f3fe3ac0 f879686f 82250388 ff644cb8 82250388 ser2pl+0x617
f3fe3af8 f8798eaf 82250300 82291d78 82292848 ser2pl+0x86f
f3fe3bec 804e3d77 822502d0 ff644bb8 ff644bb8 ser2pl+0x2eaf
f3fe3c10 f89eaac6 82291cc0 00644bb8 81f31720 nt+0xcd77
f3fe3c34 804e3d77 82291cc0 00000000 806ef2d0 serenum+0xac6
f3fe3c58 8057d9f7 82291cc0 ff644bb8 81d84320 nt+0xcd77
f3fe3d00 8057fbfa 00000080 00000084 00000000 nt+0xa69f7
f3fe3d34 804df06b 00000080 00000084 00000000 nt+0xa8bfa
f3fe3d64 7c91eb94 badb0d00 0121fca0 f3fe3d98 nt+0x806b
f3fe3d68 badb0d00 0121fca0 f3fe3d98 f3fe3dcc 0x7c91eb94
f3fe3d6c 0121fca0 f3fe3d98 f3fe3dcc 00000000 0xbadb0d00
f3fe3d70 f3fe3d98 f3fe3dcc 00000000 00000000 0x121fca0
f3fe3d74 f3fe3dcc 00000000 00000000 00000000 0xf3fe3d98
f3fe3d98 00000000 7c91eb94 0121fc98 00000000 0xf3fe3dcc


STACK_COMMAND: kb

FOLLOWUP_IP:
ser2pl+97f0
f879f7f0 8b4760 mov eax,dword ptr [edi+60h]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: ser2pl+97f0

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: ser2pl.sys

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner
---------

kd> lmvm ser2pl
start end module name
f8796000 f87a1e00 ser2pl T (no symbols)
Loaded symbol image file: ser2pl.sys
Image path: ser2pl.sys
Image name: ser2pl.sys
Timestamp: Fri Jul 22 05:23:25 2005 (42E0ACFD)
CheckSum: 00019B64
ImageSize: 0000BE00
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
kd> lmvm nt
start end module name
804d7000 806ec100 nt T (no symbols)
Loaded symbol image file: ntoskrnl.exe
Image path: ntoskrnl.exe
Image name: ntoskrnl.exe
Timestamp: Wed Aug 04 03:19:48 2004 (41108004)
CheckSum: 0021F9C6
ImageSize: 00215100
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4






### minidump after driver update ###


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\BS SYSTEMS\PROYECTOS\Proyecto001_cortinas con cambios en mapeoIO\Mini082711-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Sat Aug 27 18:13:34.250 2011 (UTC - 3:00)
System Uptime: 0 days 4:28:13.843
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
..........................................................
Loading User Symbols
Loading unloaded module list
............
Unable to load image ser2pl.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ser2pl.sys
*** ERROR: Module load completed but symbols could not be loaded for ser2pl.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {60, 2, 0, f451a525}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*** WARNING: Unable to verify timestamp for serenum.sys
*** ERROR: Module load completed but symbols could not be loaded for serenum.sys
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
Probably caused by : ser2pl.sys ( ser2pl+a525 )

Followup: MachineOwner
---------

kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000060, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: f451a525, address which referenced memory

Debugging Details:
------------------

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************

ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

MODULE_NAME: ser2pl

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4dba5a2d

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
00000060

CURRENT_IRQL: 2

FAULTING_IP:
ser2pl+a525
f451a525 8b4860 mov ecx,dword ptr [eax+60h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

LAST_CONTROL_TRANSFER: from f451a713 to f451a525

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
f3308b08 f451a713 821b0650 81e88158 00000001 ser2pl+0xa525
f3308b30 f4511197 821b0650 00000001 821b08e0 ser2pl+0xa713
f3308b4c f45113eb 821b0708 f8c96ee0 821b0708 ser2pl+0x1197
f3308b84 f4513be2 821b0700 f3c4d8f5 8225c368 ser2pl+0x13eb
f3308bec 804e3d77 821b0600 f8c96de0 f8c96de0 ser2pl+0x3be2
f3308c10 f89deac6 8225c2b0 00c96de0 81e8ed90 nt+0xcd77
f3308c34 804e3d77 8225c2b0 00000000 806ef2d0 serenum+0xac6
f3308c58 8057d9f7 8225c2b0 f8c96de0 82118ef8 nt+0xcd77
f3308d00 8057fbfa 00000080 00000084 00000000 nt+0xa69f7
f3308d34 804df06b 00000080 00000084 00000000 nt+0xa8bfa
f3308d64 7c91eb94 badb0d00 0121fca0 f3308d98 nt+0x806b
f3308d68 badb0d00 0121fca0 f3308d98 f3308dcc 0x7c91eb94
f3308d6c 0121fca0 f3308d98 f3308dcc 00000000 0xbadb0d00
f3308d70 f3308d98 f3308dcc 00000000 00000000 0x121fca0
f3308d74 f3308dcc 00000000 00000000 00000000 0xf3308d98
f3308d98 00000000 7c91eb94 0121fcb0 00000001 0xf3308dcc


STACK_COMMAND: kb

FOLLOWUP_IP:
ser2pl+a525
f451a525 8b4860 mov ecx,dword ptr [eax+60h]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: ser2pl+a525

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: ser2pl.sys

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner
---------

kd> lmvm ser2pl
start end module name
f4510000 f4521000 ser2pl T (no symbols)
Loaded symbol image file: ser2pl.sys
Image path: ser2pl.sys
Image name: ser2pl.sys
Timestamp: Fri Apr 29 03:26:53 2011 (4DBA5A2D)
CheckSum: 000104E9
ImageSize: 00011000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
kd> lmvm nt
start end module name
804d7000 806ec100 nt T (no symbols)
Loaded symbol image file: ntoskrnl.exe
Image path: ntoskrnl.exe
Image name: ntoskrnl.exe
Timestamp: Wed Aug 04 03:19:48 2004 (41108004)
CheckSum: 0021F9C6
ImageSize: 00215100
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 

Attachments

  • minidump before.txt
    23.8 KB · Views: 0
  • minidump after.txt
    23.8 KB · Views: 0
Tmagic650,

With respect to XP, it has SP 2. I´ll upgrade it now.

How can I check the memory for errors? I´m just using RamBooster for monitoring the memory availability.

Thanks!
 
Serial port problems: DRIVER_IRQL_NOT_LESS_OR_EQUAL

That´s me again,

I have eliminated a few error messages in the .dmp files related to the symbols. So, the more clear .dmp files are copied below.


### BEFORE UPDATING ser2pl.sys DRIVER ###


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini082311-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

WARNING: Whitespace at end of path element
Symbol search path is: ...

Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_rtm.040803-2158
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Tue Aug 23 19:40:01.718 2011 (UTC - 3:00)
System Uptime: 10 days 18:47:22.302
Loading Kernel Symbols
.................................................. .............
.................................................. ........
Loading User Symbols
Loading unloaded module list
...................
Unable to load image ser2pl.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ser2pl.sys
*** ERROR: Module load completed but symbols could not be loaded for

ser2pl.sys
************************************************** ************************

*****
*

*
* Bugcheck Analysis

*
*

*
************************************************** ************************

*****

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {60, 2, 0, f879f7f0}

Probably caused by : ser2pl.sys ( ser2pl+97f0 )

Followup: MachineOwner
---------

kd> !analyze -v
************************************************** ************************

*****
*

*
* Bugcheck Analysis

*
*

*
************************************************** ************************

*****

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address

at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000060, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: f879f7f0, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: 00000060

CURRENT_IRQL: 2

FAULTING_IP:
ser2pl+97f0
f879f7f0 8b4760 mov eax,dword ptr [edi+60h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: Proyecto001.exe

LAST_CONTROL_TRANSFER: from f879f9d4 to f879f7f0

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be

wrong.
f3fe3a78 f879f9d4 822502d0 81d9a238 00000001 ser2pl+0x97f0
f3fe3aa4 f8796617 822502d0 00000001 82250560 ser2pl+0x99d4
f3fe3ac0 f879686f 82250388 ff644cb8 82250388 ser2pl+0x617
f3fe3af8 f8798eaf 82250300 82291d78 82292848 ser2pl+0x86f
f3fe3bec 804e3d77 822502d0 ff644bb8 ff644bb8 ser2pl+0x2eaf
f3fe3bfc f89ea8b7 82291d78 ff644bb8 ff644cb8 nt!IopfCallDriver+0x31
f3fe3c10 f89eaac6 82291cc0 00644bb8 81f31720

serenum!Serenum_DispatchPassThrough+0x65
f3fe3c34 804e3d77 82291cc0 00000000 806ef2d0 serenum!Serenum_IoCtl+0x72
f3fe3c44 8056a9ab ff644cb8 81d84320 ff644bb8 nt!IopfCallDriver+0x31
f3fe3c58 8057d9f7 82291cc0 ff644bb8 81d84320

nt!IopSynchronousServiceTail+0x60
f3fe3d00 8057fbfa 00000080 00000084 00000000 nt!IopXxxControlFile+0x611
f3fe3d34 804df06b 00000080 00000084 00000000 nt!NtDeviceIoControlFile+0x2a
f3fe3d34 7c91eb94 00000080 00000084 00000000 nt!KiFastCallEntry+0xf8
0121fcdc 00000000 00000000 00000000 00000000 0x7c91eb94


STACK_COMMAND: kb

FOLLOWUP_IP:
ser2pl+97f0
f879f7f0 8b4760 mov eax,dword ptr [edi+60h]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: ser2pl+97f0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: ser2pl

IMAGE_NAME: ser2pl.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 42e0acfd

FAILURE_BUCKET_ID: 0xD1_ser2pl+97f0

BUCKET_ID: 0xD1_ser2pl+97f0

Followup: MachineOwner
---------

kd> lmvm ser2pl
start end module name
f8796000 f87a1e00 ser2pl T (no symbols)
Loaded symbol image file: ser2pl.sys
Image path: ser2pl.sys
Image name: ser2pl.sys
Timestamp: Fri Jul 22 05:23:25 2005 (42E0ACFD)
CheckSum: 00019B64
ImageSize: 0000BE00
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4


### AFTER UPDATING ser2pl.sys DRIVER ###

Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini082711-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

WARNING: Whitespace at end of path element
Symbol search path is: ...

Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_rtm.040803-2158
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Sat Aug 27 18:13:34.250 2011 (UTC - 3:00)
System Uptime: 0 days 4:28:13.843
Loading Kernel Symbols
.................................................. .............
.................................................. ........
Loading User Symbols
Loading unloaded module list
............
Unable to load image ser2pl.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ser2pl.sys
*** ERROR: Module load completed but symbols could not be loaded for ser2pl.sys
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {60, 2, 0, f451a525}

Probably caused by : ser2pl.sys ( ser2pl+a525 )

Followup: MachineOwner
---------

kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000060, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: f451a525, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: 00000060

CURRENT_IRQL: 2

FAULTING_IP:
ser2pl+a525
f451a525 8b4860 mov ecx,dword ptr [eax+60h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: Proyecto001.exe

LAST_CONTROL_TRANSFER: from f451a713 to f451a525

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
f3308b08 f451a713 821b0650 81e88158 00000001 ser2pl+0xa525
f3308b30 f4511197 821b0650 00000001 821b08e0 ser2pl+0xa713
f3308b4c f45113eb 821b0708 f8c96ee0 821b0708 ser2pl+0x1197
f3308b84 f4513be2 821b0700 f3c4d8f5 8225c368 ser2pl+0x13eb
f3308bec 804e3d77 821b0600 f8c96de0 f8c96de0 ser2pl+0x3be2
f3308bfc f89de8b7 8225c368 f8c96de0 f8c96ee0 nt!IopfCallDriver+0x31
f3308c10 f89deac6 8225c2b0 00c96de0 81e8ed90 serenum!Serenum_DispatchPassThrough+0x65
f3308c34 804e3d77 8225c2b0 00000000 806ef2d0 serenum!Serenum_IoCtl+0x72
f3308c44 8056a9ab f8c96ee0 82118ef8 f8c96de0 nt!IopfCallDriver+0x31
f3308c58 8057d9f7 8225c2b0 f8c96de0 82118ef8 nt!IopSynchronousServiceTail+0x60
f3308d00 8057fbfa 00000080 00000084 00000000 nt!IopXxxControlFile+0x611
f3308d34 804df06b 00000080 00000084 00000000 nt!NtDeviceIoControlFile+0x2a
f3308d34 7c91eb94 00000080 00000084 00000000 nt!KiFastCallEntry+0xf8
0121fcdc 00000000 00000000 00000000 00000000 0x7c91eb94


STACK_COMMAND: kb

FOLLOWUP_IP:
ser2pl+a525
f451a525 8b4860 mov ecx,dword ptr [eax+60h]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: ser2pl+a525

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: ser2pl

IMAGE_NAME: ser2pl.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4dba5a2d

FAILURE_BUCKET_ID: 0xD1_ser2pl+a525

BUCKET_ID: 0xD1_ser2pl+a525

Followup: MachineOwner
---------

kd> lmvm ser2pl
start end module name
f4510000 f4521000 ser2pl T (no symbols)
Loaded symbol image file: ser2pl.sys
Image path: ser2pl.sys
Image name: ser2pl.sys
Timestamp: Fri Apr 29 03:26:53 2011 (4DBA5A2D)
CheckSum: 000104E9
ImageSize: 00011000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 
Back