You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
976 lines
24 KiB
976 lines
24 KiB
/*++
|
|
|
|
Copyright (c) 2000 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
vfbugcheck.c
|
|
|
|
Abstract:
|
|
|
|
This module implements support for verifier bugchecks.
|
|
|
|
Author:
|
|
|
|
Adrian J. Oney (adriao) 20-Apr-1998
|
|
|
|
Environment:
|
|
|
|
Kernel mode
|
|
|
|
Revision History:
|
|
|
|
AdriaO 02/21/2000 - Moved from ntos\io\ioassert.c
|
|
|
|
--*/
|
|
|
|
//
|
|
// Disable W4 level warnings generated by public headers.
|
|
//
|
|
|
|
#include "vfpragma.h"
|
|
|
|
|
|
#include "..\io\iop.h" // Includes vfdef.h
|
|
#include "vibugcheck.h"
|
|
|
|
#ifdef ALLOC_PRAGMA
|
|
#pragma alloc_text(INIT, VfBugcheckInit)
|
|
#pragma alloc_text(PAGEVRFY, VfBugcheckThrowIoException)
|
|
#pragma alloc_text(PAGEVRFY, VfBugcheckThrowException)
|
|
#pragma alloc_text(PAGEVRFY, ViBucheckProcessParams)
|
|
#pragma alloc_text(PAGEVRFY, ViBugcheckProcessMessageText)
|
|
#pragma alloc_text(PAGEVRFY, ViBugcheckApplyControl)
|
|
#pragma alloc_text(PAGEVRFY, ViBugcheckHalt)
|
|
#pragma alloc_text(PAGEVRFY, ViBugcheckPrintBuffer)
|
|
#pragma alloc_text(PAGEVRFY, ViBugcheckPrintParamData)
|
|
#pragma alloc_text(PAGEVRFY, ViBugcheckPrintUrl)
|
|
#pragma alloc_text(PAGEVRFY, ViBugcheckPrompt)
|
|
#endif // ALLOC_PRAGMA
|
|
|
|
#ifdef ALLOC_DATA_PRAGMA
|
|
#pragma data_seg("PAGEVRFD")
|
|
#endif
|
|
|
|
ULONG ViBugCheckInitialControl;
|
|
ULONG ViBugCheckControlOverride;
|
|
UNICODE_STRING ViBugCheckEmptyString;
|
|
|
|
#ifdef ALLOC_DATA_PRAGMA
|
|
#pragma const_seg("PAGEVRFC")
|
|
#endif
|
|
|
|
//
|
|
// When invoking the driver check macro's, pass Irps first, Routines second,
|
|
// DevObj's third, and any Status's last...
|
|
//
|
|
const DCPARAM_TYPE_ENTRY ViBugCheckParamTable[] = {
|
|
{ DCPARAM_ROUTINE, "Routine" },
|
|
{ DCPARAM_IRP, "Irp" },
|
|
{ DCPARAM_IRPSNAP, "Snapshot" },
|
|
{ DCPARAM_DEVOBJ, "DevObj" },
|
|
{ DCPARAM_STATUS, "Status" },
|
|
{ DCPARAM_ULONG, "Ulong" },
|
|
{ DCPARAM_PVOID, "Pvoid" }
|
|
};
|
|
|
|
|
|
VOID
|
|
FASTCALL
|
|
VfBugcheckInit(
|
|
VOID
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine initializes the verifier bugcheck support routines.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
{
|
|
ViBugCheckInitialControl = 0;
|
|
ViBugCheckControlOverride = 0;
|
|
RtlInitUnicodeString(&ViBugCheckEmptyString, NULL);
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
VfBugcheckThrowIoException(
|
|
IN DCERROR_ID MessageID,
|
|
IN ULONG MessageParameterMask,
|
|
...
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
This routine processes an assert and provides options for removing the
|
|
breakpoint, changing to just a text-out, etc.
|
|
|
|
DCPARAM_IRP*(count)+DCPARAM_ROUTINE*(count)+DCPARAM_DEVOBJ*(count),
|
|
irp1,
|
|
irp2,
|
|
irp3,
|
|
routine1,
|
|
..,
|
|
..,
|
|
devobj1,
|
|
|
|
count can be a max of 3.
|
|
|
|
Notes:
|
|
|
|
The text will automagically be formatted and printed as such:
|
|
|
|
ASSERTION CLASS: ASSERTION TEXT ASSERTION TEXT ASSERTION
|
|
TEXT ASSERTION TEXT ...
|
|
|
|
--*/
|
|
{
|
|
PVFMESSAGE_TEMPLATE_TABLE ioVerifierTable;
|
|
UCHAR paramFormat[9*3*ARRAY_COUNT(ViBugCheckParamTable)+1];
|
|
ULONG paramType, paramMask, curMask;
|
|
NTSTATUS status;
|
|
va_list arglist;
|
|
|
|
curMask = MessageParameterMask;
|
|
paramFormat[0] = '\0';
|
|
|
|
for(paramType=0; paramType<ARRAY_COUNT(ViBugCheckParamTable); paramType++) {
|
|
|
|
paramMask = ViBugCheckParamTable[paramType].DcParamMask;
|
|
while(curMask & (paramMask*3)) {
|
|
|
|
strcat(
|
|
(char *) paramFormat,
|
|
ViBugCheckParamTable[paramType].DcParamName
|
|
);
|
|
|
|
curMask -= paramMask;
|
|
}
|
|
}
|
|
|
|
VfMessageRetrieveInternalTable(
|
|
VFMESSAGE_TABLE_IOVERIFIER,
|
|
&ioVerifierTable
|
|
);
|
|
|
|
va_start(arglist, MessageParameterMask);
|
|
|
|
status = VfBugcheckThrowException(
|
|
ioVerifierTable,
|
|
(VFMESSAGE_ERRORID) MessageID,
|
|
(PCSTR) paramFormat,
|
|
&arglist
|
|
);
|
|
|
|
va_end(arglist);
|
|
|
|
return status;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
VfBugcheckThrowException(
|
|
IN PVFMESSAGE_TEMPLATE_TABLE MessageTable OPTIONAL,
|
|
IN VFMESSAGE_ERRORID MessageID,
|
|
IN PCSTR MessageParamFormat,
|
|
IN va_list * MessageParameters
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
This routine displays an assert and provides options for
|
|
removing the breakpoint, changing to just a text-out, etc.
|
|
|
|
Arguments:
|
|
|
|
Notes:
|
|
|
|
The text will automagically be formatted and printed as such:
|
|
|
|
ASSERTION CLASS: ASSERTION TEXT ASSERTION TEXT ASSERTION
|
|
TEXT ASSERTION TEXT ...
|
|
|
|
--*/
|
|
{
|
|
UCHAR finalBuffer[512];
|
|
NTSTATUS status;
|
|
DC_CHECK_DATA dcCheckData;
|
|
PVOID dcParamArray[3*ARRAY_COUNT(ViBugCheckParamTable)];
|
|
BOOLEAN exitAssertion;
|
|
|
|
//
|
|
// Preinit
|
|
//
|
|
RtlZeroMemory(dcParamArray, sizeof(dcParamArray));
|
|
|
|
//
|
|
// Determine what our basic policy towards this check will be and fill out
|
|
// the dcCheckData structure as well as we can.
|
|
//
|
|
ViBucheckProcessParams(
|
|
MessageTable,
|
|
MessageID,
|
|
MessageParamFormat,
|
|
MessageParameters,
|
|
dcParamArray,
|
|
&dcCheckData
|
|
);
|
|
|
|
if (!ViBugcheckApplyControl(&dcCheckData)) {
|
|
|
|
//
|
|
// Nothing to see here, just ignore the assert...
|
|
//
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//
|
|
// We are going to express our disatifaction somehow. Expand out the
|
|
// message we've prepared for this scenario.
|
|
//
|
|
status = ViBugcheckProcessMessageText(
|
|
sizeof(finalBuffer),
|
|
(PSTR)finalBuffer,
|
|
&dcCheckData
|
|
);
|
|
|
|
if (!NT_SUCCESS(status)) {
|
|
|
|
ASSERT(0);
|
|
|
|
//
|
|
// Something went wrong with the index lookup!
|
|
//
|
|
return status;
|
|
}
|
|
|
|
do {
|
|
|
|
ViBugcheckPrintBuffer(&dcCheckData);
|
|
ViBugcheckPrintParamData(&dcCheckData);
|
|
ViBugcheckPrintUrl(&dcCheckData);
|
|
ViBugcheckHalt(&dcCheckData);
|
|
ViBugcheckPrompt(&dcCheckData, &exitAssertion);
|
|
|
|
} while (!exitAssertion);
|
|
|
|
return status;
|
|
}
|
|
|
|
|
|
VOID
|
|
ViBucheckProcessParams(
|
|
IN PVFMESSAGE_TEMPLATE_TABLE MessageTable OPTIONAL,
|
|
IN VFMESSAGE_ERRORID MessageID,
|
|
IN PCSTR MessageParamFormat,
|
|
IN va_list * MessageParameters,
|
|
IN PVOID * DcParamArray,
|
|
OUT PDC_CHECK_DATA DcCheckData
|
|
)
|
|
{
|
|
PVOID culpritAddress;
|
|
ULONG i, paramType, paramLen;
|
|
char ansiDriverName[81];
|
|
NTSTATUS status;
|
|
ULONG paramIndices[ARRAY_COUNT(ViBugCheckParamTable)];
|
|
PCSTR format;
|
|
|
|
//
|
|
// First we grab parameter off the stack and slot them appropriately into
|
|
// our array of "things".
|
|
//
|
|
// The array is in groups of three for each possible member of a given type
|
|
// (three irps, three routines, three device objects, etc). Items not
|
|
// referenced in are set to NULL.
|
|
//
|
|
RtlZeroMemory(paramIndices, sizeof(paramIndices));
|
|
format = MessageParamFormat;
|
|
while(*format) {
|
|
|
|
if ((format[0] == ' ')||(format[0] == '%')) {
|
|
|
|
format++;
|
|
continue;
|
|
}
|
|
|
|
for(paramType = 0;
|
|
paramType < ARRAY_COUNT(ViBugCheckParamTable);
|
|
paramType++) {
|
|
|
|
paramLen = (ULONG)strlen(ViBugCheckParamTable[paramType].DcParamName);
|
|
|
|
if (!_strnicmp(ViBugCheckParamTable[paramType].DcParamName, format, paramLen)) {
|
|
|
|
//
|
|
// Match! Advance the pointer...
|
|
//
|
|
format += paramLen;
|
|
|
|
//
|
|
// If the caller specified an index, grab it. Otherwise infer.
|
|
//
|
|
if ((format[0] >= '1') && (format[0] <= '3')) {
|
|
|
|
i = format[0] - '1';
|
|
format++;
|
|
|
|
} else {
|
|
|
|
i = paramIndices[paramType];
|
|
ASSERT(i < 3);
|
|
}
|
|
|
|
if (i < 3) {
|
|
|
|
//
|
|
// Param number is within bounds.
|
|
//
|
|
DcParamArray[paramType*3+i] = va_arg(*MessageParameters, PVOID);
|
|
}
|
|
|
|
//
|
|
// Update the current parameter index for the given type.
|
|
//
|
|
paramIndices[paramType] = i+1;
|
|
|
|
//
|
|
// Get out early
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (paramType == ARRAY_COUNT(ViBugCheckParamTable)) {
|
|
|
|
//
|
|
// We could'nt find an entry matching the format text. Bail.
|
|
//
|
|
ASSERT(paramType != ARRAY_COUNT(ViBugCheckParamTable));
|
|
break;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Pre-init unhelpful answers...
|
|
//
|
|
DcCheckData->DriverName = &ViBugCheckEmptyString;
|
|
DcCheckData->OffsetIntoImage = 0;
|
|
DcCheckData->InVerifierList = FALSE;
|
|
culpritAddress = DcParamArray[0];
|
|
|
|
//
|
|
// Extract the culprit's name if possible...
|
|
//
|
|
if (culpritAddress) {
|
|
|
|
status = KevUtilAddressToFileHeader(
|
|
(PVOID) culpritAddress,
|
|
(PUINT_PTR)(&DcCheckData->OffsetIntoImage),
|
|
&DcCheckData->DriverName,
|
|
&DcCheckData->InVerifierList
|
|
);
|
|
|
|
if (!NT_SUCCESS(status)) {
|
|
|
|
//
|
|
// IF we don't know who it is, assert anyway.
|
|
//
|
|
DcCheckData->InVerifierList = TRUE;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Record
|
|
//
|
|
DcCheckData->CulpritAddress = culpritAddress;
|
|
DcCheckData->DcParamArray = DcParamArray;
|
|
DcCheckData->MessageID = MessageID;
|
|
|
|
//
|
|
// Get an ANSI version of the driver name.
|
|
//
|
|
KeBugCheckUnicodeToAnsi(
|
|
DcCheckData->DriverName,
|
|
ansiDriverName,
|
|
sizeof(ansiDriverName)
|
|
);
|
|
|
|
//
|
|
// Retrieve a pointer to the appropriate message data.
|
|
//
|
|
VfMessageRetrieveErrorData(
|
|
MessageTable,
|
|
MessageID,
|
|
ansiDriverName,
|
|
&DcCheckData->BugCheckMajor,
|
|
&DcCheckData->AssertionClass,
|
|
&DcCheckData->MessageTextTemplate,
|
|
&DcCheckData->Control
|
|
);
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
FASTCALL
|
|
ViBugcheckProcessMessageText(
|
|
IN ULONG MaxOutputBufferSize,
|
|
OUT PSTR OutputBuffer,
|
|
IN OUT PDC_CHECK_DATA DcCheckData
|
|
)
|
|
{
|
|
ULONG paramType, maxParameterTypes;
|
|
ULONG arrayIndex, paramLength;
|
|
char const* messageHead;
|
|
PSTR newMessage;
|
|
LONG charsRemaining, length;
|
|
|
|
//
|
|
// Get the message text.
|
|
//
|
|
messageHead = DcCheckData->MessageTextTemplate;
|
|
|
|
//
|
|
// Now manually build out the message.
|
|
//
|
|
newMessage = OutputBuffer;
|
|
charsRemaining = (MaxOutputBufferSize/sizeof(UCHAR))-1;
|
|
maxParameterTypes = ARRAY_COUNT(ViBugCheckParamTable);
|
|
|
|
while(*messageHead != '\0') {
|
|
|
|
if (charsRemaining <= 0) {
|
|
|
|
return STATUS_BUFFER_OVERFLOW;
|
|
}
|
|
|
|
if (*messageHead != '%') {
|
|
|
|
*newMessage = *messageHead;
|
|
newMessage++;
|
|
messageHead++;
|
|
charsRemaining--;
|
|
|
|
} else {
|
|
|
|
for(paramType = 0; paramType < maxParameterTypes; paramType++) {
|
|
|
|
paramLength = (ULONG)strlen(ViBugCheckParamTable[paramType].DcParamName);
|
|
|
|
//
|
|
// Do we have a match?
|
|
//
|
|
// N.B. - We don't do any case 'de-sensitizing' anywhere, so
|
|
// everything's cases must match!
|
|
//
|
|
if (RtlCompareMemory(
|
|
messageHead+1,
|
|
ViBugCheckParamTable[paramType].DcParamName,
|
|
paramLength*sizeof(UCHAR)) == paramLength*sizeof(UCHAR)) {
|
|
|
|
arrayIndex = paramType*3;
|
|
messageHead += (paramLength+1);
|
|
|
|
//
|
|
// Was an index passed in (ie, "3rd" irp requested)?
|
|
//
|
|
if ((*messageHead >= '1') && (*messageHead <= '3')) {
|
|
|
|
//
|
|
// Adjust table index appropriately.
|
|
//
|
|
arrayIndex += (*messageHead - '1') ;
|
|
messageHead++;
|
|
}
|
|
|
|
if ((arrayIndex < 6) || (arrayIndex >=9)) {
|
|
|
|
//
|
|
// Normal param, print the pointer
|
|
//
|
|
length = _snprintf(
|
|
newMessage,
|
|
charsRemaining+1,
|
|
"%p",
|
|
DcCheckData->DcParamArray[arrayIndex]
|
|
);
|
|
|
|
} else {
|
|
|
|
//
|
|
// IRP Snapshot, extract the IRP and print that
|
|
//
|
|
length = _snprintf(
|
|
newMessage,
|
|
charsRemaining+1,
|
|
"%p",
|
|
((PIRP_MINI_SNAPSHOT) DcCheckData->DcParamArray[arrayIndex])->Irp
|
|
);
|
|
}
|
|
|
|
if (length == -1) {
|
|
|
|
return STATUS_BUFFER_OVERFLOW;
|
|
}
|
|
|
|
charsRemaining -= length;
|
|
newMessage += length;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (paramType == maxParameterTypes) {
|
|
|
|
//
|
|
// Either the message we looked up is malformed, we don't recognize
|
|
// the %thing it is talking about, or this is %%!
|
|
//
|
|
*newMessage = *messageHead;
|
|
messageHead++;
|
|
newMessage++;
|
|
charsRemaining--;
|
|
|
|
if (*messageHead == '%') {
|
|
|
|
messageHead++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Null-terminate it (we have room because we took one off the buffer size
|
|
// above).
|
|
//
|
|
*newMessage = '\0';
|
|
|
|
DcCheckData->ClassText = DcCheckData->AssertionClass->MessageClassText;
|
|
DcCheckData->AssertionText = OutputBuffer;
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
BOOLEAN
|
|
FASTCALL
|
|
ViBugcheckApplyControl(
|
|
IN OUT PDC_CHECK_DATA DcCheckData
|
|
)
|
|
{
|
|
ULONG assertionControl;
|
|
|
|
if (ViBugCheckControlOverride) {
|
|
|
|
assertionControl = ViBugCheckControlOverride;
|
|
|
|
} else if (DcCheckData->Control) {
|
|
|
|
//
|
|
// Initialize the control if appropo
|
|
//
|
|
if (!((*DcCheckData->Control) & VFM_FLAG_INITIALIZED)) {
|
|
|
|
*DcCheckData->Control |= (
|
|
VFM_FLAG_INITIALIZED | ViBugCheckInitialControl |
|
|
DcCheckData->AssertionClass->ClassFlags );
|
|
}
|
|
|
|
assertionControl = *DcCheckData->Control;
|
|
|
|
} else {
|
|
|
|
assertionControl =
|
|
( ViBugCheckInitialControl |
|
|
DcCheckData->AssertionClass->ClassFlags );
|
|
}
|
|
|
|
if (assertionControl & VFM_FLAG_CLEARED) {
|
|
|
|
//
|
|
// If the breakpoint was cleared, then return, print/rip not.
|
|
//
|
|
return FALSE;
|
|
}
|
|
|
|
if ((!(assertionControl & VFM_IGNORE_DRIVER_LIST)) &&
|
|
(!DcCheckData->InVerifierList)) {
|
|
|
|
//
|
|
// Not of interest, skip this one.
|
|
//
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// If there is no debugger, don't halt the machine. We are probably
|
|
// ripping like mad and the user just wants to be able to boot.
|
|
// The one exception is if VFM_DEPLOYMENT_FAILURE is set. Then we shall
|
|
// invoke the driver bugcheck...
|
|
//
|
|
if ((!KdDebuggerEnabled) && (!(assertionControl & VFM_DEPLOYMENT_FAILURE))) {
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Record our intentions and continue.
|
|
//
|
|
DcCheckData->AssertionControl = assertionControl;
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
VOID
|
|
FASTCALL
|
|
ViBugcheckHalt(
|
|
IN PDC_CHECK_DATA DcCheckData
|
|
)
|
|
{
|
|
PVOID parameterArray[4];
|
|
char captionBuffer[256];
|
|
char ansiDriverName[81];
|
|
|
|
//
|
|
// Do not bugcheck if a kernel debugger is attached, nor if this isn't a
|
|
// fatal error.
|
|
//
|
|
if (KdDebuggerEnabled ||
|
|
(!(DcCheckData->AssertionControl & VFM_DEPLOYMENT_FAILURE))) {
|
|
|
|
return;
|
|
}
|
|
|
|
//
|
|
// We are here because VFM_DEPLOYMENT_FAILURE is set. We use
|
|
// FATAL_UNHANDLED_HARD_ERROR so that we can give a
|
|
// descriptive text string for the problem.
|
|
//
|
|
parameterArray[0] = (PVOID)(ULONG_PTR)(DcCheckData->MessageID);
|
|
parameterArray[1] = DcCheckData->CulpritAddress;
|
|
parameterArray[2] = DcCheckData->DcParamArray[3];
|
|
parameterArray[3] = DcCheckData->DcParamArray[9];
|
|
|
|
if (DcCheckData->BugCheckMajor == DRIVER_VERIFIER_IOMANAGER_VIOLATION) {
|
|
|
|
KeBugCheckUnicodeToAnsi(
|
|
DcCheckData->DriverName,
|
|
ansiDriverName,
|
|
sizeof(ansiDriverName)
|
|
);
|
|
|
|
_snprintf(
|
|
captionBuffer,
|
|
sizeof(captionBuffer),
|
|
"IO SYSTEM VERIFICATION ERROR in %s (%s %x)\n[%s+%x at %p]\n",
|
|
ansiDriverName,
|
|
DcCheckData->ClassText,
|
|
DcCheckData->MessageID,
|
|
ansiDriverName,
|
|
DcCheckData->OffsetIntoImage,
|
|
DcCheckData->CulpritAddress
|
|
);
|
|
|
|
KeBugCheckEx(
|
|
FATAL_UNHANDLED_HARD_ERROR,
|
|
DcCheckData->BugCheckMajor,
|
|
(ULONG_PTR) parameterArray,
|
|
(ULONG_PTR) captionBuffer,
|
|
(ULONG_PTR) "" // DcCheckData->AssertionText is too technical
|
|
);
|
|
|
|
} else {
|
|
|
|
KeBugCheckEx(
|
|
DcCheckData->BugCheckMajor,
|
|
DcCheckData->MessageID,
|
|
(ULONG_PTR) DcCheckData->DcParamArray[9],
|
|
(ULONG_PTR) DcCheckData->DcParamArray[15],
|
|
(ULONG_PTR) DcCheckData->DcParamArray[16]
|
|
);
|
|
}
|
|
}
|
|
|
|
|
|
VOID
|
|
FASTCALL
|
|
ViBugcheckPrintBuffer(
|
|
IN PDC_CHECK_DATA DcCheckData
|
|
)
|
|
{
|
|
UCHAR buffer[82];
|
|
UCHAR classBuf[81];
|
|
UCHAR callerBuf[81+40];
|
|
UCHAR ansiDriverName[81];
|
|
LONG lMargin, i, lMarginCur, rMargin=78;
|
|
PSTR lineStart, lastWord, current, lMarginText;
|
|
|
|
//
|
|
// Put down a carriage return
|
|
//
|
|
DbgPrint("\n") ;
|
|
|
|
//
|
|
// Drop a banner if this is a fatal assert or a logo failure.
|
|
//
|
|
if (DcCheckData->AssertionControl &
|
|
(VFM_DEPLOYMENT_FAILURE | VFM_LOGO_FAILURE)) {
|
|
|
|
DbgPrint(
|
|
"***********************************************************************\n"
|
|
"* THIS VALIDATION BUG IS FATAL AND WILL CAUSE THE VERIFIER TO HALT *\n"
|
|
"* WINDOWS (BUGCHECK) WHEN THE MACHINE IS NOT UNDER A KERNEL DEBUGGER! *\n"
|
|
"***********************************************************************\n"
|
|
"\n"
|
|
);
|
|
}
|
|
|
|
//
|
|
// Prepare left margin (ClassText)
|
|
//
|
|
if (DcCheckData->ClassText != NULL) {
|
|
|
|
lMargin = (LONG)strlen(DcCheckData->ClassText)+2;
|
|
|
|
DbgPrint("%s: ", DcCheckData->ClassText);
|
|
|
|
} else {
|
|
|
|
lMargin = 0;
|
|
}
|
|
|
|
if (lMargin+1>=rMargin) {
|
|
|
|
lMargin=0;
|
|
}
|
|
|
|
for(i=0; i<lMargin; i++) classBuf[i] = ' ';
|
|
classBuf[lMargin] = '\0';
|
|
lMarginText = (PSTR)(classBuf+lMargin);
|
|
lMarginCur = lMargin;
|
|
|
|
lineStart = lastWord = current = DcCheckData->AssertionText;
|
|
|
|
//
|
|
// Print out culprit if we have him...
|
|
//
|
|
if (DcCheckData->CulpritAddress) {
|
|
|
|
if (DcCheckData->DriverName->Length) {
|
|
|
|
KeBugCheckUnicodeToAnsi(
|
|
DcCheckData->DriverName,
|
|
(PSTR)ansiDriverName,
|
|
sizeof(ansiDriverName)
|
|
);
|
|
|
|
sprintf((PCHAR)callerBuf, "[%s @ 0x%p] ",
|
|
ansiDriverName,
|
|
DcCheckData->CulpritAddress
|
|
);
|
|
|
|
} else {
|
|
|
|
sprintf((PCHAR)callerBuf, "[0x%p] ", DcCheckData->CulpritAddress);
|
|
}
|
|
|
|
DbgPrint("%s", callerBuf);
|
|
lMarginCur += (LONG)strlen((PCHAR)callerBuf);
|
|
}
|
|
|
|
//
|
|
// Format and print our assertion text
|
|
//
|
|
while(*current) {
|
|
|
|
if (*current == ' ') {
|
|
|
|
if ((current - lineStart) >= (rMargin-lMarginCur-1)) {
|
|
|
|
DbgPrint("%s", lMarginText);
|
|
lMarginText = (PSTR)classBuf;
|
|
lMarginCur = lMargin;
|
|
|
|
if ((lastWord-lineStart)<rMargin) {
|
|
|
|
memcpy(buffer, lineStart, (ULONG)(lastWord-lineStart)*sizeof(UCHAR));
|
|
buffer[lastWord-lineStart] = '\0';
|
|
DbgPrint("%s\n", buffer);
|
|
|
|
}
|
|
|
|
lineStart = lastWord+1;
|
|
}
|
|
|
|
lastWord = current;
|
|
}
|
|
|
|
current++;
|
|
}
|
|
|
|
if ((current - lineStart) >= (rMargin-lMarginCur-1)) {
|
|
|
|
DbgPrint("%s", lMarginText);
|
|
lMarginText = (PSTR)classBuf;
|
|
|
|
if ((lastWord-lineStart)<rMargin) {
|
|
|
|
memcpy(buffer, lineStart, (ULONG)(lastWord-lineStart)*sizeof(UCHAR));
|
|
buffer[lastWord-lineStart] = '\0';
|
|
DbgPrint("%s\n", buffer);
|
|
}
|
|
|
|
lineStart = lastWord+1;
|
|
}
|
|
|
|
if (lineStart<current) {
|
|
|
|
DbgPrint("%s%s\n", lMarginText, lineStart);
|
|
}
|
|
}
|
|
|
|
|
|
VOID
|
|
FASTCALL
|
|
ViBugcheckPrintParamData(
|
|
IN PDC_CHECK_DATA DcCheckData
|
|
)
|
|
{
|
|
if (DcCheckData->DcParamArray[3]) {
|
|
|
|
VfPrintDumpIrp((PIRP) DcCheckData->DcParamArray[3]);
|
|
}
|
|
|
|
if (DcCheckData->DcParamArray[6]) {
|
|
|
|
VfPrintDumpIrpStack(
|
|
&((PIRP_MINI_SNAPSHOT) DcCheckData->DcParamArray[6])->IoStackLocation
|
|
);
|
|
}
|
|
}
|
|
|
|
|
|
VOID
|
|
FASTCALL
|
|
ViBugcheckPrintUrl(
|
|
IN PDC_CHECK_DATA DcCheckData
|
|
)
|
|
{
|
|
DbgPrint(
|
|
"http://www.microsoft.com/hwdq/bc/default.asp?os=%d.%d.%d&major=0x%x&minor=0x%x&lang=0x%x\n",
|
|
VER_PRODUCTMAJORVERSION,
|
|
VER_PRODUCTMINORVERSION,
|
|
VER_PRODUCTBUILD,
|
|
DcCheckData->BugCheckMajor,
|
|
DcCheckData->MessageID,
|
|
9 // English
|
|
);
|
|
}
|
|
|
|
|
|
VOID
|
|
FASTCALL
|
|
ViBugcheckPrompt(
|
|
IN PDC_CHECK_DATA DcCheckData,
|
|
OUT PBOOLEAN ExitAssertion
|
|
)
|
|
{
|
|
char response[2];
|
|
ULONG assertionControl;
|
|
BOOLEAN waitForInput;
|
|
|
|
assertionControl = DcCheckData->AssertionControl;
|
|
|
|
*ExitAssertion = TRUE;
|
|
|
|
//
|
|
// Vocalize if so ordered.
|
|
//
|
|
if (assertionControl & VFM_FLAG_BEEP) {
|
|
|
|
DbgPrint("%c", 7);
|
|
}
|
|
|
|
if (assertionControl & VFM_FLAG_ZAPPED) {
|
|
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Wait for input...
|
|
//
|
|
waitForInput = TRUE;
|
|
while(waitForInput) {
|
|
|
|
if (DcCheckData->Control) {
|
|
|
|
DbgPrompt( "Break, Ignore, Zap, Remove, Disable all (bizrd)? ", response, sizeof( response ));
|
|
} else {
|
|
|
|
DbgPrompt( "Break, Ignore, Disable all (bid)? ", response, sizeof( response ));
|
|
}
|
|
|
|
switch (response[0]) {
|
|
|
|
case 'B':
|
|
case 'b':
|
|
DbgPrint("Breaking in... (press g<enter> to return to assert menu)\n");
|
|
DbgBreakPoint();
|
|
waitForInput = FALSE;
|
|
*ExitAssertion = FALSE;
|
|
break;
|
|
|
|
case 'I':
|
|
case 'i':
|
|
waitForInput = FALSE;
|
|
break;
|
|
|
|
case 'Z':
|
|
case 'z':
|
|
if (DcCheckData->Control) {
|
|
|
|
DbgPrint("Breakpoint zapped (OS will print text and return)\n");
|
|
assertionControl |= VFM_FLAG_ZAPPED;
|
|
assertionControl &=~ VFM_FLAG_BEEP;
|
|
waitForInput = FALSE;
|
|
}
|
|
break;
|
|
|
|
case 'D':
|
|
case 'd':
|
|
ViBugCheckControlOverride = VFM_FLAG_CLEARED;
|
|
DbgPrint("Verification asserts disabled.\n");
|
|
waitForInput = FALSE;
|
|
break;
|
|
|
|
case 'R':
|
|
case 'r':
|
|
if (DcCheckData->Control) {
|
|
|
|
DbgPrint("Breakpoint removed\n") ;
|
|
assertionControl |= VFM_FLAG_CLEARED;
|
|
waitForInput = FALSE;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (DcCheckData->Control) {
|
|
*DcCheckData->Control = assertionControl;
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef ALLOC_DATA_PRAGMA
|
|
#pragma data_seg()
|
|
#pragma const_seg()
|
|
#endif
|
|
|