Jump to content

Dietmar

Member
  • Posts

    1,429
  • Joined

  • Last visited

  • Days Won

    5
  • Donations

    0.00 USD 
  • Country

    Germany

Everything posted by Dietmar

  1. On the AMD board AB350 gaming k4 I have soldered by myself a socket for its Bios chip. So there I can easy change DSDT with EEpromer entry for GPIO to If ((OSYS >= 0x07D6)) { } Dietmar PS: Also possible to do add something like "GPIO is not under usual _SB.PCI0. path - i think this is problem". But then GPIO becomes forced a PCI device and "ISA" mode is gone?
  2. @Mov AX, 0xDEAD Nice, that you find the reason for this loong standing Bsod! Do you have an idea, how to forbid a call to AcpiArbCrackPRT() from GPIO (connected to SystemBus directly) before pci.sys has started? This can be used in general for other "ISA" like devices under XP also. Of course we can disable AMDI0030 (GPIO) in DSDT for XP, but maybe some programs (near to hardware) make use of GPIO connected to SystemBus directly. I think the hack before in acpi.sys comes very close to this idea because Bsod via AcpiArbCrackPRT() without pci.sys is meaningless Dietmar
  3. @Mov AX, 0xDEAD I am happy, that you take a deeper look in the problem of Ryzen cpu with XP! And for sure this helps you also for better understanding XP ). With this acpi.sys the compi boots to desktop in about 10min on the same AMD board as before. Loong txt output. During the whole session with Windbg over Lan, no error message at all. Here is the log file, hope that it helps you Dietmar ottocrack.7z ottoPCI.7z
  4. I tried the Quantum browser from Feodor for XP SP3. Even just now you can work with it, look HTML5 movies Dietmar
  5. @George King We solved this problem in full with ULONG64 for CreateQWordField Dietmar
  6. @Mov AX, 0xDEAD Nono, this Bsod was not random. After dirty hack against this Bsod 0x000000A5 (0x00000002, xxx, 0x00000001, yyy) via jmp I get Bsod 0x000000A5 (0x00000002, xxx, 0x00000000, yyy) and after dirty hack via jmp against this, the bootdevice cant be found any longer. ALL those problems are gone at once (only(!)) with correct CreateQWordField Dietmar
  7. @Mov AX, 0xDEAD "But now other BSOD appears 0x000000A5 (0x00000002, xxx, 0x00000001, yyy)" This Bsod is gone after your patch Ulong ---> Ulong64 very strange but true Dietmar
  8. @Mov AX, 0xDEAD Do you have an idea, for what AcpiArbCrackPRT() is needed? The name itself tells something strange. What has happened, that pci.sys is not loaded before AcpiArbCrackPRT() on Ryzen cpu? Because you told via Virtualbox pci.sys Driverentry for pci.sys is reached before AcpiArbCrackPRT() ? Driverentry of pci.sys is not reached. What can make this Dietmar
  9. Microsoft (R) Windows Debugger Version 6.3.9600.17200 X86 Copyright (c) Microsoft Corporation. All rights reserved. Using NET for debugging Opened WinSock 2.0 Waiting to reconnect... Connected to target 192.168.2.104 on port 50000 on local IP 192.168.2.101. Connected to Windows XP 2600 x86 compatible target at (Sat Apr 9 12:51:17.046 2022 (UTC + 2:00)), ptr64 FALSE Kernel Debugger connection established. ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\Symbols ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\symbolssss Symbol search path is: C:\symbolssss Executable search path is: C:\Symbols Windows XP Kernel Version 2600 MP (1 procs) Checked x86 compatible Built by: 2600.xpsp.080413-2133 Machine Name: Kernel base = 0x80a02000 PsLoadedModuleList = 0x80b019e8 System Uptime: not available ************* Symbol Path validation summary ************** Response Time (ms) Location OK E:\binaries.x86fre\Symbols ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\Symbols ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\symbolssss OK C:\symbols OK C:\symbolss OK C:\symbolsss OK E:\binaries.x86fre\Symbols Deferred https://msdl.microsoft.com/download/symbols Deferred srv* Break instruction exception - code 80000003 (first chance) nt!DbgBreakPoint: 80ac37e0 cc int 3 kd> bu pci!DriverEntry kd> bu acpi!DriverEntry kd> bu acpi!AcpiArbInitializePciRouting kd> bu acpi!ACPIBusIrpStartDevice kd> bl 0 eu 0001 (0001) (pci!DriverEntry) 1 eu 0001 (0001) (acpi!DriverEntry) 2 eu 0001 (0001) (acpi!AcpiArbInitializePciRouting) 3 eu 0001 (0001) (acpi!ACPIBusIrpStartDevice) kd> g MM: Loader/HAL memory block indicates large pages cannot be used for 80100000->8012777F MM: Loader/HAL memory block indicates large pages cannot be used for 810A6000->8258AFFF MM: Disabling large pages for all ranges due to overlap Breakpoint 1 hit ACPI!DriverEntry: ba71bf80 55 push ebp 15: kd> g *** Assertion failed: PciInterfacesInstantiated *** Source File: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c, line 3512 Break repeatedly, break Once, Ignore, terminate Process, or terminate Thread (boipt)? i i *** Assertion failed: pciInterface *** Source File: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c, line 3518 Break repeatedly, break Once, Ignore, terminate Process, or terminate Thread (boipt)? i i PS: Unhandled Kernel Mode Exception Pointers = 0xBACC69DC Code c0000005 Addr BA6CABE4 Info0 00000000 Info1 00000010 Info2 00000010 Info3 8A4E4CA0 *** Fatal System Error: 0x0000007e (0xC0000005,0xBA6CABE4,0xBACC6E90,0xBACC6B8C) Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows XP 2600 x86 compatible target at (Sat Apr 9 12:53:39.734 2022 (UTC + 2:00)), ptr64 FALSE Loading Kernel Symbols .................................... Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7E, {c0000005, ba6cabe4, bacc6e90, bacc6b8c} *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 Probably caused by : ACPI.sys ( ACPI!AcpiArbCrackPRT+f8 ) Followup: MachineOwner --------- nt!RtlpBreakWithStatusInstruction: 80ac37ec cc int 3 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: ba6cabe4, The address that the exception occurred at Arg3: bacc6e90, Exception Record Address Arg4: bacc6b8c, Context Record Address Debugging Details: ------------------ *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung "0x%08lx" verweist auf Speicher bei "0x%08lx". Die Daten wurden wegen eines E/A-Fehlers in "0x%081x" nicht in den Arbeitsspeicher bertragen. FAULTING_IP: ACPI!AcpiArbCrackPRT+f8 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 3535] ba6cabe4 ff5710 call dword ptr [edi+10h] EXCEPTION_RECORD: bacc6e90 -- (.exr 0xffffffffbacc6e90) ExceptionAddress: ba6cabe4 (ACPI!AcpiArbCrackPRT+0x000000f8) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000010 Attempt to read from address 00000010 CONTEXT: bacc6b8c -- (.cxr 0xffffffffbacc6b8c;r) eax=bacc7070 ebx=00000000 ecx=0000bb40 edx=00000056 esi=8a4a4728 edi=00000000 eip=ba6cabe4 esp=bacc6f58 ebp=bacc70a0 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 ACPI!AcpiArbCrackPRT+0xf8: ba6cabe4 ff5710 call dword ptr [edi+10h] ds:0023:00000010=???????? Last set context: eax=bacc7070 ebx=00000000 ecx=0000bb40 edx=00000056 esi=8a4a4728 edi=00000000 eip=ba6cabe4 esp=bacc6f58 ebp=bacc70a0 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 ACPI!AcpiArbCrackPRT+0xf8: ba6cabe4 ff5710 call dword ptr [edi+10h] ds:0023:00000010=???????? Resetting default scope PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung "0x%08lx" verweist auf Speicher bei "0x%08lx". Die Daten wurden wegen eines E/A-Fehlers in "0x%081x" nicht in den Arbeitsspeicher bertragen. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000010 READ_ADDRESS: 00000010 FOLLOWUP_IP: ACPI!AcpiArbCrackPRT+f8 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 3535] ba6cabe4 ff5710 call dword ptr [edi+10h] BUGCHECK_STR: 0x7E DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre DPC_STACK_BASE: FFFFFFFFBACCC000 LOCK_ADDRESS: 80afd6c0 -- (!locks 80afd6c0) Resource @ nt!IopDeviceTreeLock (0x80afd6c0) Shared 1 owning threads Threads: 8a528da8-01<*> 1 total locks, 1 locks currently held PNP_TRIAGE: Lock address : 0x80afd6c0 Thread Count : 1 Thread address: 0x8a528da8 Thread wait : 0xce LAST_CONTROL_TRANSFER: from 80a30d7b to 80ac37ec STACK_TEXT: bacc70a0 ba70af2a 8a4a4728 bacc70cc bacc70e0 ACPI!AcpiArbCrackPRT+0xf8 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 3535] bacc70d4 ba71a367 ba700f00 bacc70f0 e12b639c ACPI!AcpiArbAddAllocation+0x9d [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 1474] bacc7158 ba709c7d e101c058 e12b639c ba700f00 ACPI!ArbBootAllocation+0xf5 [e:\nt\base\ntos\arb\arbiter.c @ 1406] bacc716c ba71a3de ba700f00 e12b639c e12b639c ACPI!AcpiArbBootAllocation+0x49 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 1850] bacc7188 80b6c111 ba700f00 00000009 bacc71a8 ACPI!ArbArbiterHandler+0x52 [e:\nt\base\ntos\arb\arbiter.c @ 1562] bacc71c4 80b6d093 bacc71b8 00000000 80afd1c0 nt!IopBootAllocation+0xbb bacc7208 80b6d80b 00000004 e101c008 e12db5b0 nt!IopAllocateBootResourcesInternal+0xc5 bacc7228 80d38c8b 00000004 8a4a4728 e12db5b0 nt!IopAllocateBootResources+0x75 bacc724c 80b5653a 00000004 8a4a4728 e12db5b0 nt!IopReportBootResources+0x65 bacc727c 80b5cb93 8a4e6ed8 800007b8 00000001 nt!PiQueryAndAllocateBootResources+0x150 bacc736c 80b5d26d 8a4e6ed8 00000000 00000000 nt!PipProcessNewDeviceNode+0xc9d bacc75c4 80a2cff0 8a4f1838 00000000 00000000 nt!PipProcessDevNodeTree+0x1bd bacc7608 80a2d2fb 00000000 00000000 80091138 nt!PipDeviceActionWorker+0xc4 bacc7620 80d37f53 00000000 00000006 00000000 nt!PipRequestDeviceAction+0x13b bacc7684 80d341f1 80085000 bacc76a0 00034000 nt!IopInitializeBootDrivers+0x39b bacc7830 80d31940 80085000 00000000 8a528da8 nt!IoInitSystem+0x82d bacc7dac 80bd81ac 80085000 00000000 00000000 nt!Phase1Initialization+0xb12 bacc7ddc 80ae4212 80d30e2e 80085000 00000000 nt!PspSystemThreadStartup+0x34 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 FAULTING_SOURCE_LINE: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c FAULTING_SOURCE_FILE: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c FAULTING_SOURCE_LINE_NUMBER: 3535 FAULTING_SOURCE_CODE: 3531: &classCode, 3532: &subClassCode, 3533: &parent, 3534: &routingToken, > 3535: &flags); 3536: 3537: if (!NT_SUCCESS(status)) { 3538: return STATUS_NOT_FOUND; 3539: } 3540: SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: ACPI!AcpiArbCrackPRT+f8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: ACPI IMAGE_NAME: ACPI.sys DEBUG_FLR_IMAGE_TIMESTAMP: 624f31cb IMAGE_VERSION: 5.1.2600.1106 STACK_COMMAND: .cxr 0xffffffffbacc6b8c ; kb FAILURE_BUCKET_ID: 0x7E_ACPI!AcpiArbCrackPRT+f8 BUCKET_ID: 0x7E_ACPI!AcpiArbCrackPRT+f8 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x7e_acpi!acpiarbcrackprt+f8 FAILURE_ID_HASH: {30b13d1d-5098-59bf-2bca-ef183c89cfe1} Followup: MachineOwner --------- 0: kd> lm start end module name 80100000 80127780 HAL3 (deferred) 80128000 80150000 kdcom (deferred) 80150000 8017a000 KDSTUB (deferred) 805e8000 8060ef80 pci (pdb symbols) c:\symbolssss\sys\pci.pdb 80a02000 80da3000 nt (pdb symbols) C:\Programme\Windows Kits\8.1\Debuggers\x86\sym\ntkrpamp.pdb\5B9E8A586D3D49D98927B5D5117577231\ntkrpamp.pdb ba448000 ba461b80 Mup (deferred) ba462000 ba48e980 NDIS (deferred) ba48f000 ba51b600 Ntfs (deferred) ba51c000 ba579000 UsbHub3 (deferred) ba579000 ba5be000 USBXHCI (deferred) ba5be000 ba5d4880 KSecDD (deferred) ba5d5000 ba5e6f00 sr (deferred) ba5e7000 ba606b00 fltMgr (deferred) ba607000 ba61c000 amd_sata (deferred) ba61c000 ba635000 storport (deferred) ba635000 ba646000 storahci (deferred) ba646000 ba66ba00 dmio (deferred) ba66c000 ba68ad80 ftdisk (deferred) ba68b000 ba6ba000 ucx01000 (deferred) ba6ba000 ba724b00 ACPI (private pdb symbols) C:\Programme\Windows Kits\8.1\Debuggers\x86\sym\acpi.pdb\65CE5676DFFA4AA68128AB4DCDBDBB5F4\acpi.pdb ba725000 ba7a7000 WDF01_W8 (deferred) ba8a8000 ba8b6000 WDFLDR8 (deferred) ba8b8000 ba8c1300 isapnp (deferred) ba8c8000 ba8d2000 WppRecorder (deferred) ba8d8000 ba8e2580 MountMgr (deferred) ba8e8000 ba8f5200 VolSnap (deferred) ba8f8000 ba903000 amd_xata (deferred) ba908000 ba910e00 disk (deferred) ba918000 ba924180 CLASSPNP (deferred) ba928000 ba931000 USBD_W8 (deferred) bab28000 bab2e800 firadisk (deferred) bab30000 bab34d00 PartMgr (deferred) bacb8000 bacbb000 BOOTVID (deferred) bacbc000 bacbef80 ACPIEC (deferred) bada8000 bada9100 WMILIB (deferred) badaa000 badab700 dmload (deferred) bae70000 bae70d80 OPRGHDLR (deferred) 0: kd> !devnode 0 1 Dumping IopRootDeviceNode (= 0x8a4f1838) DevNode 0x8a4f1838 for PDO 0x8a4f1980 InstancePath is "HTREE\ROOT\0" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a54ac30 for PDO 0x8a54ad90 InstancePath is "Root\ACPI_HAL\0000" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a544378 for PDO 0x8a546cb0 InstancePath is "ACPI_HAL\PNP0C08\0" ServiceName is "ACPI" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a367398 for PDO 0x8a4bf3d8 InstancePath is "ACPI\PNP0C14\AWW" ServiceName is "WmiAcpi" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a367268 for PDO 0x8a54b4b0 InstancePath is "ACPI\PNP0A08\0" ServiceName is "pci" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a367138 for PDO 0x8a4f1dd8 InstancePath is "ACPI\PNP0C0C\aa" State = DeviceNodeDriversAdded (0x303) Previous State = DeviceNodeInitialized (0x302) DevNode 0x8a4e6008 for PDO 0x8a4f1cb8 InstancePath is "ACPI\PNP0103\2&daba3ff&0" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4e6ed8 for PDO 0x8a4a4728 InstancePath is "ACPI\AMDI0030\0" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) Problem = CM_PROB_DISABLED DevNode 0x8a4e6da8 for PDO 0x8a4a4608 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e6c78 for PDO 0x8a4a44e8 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e6b48 for PDO 0x8a4a43c8 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e6a18 for PDO 0x8a49dd88 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e68e8 for PDO 0x8a49dc68 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e67b8 for PDO 0x8a49db48 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e6688 for PDO 0x8a49da28 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e6558 for PDO 0x8a49d908 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e6428 for PDO 0x8a49d7e8 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e62f8 for PDO 0x8a367f18 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e61c8 for PDO 0x8a367df8 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e5008 for PDO 0x8a367cd8 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e5ed8 for PDO 0x8a367bb8 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e5da8 for PDO 0x8a367a98 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e5c78 for PDO 0x8a367978 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e5b48 for PDO 0x8a367858 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e5a18 for PDO 0x8a367738 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e58e8 for PDO 0x8a367618 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a4e57b8 for PDO 0x8a3674f8 State = DeviceNodeUninitialized (0x301) Previous State = Unknown State (0x0) DevNode 0x8a54a8b8 for PDO 0x8a54aa18 InstancePath is "Root\dmio\0000" ServiceName is "dmio" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a54a660 for PDO 0x8a54a7c0 InstancePath is "Root\firadisk\0000" ServiceName is "FiraDisk" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a54a408 for PDO 0x8a54a568 InstancePath is "Root\ftdisk\0000" ServiceName is "ftdisk" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a54a1b0 for PDO 0x8a54a310 InstancePath is "Root\LEGACY_AFD\0000" ServiceName is "AFD" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4f0ed8 for PDO 0x8a4f0038 InstancePath is "Root\LEGACY_BEEP\0000" ServiceName is "Beep" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4f0c80 for PDO 0x8a4f0de0 InstancePath is "Root\LEGACY_CPUZ135\0000" ServiceName is "cpuz135" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4f0a28 for PDO 0x8a4f0b88 InstancePath is "Root\LEGACY_DMBOOT\0000" ServiceName is "dmboot" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4f07d0 for PDO 0x8a4f0930 InstancePath is "Root\LEGACY_DMLOAD\0000" ServiceName is "dmload" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4f0508 for PDO 0x8a4f0668 InstancePath is "Root\LEGACY_FIPS\0000" ServiceName is "Fips" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4f02b0 for PDO 0x8a4f0410 InstancePath is "Root\LEGACY_GPC\0000" ServiceName is "Gpc" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a549008 for PDO 0x8a4f01b8 InstancePath is "Root\LEGACY_HTTP\0000" ServiceName is "HTTP" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a549db0 for PDO 0x8a549f10 InstancePath is "Root\LEGACY_IPNAT\0000" ServiceName is "IpNat" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a549b58 for PDO 0x8a549cb8 InstancePath is "Root\LEGACY_IPSEC\0000" ServiceName is "IPSec" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a549900 for PDO 0x8a549a60 InstancePath is "Root\LEGACY_KSECDD\0000" ServiceName is "ksecdd" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a5496a8 for PDO 0x8a549808 InstancePath is "Root\LEGACY_MNMDD\0000" ServiceName is "mnmdd" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a549450 for PDO 0x8a5495b0 InstancePath is "Root\LEGACY_MOUNTMGR\0000" ServiceName is "mountmgr" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a5491f8 for PDO 0x8a549358 InstancePath is "Root\LEGACY_NDIS\0000" ServiceName is "NDIS" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4efed8 for PDO 0x8a4ef038 InstancePath is "Root\LEGACY_NDISTAPI\0000" ServiceName is "NdisTapi" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4efc80 for PDO 0x8a4efde0 InstancePath is "Root\LEGACY_NDISUIO\0000" ServiceName is "Ndisuio" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4efa28 for PDO 0x8a4efb88 InstancePath is "Root\LEGACY_NDPROXY\0000" ServiceName is "NDProxy" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4ef7d0 for PDO 0x8a4ef930 InstancePath is "Root\LEGACY_NETBT\0000" ServiceName is "NetBT" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4ef578 for PDO 0x8a4ef6d8 InstancePath is "Root\LEGACY_NULL\0000" ServiceName is "Null" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4ef320 for PDO 0x8a4ef480 InstancePath is "Root\LEGACY_PARTMGR\0000" ServiceName is "PartMgr" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a548008 for PDO 0x8a4ef228 InstancePath is "Root\LEGACY_PARVDM\0000" ServiceName is "ParVdm" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a548db0 for PDO 0x8a548f10 InstancePath is "Root\LEGACY_RASACD\0000" ServiceName is "RasAcd" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a548b58 for PDO 0x8a548cb8 InstancePath is "Root\LEGACY_RDPCDD\0000" ServiceName is "RDPCDD" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a548900 for PDO 0x8a548a60 InstancePath is "Root\LEGACY_TCPIP\0000" ServiceName is "Tcpip" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a5486a8 for PDO 0x8a548808 InstancePath is "Root\LEGACY_UCX01000\0000" ServiceName is "UCX01000" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a548450 for PDO 0x8a5485b0 InstancePath is "Root\LEGACY_VGASAVE\0000" ServiceName is "VgaSave" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a5481f8 for PDO 0x8a548358 InstancePath is "Root\LEGACY_VOLSNAP\0000" ServiceName is "VolSnap" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4eeed8 for PDO 0x8a4ee038 InstancePath is "Root\LEGACY_WANARP\0000" ServiceName is "Wanarp" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4eec80 for PDO 0x8a4eede0 InstancePath is "Root\LEGACY_WDF01_W8\0000" ServiceName is "WDF01_W8" State = DeviceNodeStarted (0x308) Previous State = DeviceNodeEnumerateCompletion (0x30d) DevNode 0x8a4eea28 for PDO 0x8a4eeb88 InstancePath is "Root\MEDIA\MS_MMACM" ServiceName is "audstub" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4ee7d0 for PDO 0x8a4ee930 InstancePath is "Root\MEDIA\MS_MMDRV" ServiceName is "audstub" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4ee578 for PDO 0x8a4ee6d8 InstancePath is "Root\MEDIA\MS_MMMCI" ServiceName is "audstub" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4ee320 for PDO 0x8a4ee480 InstancePath is "Root\MEDIA\MS_MMVCD" ServiceName is "audstub" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a547008 for PDO 0x8a4ee228 InstancePath is "Root\MEDIA\MS_MMVID" ServiceName is "audstub" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a547db0 for PDO 0x8a547f10 InstancePath is "Root\MS_L2TPMINIPORT\0000" ServiceName is "Rasl2tp" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a547b58 for PDO 0x8a547cb8 InstancePath is "Root\MS_NDISWANIP\0000" ServiceName is "NdisWan" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a547900 for PDO 0x8a547a60 InstancePath is "Root\MS_PPPOEMINIPORT\0000" ServiceName is "RasPppoe" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a5476a8 for PDO 0x8a547808 InstancePath is "Root\MS_PPTPMINIPORT\0000" ServiceName is "PptpMiniport" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a547450 for PDO 0x8a5475b0 InstancePath is "Root\MS_PSCHEDMP\0000" ServiceName is "PSched" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a5471f8 for PDO 0x8a547358 InstancePath is "Root\MS_PTIMINIPORT\0000" ServiceName is "Raspti" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4eded8 for PDO 0x8a4ed038 InstancePath is "Root\RDPDR\0000" ServiceName is "rdpdr" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4edc80 for PDO 0x8a4edde0 InstancePath is "Root\RDP_KBD\0000" ServiceName is "TermDD" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4eda28 for PDO 0x8a4edb88 InstancePath is "Root\RDP_MOU\0000" ServiceName is "TermDD" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4ed7d0 for PDO 0x8a4ed930 InstancePath is "Root\SYSTEM\0000" ServiceName is "swenum" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4ed578 for PDO 0x8a4ed6d8 InstancePath is "Root\SYSTEM\0001" ServiceName is "update" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301) DevNode 0x8a4ed320 for PDO 0x8a4ed480 InstancePath is "Root\SYSTEM\0002" ServiceName is "mssmbios" State = DeviceNodeInitialized (0x302) Previous State = DeviceNodeUninitialized (0x301)
  10. @Mov AX, 0xDEAD @Damnation I just test my pci.sys with EB FE. It works. This I can see, when I change the acpi.sys against the for Ryzen hacked acpi.sys. At once I see the endless running bar and I can easy reach the driverentry point of pci.sys. So, ACPIBusIrpStartDevice is never called. Dietmar
  11. @Mov AX, 0xDEAD ACPIBusIrpStartDevice cant be called, because this happens after driverentry of pci.sys Dietmar
  12. @Mov AX, 0xDEAD For sure the driverentry of pci.sys is not reached. The driverentry for acpi.sys is reached. But I dont understand, how to set your 4 Breakpoints. Can you please tell me step by step, when Windbg starts, what I have to do for to reach thoses breakpoints Dietmar
  13. @Mov AX, 0xDEAD I make the ultimative test, if driverentry of pci.sys is reached before Bsod via AcpiArbCrackPRT or not. For this I changed first 2 Bytes in pci.sys at adress driverentry of the for outpit modded debug against EB FE. Voila, when I start compi, Bsod via AcpiArbCrackPRT happens BEFORE the endless loop in driverentry of pci.sys with running bar is reached. So, driverentry of pci.sys is never reached on Ryzen with normal acpi.sys Dietmar PS: Here is my pci.sys debug, modded for output, and with EB FE at driverentry, checksum corrected. Please take a look at this pci.sys, if I did everything right with EB FE at driverentry. Dietmar pciEBFE.7z
  14. @Mov AX, 0xDEAD Here is DSDT from Bios 4007 from 8. Dezember 2020 for the AMD board rog strix b450-f gaming ii Dietmar dsdt4007ORIRaw.7z
  15. Hihi, I make small joke with the acpi.sys V2 where I did the Ryzen hack against AcpiArbCrackPRT in the morning. And voila, now pci.sys Debug gives output. Hm, can this mean, that the driver entry for pci.sys is never reached because the crash via AcpiArbCrackPRT happens before this? Microsoft (R) Windows Debugger Version 6.3.9600.17200 X86 Copyright (c) Microsoft Corporation. All rights reserved. Using NET for debugging Opened WinSock 2.0 Waiting to reconnect... Connected to target 192.168.2.104 on port 50000 on local IP 192.168.2.101. Connected to Windows XP 2600 x86 compatible target at (Sat Apr 9 00:58:19.572 2022 (UTC + 2:00)), ptr64 FALSE Kernel Debugger connection established. ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\Symbols ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\symbolssss Symbol search path is: C:\symbolssss Executable search path is: C:\Symbols Windows XP Kernel Version 2600 MP (1 procs) Checked x86 compatible Built by: 2600.xpsp.080413-2133 Machine Name: Kernel base = 0x80a02000 PsLoadedModuleList = 0x80b019e8 System Uptime: not available ************* Symbol Path validation summary ************** Response Time (ms) Location OK E:\binaries.x86fre\Symbols ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\Symbols ************* Symbol Path validation summary ************** Response Time (ms) Location OK C:\symbolssss OK C:\symbols OK C:\symbolss OK C:\symbolsss OK E:\binaries.x86fre\Symbols Deferred https://msdl.microsoft.com/download/symbols Deferred srv* Closing open log file otto7 Opened log file 'otto7' Break instruction exception - code 80000003 (first chance) nt!DbgBreakPoint: 80ac37e0 cc int 3 kd> bu pci!DriverEntry kd> g MM: Loader/HAL memory block indicates large pages cannot be used for 80100000->8012777F MM: Loader/HAL memory block indicates large pages cannot be used for 810A6000->8258AFFF MM: Disabling large pages for all ranges due to overlap Breakpoint 0 hit pci!DriverEntry: 8059fc96 8bff mov edi,edi 15: kd> g Adding Hack entry for Vendor:0x1045 Device:0xc621 = 0x4 Adding Hack entry for Vendor:0x1095 Device:0x0640 = 0x4 Adding Hack entry for Vendor:0x8086 Device:0x1230 = 0x4 Adding Hack entry for Vendor:0x8086 Device:0x7010 = 0x4 Adding Hack entry for Vendor:0x104b Device:0x0140 = 0x8 Adding Hack entry for Vendor:0x1179 Device:0x0603 = 0x8 Adding Hack entry for Vendor:0x8086 Device:0x7113 = 0x8 Adding Hack entry for Vendor:0x4978 Device:0x84c5 = 0x8 Adding Hack entry for Vendor:0x1106 Device:0x3040 = 0x8 Adding Hack entry for Vendor:0x0e11 Device:0x1000 = 0x10 Adding Hack entry for Vendor:0x0e11 Device:0x2000 = 0x10 Adding Hack entry for Vendor:0x1039 Device:0x0406 = 0x10 Adding Hack entry for Vendor:0x8086 Device:0x0482 = 0x4000 Adding Hack entry for Vendor:0x8086 Device:0x0008 = 0x10 Adding Hack entry for Vendor:0x1014 Device:0x0002 = 0x10 Adding Hack entry for Vendor:0x1080 Device:0x0600 = 0x20 Adding Hack entry for Vendor:0x1013 Device:0x1100 = 0x40 Adding Hack entry for Vendor:0x10b9 Device:0x5219 = 0x80 Adding Hack entry for Vendor:0x1c1c Device:0x0001 = 0x100 Adding Hack entry for Vendor:0x1097 Device:0x0038 = 0x100 Adding Hack entry for Vendor:0x100b Device:0xd001 = 0x400 Adding Hack entry for Vendor:0x8086 Device:0x04a3 = 0x800 Adding Hack entry for Vendor:0x10aa Device:0x0000 = 0x800 Adding Hack entry for Vendor:0x5333 Device:0x88d1 = 0x100000000 Adding Hack entry for Vendor:0x1179 Device:0x0605 = 0x1000 Adding Hack entry for Vendor:0x1013 Device:0x1110 = 0x2000 Adding Hack entry for Vendor:0x1180 Device:0x0478 = 0x2000 Adding Hack entry for Vendor:0x1180 Device:0x0475 = 0x2000 Adding Hack entry for Vendor:0x1180 Device:0x0476 = 0x2000 Adding Hack entry for Vendor:0x1004 Device:0x0101 = 0x4000 Adding Hack entry for Vendor:0x1042 Device:0x1000 = 0x4000 Adding Hack entry for Vendor:0x104c Device:0xac12 = 0x10000 Adding Hack entry for Vendor:0x1180 Device:0x0466 = 0x10000 Adding Hack entry for Vendor:0x1014 Device:0x0095 = 0x40000 Adding Hack entry for Vendor:0x8086 Device:0x2418 = 0x40000 Adding Hack entry for Vendor:0x8086 Device:0x2428 = 0x40000 Adding Hack entry for Vendor:0x8086 Device:0x244e = 0x40000 Adding Hack entry for Vendor:0x8086 Device:0x2448 = 0x40000 Adding Hack entry for Vendor:0x8086 Device:0x122e = 0x80000 Adding Hack entry for Vendor:0x8086 Device:0x7000 = 0x80000 Adding Hack entry for Vendor:0x8086 Device:0x7110 = 0x80000 Adding Hack entry for Vendor:0x8086 Device:0x7600 = 0x80000 Adding Hack entry for Vendor:0x1002 Device:0x4747 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4754 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x8901 = 0x100000000 Adding Hack entry for Vendor:0x1013 Device:0x00d6 = 0x400000 Adding Hack entry for Vendor:0x104c Device:0xac15 = 0x400000 Adding Hack entry for Vendor:0x110b Device:0x0004 = 0x400000 Adding Hack entry for Vendor:0x1000 Device:0x000f = 0x400000 Adding Hack entry for Vendor:0x104c Device:0xac17 = 0x400000 Adding Hack entry for Vendor:0x1023 Device:0x9397 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4742 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4744 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4749 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4750 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4751 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4755 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4757 = 0x20400000 Adding Hack entry for Vendor:0x1002 Device:0x4759 = 0x20400000 Adding Hack entry for Vendor:0x1002 Device:0x4c42 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4c44 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4c47 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4c49 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4c50 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x4c51 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x5654 = 0x100000000 Adding Hack entry for Vendor:0x1002 Device:0x5655 = 0x400000 Adding Hack entry for Vendor:0x1002 Device:0x5656 = 0x400000 Adding Hack entry for Vendor:0x121a Device:0x0003 = 0x400000 Adding Hack entry for Vendor:0x1045 Device:0xc861 SybSys:0x9300 SubVendor:0x107b = 0x400000 Adding Hack entry for Vendor:0x1045 Device:0xc861 SybSys:0xc861 SubVendor:0x1045 = 0x400000 Adding Hack entry for Vendor:0x8086 Device:0x1231 = 0x1000000 Adding Hack entry for Vendor:0x1273 Device:0x0002 = 0x1000000 Adding Hack entry for Vendor:0x1014 Device:0x007d = 0x1000000 Adding Hack entry for Vendor:0x1285 Device:0x0100 = 0x1000000 Adding Hack entry for Vendor:0x1217 Device:0x6836 = 0x8000000 Adding Hack entry for Vendor:0x1217 Device:0x6832 = 0x8000000 Adding Hack entry for Vendor:0x1091 Device:0x07a0 = 0x20000000 Adding Hack entry for Vendor:0x8086 Device:0x7800 = 0x20000000 Adding Hack entry for Vendor:0x10c8 Device:0x8005 = 0x20000000 Adding Hack entry for Vendor:0x10c8 Device:0x8006 = 0x20000000 Adding Hack entry for Vendor:0x10c8 Device:0x0005 = 0x20000000 Adding Hack entry for Vendor:0x10c8 Device:0x0006 = 0x20000000 Adding Hack entry for Vendor:0x102b Device:0x1001 = 0x80000000 Adding Hack entry for Vendor:0x10dd Device:0x0100 = 0x20000000 Adding Hack entry for Vendor:0x1095 Device:0x0646 = 0x20000000 Adding Hack entry for Vendor:0x1095 Device:0x0670 = 0x20000000 Adding Hack entry for Vendor:0x1095 Device:0x0648 = 0x20000000 Adding Hack entry for Vendor:0x1011 Device:0x0026 = 0x20000000 Adding Hack entry for Vendor:0x8086 Device:0xb154 = 0x20000000 Adding Hack entry for Vendor:0x5333 Device:0x8904 = 0x20000000 Adding Hack entry for Vendor:0x1106 Device:0x8598 = 0x20000000 Adding Hack entry for Vendor:0x1106 Device:0x8605 = 0x20000000 Adding Hack entry for Vendor:0x1179 Device:0x0609 = 0x40000000 Adding Hack entry for Vendor:0x1014 Device:0x0047 = 0x40000000 Adding Hack entry for Vendor:0x102b Device:0x051b = 0x80000000 Adding Hack entry for Vendor:0x102b Device:0x0520 = 0x80000000 Adding Hack entry for Vendor:0x102b Device:0x0521 = 0x80000000 Adding Hack entry for Vendor:0x102b Device:0x1025 = 0x80000000 Adding Hack entry for Vendor:0x102b Device:0x0525 = 0x80000000 Adding Hack entry for Vendor:0x8086 Device:0x7121 = 0x80000000 Adding Hack entry for Vendor:0x8086 Device:0x7123 = 0x80000000 Adding Hack entry for Vendor:0x8086 Device:0x7125 = 0x80000000 Adding Hack entry for Vendor:0x8086 Device:0x1132 = 0x80000000 Adding Hack entry for Vendor:0x9005 Device:0x0050 = 0x80000000 Adding Hack entry for Vendor:0x9005 Device:0x005f = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x4752 = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x474f = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x474d = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x4753 = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x474c = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x474e = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x4c4d = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x4c4e = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x4c52 = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x4c53 = 0x80000000 Adding Hack entry for Vendor:0x1023 Device:0x9880 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x00a0 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x00a1 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x00a3 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x00b0 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x00b1 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x00b3 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0100 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0101 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0102 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0103 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0120 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0121 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0122 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0123 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0150 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0151 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0152 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0153 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0200 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0201 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0202 = 0x80000000 Adding Hack entry for Vendor:0x10de Device:0x0203 = 0x80000000 Adding Hack entry for Vendor:0x12d2 Device:0x0018 = 0x80000000 Adding Hack entry for Vendor:0x12d2 Device:0x0019 = 0x80000000 Adding Hack entry for Vendor:0x1013 Device:0x6003 = 0x80000000 Adding Hack entry for Vendor:0x3d3d Device:0x000a = 0x80000000 Adding Hack entry for Vendor:0x1002 Device:0x4158 = 0x100000000 Adding Hack entry for Vendor:0x1002 Device:0x4354 = 0x100000000 Adding Hack entry for Vendor:0x1002 Device:0x4358 = 0x100000000 Adding Hack entry for Vendor:0x1002 Device:0x4554 = 0x100000000 Adding Hack entry for Vendor:0x1002 Device:0x4758 = 0x100000000 Adding Hack entry for Vendor:0x1002 Device:0x4c54 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x8810 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x8811 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x8812 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x8814 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x8880 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x88b0 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x88c0 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x88c1 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x88d0 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x88f0 = 0x100000000 Adding Hack entry for Vendor:0x5333 Device:0x8902 = 0x100000000 Adding Hack entry for Vendor:0x0e11 Device:0xb109 = 0x200000000 Adding Hack entry for Vendor:0x1002 Device:0x4342 = 0x8000000000 Adding Hack entry for Vendor:0x1002 Device:0x4362 = 0x8000000000 Adding Hack entry for Vendor:0x1002 Device:0x4371 = 0x8000000000 Adding Hack entry for Vendor:0x100c Device:0x3202 = 0x8a00 Adding Hack entry for Vendor:0x1066 Device:0x8002 = 0x300000 Adding Hack entry for Vendor:0x1066 Device:0x0002 = 0x300000 Adding Hack entry for Vendor:0x1004 Device:0x0102 = 0x2004000 Adding Hack entry for Vendor:0x1045 Device:0xc814 = 0x20400000 Adding Hack entry for Vendor:0x1002 Device:0x4756 = 0x20400000 Adding Hack entry for Vendor:0x1002 Device:0x475a = 0x20400000 Adding Hack entry for Vendor:0x8086 Device:0x1161 = 0x1040000000 Adding Hack entry for Vendor:0x8086 Device:0x1461 = 0x1040000000 Adding Hack entry for Vendor:0x1000 Device:0x000b = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x0020 = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x0028 = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x0029 = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x002a = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x002b = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x002c = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x002d = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x002e = 0xa0000000 Adding Hack entry for Vendor:0x10de Device:0x002f = 0xa0000000 Adding Hack entry for Vendor:0x1013 Device:0x00d6 SybSys:0x80d6 SubVendor:0x1018 = 0x0 Debug device @ Segment 0, 3.0.0 PCI - Unexpected status c0000034 from ZwQueryValueKey, expected STATUS_BUFFER_TOO_SMALL (c0000023). PCI - Unexpected status c0000034 from ZwQueryValueKey, expected STATUS_BUFFER_TOO_SMALL (c0000023). *** Assertion failed: IopInitHalResources == NULL *** Source File: d:\xpsp\base\ntos\io\pnpmgr\pnpinit.c, line 1455 Break repeatedly, break Once, Ignore, terminate Process, or terminate Thread (boipt)? i i *** Fatal System Error: 0x0000007b (0xBACC7518,0xC0000034,0x00000000,0x00000000) Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows XP 2600 x86 compatible target at (Sat Apr 9 00:59:12.057 2022 (UTC + 2:00)), ptr64 FALSE Loading Kernel Symbols ................................... Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7B, {bacc7518, c0000034, 0, 0} Probably caused by : ntkrpamp.exe ( nt!IopMarkBootPartition+f5 ) Followup: MachineOwner --------- nt!RtlpBreakWithStatusInstruction: 80ac37ec cc int 3 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* INACCESSIBLE_BOOT_DEVICE (7b) During the initialization of the I/O system, it is possible that the driver for the boot device failed to initialize the device that the system is attempting to boot from, or it is possible for the file system that is supposed to read that device to either fail its initialization or to simply not recognize the data on the boot device as a file system structure that it recognizes. In the former case, the argument (#1) is the address of a Unicode string data structure that is the ARC name of the device from which the boot was being attempted. In the latter case, the argument (#1) is the address of the device object that could not be mounted. If this is the initial setup of the system, then this error can occur if the system was installed on an unsupported disk or SCSI controller. Note that some controllers are supported only by drivers which are in the Windows Driver Library (WDL) which requires the user to do a custom install. See the Windows Driver Library for more information. This error can also be caused by the installation of a new SCSI adapter or disk controller or repartitioning the disk with the system partition. If this is the case, on x86 systems the boot.ini file must be edited or on ARC systems setup must be run. See the "Advanced Server System Administrator's User Guide" for information on changing boot.ini. If the argument is a pointer to an ARC name string, then the format of the first two (and in this case only) longwords will be: USHORT Length; USHORT MaximumLength; PWSTR Buffer; That is, the first longword will contain something like 00800020 where 20 is the actual length of the Unicode string, and the next longword will contain the address of buffer. This address will be in system space, so the high order bit will be set. If the argument is a pointer to a device object, then the format of the first word will be: USHORT Type; That is, the first word will contain a 0003, where the Type code will ALWAYS be 0003. Note that this makes it immediately obvious whether the argument is a pointer to an ARC name string or a device object, since a Unicode string can never have an odd number of bytes, and a device object will always have a Type code of 3. Arguments: Arg1: bacc7518, Pointer to the device object or Unicode string of ARC name Arg2: c0000034, (reserved) Arg3: 00000000, (reserved) Arg4: 00000000 Debugging Details: ------------------ DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0x7B PROCESS_NAME: System ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre DPC_STACK_BASE: FFFFFFFFBACCC000 LAST_CONTROL_TRANSFER: from 80a30d7b to 80ac37ec STACK_TEXT: bacc7080 80a30d7b 00000003 bacc73dc 00000000 nt!RtlpBreakWithStatusInstruction bacc70cc 80a319e6 00000003 80085000 e12ec418 nt!KiBugCheckDebugBreak+0x19 bacc74ac 80a31f77 0000007b bacc7518 c0000034 nt!KeBugCheck2+0x574 bacc74cc 80d32863 0000007b bacc7518 c0000034 nt!KeBugCheckEx+0x1b bacc7634 80d380f6 80085000 00000000 80085000 nt!IopMarkBootPartition+0xf5 bacc7684 80d341f1 80085000 bacc76a0 00034000 nt!IopInitializeBootDrivers+0x53e bacc7830 80d31940 80085000 00000000 8a528da8 nt!IoInitSystem+0x82d bacc7dac 80bd81ac 80085000 00000000 00000000 nt!Phase1Initialization+0xb12 bacc7ddc 80ae4212 80d30e2e 80085000 00000000 nt!PspSystemThreadStartup+0x34 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!IopMarkBootPartition+f5 80d32863 8d85e0feffff lea eax,[ebp-120h] SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: nt!IopMarkBootPartition+f5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4802b3ce IMAGE_VERSION: 5.1.2600.5512 FAILURE_BUCKET_ID: 0x7B_nt!IopMarkBootPartition+f5 BUCKET_ID: 0x7B_nt!IopMarkBootPartition+f5 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x7b_nt!iopmarkbootpartition+f5 FAILURE_ID_HASH: {e710697b-9762-1225-4a06-575d839651e1} Followup: MachineOwner ---------
  16. @Mov AX, 0xDEAD I have the same SHA-1 checksum for pci.sys (Debug) before modd as you and also the same SHA-1 checksum after modd exakt as you. But no output for PCI, only Acpi as before. May be the reason is the following: When I set a breakpoint via bu pci!DriverEntry the Bsod 0x7E (0xC0000005, xxx, yyy, zzz) happens before the compi breaks there Dietmar PS: I also check the Symbol path for the Debug and modded pci.sys. It is 805e8000 8060ef80 pci (pdb symbols) c:\symbolssss\sys\pci.pdb This is correct, because in C:\symbolssss folder I extract the Debug *.pdb. EDIT: What do you write in kd> line after Windbg starts?
  17. @Mov AX, 0xDEAD I make a new folder for the XP SP3 Debug, here Symbolssss. Then I put the Debug pci.sys on the AMD compi and the (unmodded) Debug acpi.sys V2 also. Here is the txt output from Windbg. The ed Kd_PCI_Mask 0xFFFFFFFF gives no extra output. Also I noticed, that in the PCI files from Source is not a single function with "Tracename" in it Dietmar otto4AcpiPci.7z
  18. @George King Yes, the problem is that on the Ryzen board some devices are not recogniced as PCI devices. And also Linux has big problems with this. The binary hack does the same as you mentioned. I think it is a hardware problem of the Ryzen cpu, I remember that they change in the Apic model, when the Irq is generated from the uprising flank to the downfalling (or vice versa) Dietmar
  19. It just looks like, if something is not recogniced as PCI device on the Ryzen compi. *** Assertion failed: PciInterfacesInstantiated *** Source File: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c, line 3512 and then also *** Assertion failed: pciInterface *** Source File: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c, line 3518 Here is the Windbg output after Ryzen compi reached Breakpoint ACPI!AcpiArbCrackPRT: to ----------> Bsod 0x7E, (0xC0000005,xxx,yyy,zzz) Dietmar otto3.7z
  20. @Damnation The register EDI is 0, so adress is 0x00000010. Question is, why EDI becomes 0 Dietmar
  21. I make a try with Lan Windbg on this Ryzen board with the unpatched acpi.sys V2 "Debug". Not so much more information as before Dietmar *** Assertion failed: PciInterfacesInstantiated *** Source File: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c, line 3512 Break repeatedly, break Once, Ignore, terminate Process, or terminate Thread (boipt)? i i *** Assertion failed: pciInterface *** Source File: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c, line 3518 Break repeatedly, break Once, Ignore, terminate Process, or terminate Thread (boipt)? i i PS: Unhandled Kernel Mode Exception Pointers = 0xBACC69DC Code c0000005 Addr BA74CBE4 Info0 00000000 Info1 00000010 Info2 00000010 Info3 8A332500 *** Fatal System Error: 0x0000007e (0xC0000005,0xBA74CBE4,0xBACC6E90,0xBACC6B8C) Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows XP 2600 x86 compatible target at (Fri Apr 8 14:54:11.026 2022 (UTC + 2:00)), ptr64 FALSE Loading Kernel Symbols ........................... Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7E, {c0000005, ba74cbe4, bacc6e90, bacc6b8c} *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 Probably caused by : ACPI.sys ( ACPI!AcpiArbCrackPRT+f8 ) Followup: MachineOwner --------- nt!RtlpBreakWithStatusInstruction: 80ac37ec cc int 3 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: ba74cbe4, The address that the exception occurred at Arg3: bacc6e90, Exception Record Address Arg4: bacc6b8c, Context Record Address Debugging Details: ------------------ *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 *** No owner thread found for resource 80afd640 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung "0x%08lx" verweist auf Speicher bei "0x%08lx". Die Daten wurden wegen eines E/A-Fehlers in "0x%081x" nicht in den Arbeitsspeicher bertragen. FAULTING_IP: ACPI!AcpiArbCrackPRT+f8 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 3535] ba74cbe4 ff5710 call dword ptr [edi+10h] EXCEPTION_RECORD: bacc6e90 -- (.exr 0xffffffffbacc6e90) ExceptionAddress: ba74cbe4 (ACPI!AcpiArbCrackPRT+0x000000f8) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000010 Attempt to read from address 00000010 CONTEXT: bacc6b8c -- (.cxr 0xffffffffbacc6b8c;r) eax=bacc7070 ebx=00000000 ecx=0000bb40 edx=00000056 esi=8a2f8660 edi=00000000 eip=ba74cbe4 esp=bacc6f58 ebp=bacc70a0 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 ACPI!AcpiArbCrackPRT+0xf8: ba74cbe4 ff5710 call dword ptr [edi+10h] ds:0023:00000010=???????? Last set context: eax=bacc7070 ebx=00000000 ecx=0000bb40 edx=00000056 esi=8a2f8660 edi=00000000 eip=ba74cbe4 esp=bacc6f58 ebp=bacc70a0 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 ACPI!AcpiArbCrackPRT+0xf8: ba74cbe4 ff5710 call dword ptr [edi+10h] ds:0023:00000010=???????? Resetting default scope PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung "0x%08lx" verweist auf Speicher bei "0x%08lx". Die Daten wurden wegen eines E/A-Fehlers in "0x%081x" nicht in den Arbeitsspeicher bertragen. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000010 READ_ADDRESS: 00000010 FOLLOWUP_IP: ACPI!AcpiArbCrackPRT+f8 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 3535] ba74cbe4 ff5710 call dword ptr [edi+10h] BUGCHECK_STR: 0x7E DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre DPC_STACK_BASE: FFFFFFFFBACCC000 LOCK_ADDRESS: 80afd6c0 -- (!locks 80afd6c0) Resource @ nt!IopDeviceTreeLock (0x80afd6c0) Shared 1 owning threads Threads: 8a328020-01<*> 1 total locks, 1 locks currently held PNP_TRIAGE: Lock address : 0x80afd6c0 Thread Count : 1 Thread address: 0x8a328020 Thread wait : 0xcf LAST_CONTROL_TRANSFER: from 80a30d7b to 80ac37ec STACK_TEXT: bacc70a0 ba78cf2a 8a2f8660 bacc70cc bacc70e0 ACPI!AcpiArbCrackPRT+0xf8 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 3535] bacc70d4 ba79c367 ba782f00 bacc70f0 e12b4624 ACPI!AcpiArbAddAllocation+0x9d [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 1474] bacc7158 ba78bc7d e10089a0 e12b4624 ba782f00 ACPI!ArbBootAllocation+0xf5 [e:\nt\base\ntos\arb\arbiter.c @ 1406] bacc716c ba79c3de ba782f00 e12b4624 e12b4624 ACPI!AcpiArbBootAllocation+0x49 [e:\nt\base\busdrv\acpi\driver\nt\irqarb.c @ 1850] bacc7188 80b6c111 ba782f00 00000009 bacc71a8 ACPI!ArbArbiterHandler+0x52 [e:\nt\base\ntos\arb\arbiter.c @ 1562] bacc71c4 80b6d093 bacc71b8 00000000 80afd1c0 nt!IopBootAllocation+0xbb bacc7208 80b6d80b 00000004 e1008950 e101a170 nt!IopAllocateBootResourcesInternal+0xc5 bacc7228 80d38c8b 00000004 8a2f8660 e101a170 nt!IopAllocateBootResources+0x75 bacc724c 80b5653a 00000004 8a2f8660 e101a170 nt!IopReportBootResources+0x65 bacc727c 80b5cb93 8a2e6598 800005e4 00000001 nt!PiQueryAndAllocateBootResources+0x150 bacc736c 80b5d26d 8a2e6598 00000000 00000000 nt!PipProcessNewDeviceNode+0xc9d bacc75c4 80a2cff0 8a33ec80 00000000 00000000 nt!PipProcessDevNodeTree+0x1bd bacc7608 80a2d2fb 00000000 00000000 80090f18 nt!PipDeviceActionWorker+0xc4 bacc7620 80d37f53 00000000 00000006 00000000 nt!PipRequestDeviceAction+0x13b bacc7684 80d341f1 80085000 bacc76a0 00034000 nt!IopInitializeBootDrivers+0x39b bacc7830 80d31940 80085000 00000000 8a328020 nt!IoInitSystem+0x82d bacc7dac 80bd81ac 80085000 00000000 00000000 nt!Phase1Initialization+0xb12 bacc7ddc 80ae4212 80d30e2e 80085000 00000000 nt!PspSystemThreadStartup+0x34 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 FAULTING_SOURCE_LINE: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c FAULTING_SOURCE_FILE: e:\nt\base\busdrv\acpi\driver\nt\irqarb.c FAULTING_SOURCE_LINE_NUMBER: 3535 FAULTING_SOURCE_CODE: 3531: &classCode, 3532: &subClassCode, 3533: &parent, 3534: &routingToken, > 3535: &flags); 3536: 3537: if (!NT_SUCCESS(status)) { 3538: return STATUS_NOT_FOUND; 3539: } 3540: SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: ACPI!AcpiArbCrackPRT+f8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: ACPI IMAGE_NAME: ACPI.sys DEBUG_FLR_IMAGE_TIMESTAMP: 624f31cb IMAGE_VERSION: 5.1.2600.1106 STACK_COMMAND: .cxr 0xffffffffbacc6b8c ; kb FAILURE_BUCKET_ID: 0x7E_ACPI!AcpiArbCrackPRT+f8 BUCKET_ID: 0x7E_ACPI!AcpiArbCrackPRT+f8 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x7e_acpi!acpiarbcrackprt+f8 FAILURE_ID_HASH: {30b13d1d-5098-59bf-2bca-ef183c89cfe1} Followup: MachineOwner ---------
  22. @Damnation @Andalu And here ist acpi.sys V2 "free" with binary hack for Ryzen and for DDB fail Dietmar https://ufile.io/3u5xfmx3
  23. @Damnation I remember the crazy search for this Bsod. I just kill ACPICrackPRT and this works also for Ryzen Dietmar https://ufile.io/4naa88ej
×
×
  • Create New...