To be clear regarding drivers I am total newbie, and I am just learning how to write them.
I am writing some storage driver (virtual drive) and all BSOD stack-traces were point to my code, but this one doesn’t.
And so far I am unable to wrap my head around it. Couldn’t find anything that would help me resolve the real cause of the problem.
It always happens when I unmount the drive, and I am missing what else I need to do (or maybe I overdid something?).
I would appreciate some help debugging the cause of all this.
Here is the bugcheck Analysis
`
kd> !analyze -v
-
*
-
Bugcheck Analysis *
-
*
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8a0000cc000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88000d54e17, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
Could not read faulting driver name
KEY_VALUES_STRING: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
SYSTEM_MANUFACTURER: VMware, Inc.
VIRTUAL_MACHINE: VMware
SYSTEM_PRODUCT_NAME: VMware Virtual Platform
SYSTEM_VERSION: None
BIOS_VENDOR: Phoenix Technologies LTD
BIOS_VERSION: 6.00
BIOS_DATE: 07/31/2013
BASEBOARD_MANUFACTURER: Intel Corporation
BASEBOARD_PRODUCT: 440BX Desktop Reference Platform
BASEBOARD_VERSION: None
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a0000cc000
BUGCHECK_P2: 0
BUGCHECK_P3: fffff88000d54e17
BUGCHECK_P4: 0
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d000e8
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002d00280
GetUlongPtrFromAddress: unable to read from fffff80002d00408
GetPointerFromAddress: unable to read from fffff80002d000a8
fffff8a0000cc000 Paged pool
FAULTING_IP:
CLFS!ClfsDecodeBlock+53
fffff880`00d54e17 0fb607 movzx eax,byte ptr [rdi]
MM_INTERNAL_CODE: 0
CPU_COUNT: 1
CPU_MHZ: b54
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 17’00000000 (cache) 17’00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: W7X64DRV
ANALYSIS_SESSION_TIME: 12-28-2018 09:39:48.0306
ANALYSIS_VERSION: 10.0.17134.12 amd64fre
TRAP_FRAME: fffff8800492a970 – (.trap 0xfffff8800492a970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000082d67b rbx=0000000000000000 rcx=000000000000000b
rdx=0000000097500ff3 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000d54e17 rsp=fffff8800492ab00 rbp=fffff88000d6da40
r8=00000000005e6a00 r9=0000000000000010 r10=fffff8a0000b1000
r11=000000004a868051 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
CLFS!ClfsDecodeBlock+0x53:
fffff88000d54e17 0fb607 movzx eax,byte ptr [rdi] ds:00000000
00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a7b2ac to fffff80002acf640
STACK_TEXT:
fffff8800492a808 fffff800
02a7b2ac : 0000000000000050 fffff8a0
000cc000 0000000000000000 fffff880
0492a970 : nt!KeBugCheckEx
fffff8800492a810 fffff800
02acd76e : 0000000000000000 fffff8a0
000cc000 fffff8800492aa00 00000000
0000300d : nt! ?? ::FNODOBFM::string'+0x4621f fffff880
0492a970 fffff88000d54e17 : 00000000
00000001 fffffa800e9aa201 00000000
00000002 0000000000000020 : nt!KiPageFault+0x16e fffff880
0492ab00 fffff88000d75948 : fffff8a0
000b1000 fffffa800ccc0b30 fffffa80
0e911010 fffff8a0000b1000 : CLFS!ClfsDecodeBlock+0x53 fffff880
0492ab40 fffff88000d75642 : fffffa80
0e911010 fffffa800e911010 00000000
00000001 fffff8a000001701 : CLFS!CClfsBaseFilePersisted::WriteMetadataBlock+0x288 fffff880
0492abd0 fffff88000d59335 : fffffa80
0e911010 0000000000000001 00000000
00000000 0000000000000000 : CLFS!CClfsBaseFilePersisted::FlushImage+0x3a fffff880
0492ac10 fffff88000d862fd : 00000000
00000000 0000000000000000 fffffa80
0ccc0b30 0000000000000000 : CLFS!CClfsLogFcbPhysical::FlushMetadata+0xe1 fffff880
0492ac60 fffff88000d82d57 : fffffa80
0e96c630 fffff8a000001780 fffffa80
0d2e9300 0000000000000000 : CLFS!CClfsLogFcbVirtual::Cleanup+0x231 fffff880
0492ad00 fffff88000d7fc52 : fffffa80
0e96c630 fffff8800492b110 fffffa80
0ccc0b30 0000000000000000 : CLFS!CClfsLogCcb::Cleanup+0x147 fffff880
0492ad50 fffff88000d994be : fffffa80
0e9283e0 fffffa800e9283e0 00000000
00000001 fffffa800e96ca00 : CLFS!CClfsRequest::Cleanup+0x5e fffff880
0492ada0 fffff88000d71a09 : fffffa80
0e9283e0 0000000000000000 fffffa80
0d2e93c0 0000000000000000 : CLFS!ClfsDispatchIoRequest+0x32 fffff880
0492adf0 fffff80002dd6f0f : fffffa80
0e9283e0 fffffa800ccc0b30 00000000
00000000 fffffa800e96ca00 : CLFS!CClfsDriver::LogIoDispatch+0x21 fffff880
0492ae20 fffff80002dc66b4 : 00000000
00000000 fffffa800ccc0b30 fffff880
00d6b110 fffff88000d5bb99 : nt!IopCloseFile+0x11f fffff880
0492aeb0 fffff80002dc6471 : fffffa80
0ccc0b30 fffffa8000000001 fffff8a0
00001780 0000000000000002 : nt!ObpDecrementHandleCount+0xb4 fffff880
0492af30 fffff80002dc6a34 : 00000000
00000758 fffffa800ccc0b30 fffff8a0
00001780 0000000000000758 : nt!ObpCloseHandleTableEntry+0xb1 fffff880
0492afc0 fffff80002ace8d3 : fffffa80
0e6ed060 fffff8800492b090 fffff880
00d6b110 fffff88000d8c9d7 : nt!ObpCloseHandle+0x94 fffff880
0492b010 fffff80002acae70 : fffff880
00da0476 fffffffffffef800 00000000
00000000 fffff8a002937520 : nt!KiSystemServiceCopyEnd+0x13 fffff880
0492b1a8 fffff88000da0476 : ffffffff
fffef800 0000000000000000 fffff8a0
02937520 fffffa800e9ee320 : nt!KiServiceLinkage fffff880
0492b1b0 fffff80002d58c42 : fffffa80
0e96cc40 fffffa800e96c510 fffffa80
0e9ee320 0000000000000000 : CLFS!ClfsCloseLogFileObject+0x7a fffff880
0492b1f0 fffff80002d59a3b : 00000000
00000000 fffffa800e9ee320 00000000
00000000 fffffa800ccc0b30 : nt!TmpTmOffline+0xe6 fffff880
0492b240 fffff80002dc66b4 : 00000000
00000001 fffffa800e9ee320 fffffa80
0e96cc10 fffffa8000000000 : nt!TmpCloseTransactionManager+0x2b fffff880
0492b280 fffff80002dc6471 : 00000000
00000000 fffffa8000000000 fffff8a0
00001780 0000000000000000 : nt!ObpDecrementHandleCount+0xb4 fffff880
0492b300 fffff80002dc6a34 : 00000000
00000760 fffffa800e9ee320 fffff8a0
00001780 0000000000000760 : nt!ObpCloseHandleTableEntry+0xb1 fffff880
0492b390 fffff80002ace8d3 : fffffa80
0e6ed060 fffff8800492b460 fffff8a0
000a7000 0000000000000000 : nt!ObpCloseHandle+0x94 fffff880
0492b3e0 fffff80002acae70 : fffff880
01334585 fffff8800492b920 00000000
00000000 fffff8a0000a7000 : nt!KiSystemServiceCopyEnd+0x13 fffff880
0492b578 fffff88001334585 : fffff880
0492b920 0000000000000000 fffff8a0
000a7000 fffff8800492b600 : nt!KiServiceLinkage fffff880
0492b580 fffff88001318418 : fffffa80
0e9aa2a0 fffff8a0000a7000 fffffa80
0f10e910 fffff880010d7000 : Ntfs!TxfShutdownRm+0x2e1 fffff880
0492b660 fffff880013195f8 : fffffa80
0e9aa2a0 fffffa800f10d180 fffffa80
0f10d100 fffff88001123d00 : Ntfs!TxfShutdownVolume+0x10c fffff880
0492b720 fffff880013073ee : fffffa80
0e9aa2a0 0000000000000000 00000000
00000000 0000000000000000 : Ntfs!NtfsLockVolume+0x198 fffff880
0492b800 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x2de
THREAD_SHA1_HASH_MOD_FUNC: 7d0edbd44806e28bde116c5debb37212f7a90710
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 58c88db71732daa38856123691e4b80fb91a30f1
THREAD_SHA1_HASH_MOD: a0d598732c44c6965712e3cfcfc078cb425401a6
FOLLOWUP_IP:
CLFS!ClfsDecodeBlock+53
fffff880`00d54e17 0fb607 movzx eax,byte ptr [rdi]
FAULT_INSTR_CODE: f07b60f
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: CLFS!ClfsDecodeBlock+53
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CLFS
IMAGE_NAME: CLFS.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11d
IMAGE_VERSION: 6.1.7600.16385
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x50_CLFS!ClfsDecodeBlock+53
BUCKET_ID: X64_0x50_CLFS!ClfsDecodeBlock+53
PRIMARY_PROBLEM_CLASS: X64_0x50_CLFS!ClfsDecodeBlock+53
TARGET_TIME: 2018-12-28T08:30:27.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2010-11-20 10:30:02
BUILDDATESTAMP_STR: 101119-1850
BUILDLAB_STR: win7sp1_rtm
BUILDOSVER_STR: 6.1.7601.17514.amd64fre.win7sp1_rtm.101119-1850
ANALYSIS_SESSION_ELAPSED_TIME: 6b4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_clfs!clfsdecodeblock+53
FAILURE_ID_HASH: {40eff690-da10-f4c9-2650-796690e5dda9}
Followup: MachineOwner
`