Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

Sign In with Google

Our Sites

covecube.com 
community.covecube.com 
blog.covecube.com 
wiki.covecube.com 
bitflock.com 
stablebit.com 

Poll

No poll attached to this discussion.

In order to better support our growing community we've set up a new more powerful forum.


The new forum is at: http://community.covecube.com


The new forum is running IP.Board and will be our primary forum from now on.


This forum is being retired, but will remain online indefinitely in order to preserve its contents. This forum is now read only.


Thank you,

BugCheck M4 Build

RayRay
edited January 2012 in DrivePool
Happened while using RichCopy to copy over data to the drives:

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800a7ffffe, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004b167d5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

Failed calling InternetOpenUrl, GLE=12029

READ_ADDRESS:  fffffa800a7ffffe Nonpaged pool

FAULTING_IP: 
covefs+167d5
fffff880`04b167d5 0fb70448        movzx   eax,word ptr [rax+rcx*2]

MM_INTERNAL_CODE:  0

IMAGE_NAME:  covefs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4f10ce9d

MODULE_NAME: covefs

FAULTING_MODULE: fffff88004b00000 covefs

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  RichCopy64.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800f5b2670 -- (.trap 0xfffff8800f5b2670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a7f80aa rbx=0000000000000000 rcx=0000000000003faa
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004b167d5 rsp=fffff8800f5b2800 rbp=fffffa80084c16d0
 r8=0000000000000001  r9=0000000000000002 r10=fffffa80084c16d0
r11=fffffa8009841b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
covefs+0x167d5:
fffff880`04b167d5 0fb70448        movzx   eax,word ptr [rax+rcx*2] ds:fffffa80`0a7ffffe=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800016469fc to fffff8000169ac40

STACK_TEXT:  
fffff880`0f5b2508 fffff800`016469fc : 00000000`00000050 fffffa80`0a7ffffe 00000000`00000000 fffff880`0f5b2670 : nt!KeBugCheckEx [d:\win7sp1_gdr\minkernel\ntos\ke\amd64\procstat.asm @ 177] fffff880`0f5b2510 fffff800`01698d6e : 00000000`00000000 fffffa80`0a7ffffe fffffa80`06716500 fffffa80`089b2460 : nt!MmAccessFault+0xffffffff`fff9ee3c
fffff880`0f5b2670 fffff880`04b167d5 : 00003faa`00007ff6 fffffa80`0e1d9f00 fffff8a0`06c7b410 fffff880`04b0ce51 : nt!KiPageFault+0x16e [d:\win7sp1_gdr\minkernel\ntos\ke\amd64\trap.asm @ 932] fffff880`0f5b2800 fffff880`04b16918 : fffffa80`09977940 fffff880`0f5b2860 fffff880`0f5b28b0 fffff800`01696470 : covefs+0x167d5
fffff880`0f5b2840 fffff880`04b1ff6a : fffffa80`09977940 fffffa80`089b2460 00000000`00000000 00000000`00000000 : covefs+0x16918 fffff880`0f5b2890 fffff880`0132d6af : fffffa80`089b4b90 fffffa80`0a2b61c0 00000000`00000000 fffffa80`098875b0 : covefs+0x1ff6a
fffff880`0f5b29d0 fffff800`019a2a0f : fffffa80`0a2b61c0 fffffa80`084c16d0 00000000`00000000 fffffa80`098875b0 : fltmgr!FltpDispatch+0x9f [d:\w7rtm\minkernel\fs\filtermgr\filter\fltmgr.c @ 4312] fffff880`0f5b2a30 fffff800`01992174 : 00000000`00000000 fffffa80`084c16d0 00000000`00000101 fffffa80`098875b0 : nt!IopCloseFile+0x11f [d:\win7sp1_gdr\minkernel\ntos\io\iomgr\objsup.c @ 601]
fffff880`0f5b2ac0 fffff800`01991f31 : fffffa80`084c16d0 fffffa80`00000001 fffff8a0`06c7b410 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4 [d:\win7sp1_gdr\minkernel\ntos\ob\obhandle.c @ 3125] fffff880`0f5b2b40 fffff800`019924f4 : 00000000`00000a98 fffffa80`084c16d0 fffff8a0`06c7b410 00000000`00000a98 : nt!ObpCloseHandleTableEntry+0xb1 [d:\win7sp1_gdr\minkernel\ntos\ob\obclose.c @ 203]
fffff880`0f5b2bd0 fffff800`01699ed3 : fffffa80`09841b60 fffff880`0f5b2ca0 00000000`042fe9f8 fffffa80`00000000 : nt!ObpCloseHandle+0x94 [d:\win7sp1_gdr\minkernel\ntos\ob\obclose.c @ 378] fffff880`0f5b2c20 00000000`77ac140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 [d:\win7sp1_gdr\minkernel\ntos\ke\amd64\trap.asm @ 2072]
00000000`0b586948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ac140a

Can provide the MEMORY.DMP if needed.
Sign In or Register to comment.