Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [032414-9609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Program Files (x86)\Windows Kits\8.1\Debuggers\x64\localsymbols*
http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Program Files (x86)\Windows Kits\8.1\Debuggers\x64\localsymbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff800`ce00d000 PsLoadedModuleList = 0xfffff800`ce2d1990
Debug session time: Mon Mar 24 12:34:08.304 2014 (UTC + 1:00)
System Uptime: 1 days 18:02:06.034
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {b500190637, ffffd0002216ff78, ffffd0002216f780, fffff800ce0907c6}
Probably caused by : ntkrnlmp.exe ( nt!CcGetDirtyPages+f6 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190637
Arg2: ffffd0002216ff78
Arg3: ffffd0002216f780
Arg4: fffff800ce0907c6
Debugging Details:
------------------
EXCEPTION_RECORD: ffffd0002216ff78 -- (.exr 0xffffd0002216ff78)
ExceptionAddress: fffff800ce0907c6 (nt!CcGetDirtyPages+0x00000000000000f6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd0002216f780 -- (.cxr 0xffffd0002216f780;r)
rax=00000000000002fd rbx=fdffe0000aae07a0 rcx=ffffe00009555a70
rdx=0000000000000000 rsi=ffffe0001c34e360 rdi=ffffe00009555b88
rip=fffff800ce0907c6 rsp=ffffd000221701b0 rbp=ffffd00022170300
r8=0000000000000000 r9=0000000000000000 r10=ffffe00009555b88
r11=7ffffffffffffffc r12=ffffe00009555a80 r13=ffffc0000033a800
r14=ffffd00022170388 r15=fdffe0000aae07b0
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!CcGetDirtyPages+0xf6:
fffff800`ce0907c6 663903 cmp word ptr [rbx],ax ds:002b:fdffe000`0aae07a0=????
Last set context:
rax=00000000000002fd rbx=fdffe0000aae07a0 rcx=ffffe00009555a70
rdx=0000000000000000 rsi=ffffe0001c34e360 rdi=ffffe00009555b88
rip=fffff800ce0907c6 rsp=ffffd000221701b0 rbp=ffffd00022170300
r8=0000000000000000 r9=0000000000000000 r10=ffffe00009555b88
r11=7ffffffffffffffc r12=ffffe00009555a80 r13=ffffc0000033a800
r14=ffffd00022170388 r15=fdffe0000aae07b0
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!CcGetDirtyPages+0xf6:
fffff800`ce0907c6 663903 cmp word ptr [rbx],ax ds:002b:fdffe000`0aae07a0=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 1
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800ce35a150
GetUlongFromAddress: unable to read from fffff800ce35a208
ffffffffffffffff
FOLLOWUP_IP:
nt!CcGetDirtyPages+f6
fffff800`ce0907c6 663903 cmp word ptr [rbx],ax
FAULTING_IP:
nt!CcGetDirtyPages+f6
fffff800`ce0907c6 663903 cmp word ptr [rbx],ax
BUGCHECK_STR: 0x24
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff800009a27d2 to fffff800ce0907c6
STACK_TEXT:
ffffd000`221701b0 fffff800`009a27d2 : 00000000`00000000 fffff800`008facf0 ffffd000`22170900 ffffd000`22170388 : nt!CcGetDirtyPages+0xf6
ffffd000`22170280 fffff800`009a8d81 : ffffd000`22170980 fffff800`009ab028 00000000`00000000 fffff800`00958d00 : Ntfs!NtfsCheckpointVolume+0xa22
ffffd000`22170790 fffff800`009a6ce1 : ffffd000`22170900 ffffd000`22170900 ffffe000`0031b188 00000000`00000000 : Ntfs!NtfsCheckpointAllVolumesWorker+0x61
ffffd000`221707e0 fffff800`009a1c38 : ffffd000`22170900 00000000`00000000 fffff800`009a8d20 ffffd000`221708b0 : Ntfs!NtfsForEachVcb+0x1ad
ffffd000`22170880 fffff800`ce0ae1b9 : fffff800`029b2724 fffff800`009a1b0c fffff800`00958d80 ffffe000`1c34e040 : Ntfs!NtfsCheckpointAllVolumes+0x12c
ffffd000`22170b50 fffff800`ce09a2e4 : 00000000`00000000 ffffe000`1c34e040 ffffe000`1c34e040 ffffe000`0033b900 : nt!ExpWorkerThread+0x2b5
ffffd000`22170c00 fffff800`ce1612c6 : fffff800`ce2fb180 ffffe000`1c34e040 ffffe000`0bcf8080 0000007f`fffffff8 : nt!PspSystemThreadStartup+0x58
ffffd000`22170c60 00000000`00000000 : ffffd000`22171000 ffffd000`2216b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CcGetDirtyPages+f6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c
IMAGE_VERSION: 6.3.9600.16452
STACK_COMMAND: .cxr 0xffffd0002216f780 ; kb
BUCKET_ID_FUNC_OFFSET: f6
FAILURE_BUCKET_ID: 0x24_nt!CcGetDirtyPages
BUCKET_ID: 0x24_nt!CcGetDirtyPages
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x24_nt!ccgetdirtypages
FAILURE_ID_HASH: {5a906867-130a-65fa-3cc0-b8318296b114}
Followup: MachineOwner
---------