Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121410-14305-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e00000 PsLoadedModuleList = 0xfffff800`0303de50
Debug session time: Tue Dec 14 09:04:26.826 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:05.745
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff9810c342698, 0, fffff880012424e0, 5}
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!memmove+250 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff9810c342698, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880012424e0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030a80e0
fffff9810c342698
FAULTING_IP:
Ntfs!memmove+250
fffff880`012424e0 488b440af8 mov rax,qword ptr [rdx+rcx-8]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002f8bd60 -- (.trap 0xfffff88002f8bd60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=fffff9810c3426c8
rdx=ffffffffffffffd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012424e0 rsp=fffff88002f8bef8 rbp=fffff9800c342718
r8=00000000ffffff68 r9=0000000007fffffb r10=fffff8a0046cf510
r11=fffff9800c342760 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
Ntfs!memmove+0x250:
fffff880`012424e0 488b440af8 mov rax,qword ptr [rdx+rcx-8] ds:fffff981`0c342698=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002eef8c1 to fffff80002e70740
STACK_TEXT:
fffff880`02f8bbf8 fffff800`02eef8c1 : 00000000`00000050 fffff981`0c342698 00000000`00000000 fffff880`02f8bd60 : nt!KeBugCheckEx
fffff880`02f8bc00 fffff800`02e6e82e : 00000000`00000000 00000000`00000028 00000000`00000000 fffff880`013004a3 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`02f8bd60 fffff880`012424e0 : fffff880`01301310 fffffa80`05c56010 fffff880`02f8bf50 fffff8a0`00000400 : nt!KiPageFault+0x16e
fffff880`02f8bef8 fffff880`01301310 : fffffa80`05c56010 fffff880`02f8bf50 fffff8a0`00000400 fffff8a0`046c3d20 : Ntfs!memmove+0x250
fffff880`02f8bf00 fffff880`01301dbc : fffff8a0`046c3d20 fffff800`030155a0 fffff8a0`046c3d20 00000000`00000000 : Ntfs!NtfsRestartInsertSimpleRoot+0x50
fffff880`02f8bf40 fffff880`012fb54f : fffffa80`05c56010 fffffa80`05e5a180 fffff880`02f8c0d8 fffff880`02f8c110 : Ntfs!InsertSimpleRoot+0xb8
fffff880`02f8c010 fffff880`012afe17 : 00000000`00000000 fffff8a0`046c3d20 fffff880`02f8c0d8 fffff880`02f8c168 : Ntfs!AddToIndex+0xcf
fffff880`02f8c090 fffff880`012b4665 : fffffa80`05c56010 fffff8a0`046c3d20 fffff8a0`04627b78 fffffa80`00000000 : Ntfs!NtOfsAddRecords+0x167
fffff880`02f8c270 fffff880`012faebc : fffffa80`05c56010 fffff8a0`04627b70 00000000`0009ac0c 00000000`0009ac10 : Ntfs!GetSecurityIdFromSecurityDescriptorUnsafe+0x1fd
fffff880`02f8c320 fffff880`013334be : fffffa80`05c56010 fffffa80`05e5a180 00000000`00000000 fffff980`0c342d00 : Ntfs!NtfsCacheSharedSecurityByDescriptor+0xa0
fffff880`02f8c370 fffff880`012b98fd : fffffa80`05c56010 fffffa80`05e5a180 fffff800`030155a0 00000000`00000000 : Ntfs! ?? ::NNGAKEGL::`string'+0x11130
fffff880`02f8c3f0 fffff880`012546c4 : fffffa80`05c56010 fffff880`0127ea00 fffffa80`05c56010 fffff8a0`04766a90 : Ntfs!NtfsUpdateFcbInfoFromDisk+0x4fe
fffff880`02f8c540 fffff880`01321c66 : fffffa80`05c56010 00000000`00000000 00000000`00000000 fffff8a0`04766a90 : Ntfs!NtfsInitializeDirectory+0x254
fffff880`02f8c650 fffff880`0131690a : fffffa80`05c56010 fffffa80`05e5a180 00000000`00000000 fffffa80`05e5a180 : Ntfs!NtfsInitializeExtendDirectory+0x3d6
fffff880`02f8c810 fffff880`012b2c79 : 00000000`00000000 fffffa80`05e43bd0 00000000`00000001 00000000`00000000 : Ntfs!NtfsMountVolume+0x1691
fffff880`02f8cb50 fffff880`0123a51d : 00000000`00000000 00000000`00000000 fffffa80`05c56010 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x59
fffff880`02f8cb90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspDispatch+0x2ad
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!memmove+250
fffff880`012424e0 488b440af8 mov rax,qword ptr [rdx+rcx-8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: Ntfs!memmove+250
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
FAILURE_BUCKET_ID: X64_0x50_Ntfs!memmove+250
BUCKET_ID: X64_0x50_Ntfs!memmove+250
Followup: MachineOwner
---------