To be alerted when this document is updated, click the Subscribe to Article link in the Actions box..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880056a4d08
Arg3: fffff880056a4560
Arg4: fffff880018b3352
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880056a4d08 -- (.exr 0xfffff880056a4d08)
ExceptionAddress: fffff880018b3352 (Ntfs!NtfsReadMftRecord+0x0000000000000082)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000018
Attempt to read from address 0000000000000018
CONTEXT: fffff880056a4560 -- (.cxr 0xfffff880056a4560)
rax=000000000381d000 rbx=000000000381cc00 rcx=000000000000000a
rdx=fffff880056a5040 rsi=fffffa80040be8b0 rdi=0000000000000000
rip=fffff880018b3352 rsp=fffff880056a4f40 rbp=0000000000000080
r8=0000000000000400 r9=0000000000000001 r10=0000000000000004
r11=fffff880056a4fe8 r12=fffffa8002550180 r13=fffff8a00decdb48
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
Ntfs!NtfsReadMftRecord+0x82:
fffff880`018b3352 493b4618 cmp rax,qword ptr [r14+18h] ds:002b:00000000`00000018=????????????????
Resetting default scope
PROCESS_NAME: vds.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000018
READ_ADDRESS: 0000000000000018
FOLLOWUP_IP:
Ntfs!NtfsReadMftRecord+82
fffff880`018b3352 493b4618 cmp rax,qword ptr [r14+18h]
FAULTING_IP:
Ntfs!NtfsReadMftRecord+82
fffff880`018b3352 493b4618 cmp rax,qword ptr [r14+18h]
BUGCHECK_STR: 0x24
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffff880018aeefc to fffff880018b3352
STACK_TEXT:
fffff880`056a4f40 fffff880`018aeefc : fffffa80`040be8b0 fffffa80`02550180 fffff8a0`0decdb48 00000000`00000001 : Ntfs!NtfsReadMftRecord+0x82
fffff880`056a4ff0 fffff880`018bcb18 : fffff8a0`14267010 fffff8a0`0decdc70 fffff880`056a5400 fffff880`056a5200 : Ntfs!NtfsLookupInFileRecord+0x6c
fffff880`056a5080 fffff880`018a34d9 : fffffa80`040be8b0 fffff880`056a5400 fffffa80`040be8b0 fffff8a0`0decdb40 : Ntfs!NtfsWriteFileSizes+0xa8
fffff880`056a51e0 fffff880`018aa81c : fffffa80`040be8b0 fffff8a0`0decdc70 fffff8a0`0decdb40 fffffa80`02550180 : Ntfs!NtfsCommonClose+0x559
fffff880`056a52b0 fffff880`013aabcf : fffff880`056a5400 fffffa80`035c6ab0 fffff880`056a5401 00000000`00000005 : Ntfs!NtfsFsdClose+0x2dc
fffff880`056a53b0 fffff880`013a96df : fffffa80`041c86c0 fffffa80`035c6ab0 fffffa80`01b71500 fffffa80`035c6ab0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`056a5440 fffff800`0198928e : fffffa80`043358b0 fffffa80`032d0420 00000000`00000000 fffffa80`041c86c0 : fltmgr!FltpDispatch+0xcf
fffff880`056a54a0 fffff800`01693f34 : 00000000`00000001 fffff880`056a5960 fffffa80`018ad080 00000000`00000000 : nt!IopDeleteFile+0x11e
fffff880`056a5530 fffff880`018c5116 : fffff880`056a5960 fffff8a0`0decdc70 fffff8a0`0decdb00 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`056a5590 fffff880`018f3290 : fffff8a0`0decdc70 fffff880`056a5960 fffff8a0`0decdb40 fffffa80`02550180 : Ntfs!NtfsDeleteInternalAttributeStream+0x106
fffff880`056a55e0 fffff880`018d465f : fffffa80`0340f010 fffffa80`02550180 fffff880`056a5900 fffffa80`035c8a01 : Ntfs!NtfsPerformDismountOnVcb+0x2c0
fffff880`056a56f0 fffff880`018d43ee : fffffa80`02550101 fffffa80`02550180 00000000`00000000 fffffa80`0253bce0 : Ntfs!NtfsLockVolumeInternal+0xff
fffff880`056a5770 fffff880`018c0fe3 : fffffa80`0340f010 00000000`00000001 fffffa80`041c8600 fffffa80`02550180 : Ntfs!NtfsLockVolume+0x1fe
fffff880`056a5840 fffff880`018c12fd : fffffa80`0340f010 00000000`00000000 fffff880`056a5960 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x1b3
fffff880`056a5880 fffff880`013aabcf : fffff880`056a59d0 fffffa80`035c87f0 fffff880`056a5901 fffffa80`0340f010 : Ntfs!NtfsFsdFileSystemControl+0x13d
fffff880`056a5920 fffff880`013ca95e : fffffa80`041c86c0 fffffa80`03731960 fffffa80`041c8600 fffffa80`035c87f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`056a59b0 fffff800`019a9b37 : fffffa80`03731960 fffff880`056a5ca0 fffffa80`035c8b00 fffffa80`035c87f0 : fltmgr!FltpFsControl+0xee
fffff880`056a5a10 fffff800`01966142 : fffffa80`043d9270 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`056a5b40 fffff800`01689153 : fffff880`056a5ca0 00000000`00000000 00000000`00000000 fffff800`01983600 : nt!NtFsControlFile+0x56
fffff880`056a5bb0 00000000`77b0164a : 000007fe`fd8bec28 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00efe228 000007fe`fd8bec28 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!ZwFsControlFile+0xa
00000000`00efe230 00000000`778a5cff : 00000000`00090018 00000000`00000000 000073f9`ec14a8ad 000007fe`f44993ff : KERNELBASE!DeviceIoControl+0xec
00000000`00efe2a0 000007fe`f449ee60 : 00000000`00000000 00000000`00000000 00000000`000001c4 00000000`00000101 : kernel32!DeviceIoControlImplementation+0x7f
00000000`00efe2f0 000007fe`f449ef0f : 00000000`00108c01 00000000`00000000 00000000`00000000 00000000`000001c4 : vdsutil!LockVolume+0x64
00000000`00efe350 00000000`ff2a6b79 : 00000000`00108c40 00000000`002dc7d8 000007fe`f4491a70 000007fe`00000000 : vdsutil!LockDismountVolume+0x3b
00000000`00efe3b0 000007fe`ff5efe85 : 00000000`002dc7d8 00000000`00000000 00000000`00000003 000007fe`ff5efe46 : vds!CVdsVolume::Dismount+0x2b1
00000000`00efe490 000007fe`ff69b68e : 00000000`00000003 00000000`00142080 000007fe`f5626d38 00000000`00117050 : RPCRT4!Invoke+0x65
00000000`00efe4f0 000007fe`ff5f2356 : 00000000`00efeb58 00000000`0010ad50 00000000`00000000 00000000`00efebb0 : RPCRT4!Ndr64StubWorker+0x61b
00000000`00efeab0 000007fe`ff040883 : 00000000`00000000 00000000`00000000 000007fe`f5634960 00000000`0010b290 : RPCRT4!NdrStubCall3+0xb5
00000000`00efeb10 000007fe`ff040ccd : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : ole32!CStdStubBuffer_Invoke+0x5b [d:\w7rtm\com\rpc\ndrole\stub.cxx @ 1586]
00000000`00efeb40 000007fe`ff040c43 : 00000000`00117050 00000000`0016c254 00000000`00118d20 00000000`ff254a60 : ole32!SyncStubInvoke+0x5d [d:\w7rtm\com\ole32\com\dcomrem\channelb.cxx @ 1187]
00000000`00efebb0 000007fe`feefa4f0 : 00000000`00117050 00000000`00116bc0 00000000`00117050 00000000`00000000 : ole32!StubInvoke+0xdb [d:\w7rtm\com\ole32\com\dcomrem\channelb.cxx @ 1396]
00000000`00efec60 000007fe`ff0414d6 : 00000000`00000000 00000000`00000010 00000000`0016ebf0 00000000`0010b290 : ole32!CCtxComChnl::ContextInvoke+0x190 [d:\w7rtm\com\ole32\com\dcomrem\ctxchnl.cxx @ 1262]
00000000`00efedf0 000007fe`ff04122b : 00000000`d0908070 00000000`00116bc0 00000000`001171b0 00000000`00142080 : ole32!AppInvoke+0xc2 [d:\w7rtm\com\ole32\com\dcomrem\channelb.cxx @ 1086]
00000000`00efee60 000007fe`ff03fd6d : 00000000`00116bc0 00000000`00116bc0 00000000`0010b290 00000000`00070005 : ole32!ComInvokeWithLockAndIPID+0x52b [d:\w7rtm\com\ole32\com\dcomrem\channelb.cxx @ 1727]
00000000`00efeff0 000007fe`ff5e3134 : 000007fe`ff0a9930 00000000`00000000 00000000`00118250 000007fe`ff5dd0d7 : ole32!ThreadInvoke+0x30d [d:\w7rtm\com\ole32\com\dcomrem\channelb.cxx @ 4751]
00000000`00eff090 000007fe`ff5e3296 : 000007fe`ff050ab0 00000000`00000001 00000000`00eff300 000007fe`feed8ffc : RPCRT4!DispatchToStubInCNoAvrf+0x14
00000000`00eff0c0 000007fe`ff5e5ac0 : 00000000`0016c230 00000000`00000000 00000000`00eff3e4 00000000`0016c230 : RPCRT4!RPC_INTERFACE::DispatchToStubWorker+0x146
00000000`00eff1e0 000007fe`ff5e59fb : 00000000`00000000 00000000`00eff300 00000000`00eff300 00000000`00118250 : RPCRT4!RPC_INTERFACE::DispatchToStub+0xa0
00000000`00eff220 000007fe`ff5e5992 : 00000000`0016c230 00000000`0016c230 00000000`0016c230 000007fe`ff5e44a0 : RPCRT4!RPC_INTERFACE::DispatchToStubWithObject+0x5b
00000000`00eff2a0 000007fe`ff5e366d : 00000000`00000001 00000000`00000000 000007fe`ff5c0000 00000000`0016c230 : RPCRT4!LRPC_SCALL::DispatchRequest+0x42c
00000000`00eff380 000007fe`ff623d96 : 00000000`00115910 00000000`00115910 00000000`00115910 00000000`00000000 : RPCRT4!LRPC_SCALL::HandleRequest+0x20d
00000000`00eff4b0 000007fe`ff623be0 : 00000000`00000000 00000000`00118100 00000000`00000004 00000000`00000000 : RPCRT4!LRPC_SASSOCIATION::HandleRequest+0xf6
00000000`00eff520 000007fe`ff5e3441 : 00000000`001084a0 00000000`00111740 00000000`001084a0 40000000`00000000 : RPCRT4!LRPC_ADDRESS::HandleRequest+0x100
00000000`00eff5a0 000007fe`ff600485 : 00000000`00000000 00000000`001115d0 00000000`00000000 00000000`00000000 : RPCRT4!LRPC_ADDRESS::ProcessIO+0x500
00000000`00eff6a0 00000000`77acb6bb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : RPCRT4!LrpcIoComplete+0xa5
00000000`00eff730 00000000`77acff2f : 00000000`00000000 00000000`00000000 00000000`0000ffff 00000000`00000000 : ntdll!TppAlpcpExecuteCallback+0x26b
00000000`00eff7c0 00000000`778a59ed : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x3f8
00000000`00effac0 00000000`77adc541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`00effaf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d