Quantcast
Channel: Windows 7 Miscellaneous forum
Viewing all articles
Browse latest Browse all 11372

BSOD Bugcheck 27 RDR_FILE_SYSTEM Windows 7 Ent

$
0
0

Looking for some insight into this Bugcheck.  The same bugcheck seems to be happening to another user.  Both have reported the laptop blue screens using MS Project.  One said it happens when he saves a file and the other said when he is in"MS office applications".  Thanks.


Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\johnsc10\Downloads\MEMORYJordan.DMP]
Kernel Summary Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.22411.amd64fre.win7sp1_ldr.130801-1934
Machine Name:
Kernel base = 0xfffff800`0365e000 PsLoadedModuleList = 0xfffff800`038a26d0
Debug session time: Thu Aug 21 09:07:20.539 2014 (UTC - 4:00)
System Uptime: 0 days 14:53:47.610
Loading Kernel Symbols
...............................................................
................................................................
................................................................

Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.................
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 27, {baad0073, fffff88024ccac78, fffff88024cca4d0, fffff8800af060f2}

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for mfehidk.sys - 
Probably caused by : mrxsmb10.sys ( mrxsmb10!MRxSmbBuildWriteRequest+25e )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

RDR_FILE_SYSTEM (27)
    If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
    exception record and context record. Do a .cxr on the 3rd parameter and then kb to
    obtain a more informative stack trace.
    The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined
    as follows:
     RDBSS_BUG_CHECK_CACHESUP  = 0xca550000,
     RDBSS_BUG_CHECK_CLEANUP   = 0xc1ee0000,
     RDBSS_BUG_CHECK_CLOSE     = 0xc10e0000,
     RDBSS_BUG_CHECK_NTEXCEPT  = 0xbaad0000,
Arguments:
Arg1: 00000000baad0073
Arg2: fffff88024ccac78
Arg3: fffff88024cca4d0
Arg4: fffff8800af060f2

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88024ccac78 -- (.exr 0xfffff88024ccac78)
ExceptionAddress: fffff8800af060f2 (mrxsmb10!MRxSmbBuildWriteRequest+0x000000000000025e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008

CONTEXT:  fffff88024cca4d0 -- (.cxr 0xfffff88024cca4d0;r)
rax=fffff8800af0be90 rbx=fffffa80138cd5b0 rcx=fffff8800d958f50
rdx=0000000000000001 rsi=fffffa80138cd5b0 rdi=fffffa8019826470
rip=fffff8800af060f2 rsp=fffff88024ccaeb0 rbp=0000000000000000
 r8=00000000000012ff  r9=0000000000000000 r10=0000000000000002
r11=0000000000000000 r12=0000000000000001 r13=fffffa8019820000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010297
mrxsmb10!MRxSmbBuildWriteRequest+0x25e:
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8] ds:002b:00000000`00000008=????
Last set context:
rax=fffff8800af0be90 rbx=fffffa80138cd5b0 rcx=fffff8800d958f50
rdx=0000000000000001 rsi=fffffa80138cd5b0 rdi=fffffa8019826470
rip=fffff8800af060f2 rsp=fffff88024ccaeb0 rbp=0000000000000000
 r8=00000000000012ff  r9=0000000000000000 r10=0000000000000002
r11=0000000000000000 r12=0000000000000001 r13=fffffa8019820000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010297
mrxsmb10!MRxSmbBuildWriteRequest+0x25e:
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8] ds:002b:00000000`00000008=????
Resetting default scope

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000008

READ_ADDRESS:  0000000000000008 

FOLLOWUP_IP: 
mrxsmb10!MRxSmbBuildWriteRequest+25e
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8]

FAULTING_IP: 
mrxsmb10!MRxSmbBuildWriteRequest+25e
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8]

BUGCHECK_STR:  0x27

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

DEVICE_OBJECT: fffffa801543b728

DRIVER_OBJECT: 0000000000000000

LAST_CONTROL_TRANSFER:  from fffff8800af06550 to fffff8800af060f2

STACK_TEXT:  
fffff880`24ccaeb0 fffff880`0af06550 : fffff880`00001201 fffff8a0`18f25000 fffffa80`138cd500 00000000`00000000 : mrxsmb10!MRxSmbBuildWriteRequest+0x25e
fffff880`24ccafd0 fffff880`0aefe505 : 00000000`00000000 fffffa80`155ea400 fffffa80`138cd5b0 fffffa80`150aa8e0 : mrxsmb10!SmbPseExchangeStart_Write+0x2c4
fffff880`24ccb060 fffff880`0af05c85 : fffffa80`17257840 fffffa80`155ea410 fffffa80`181bdc90 fffff880`0af0628c : mrxsmb10!SmbCeInitiateExchange+0x4a1
fffff880`24ccb0e0 fffff880`05895b46 : 00000000`00000001 00000000`00000000 fffff8a0`00000001 fffffa80`00000000 : mrxsmb10!MRxSmbWrite+0x3e9
fffff880`24ccb190 fffff880`05596ac9 : 00000000`00000001 fffff880`00000001 00000000`00000000 fffff8a0`00000001 : csc!CscWrite+0x3aa
fffff880`24ccb2a0 fffff880`055a5aef : fffffa80`19826470 fffff880`0558b110 fffffa80`1543b4f0 fffff880`24ccb520 : rdbss!RxLowIoSubmit+0x291
fffff880`24ccb300 fffff880`0557bf84 : fffffa80`19826990 fffff880`24ccb520 fffff880`0558b110 00000000`00000001 : rdbss!RxLowIoWriteShell+0x7f
fffff880`24ccb330 fffff880`055a5a16 : fffffa80`19826470 fffffa80`1543b4f0 fffff8a0`1100c010 fffff8a0`1100c3b0 : rdbss!RxCommonFileWrite+0x1ccc
fffff880`24ccb4b0 fffff880`05573714 : 00000000`00000000 fffff880`24ccb520 01cfbd40`d7569a00 00000000`00000001 : rdbss!RxCommonWrite+0xe6
fffff880`24ccb4e0 fffff880`05591b94 : fffffa80`1543b4f0 fffffa80`13e39604 00000000`c0000016 fffff880`015c01b5 : rdbss!RxFsdCommonDispatch+0x870
fffff880`24ccb5d0 fffff880`054202cc : fffffa80`1543b4f0 00000000`c0000016 fffffa80`1543b608 fffffa80`13e39620 : rdbss!RxFsdDispatch+0x224
fffff880`24ccb640 fffff880`01808271 : fffffa80`17f515b0 fffffa80`1543b4f0 fffffa80`181fa400 fffff8a0`003376a0 : mrxsmb!MRxSmbFsdDispatch+0xc0
fffff880`24ccb680 fffff880`01806138 : fffff8a0`003376a0 fffffa80`17f515b0 00000000`00000001 00000000`00000000 : mup!MupiCallUncProvider+0x161
fffff880`24ccb6f0 fffff880`01806b0d : fffffa80`1543b4f0 fffff880`01804110 fffffa80`164cef20 00000000`00000000 : mup!MupStateMachine+0x128
fffff880`24ccb740 fffff880`00c02bcf : fffffa80`1543b698 fffffa80`17f515b0 fffff880`24ccb7e0 fffffa80`15195830 : mup!MupFsdIrpPassThrough+0x12d
fffff880`24ccb790 fffff880`00c016df : fffffa80`0d4ccde0 fffffa80`0d4cbf40 fffffa80`0d4ccd00 fffffa80`1543b4f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`24ccb820 fffff880`01690a10 : fffffa80`1543b4f0 fffffa80`0d4cbdf0 fffffa80`1543b4f0 fffffa80`164cef00 : fltmgr!FltpDispatch+0xcf
fffff880`24ccb880 fffff800`039de7fb : 00000000`00000001 fffffa80`164cef20 00000000`00000001 fffffa80`1543b4f0 : mfehidk!DEVICEDISPATCH::DispatchPassThrough+0x140
fffff880`24ccb900 fffff800`039e96d3 : fffffa80`1543b728 00000000`00000000 fffffa80`164cef20 fffff880`03702180 : nt!IopSynchronousServiceTail+0xfb
fffff880`24ccb970 fffff800`036d01d3 : 00000000`00001001 00000000`00000000 00000000`00000000 00000000`067bcea0 : nt!NtWriteFile+0x7e2
fffff880`24ccba70 00000000`77cc133a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`067bcdb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cc133a


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  mrxsmb10!MRxSmbBuildWriteRequest+25e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mrxsmb10

IMAGE_NAME:  mrxsmb10.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  50804251

STACK_COMMAND:  .cxr 0xfffff88024cca4d0 ; kb

FAILURE_BUCKET_ID:  X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e

BUCKET_ID:  X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x27_mrxsmb10!mrxsmbbuildwriterequest+25e

FAILURE_ID_HASH:  {e454b02a-a3ef-39ed-ffa5-d09145fcc547}

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

RDR_FILE_SYSTEM (27)
    If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
    exception record and context record. Do a .cxr on the 3rd parameter and then kb to
    obtain a more informative stack trace.
    The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined
    as follows:
     RDBSS_BUG_CHECK_CACHESUP  = 0xca550000,
     RDBSS_BUG_CHECK_CLEANUP   = 0xc1ee0000,
     RDBSS_BUG_CHECK_CLOSE     = 0xc10e0000,
     RDBSS_BUG_CHECK_NTEXCEPT  = 0xbaad0000,
Arguments:
Arg1: 00000000baad0073
Arg2: fffff88024ccac78
Arg3: fffff88024cca4d0
Arg4: fffff8800af060f2

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff88024ccac78 -- (.exr 0xfffff88024ccac78)
ExceptionAddress: fffff8800af060f2 (mrxsmb10!MRxSmbBuildWriteRequest+0x000000000000025e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008

CONTEXT:  fffff88024cca4d0 -- (.cxr 0xfffff88024cca4d0;r)
rax=fffff8800af0be90 rbx=fffffa80138cd5b0 rcx=fffff8800d958f50
rdx=0000000000000001 rsi=fffffa80138cd5b0 rdi=fffffa8019826470
rip=fffff8800af060f2 rsp=fffff88024ccaeb0 rbp=0000000000000000
 r8=00000000000012ff  r9=0000000000000000 r10=0000000000000002
r11=0000000000000000 r12=0000000000000001 r13=fffffa8019820000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010297
mrxsmb10!MRxSmbBuildWriteRequest+0x25e:
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8] ds:002b:00000000`00000008=????
Last set context:
rax=fffff8800af0be90 rbx=fffffa80138cd5b0 rcx=fffff8800d958f50
rdx=0000000000000001 rsi=fffffa80138cd5b0 rdi=fffffa8019826470
rip=fffff8800af060f2 rsp=fffff88024ccaeb0 rbp=0000000000000000
 r8=00000000000012ff  r9=0000000000000000 r10=0000000000000002
r11=0000000000000000 r12=0000000000000001 r13=fffffa8019820000
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010297
mrxsmb10!MRxSmbBuildWriteRequest+0x25e:
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8] ds:002b:00000000`00000008=????
Resetting default scope

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000008

READ_ADDRESS:  0000000000000008 

FOLLOWUP_IP: 
mrxsmb10!MRxSmbBuildWriteRequest+25e
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8]

FAULTING_IP: 
mrxsmb10!MRxSmbBuildWriteRequest+25e
fffff880`0af060f2 450fb74608      movzx   r8d,word ptr [r14+8]

BUGCHECK_STR:  0x27

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

DEVICE_OBJECT: fffffa801543b728

DRIVER_OBJECT: 0000000000000000

LAST_CONTROL_TRANSFER:  from fffff8800af06550 to fffff8800af060f2

STACK_TEXT:  
fffff880`24ccaeb0 fffff880`0af06550 : fffff880`00001201 fffff8a0`18f25000 fffffa80`138cd500 00000000`00000000 : mrxsmb10!MRxSmbBuildWriteRequest+0x25e
fffff880`24ccafd0 fffff880`0aefe505 : 00000000`00000000 fffffa80`155ea400 fffffa80`138cd5b0 fffffa80`150aa8e0 : mrxsmb10!SmbPseExchangeStart_Write+0x2c4
fffff880`24ccb060 fffff880`0af05c85 : fffffa80`17257840 fffffa80`155ea410 fffffa80`181bdc90 fffff880`0af0628c : mrxsmb10!SmbCeInitiateExchange+0x4a1
fffff880`24ccb0e0 fffff880`05895b46 : 00000000`00000001 00000000`00000000 fffff8a0`00000001 fffffa80`00000000 : mrxsmb10!MRxSmbWrite+0x3e9
fffff880`24ccb190 fffff880`05596ac9 : 00000000`00000001 fffff880`00000001 00000000`00000000 fffff8a0`00000001 : csc!CscWrite+0x3aa
fffff880`24ccb2a0 fffff880`055a5aef : fffffa80`19826470 fffff880`0558b110 fffffa80`1543b4f0 fffff880`24ccb520 : rdbss!RxLowIoSubmit+0x291
fffff880`24ccb300 fffff880`0557bf84 : fffffa80`19826990 fffff880`24ccb520 fffff880`0558b110 00000000`00000001 : rdbss!RxLowIoWriteShell+0x7f
fffff880`24ccb330 fffff880`055a5a16 : fffffa80`19826470 fffffa80`1543b4f0 fffff8a0`1100c010 fffff8a0`1100c3b0 : rdbss!RxCommonFileWrite+0x1ccc
fffff880`24ccb4b0 fffff880`05573714 : 00000000`00000000 fffff880`24ccb520 01cfbd40`d7569a00 00000000`00000001 : rdbss!RxCommonWrite+0xe6
fffff880`24ccb4e0 fffff880`05591b94 : fffffa80`1543b4f0 fffffa80`13e39604 00000000`c0000016 fffff880`015c01b5 : rdbss!RxFsdCommonDispatch+0x870
fffff880`24ccb5d0 fffff880`054202cc : fffffa80`1543b4f0 00000000`c0000016 fffffa80`1543b608 fffffa80`13e39620 : rdbss!RxFsdDispatch+0x224
fffff880`24ccb640 fffff880`01808271 : fffffa80`17f515b0 fffffa80`1543b4f0 fffffa80`181fa400 fffff8a0`003376a0 : mrxsmb!MRxSmbFsdDispatch+0xc0
fffff880`24ccb680 fffff880`01806138 : fffff8a0`003376a0 fffffa80`17f515b0 00000000`00000001 00000000`00000000 : mup!MupiCallUncProvider+0x161
fffff880`24ccb6f0 fffff880`01806b0d : fffffa80`1543b4f0 fffff880`01804110 fffffa80`164cef20 00000000`00000000 : mup!MupStateMachine+0x128
fffff880`24ccb740 fffff880`00c02bcf : fffffa80`1543b698 fffffa80`17f515b0 fffff880`24ccb7e0 fffffa80`15195830 : mup!MupFsdIrpPassThrough+0x12d
fffff880`24ccb790 fffff880`00c016df : fffffa80`0d4ccde0 fffffa80`0d4cbf40 fffffa80`0d4ccd00 fffffa80`1543b4f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`24ccb820 fffff880`01690a10 : fffffa80`1543b4f0 fffffa80`0d4cbdf0 fffffa80`1543b4f0 fffffa80`164cef00 : fltmgr!FltpDispatch+0xcf
fffff880`24ccb880 fffff800`039de7fb : 00000000`00000001 fffffa80`164cef20 00000000`00000001 fffffa80`1543b4f0 : mfehidk!DEVICEDISPATCH::DispatchPassThrough+0x140
fffff880`24ccb900 fffff800`039e96d3 : fffffa80`1543b728 00000000`00000000 fffffa80`164cef20 fffff880`03702180 : nt!IopSynchronousServiceTail+0xfb
fffff880`24ccb970 fffff800`036d01d3 : 00000000`00001001 00000000`00000000 00000000`00000000 00000000`067bcea0 : nt!NtWriteFile+0x7e2
fffff880`24ccba70 00000000`77cc133a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`067bcdb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cc133a


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  mrxsmb10!MRxSmbBuildWriteRequest+25e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mrxsmb10

IMAGE_NAME:  mrxsmb10.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  50804251

STACK_COMMAND:  .cxr 0xfffff88024cca4d0 ; kb

FAILURE_BUCKET_ID:  X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e

BUCKET_ID:  X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x27_mrxsmb10!mrxsmbbuildwriterequest+25e

FAILURE_ID_HASH:  {e454b02a-a3ef-39ed-ffa5-d09145fcc547}

Followup: MachineOwner
---------

6: kd> !devobj fffffa801543b728 f
fffffa801543b728: is not a device object
6: kd> lmvm mrxsmb10
start             end                 module name
fffff880`0aec3000 fffff880`0af11000   mrxsmb10   (pdb symbols)          c:\symbols\mrxsmb10.pdb\821FEFE547B149389294EE1E8D6111E11\mrxsmb10.pdb
    Loaded symbol image file: mrxsmb10.sys
    Image path: \SystemRoot\system32\DRIVERS\mrxsmb10.sys
    Image name: mrxsmb10.sys
    Timestamp:        Thu Oct 18 13:54:25 2012 (50804251)
    CheckSum:         000485BC
    ImageSize:        0004E000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
6: kd> 
start             end                 module name
fffff880`0aec3000 fffff880`0af11000   mrxsmb10   (pdb symbols)          c:\symbols\mrxsmb10.pdb\821FEFE547B149389294EE1E8D6111E11\mrxsmb10.pdb
    Loaded symbol image file: mrxsmb10.sys
    Image path: \SystemRoot\system32\DRIVERS\mrxsmb10.sys
    Image name: mrxsmb10.sys
    Timestamp:        Thu Oct 18 13:54:25 2012 (50804251)
    CheckSum:         000485BC
    ImageSize:        0004E000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4


Viewing all articles
Browse latest Browse all 11372

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>