BlueScreen BCCode 27
User received BSOD. Running Windows 7 64-bit. Dump files are located at https://skydrive.live.com/redir.aspx?cid=d784f228103b416b&resid=D784F228103B416B!107. Can anyone interpret these for me? Thanks.
October 12th, 2011 4:36pm

Hi, You may analyze them with Debugging Tools by yourself. You can install it and it’s Symbol Packages from the following link: http://www.microsoft.com/whdc/Devtools/Debugging/default.mspx WinDbg will tell you the possible cause. For more information, please read Microsoft KB Article: How to read the small memory dump files that Windows creates for debugging http://support.microsoft.com/kb/315263 If no clue can be found, you may contact Microsoft Customer Service and Support (CSS) via telephone so that a dedicated Support Professional can assist with your request. To troubleshoot this kind of kernel crash issue, we need to debug the crashed system dump. Unfortunately, debugging is beyond what we can do in the forum. Please be advised that contacting phone support will be a charged call. To obtain the phone numbers for specific technology request please take a look at the web site listed below: http://support.microsoft.com/default.aspx?scid=fh;EN-US;OfferProPhone#faq607 Regards,Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
October 12th, 2011 6:46pm

Seems like the crash occurred in the SMB driver. Are you on the latest/correct version of the network driver for your platform? 0: kd> lmvm e1c62x64 start end module name fffff880`04a41000 fffff880`04a91000 e1c62x64 T (no symbols) Loaded symbol image file: e1c62x64.sys Image path: e1c62x64.sys Image name: e1c62x64.sys Timestamp: Tue Dec 21 02:30:56 2010 (4D1073D0) CheckSum: 0005AB0A ImageSize: 00050000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 It also appears that you have the ESET personal firewall installed. Does disabling it help with the crash issue? ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 27, {baad0073, fffff880058a0d08, fffff880058a0560, fffff880057bc0fa} Probably caused by : mrxsmb10.sys ( mrxsmb10!MRxSmbBuildWriteRequest+25e ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* RDR_FILE_SYSTEM (27) If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined as follows: RDBSS_BUG_CHECK_CACHESUP = 0xca550000, RDBSS_BUG_CHECK_CLEANUP = 0xc1ee0000, RDBSS_BUG_CHECK_CLOSE = 0xc10e0000, RDBSS_BUG_CHECK_NTEXCEPT = 0xbaad0000, Arguments: Arg1: 00000000baad0073 Arg2: fffff880058a0d08 Arg3: fffff880058a0560 Arg4: fffff880057bc0fa Debugging Details: ------------------ EXCEPTION_RECORD: fffff880058a0d08 -- (.exr 0xfffff880058a0d08) ExceptionAddress: fffff880057bc0fa (mrxsmb10!MRxSmbBuildWriteRequest+0x000000000000025e) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000008 Attempt to read from address 0000000000000008 CONTEXT: fffff880058a0560 -- (.cxr 0xfffff880058a0560) rax=fffff880057c1e70 rbx=fffffa800844da20 rcx=0000000000000000 rdx=0000000000000002 rsi=fffffa800844da20 rdi=fffffa80084c4010 rip=fffff880057bc0fa rsp=fffff880058a0f40 rbp=0000000000000000 r8=0000000000001aff r9=0000000000000000 r10=0000000000000002 r11=0000000000000000 r12=0000000000000800 r13=fffffa80084c0000 r14=0000000000000000 r15=0000000000000800 iopl=0 nv up ei ng nz ac po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210297 mrxsmb10!MRxSmbBuildWriteRequest+0x25e: fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] ds:002b:00000000`00000008=???? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: WINWORD.EXE CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000008 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f17100 0000000000000008 FOLLOWUP_IP: mrxsmb10!MRxSmbBuildWriteRequest+25e fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] FAULTING_IP: mrxsmb10!MRxSmbBuildWriteRequest+25e fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] BUGCHECK_STR: 0x27 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE DEVICE_OBJECT: fffffa8007613f00 LAST_CONTROL_TRANSFER: from fffff880057bc558 to fffff880057bc0fa STACK_TEXT: fffff880`058a0f40 fffff880`057bc558 : 00000000`00001a01 fffff8a0`0c605000 fffffa80`0844da00 00000000`00000000 : mrxsmb10!MRxSmbBuildWriteRequest+0x25e fffff880`058a1060 fffff880`057b4505 : 00000000`00000000 fffffa80`08007b00 fffffa80`0844da20 fffffa80`07c8a210 : mrxsmb10!SmbPseExchangeStart_Write+0x2c4 fffff880`058a10f0 fffff880`057bbc8d : fffffa80`07f45ba0 fffffa80`08007bb0 fffffa80`08150170 fffff880`057bc294 : mrxsmb10!SmbCeInitiateExchange+0x4a1 fffff880`058a1170 fffff880`04350a1c : fffffa80`084c4001 00000000`00000000 fffff8a0`00000001 00000000`00000000 : mrxsmb10!MRxSmbWrite+0x3e9 fffff880`058a1220 fffff880`042f4b99 : 00000000`00000001 fffff880`00000001 00000000`00000000 fffff800`00000800 : csc!CscWrite+0x3ac fffff880`058a1330 fffff880`0430399b : fffffa80`084c4010 fffff880`042e9110 fffffa80`07613d10 fffffa80`084c4010 : rdbss!RxLowIoSubmit+0x291 fffff880`058a1390 fffff880`042db46d : 00000000`00000a01 fffff880`058a15a0 fffffa80`084c4010 fffffa80`00000000 : rdbss!RxLowIoWriteShell+0x7f fffff880`058a13c0 fffff880`043038ce : fffffa80`084c4010 fffffa80`07613d10 fffff8a0`0c3de010 fffff8a0`0c3de3b0 : rdbss!RxCommonFileWrite+0x1be9 fffff880`058a1530 fffff880`042d2684 : 00000000`00000000 fffff880`058a15a0 01cc884a`2485be00 00000000`00000001 : rdbss!RxCommonWrite+0xe6 fffff880`058a1560 fffff880`042efb44 : fffffa80`07613d10 fffffa80`07645504 00000000`c0000016 fffff880`011b71b5 : rdbss!RxFsdCommonDispatch+0x870 fffff880`058a1650 fffff880`0576c2cc : fffffa80`07613d10 00000000`c0000016 fffffa80`07613e28 fffffa80`07645590 : rdbss!RxFsdDispatch+0x224 fffff880`058a16c0 fffff880`01afc271 : fffffa80`046bc220 fffffa80`07613d10 fffffa80`0847b750 fffff8a0`002f5390 : mrxsmb!MRxSmbFsdDispatch+0xc0 fffff880`058a1700 fffff880`01afa138 : fffff8a0`002f5390 fffffa80`046bc220 00000000`00000001 00000000`00000000 : mup!MupiCallUncProvider+0x161 fffff880`058a1770 fffff880`01afab0d : fffffa80`07613d10 fffff880`01af8110 fffffa80`07ce6da0 00000000`00000000 : mup!MupStateMachine+0x128 fffff880`058a17c0 fffff880`0116cbcf : fffffa80`07613eb8 fffffa80`046bc220 fffff880`058a1860 fffffa80`081b19f0 : mup!MupFsdIrpPassThrough+0x12d fffff880`058a1810 fffff880`0116b6df : fffffa80`0488e8d0 00000000`00000001 fffffa80`0488e800 fffffa80`07613d10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`058a18a0 fffff800`02fed21b : 00000000`00000001 fffffa80`07ce6da0 00000000`00000001 fffffa80`07613d10 : fltmgr!FltpDispatch+0xcf fffff880`058a1900 fffff800`02ff7c83 : fffffa80`07613f00 00000000`00000000 fffffa80`07ce6da0 fffff800`02e5ae80 : nt!IopSynchronousServiceTail+0xfb fffff880`058a1970 fffff800`02ce3ed3 : ffffffff`00000001 00000000`00000000 00000000`00000000 00000000`07af9ed8 : nt!NtWriteFile+0x7e2 fffff880`058a1a70 00000000`74da2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0771efb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74da2e09 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: mrxsmb10!MRxSmbBuildWriteRequest+25e FOLLOWUP_NAME: MachineOwner MODULE_NAME: mrxsmb10 IMAGE_NAME: mrxsmb10.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4e17c104 STACK_COMMAND: .cxr 0xfffff880058a0560 ; kb FAILURE_BUCKET_ID: X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e BUCKET_ID: X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e Followup: MachineOwner --------- -- Mike Burr Technology
October 12th, 2011 10:29pm

Hi, You may analyze them with Debugging Tools by yourself. You can install it and it’s Symbol Packages from the following link: http://www.microsoft.com/whdc/Devtools/Debugging/default.mspx WinDbg will tell you the possible cause. For more information, please read Microsoft KB Article: How to read the small memory dump files that Windows creates for debugging http://support.microsoft.com/kb/315263 If no clue can be found, you may contact Microsoft Customer Service and Support (CSS) via telephone so that a dedicated Support Professional can assist with your request. To troubleshoot this kind of kernel crash issue, we need to debug the crashed system dump. Unfortunately, debugging is beyond what we can do in the forum. Please be advised that contacting phone support will be a charged call. To obtain the phone numbers for specific technology request please take a look at the web site listed below: http://support.microsoft.com/default.aspx?scid=fh;EN-US;OfferProPhone#faq607 Regards,Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
October 13th, 2011 1:41am

******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* RDR_FILE_SYSTEM (27) If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined as follows: RDBSS_BUG_CHECK_CACHESUP = 0xca550000, RDBSS_BUG_CHECK_CLEANUP = 0xc1ee0000, RDBSS_BUG_CHECK_CLOSE = 0xc10e0000, RDBSS_BUG_CHECK_NTEXCEPT = 0xbaad0000, Arguments: Arg1: 00000000baad0073 Arg2: fffff880058a0d08 Arg3: fffff880058a0560 Arg4: fffff880057bc0fa Debugging Details: ------------------ EXCEPTION_RECORD: fffff880058a0d08 -- (.exr 0xfffff880058a0d08) ExceptionAddress: fffff880057bc0fa (mrxsmb10!MRxSmbBuildWriteRequest+0x000000000000025e) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000008 Attempt to read from address 0000000000000008 CONTEXT: fffff880058a0560 -- (.cxr 0xfffff880058a0560) rax=fffff880057c1e70 rbx=fffffa800844da20 rcx=0000000000000000 rdx=0000000000000002 rsi=fffffa800844da20 rdi=fffffa80084c4010 rip=fffff880057bc0fa rsp=fffff880058a0f40 rbp=0000000000000000 r8=0000000000001aff r9=0000000000000000 r10=0000000000000002 r11=0000000000000000 r12=0000000000000800 r13=fffffa80084c0000 r14=0000000000000000 r15=0000000000000800 iopl=0 nv up ei ng nz ac po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210297 mrxsmb10!MRxSmbBuildWriteRequest+0x25e: fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] ds:002b:00000000`00000008=???? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: WINWORD.EXE CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - L EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000008 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f17100 0000000000000008 FOLLOWUP_IP: mrxsmb10!MRxSmbBuildWriteRequest+25e fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] FAULTING_IP: mrxsmb10!MRxSmbBuildWriteRequest+25e fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] BUGCHECK_STR: 0x27 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE DEVICE_OBJECT: fffffa8007613f00 LAST_CONTROL_TRANSFER: from fffff880057bc558 to fffff880057bc0fa STACK_TEXT: fffff880`058a0f40 fffff880`057bc558 : 00000000`00001a01 fffff8a0`0c605000 fffffa80`0844da00 00000000`00000000 : mrxsmb10!MRxSmbBuildWriteRequest+0x25e fffff880`058a1060 fffff880`057b4505 : 00000000`00000000 fffffa80`08007b00 fffffa80`0844da20 fffffa80`07c8a210 : mrxsmb10!SmbPseExchangeStart_Write+0x2c4 fffff880`058a10f0 fffff880`057bbc8d : fffffa80`07f45ba0 fffffa80`08007bb0 fffffa80`08150170 fffff880`057bc294 : mrxsmb10!SmbCeInitiateExchange+0x4a1 fffff880`058a1170 fffff880`04350a1c : fffffa80`084c4001 00000000`00000000 fffff8a0`00000001 00000000`00000000 : mrxsmb10!MRxSmbWrite+0x3e9 fffff880`058a1220 fffff880`042f4b99 : 00000000`00000001 fffff880`00000001 00000000`00000000 fffff800`00000800 : csc!CscWrite+0x3ac fffff880`058a1330 fffff880`0430399b : fffffa80`084c4010 fffff880`042e9110 fffffa80`07613d10 fffffa80`084c4010 : rdbss!RxLowIoSubmit+0x291 fffff880`058a1390 fffff880`042db46d : 00000000`00000a01 fffff880`058a15a0 fffffa80`084c4010 fffffa80`00000000 : rdbss!RxLowIoWriteShell+0x7f fffff880`058a13c0 fffff880`043038ce : fffffa80`084c4010 fffffa80`07613d10 fffff8a0`0c3de010 fffff8a0`0c3de3b0 : rdbss!RxCommonFileWrite+0x1be9 fffff880`058a1530 fffff880`042d2684 : 00000000`00000000 fffff880`058a15a0 01cc884a`2485be00 00000000`00000001 : rdbss!RxCommonWrite+0xe6 fffff880`058a1560 fffff880`042efb44 : fffffa80`07613d10 fffffa80`07645504 00000000`c0000016 fffff880`011b71b5 : rdbss!RxFsdCommonDispatch+0x870 fffff880`058a1650 fffff880`0576c2cc : fffffa80`07613d10 00000000`c0000016 fffffa80`07613e28 fffffa80`07645590 : rdbss!RxFsdDispatch+0x224 fffff880`058a16c0 fffff880`01afc271 : fffffa80`046bc220 fffffa80`07613d10 fffffa80`0847b750 fffff8a0`002f5390 : mrxsmb!MRxSmbFsdDispatch+0xc0 fffff880`058a1700 fffff880`01afa138 : fffff8a0`002f5390 fffffa80`046bc220 00000000`00000001 00000000`00000000 : mup!MupiCallUncProvider+0x161 fffff880`058a1770 fffff880`01afab0d : fffffa80`07613d10 fffff880`01af8110 fffffa80`07ce6da0 00000000`00000000 : mup!MupStateMachine+0x128 fffff880`058a17c0 fffff880`0116cbcf : fffffa80`07613eb8 fffffa80`046bc220 fffff880`058a1860 fffffa80`081b19f0 : mup!MupFsdIrpPassThrough+0x12d fffff880`058a1810 fffff880`0116b6df : fffffa80`0488e8d0 00000000`00000001 fffffa80`0488e800 fffffa80`07613d10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`058a18a0 fffff800`02fed21b : 00000000`00000001 fffffa80`07ce6da0 00000000`00000001 fffffa80`07613d10 : fltmgr!FltpDispatch+0xcf fffff880`058a1900 fffff800`02ff7c83 : fffffa80`07613f00 00000000`00000000 fffffa80`07ce6da0 fffff800`02e5ae80 : nt!IopSynchronousServiceTail+0xfb fffff880`058a1970 fffff800`02ce3ed3 : ffffffff`00000001 00000000`00000000 00000000`00000000 00000000`07af9ed8 : nt!NtWriteFile+0x7e2 fffff880`058a1a70 00000000`74da2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0771efb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74da2e09 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: mrxsmb10!MRxSmbBuildWriteRequest+25e FOLLOWUP_NAME: MachineOwner MODULE_NAME: mrxsmb10 IMAGE_NAME: mrxsmb10.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4e17c104 STACK_COMMAND: .cxr 0xfffff880058a0560 ; kb FAILURE_BUCKET_ID: X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e BUCKET_ID: X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e Followup: MachineOwner --------- 0: kd> lmvm mrxsmb10 start end module name fffff880`05779000 fffff880`057c7000 mrxsmb10 (pdb symbols) c:\symbols\mrxsmb10.pdb\600811C9288E4F7389E17954DD792D461\mrxsmb10.pdb Loaded symbol image file: mrxsmb10.sys Mapped memory image file: c:\symbols\mrxsmb10.sys\4E17C1044e000\mrxsmb10.sys Image path: mrxsmb10.sys Image name: mrxsmb10.sys Timestamp: Sat Jul 09 03:46:28 2011 (4E17C104) CheckSum: 000503C4 ImageSize: 0004E000 File version: 6.1.7601.17647 Product version: 6.1.7601.17647 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: MRxSmb0.sys OriginalFilename: MRXSMB0.Sys ProductVersion: 6.1.7601.17647 FileVersion: 6.1.7601.17647 (win7sp1_gdr.110708-1503) FileDescription: Longhorn SMB Downlevel SubRdr LegalCopyright: © Microsoft Corporation. All rights reserved. --------------------------------------------------------------------------------------------------- Bug Check Code 0x27: http://msdn.microsoft.com/en-us/library/ff557446(v=VS.85).aspx One possible cause of this bug check is depletion of nonpaged pool memory. If the nonpaged pool memory is completely depleted, this error can stop the system. However, during the indexing process, if the amount of available nonpaged pool memory is very low, another kernel-mode driver requiring nonpaged pool memory can also trigger this error. To resolve a nonpaged pool memory depletion problem: Add new physical memory to the computer. This will increase the quantity of nonpaged pool memory available to the kernel. Also try updating your NIC driver. Another option is to contact Microsoft CSS. This posting is provided "AS IS" with no warranties or guarantees , and confers no rights. Microsoft Student Partner 2010 / 2011 Microsoft Certified Professional Microsoft Certified Systems Administrator: Security Microsoft Certified Systems Engineer: Security Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration Microsoft Certified Technology Specialist: Windows 7, Configuring Microsoft Certified IT Professional: Enterprise Administrator Microsoft Certified IT Professional: Server Administrator Microsoft Certified Trainer
October 13th, 2011 2:49am

Seems like the crash occurred in the SMB driver. Are you on the latest/correct version of the network driver for your platform? 0: kd> lmvm e1c62x64 start end module name fffff880`04a41000 fffff880`04a91000 e1c62x64 T (no symbols) Loaded symbol image file: e1c62x64.sys Image path: e1c62x64.sys Image name: e1c62x64.sys Timestamp: Tue Dec 21 02:30:56 2010 (4D1073D0) CheckSum: 0005AB0A ImageSize: 00050000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 It also appears that you have the ESET personal firewall installed. Does disabling it help with the crash issue? ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 27, {baad0073, fffff880058a0d08, fffff880058a0560, fffff880057bc0fa} Probably caused by : mrxsmb10.sys ( mrxsmb10!MRxSmbBuildWriteRequest+25e ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* RDR_FILE_SYSTEM (27) If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined as follows: RDBSS_BUG_CHECK_CACHESUP = 0xca550000, RDBSS_BUG_CHECK_CLEANUP = 0xc1ee0000, RDBSS_BUG_CHECK_CLOSE = 0xc10e0000, RDBSS_BUG_CHECK_NTEXCEPT = 0xbaad0000, Arguments: Arg1: 00000000baad0073 Arg2: fffff880058a0d08 Arg3: fffff880058a0560 Arg4: fffff880057bc0fa Debugging Details: ------------------ EXCEPTION_RECORD: fffff880058a0d08 -- (.exr 0xfffff880058a0d08) ExceptionAddress: fffff880057bc0fa (mrxsmb10!MRxSmbBuildWriteRequest+0x000000000000025e) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000008 Attempt to read from address 0000000000000008 CONTEXT: fffff880058a0560 -- (.cxr 0xfffff880058a0560) rax=fffff880057c1e70 rbx=fffffa800844da20 rcx=0000000000000000 rdx=0000000000000002 rsi=fffffa800844da20 rdi=fffffa80084c4010 rip=fffff880057bc0fa rsp=fffff880058a0f40 rbp=0000000000000000 r8=0000000000001aff r9=0000000000000000 r10=0000000000000002 r11=0000000000000000 r12=0000000000000800 r13=fffffa80084c0000 r14=0000000000000000 r15=0000000000000800 iopl=0 nv up ei ng nz ac po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210297 mrxsmb10!MRxSmbBuildWriteRequest+0x25e: fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] ds:002b:00000000`00000008=???? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: WINWORD.EXE CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000008 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f17100 0000000000000008 FOLLOWUP_IP: mrxsmb10!MRxSmbBuildWriteRequest+25e fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] FAULTING_IP: mrxsmb10!MRxSmbBuildWriteRequest+25e fffff880`057bc0fa 450fb74608 movzx r8d,word ptr [r14+8] BUGCHECK_STR: 0x27 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE DEVICE_OBJECT: fffffa8007613f00 LAST_CONTROL_TRANSFER: from fffff880057bc558 to fffff880057bc0fa STACK_TEXT: fffff880`058a0f40 fffff880`057bc558 : 00000000`00001a01 fffff8a0`0c605000 fffffa80`0844da00 00000000`00000000 : mrxsmb10!MRxSmbBuildWriteRequest+0x25e fffff880`058a1060 fffff880`057b4505 : 00000000`00000000 fffffa80`08007b00 fffffa80`0844da20 fffffa80`07c8a210 : mrxsmb10!SmbPseExchangeStart_Write+0x2c4 fffff880`058a10f0 fffff880`057bbc8d : fffffa80`07f45ba0 fffffa80`08007bb0 fffffa80`08150170 fffff880`057bc294 : mrxsmb10!SmbCeInitiateExchange+0x4a1 fffff880`058a1170 fffff880`04350a1c : fffffa80`084c4001 00000000`00000000 fffff8a0`00000001 00000000`00000000 : mrxsmb10!MRxSmbWrite+0x3e9 fffff880`058a1220 fffff880`042f4b99 : 00000000`00000001 fffff880`00000001 00000000`00000000 fffff800`00000800 : csc!CscWrite+0x3ac fffff880`058a1330 fffff880`0430399b : fffffa80`084c4010 fffff880`042e9110 fffffa80`07613d10 fffffa80`084c4010 : rdbss!RxLowIoSubmit+0x291 fffff880`058a1390 fffff880`042db46d : 00000000`00000a01 fffff880`058a15a0 fffffa80`084c4010 fffffa80`00000000 : rdbss!RxLowIoWriteShell+0x7f fffff880`058a13c0 fffff880`043038ce : fffffa80`084c4010 fffffa80`07613d10 fffff8a0`0c3de010 fffff8a0`0c3de3b0 : rdbss!RxCommonFileWrite+0x1be9 fffff880`058a1530 fffff880`042d2684 : 00000000`00000000 fffff880`058a15a0 01cc884a`2485be00 00000000`00000001 : rdbss!RxCommonWrite+0xe6 fffff880`058a1560 fffff880`042efb44 : fffffa80`07613d10 fffffa80`07645504 00000000`c0000016 fffff880`011b71b5 : rdbss!RxFsdCommonDispatch+0x870 fffff880`058a1650 fffff880`0576c2cc : fffffa80`07613d10 00000000`c0000016 fffffa80`07613e28 fffffa80`07645590 : rdbss!RxFsdDispatch+0x224 fffff880`058a16c0 fffff880`01afc271 : fffffa80`046bc220 fffffa80`07613d10 fffffa80`0847b750 fffff8a0`002f5390 : mrxsmb!MRxSmbFsdDispatch+0xc0 fffff880`058a1700 fffff880`01afa138 : fffff8a0`002f5390 fffffa80`046bc220 00000000`00000001 00000000`00000000 : mup!MupiCallUncProvider+0x161 fffff880`058a1770 fffff880`01afab0d : fffffa80`07613d10 fffff880`01af8110 fffffa80`07ce6da0 00000000`00000000 : mup!MupStateMachine+0x128 fffff880`058a17c0 fffff880`0116cbcf : fffffa80`07613eb8 fffffa80`046bc220 fffff880`058a1860 fffffa80`081b19f0 : mup!MupFsdIrpPassThrough+0x12d fffff880`058a1810 fffff880`0116b6df : fffffa80`0488e8d0 00000000`00000001 fffffa80`0488e800 fffffa80`07613d10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`058a18a0 fffff800`02fed21b : 00000000`00000001 fffffa80`07ce6da0 00000000`00000001 fffffa80`07613d10 : fltmgr!FltpDispatch+0xcf fffff880`058a1900 fffff800`02ff7c83 : fffffa80`07613f00 00000000`00000000 fffffa80`07ce6da0 fffff800`02e5ae80 : nt!IopSynchronousServiceTail+0xfb fffff880`058a1970 fffff800`02ce3ed3 : ffffffff`00000001 00000000`00000000 00000000`00000000 00000000`07af9ed8 : nt!NtWriteFile+0x7e2 fffff880`058a1a70 00000000`74da2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0771efb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74da2e09 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: mrxsmb10!MRxSmbBuildWriteRequest+25e FOLLOWUP_NAME: MachineOwner MODULE_NAME: mrxsmb10 IMAGE_NAME: mrxsmb10.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4e17c104 STACK_COMMAND: .cxr 0xfffff880058a0560 ; kb FAILURE_BUCKET_ID: X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e BUCKET_ID: X64_0x27_mrxsmb10!MRxSmbBuildWriteRequest+25e Followup: MachineOwner --------- -- Mike Burr Technology
Free Windows Admin Tool Kit Click here and download it now
October 13th, 2011 5:24am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics