域环境中一台服务器按照域用户共享了文件,进行EXCEL操作的时候不定时蓝屏。尝试恢复系统操作无效。暂不能上传蓝屏文件,把显示的结果上传。
Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\cuishuai\Desktop\091313-16941-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17273.x86fre.win7_gdr.130318-1532
Machine Name:
Kernel base = 0x84237000 PsLoadedModuleList = 0x8437f810
Debug session time: Fri Sep 13 13:32:57.492 2013 (UTC + 8:00)
System Uptime: 1 days 5:58:58.850
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 27, {baad0073, b0395854, b0395430, 8f62ad6a}
Probably caused by : rdbss.sys ( rdbss!RxPurgeAllFobxs+fd )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
RDR_FILE_SYSTEM (27)
If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
exception record and context record. Do a .cxr on the 3rd parameter and then kb to
obtain a more informative stack trace.
The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined
as follows:
RDBSS_BUG_CHECK_CACHESUP = 0xca550000,
RDBSS_BUG_CHECK_CLEANUP = 0xc1ee0000,
RDBSS_BUG_CHECK_CLOSE = 0xc10e0000,
RDBSS_BUG_CHECK_NTEXCEPT = 0xbaad0000,
Arguments:
Arg1: baad0073
Arg2: b0395854
Arg3: b0395430
Arg4: 8f62ad6a
Debugging Details:
------------------
EXCEPTION_RECORD: b0395854 -- (.exr 0xffffffffb0395854)
ExceptionAddress: 8f62ad6a (rdbss!RxPurgeAllFobxs+0x000000fd)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000010
Attempt to read from address 00000010
CONTEXT: b0395430 -- (.cxr 0xffffffffb0395430)
eax=00000000 ebx=b89d5420 ecx=8f61c200 edx=00000000 esi=8f61e73c edi=9c4e54bc
eip=8f62ad6a esp=b039591c ebp=b0395958 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
rdbss!RxPurgeAllFobxs+0xfd:
8f62ad6a 8b7810 mov edi,dword ptr [eax+10h] ds:0023:00000010=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EXCEL.EXE
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000010
READ_ADDRESS: GetPointerFromAddress: unable to read from 8439f71c
Unable to read MiSystemVaType memory at 8437f160
00000010
FOLLOWUP_IP:
rdbss!RxPurgeAllFobxs+fd
8f62ad6a 8b7810 mov edi,dword ptr [eax+10h]
FAULTING_IP:
rdbss!RxPurgeAllFobxs+fd
8f62ad6a 8b7810 mov edi,dword ptr [eax+10h]
BUGCHECK_STR: 0x27
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 8f62aeca to 8f62ad6a
STACK_TEXT:
b0395958 8f62aeca 014e5020 3f58ecb5 86e473c0 rdbss!RxPurgeAllFobxs+0xfd
b03959b8 af8e98b3 86760890 9c597008 000000ff rdbss!RxFinalizeConnection+0x90
b03959d8 af8f764b 00000024 86760890 884a17d8 mrxsmb!SmbShellDeleteConnection+0xcc
b03959fc af8e0673 0d4a1748 9c4e5020 b0395a24 mrxsmb!MRxSmbDevFcbXXXControlFile+0x1c0
b0395a0c 8f62a392 884a1748 001401ac b90aa508 mrxsmb!SmbShellDevFcbXXXControlFile+0x12
b0395a24 8f62a4da 884a1748 b90aa450 ffffd8f0 rdbss!RxXXXControlFileCallthru+0xa5
b0395a4c 8f60afb1 884a1748 b90aa450 3f58efd9 rdbss!RxCommonDevFCBFsCtl+0x125
b0395ad4 8f625e2b 8f61b320 b90aa450 8679a280 rdbss!RxFsdCommonDispatch+0x646
b0395b04 af8f5298 9c4e5020 0d0aa450 b90aa52c rdbss!RxFsdDispatch+0x1ab
b0395b20 8427277c 9c4e5020 010aa450 b90aa550 mrxsmb!MRxSmbFsdDispatch+0x9a
b0395b38 89364bb0 00000103 86a41590 b904aa30 nt!IofCallDriver+0x63
b0395b54 89363b52 86a41590 00000000 b90aa450 mup!MupiCallUncProvider+0x10f
b0395b6c 89363551 86a41590 00000000 86c2cce8 mup!MupStateMachine+0x9b
b0395b88 8427277c 86c2cce8 86a41590 b90aa450 mup!MupFsControl+0x77
b0395ba0 88d9e20c 86c2c6e0 b90aa450 00000000 nt!IofCallDriver+0x63
b0395bc4 88db1ce8 b0395be4 86c2c6e0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
b0395bfc 8427277c 86c2c6e0 b90aa450 b90aa450 fltmgr!FltpFsControl+0xe8
b0395c14 844755de 8679a280 b90aa450 b90aa52c nt!IofCallDriver+0x63
b0395c34 8449248a 86c2c6e0 8679a280 00000001 nt!IopSynchronousServiceTail+0x1f8
b0395cd0 8449b4c0 86c2c6e0 b90aa450 00000000 nt!IopXxxControlFile+0x6aa
b0395d04 842796da 00000814 00000000 00000000 nt!NtFsControlFile+0x2a
b0395d04 77296194 00000814 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0ec13160 00000000 00000000 00000000 00000000 0x77296194
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: rdbss!RxPurgeAllFobxs+fd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdbss
IMAGE_NAME: rdbss.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbfd2
STACK_COMMAND: .cxr 0xffffffffb0395430 ; kb
FAILURE_BUCKET_ID: 0x27_rdbss!RxPurgeAllFobxs+fd
BUCKET_ID: 0x27_rdbss!RxPurgeAllFobxs+fd
Followup: MachineOwner
---------