Hardware Upgrade Forum

Hardware Upgrade Forum (https://www.hwupgrade.it/forum/index.php)
-   Guida alla risoluzione dei problemi (https://www.hwupgrade.it/forum/forumdisplay.php?f=129)
-   -   Vista/7 - Schermate blu (bsod):individuazione cause dell'errore e possibili soluzioni (https://www.hwupgrade.it/forum/showthread.php?t=1955371)


Crimson Skies 27-05-2009 17:03

Quote:

Originariamente inviato da lcpreben (Messaggio 27621384)
Che c'entra il file system l'avevo intuito :asd: Resta da vedere cosa ha causato il conflitto. Fra un pò finisco di scaricare i Symbols per analizzare meglio l'errore.

Comuqnue non è necessario scaricarli.
Apri il debugger e dove ti dice di inserire il percorso dei symbols inserisci una stringa che era stata suggerita e che ti faceva scaricare i symbols giusti direttamente da MS. Cerca tra i posts e la trovi.:)

lcpreben 28-05-2009 13:39

Ecco il debug. Chi mi sa aiutare?
Codice:

*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800020d7a36, fffffa6007d5e2b0, 0}

Probably caused by : ntkrnlmp.exe ( nt!NtClearEvent+37 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------


nickdc 28-05-2009 19:22

A me su 7 con la 1900xt e i driver che scarica win update ha dato due volte schermata blu quando applicavo un'immagine come sfondo, credo sia dovuto ai driver acerbi...l'ha fatto a qualcun altro?

Crimson Skies 28-05-2009 19:39

Quote:

Originariamente inviato da lcpreben (Messaggio 27633072)
Ecco il debug. Chi mi sa aiutare?
Codice:

*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800020d7a36, fffffa6007d5e2b0, 0}

Probably caused by : ntkrnlmp.exe ( nt!NtClearEvent+37 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                            *
*                        Bugcheck Analysis                                    *
*                                                                            *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020d7a36, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6007d5e2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!ObReferenceObjectByHandle+206
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9]

CONTEXT:  fffffa6007d5e2b0 -- (.cxr 0xfffffa6007d5e2b0)
rax=0000000000000001 rbx=fffffa6007d5ec28 rcx=00000000000002f4
rdx=0000000000000002 rsi=0000000000715500 rdi=fffffa800423a060
rip=fffff800020d7a36 rsp=fffffa6007d5eb10 rbp=0000000000000000
 r8=fffff880106a7000  r9=0000100000000000 r10=fffff800020d0e00
r11=000000000026f100 r12=fffff8800d411110 r13=00000000000002f4
r14=0000000000000001 r15=fffffa800512b830
iopl=0        nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b            efl=00010206
nt!ObReferenceObjectByHandle+0x206:
fffff800`020d7a36 4b8b0408        mov    rax,qword ptr [r8+r9] ds:002b:00000880`106a7000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  CoDWaW.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff800020d0e37 to fffff800020d7a36

STACK_TEXT: 
fffffa60`07d5eb10 fffff800`020d0e37 : 00000000`000bfa00 fffff800`00000002 fffffa80`039aedc0 00000000`00000001 : nt!ObReferenceObjectByHandle+0x206
fffffa60`07d5ebe0 fffff800`01e5ddf3 : fffffa80`0423a060 00000000`00000000 00000000`00da7a64 fffffa80`047000f0 : nt!NtClearEvent+0x37
fffffa60`07d5ec20 00000000`75c23d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75c23d09


FOLLOWUP_IP:
nt!NtClearEvent+37
fffff800`020d0e37 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!NtClearEvent+37

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

STACK_COMMAND:  .cxr 0xfffffa6007d5e2b0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

BUCKET_ID:  X64_0x3B_nt!NtClearEvent+37

Followup: MachineOwner
---------


Stavi giocando a COD WAW per caso?
perchè compare la voce "PROCESS_NAME: CoDWaW.exe".

lcpreben 28-05-2009 20:52

Esatto, ma la voce da guardare è questa:
IMAGE_NAME: ntkrnlmp.exe
E' un file di Windows, ma non ho trovato molte informazioni a riguardo.

Crimson Skies 28-05-2009 21:03

Quote:

Originariamente inviato da lcpreben (Messaggio 27638941)
Esatto, ma la voce da guardare è questa:
IMAGE_NAME: ntkrnlmp.exe
E' un file di Windows, ma non ho trovato molte informazioni a riguardo.

Ok bene. Hmmmm hai tutto settato normale? Niente OC?

lcpreben 28-05-2009 21:05

Ho il processore a 3Ghz anzichè 2.4. Ma non penso sia l'OC la causa, per me è proprio Winzozz :asd:

Crimson Skies 28-05-2009 21:10

Io avevo questo problema perchè le ram non erano settate bene pur stanto su auto. Strano vero? Comunque io vedrei le ram come le hai settate. Di solito questi problemi sono provocati da un settaggio sbagliato delle ram per OC oppure da qualche errore delle stesse. Hai provato a fare un test con Memtest?
Io cercherei sul forum dei suggerimenti per settare correttamente il bios per tenere la CPU a 3.0Ghz. Quando avevo il E8500 e lo tenevo a 4.1 Ghz avevo dovuto settare varie voci del bios per non avere crash di questo tipo comprese le ram e il voltaggio.

lovsky 28-05-2009 23:09

ma il mio log nessuno l'ha visto crycry e' 3 post su

Crimson Skies 28-05-2009 23:41

Quote:

Originariamente inviato da lovsky (Messaggio 27640479)
ma il mio log nessuno l'ha visto crycry e' 3 post su

Scusa.:) Allora visto che fa riferimento a NFTS quindi al fily system io farei un check dell'HD possibilmente con un software del produttore dell'HD stesso.

lovsky 29-05-2009 00:02

Quote:

Originariamente inviato da Crimson Skies (Messaggio 27640708)
Scusa.:) Allora visto che fa riferimento a NFTS quindi al fily system io farei un check dell'HD possibilmente con un software del produttore dell'HD stesso.

ahah :) era ironico grazie mille per l'attenzione cmq :) :)
Ho fatto scandisk con ripristino di settori (insomma la seconda opzione dello scandisk) durato 2 ore ma niente... :(

Crimson Skies 29-05-2009 00:12

Quote:

Originariamente inviato da lovsky (Messaggio 27640824)
ahah :) era ironico grazie mille per l'attenzione cmq :) :)
Ho fatto scandisk con ripristino di settori (insomma la seconda opzione dello scandisk) durato 2 ore ma niente... :(

Gli HD che marca sono?

lovsky 29-05-2009 00:57

FUJITSU MHY2200BH ATA Device

:fagiano:

nickdc 29-05-2009 13:20

Al momento di caricare il file dmp con windows debugger, mi dice che non ho le autorizzazioni necessarie, eppure sono loggato come amministratore...come posso risolvere?

lcpreben 29-05-2009 14:09

Quote:

Originariamente inviato da Crimson Skies (Messaggio 27639141)
Io avevo questo problema perchè le ram non erano settate bene pur stanto su auto. Strano vero? Comunque io vedrei le ram come le hai settate. Di solito questi problemi sono provocati da un settaggio sbagliato delle ram per OC oppure da qualche errore delle stesse. Hai provato a fare un test con Memtest?
Io cercherei sul forum dei suggerimenti per settare correttamente il bios per tenere la CPU a 3.0Ghz. Quando avevo il E8500 e lo tenevo a 4.1 Ghz avevo dovuto settare varie voci del bios per non avere crash di questo tipo comprese le ram e il voltaggio.

Ebbene si tutti i settaggi delle ram li ho su AUTO, in quqesta maniera i timings sono più rilassati però :rolleyes: Non dovrebbero creare problemi. Boh :asd:
Com MEmtest cosa si pu vedere? Perchè so che dura tantissimo, mi tocca lasciare il pc acceso tutta la notte.

Crimson Skies 30-05-2009 14:57

Quote:

Originariamente inviato da lcpreben (Messaggio 27646630)
Ebbene si tutti i settaggi delle ram li ho su AUTO, in quqesta maniera i timings sono più rilassati però :rolleyes: Non dovrebbero creare problemi. Boh :asd:
Com MEmtest cosa si pu vedere? Perchè so che dura tantissimo, mi tocca lasciare il pc acceso tutta la notte.

Con memtest, versione bootabile testi le ram magari 1 banco per volta e vedi se hanno problemi e se danno errori significa che hanno problemi che poi si ripercuotono sul S.O.

ezio 30-05-2009 17:56

Quote:

Originariamente inviato da lovsky (Messaggio 27586641)
Ragazzi salve a tutti, premetto che ho un notebook Sony Vaio CR41s,win Vista con HD usb collegato,mouse razer diamondback e scheda audio esterna ESI u24 xl il tutto tramite usb hub autoalimentato. Ogni avvio del pc o ripresa da ibernazione,(diciamo 1 volta su 3,4) ho errore del file ntfs.sys
Ho aperto il .dmp con questo risultato:

Prova a disconnettere tutte le periferiche usb (razer compreso) ed effettua un ripristino dallo stato d'ibernazione, qualche driver di periferica potrebbe non supportare correttamente il "risveglio" dopo la sospensione.

Quote:

Originariamente inviato da lcpreben (Messaggio 27633072)
Probably caused by : ntkrnlmp.exe ( nt!NtClearEvent+37 )
PROCESS_NAME: CoDWaW.exe

Se il problema persiste, la prima cosa da fare è disabilitare l'overclock del processore e riprovare.
Secondariamente, proverei in successione quanto segue:
- disattiva il Cool and Quite se hai una cpu AMD o C1e e SpeedStep in caso di cpu Intel. Volendo, potresti provare a lasciarli attivi da bios disattivando il risparmio energetico del processore in Windows Vista;
- assicurati di aver aggiornato i driver della scheda video;
- imposta, per il processo di CoD5, l'affinità per un singolo core del processore: Vista/Win7 - Affinità processori multicore

Altrimenti va eseguito un controllo hardware delle memorie, ad esempio con Memtest come suggeriva Crimsom. In questo thread trovi link per il download e relative guide all'utilizzo dei software citati:
Analisi e comparativa tool/procedure di emergenza


Quote:

Originariamente inviato da nickdc (Messaggio 27645834)
Al momento di caricare il file dmp con windows debugger, mi dice che non ho le autorizzazioni necessarie, eppure sono loggato come amministratore...come posso risolvere?

Avvia il debugger come amministratore (tasto destro --> Esegui come amministratore), altrimenti Windbg non potrà accedere a c:\Windows :)

Crimson Skies 30-05-2009 19:30

Condordo. Il solo O.C. della CPU deve essere accompagnato dalle altre variabili del bios come già avevo suggerito. Togli l'O.C. e vedi se da ancora problemi.

lovsky 30-05-2009 21:55

Quote:

Originariamente inviato da ezio (Messaggio 27660321)
Prova a disconnettere tutte le periferiche usb (razer compreso) ed effettua un ripristino dallo stato d'ibernazione, qualche driver di periferica potrebbe non supportare correttamente il "risveglio" dopo la sospensione.


Se il problema persiste, la prima cosa da fare è disabilitare l'overclock del processore e riprovare.
Secondariamente, proverei in successione quanto segue:
- disattiva il Cool and Quite se hai una cpu AMD o C1e e SpeedStep in caso di cpu Intel. Volendo, potresti provare a lasciarli attivi da bios disattivando il risparmio energetico del processore in Windows Vista;
- assicurati di aver aggiornato i driver della scheda video;
- imposta, per il processo di CoD5, l'affinità per un singolo core del processore: Vista/Win7 - Affinità processori multicore

Altrimenti va eseguito un controllo hardware delle memorie, ad esempio con Memtest come suggeriva Crimsom. In questo thread trovi link per il download e relative guide all'utilizzo dei software citati:
Analisi e comparativa tool/procedure di emergenza



Avvia il debugger come amministratore (tasto destro --> Esegui come amministratore), altrimenti Windbg non potrà accedere a c:\Windows :)

Sai penso proprio che tu abbia ragione per quanto riguarda forse ESI 24XL(la scheda audio esterna usb)...
Ma in questo caso che posso fare??

lcpreben 31-05-2009 10:42

Quote:

Originariamente inviato da ezio (Messaggio 27660321)
Se il problema persiste, la prima cosa da fare è disabilitare l'overclock del processore e riprovare.
Secondariamente, proverei in successione quanto segue:
- disattiva il Cool and Quite se hai una cpu AMD o C1e e SpeedStep in caso di cpu Intel. Volendo, potresti provare a lasciarli attivi da bios disattivando il risparmio energetico del processore in Windows Vista;
- assicurati di aver aggiornato i driver della scheda video;
- imposta, per il processo di CoD5, l'affinità per un singolo core del processore: Vista/Win7 - Affinità processori multicore

Altrimenti va eseguito un controllo hardware delle memorie, ad esempio con Memtest come suggeriva Crimsom. In questo thread trovi link per il download e relative guide all'utilizzo dei software citati:
Analisi e comparativa tool/procedure di emergenza

-SpeedStep e C1e li ho attivati, in questo modo quando il processore è in IDLE il moltiplicatore si abbassa; è proprio necessario rinunciare a questa funzione? Mi è comoda.
-Driver aggiornati, Catalyst 9.5 appena usciti.
-Lo farò, e verificherò se la schermata si ripete solo con CoD5 o anche con altri igochi. Ricordo però che mi apparse una schermata blu anche giocando a GTAIV, ma non ho avuto l'occasione di analizzare il log.

Prossimamente farò anche il Memtest, intanto grazie a tutti per l'aiuto. ;)


Tutti gli orari sono GMT +1. Ora sono le: 07:39.

Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Hardware Upgrade S.r.l.