View Full Version : errore con crash!!aiuto!
white.devils
26-02-2008, 10:14
ciao a tutti volevo chiedere aiuto su un problema che mi si presenta molto spesso e senza soluzione, spesso facendo cose normali sul pc (internet, scrivere ecc) il pc si riavvia dopo ke mi è uscita una schermata blu. Al riavvio mi esce la finestrella con scritto di cercare una soluzione tra l'altro mai trovata. Vi Posso dire che ho windows vista home premium e tutti i driver forniti dalla casa madre del mio notebook. ecco le immagini:
http://img246.imageshack.us/img246/2169/erroredl7.jpg (http://imageshack.us)
http://img246.imageshack.us/img246/5028/errore2uy0.jpg (http://imageshack.us)
white.devils
27-02-2008, 09:31
nessuno sa niente?
dovresti farci vedere cosa c'è scritto prima della scritta "ulteriori informazioni sul problema" cioè in "Firma del problema". E' in "Firma del problema" che sono elencati i nomi dei moduli o i driver che hanno crashato
white.devils
27-02-2008, 11:18
azz e allora la prossima volta ke crasha lo posto, cmq pensavo ke i codici scritti servivano a qlcosa
white.devils
06-03-2008, 08:37
ecco la prima parte della finestra
http://img527.imageshack.us/img527/4167/errnz8.jpg (http://imageshack.us)
http://img527.imageshack.us/img527/4167/errnz8.903d21c776.jpg (http://g.imageshack.us/g.php?h=527&i=errnz8.jpg)
sapete aiutarmi????
cristian5
06-03-2008, 20:42
prova un po' così: scarica il debugging tools da qui http://msdl.microsoft.com/download/symbols/debuggers/dbg_x86_6.8.4.0.msi
poi avvialo come amministratore e metti in "Symbols File Path" sotto il menu File questo: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
infine fai "Open Crash Dump" e seleziona il file che sta nella cartella Minidump che si vede nell'immagine che hai postato, poi vedi cosa ti dice
white.devils
07-03-2008, 09:16
è uscito questo
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini022608-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.x86fre.vista_gdr.071009-1548
Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d11e10
Debug session time: Tue Feb 26 10:21:30.733 2008 (GMT+1)
System Uptime: 0 days 0:31:47.519
Loading Kernel Symbols
..........................................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {19c3d8cc, 1b, 0, 81c29144}
Probably caused by : ntkrpamp.exe ( nt!KeWaitForSingleObject+1b5 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 19c3d8cc, memory referenced
Arg2: 0000001b, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81c29144, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'amon' and 'parport.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d117e0
19c3d8cc
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: SearchIndexer.e
TRAP_FRAME: 99c3d744 -- (.trap 0xffffffff99c3d744)
ErrCode = 00000000
eax=00000000 ebx=84570e30 ecx=19c3d8cc edx=81d32300 esi=84570d78 edi=84570e00
eip=81c29144 esp=99c3d7b8 ebp=99c3d80c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!KeWaitForSingleObject+0x1b5:
81c29144 803902 cmp byte ptr [ecx],2 ds:0023:19c3d8cc=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 81c29144 to 81c8fd84
STACK_TEXT:
99c3d744 81c29144 badb0d00 81d32300 844eed30 nt!KiTrap0E+0x2ac
99c3d80c 81c3b553 19c3d8cc 00000013 00000000 nt!KeWaitForSingleObject+0x1b5
99c3d810 19c3d8cc 00000013 00000000 00000000 nt!MiFlushSectionInternal+0x8bd
WARNING: Frame IP not in any known module. Following frames may be wrong.
99c3d814 00000000 00000000 00000000 00000000 0x19c3d8cc
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeWaitForSingleObject+1b5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c2f52
FAILURE_BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 19c3d8cc, memory referenced
Arg2: 0000001b, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81c29144, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'amon' and 'parport.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d117e0
19c3d8cc
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: SearchIndexer.e
TRAP_FRAME: 99c3d744 -- (.trap 0xffffffff99c3d744)
ErrCode = 00000000
eax=00000000 ebx=84570e30 ecx=19c3d8cc edx=81d32300 esi=84570d78 edi=84570e00
eip=81c29144 esp=99c3d7b8 ebp=99c3d80c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!KeWaitForSingleObject+0x1b5:
81c29144 803902 cmp byte ptr [ecx],2 ds:0023:19c3d8cc=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 81c29144 to 81c8fd84
STACK_TEXT:
99c3d744 81c29144 badb0d00 81d32300 844eed30 nt!KiTrap0E+0x2ac
99c3d80c 81c3b553 19c3d8cc 00000013 00000000 nt!KeWaitForSingleObject+0x1b5
99c3d810 19c3d8cc 00000013 00000000 00000000 nt!MiFlushSectionInternal+0x8bd
WARNING: Frame IP not in any known module. Following frames may be wrong.
99c3d814 00000000 00000000 00000000 00000000 0x19c3d8cc
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeWaitForSingleObject+1b5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c2f52
FAILURE_BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 19c3d8cc, memory referenced
Arg2: 0000001b, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81c29144, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'amon' and 'parport.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d117e0
19c3d8cc
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: SearchIndexer.e
TRAP_FRAME: 99c3d744 -- (.trap 0xffffffff99c3d744)
ErrCode = 00000000
eax=00000000 ebx=84570e30 ecx=19c3d8cc edx=81d32300 esi=84570d78 edi=84570e00
eip=81c29144 esp=99c3d7b8 ebp=99c3d80c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!KeWaitForSingleObject+0x1b5:
81c29144 803902 cmp byte ptr [ecx],2 ds:0023:19c3d8cc=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 81c29144 to 81c8fd84
STACK_TEXT:
99c3d744 81c29144 badb0d00 81d32300 844eed30 nt!KiTrap0E+0x2ac
99c3d80c 81c3b553 19c3d8cc 00000013 00000000 nt!KeWaitForSingleObject+0x1b5
99c3d810 19c3d8cc 00000013 00000000 00000000 nt!MiFlushSectionInternal+0x8bd
WARNING: Frame IP not in any known module. Following frames may be wrong.
99c3d814 00000000 00000000 00000000 00000000 0x19c3d8cc
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeWaitForSingleObject+1b5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c2f52
FAILURE_BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 19c3d8cc, memory referenced
Arg2: 0000001b, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81c29144, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'amon' and 'parport.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d117e0
19c3d8cc
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: SearchIndexer.e
TRAP_FRAME: 99c3d744 -- (.trap 0xffffffff99c3d744)
ErrCode = 00000000
eax=00000000 ebx=84570e30 ecx=19c3d8cc edx=81d32300 esi=84570d78 edi=84570e00
eip=81c29144 esp=99c3d7b8 ebp=99c3d80c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!KeWaitForSingleObject+0x1b5:
81c29144 803902 cmp byte ptr [ecx],2 ds:0023:19c3d8cc=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 81c29144 to 81c8fd84
STACK_TEXT:
99c3d744 81c29144 badb0d00 81d32300 844eed30 nt!KiTrap0E+0x2ac
99c3d80c 81c3b553 19c3d8cc 00000013 00000000 nt!KeWaitForSingleObject+0x1b5
99c3d810 19c3d8cc 00000013 00000000 00000000 nt!MiFlushSectionInternal+0x8bd
WARNING: Frame IP not in any known module. Following frames may be wrong.
99c3d814 00000000 00000000 00000000 00000000 0x19c3d8cc
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeWaitForSingleObject+1b5
81c29144 803902 cmp byte ptr [ecx],2
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeWaitForSingleObject+1b5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c2f52
FAILURE_BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
BUCKET_ID: 0xA_nt!KeWaitForSingleObject+1b5
Followup: MachineOwner
---------
giannola
07-03-2008, 09:27
è un problema di ram.
nel migliore dei casi occorre settare i timings, nel peggiore un banco può essere danneggiato.
white.devils
07-03-2008, 09:39
azz, cm posso settare i timing, mi sai dare una mano?
giannola
07-03-2008, 10:19
azz, cm posso settare i timing, mi sai dare una mano?
devi conoscere i valori dei singoli banchi e, nel caso fossero differenti, settarli nel bios uno ad uno.
usa cpu-z.
white.devils
07-03-2008, 10:44
questo è il mio pc
http://img120.imageshack.us/img120/1334/cpukz4.jpg (http://imageshack.us)
giannola
07-03-2008, 10:53
le ram sono identiche (finestre 2 e 3 in alto da sinistra) e il sistema le riconosce automaticamente senza problemi.
Per tagliare la testa al toro vai nel bios e nel menù exit, cerca l'opzione load setup defaults (o similare).
Vedi come va.
Nel caso (come credo) i problemi persistano fai un controllo della ram con memtest. ;)
white.devils
07-03-2008, 12:06
x la cronaca a volte qnd scarico dei file grossi, e li estraggo mi esce errore crc, mi dissero ke era un problema di ram, cosi ho fatto il memtest x circa 4 ore e gli errori sono stati zero...
giannola
07-03-2008, 15:51
x la cronaca a volte qnd scarico dei file grossi, e li estraggo mi esce errore crc, mi dissero ke era un problema di ram, cosi ho fatto il memtest x circa 4 ore e gli errori sono stati zero...
il crc acronimo di Cyclic redundancy check (controllo di ridondanza ciclico) è un controllo per verificare la correttezza dei dati; questo controllo di norma vien fatto dall'hd sui dati in trasferimento per verificarne la correttezza.
Se vi sono errori il crc li rileva.
A volte la causa può essere l'eccessivo riscaldamento dell'hd.
Cmq fai una scansione dettagliata con hd tune per vedere che non ci siano settori danneggiati.
white.devils
07-03-2008, 17:02
ma x la questione delle ram come devo fare?
giannola
07-03-2008, 17:25
ma x la questione delle ram come devo fare?
scaricati memtest, crea un disco di avvio con il programma, setta il bios per far partire il cd e poi fa tutto da solo. :)
white.devils
07-03-2008, 22:46
l'ho fatto e dopo 3 ore zero errori
giannola
08-03-2008, 07:33
l'ho fatto e dopo 3 ore zero errori
e quindi torniamo al nostro crc.
verifica la temperatura dell'hd, può essere quella che da problemi
white.devils
08-03-2008, 09:46
devo usare hd tune quindi?
giannola
08-03-2008, 10:09
devo usare hd tune quindi?
sisi. ;)
Controlla temperatura e parametri.
white.devils
18-03-2008, 12:37
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini031808-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.x86fre.vista_gdr.071009-1548
Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d11e10
Debug session time: Tue Mar 18 13:30:32.633 2008 (GMT+1)
System Uptime: 0 days 0:36:17.487
Loading Kernel Symbols
.........................................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {3fe3058, 2, 0, 8b432bfd}
Probably caused by : usbhub.sys ( usbhub!PdoExt+1f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 03fe3058, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8b432bfd, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'cdfs' and 'parport.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d117e0
03fe3058
CURRENT_IRQL: 2
FAULTING_IP:
usbhub!PdoExt+1f
8b432bfd 8b4028 mov eax,dword ptr [eax+28h]
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 880bcab8 -- (.trap 0xffffffff880bcab8)
ErrCode = 00000000
eax=03fe3030 ebx=85ad5780 ecx=00000000 edx=31696e6f esi=865cc808 edi=00000100
eip=8b432bfd esp=880bcb2c ebp=880bcb2c iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
usbhub!PdoExt+0x1f:
8b432bfd 8b4028 mov eax,dword ptr [eax+28h] ds:0023:03fe3058=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8b432bfd to 81c8fd84
STACK_TEXT:
880bcab8 8b432bfd badb0d00 31696e6f 0000000f nt!KiTrap0E+0x2ac
880bcb2c 8b4389e4 03fe3030 85d81000 00000400 usbhub!PdoExt+0x1f
880bcb58 8b434c0e 85af7028 83ffd700 00000004 usbhub!UsbhDetectDuplicateDevice+0x67
880bcb90 8b43662d 00000001 00000000 83ffd700 usbhub!UsbhReset2Complete+0x1df
880bcbb4 8b435adc 85af7028 00000010 00000000 usbhub!UsbhEnumerate2+0x192
880bcbe4 8b43556c 85af7028 85d81019 83ffd700 usbhub!UsbhHubDispatchPortEvent+0x4a6
880bcc34 8b435d02 00000503 85d81000 85d81014 usbhub!UsbhHubRunPortChangeQueue+0x1b4
880bcc58 8b435124 85af7000 00000004 85d81014 usbhub!Usbh_PCE_wRun_Action+0x11b
880bcc78 8b436074 85af7028 85d81000 00000005 usbhub!UsbhDispatch_PortChangeQueueEventEx+0xb9
880bcca4 8b436047 85af7028 85d81000 00000005 usbhub!UsbhDispatch_PortChangeQueueEvent+0x24
880bccd4 8b43601d 85af7028 85d81000 00000005 usbhub!UsbhDispatch_PortChangeQueueNullEvent+0x20
880bccf0 8b435fbf 85af7028 85d81014 85d81000 usbhub!UsbhPCE_wRun+0x48
880bcd10 8b4327dc 85af7028 9f109c70 85d81014 usbhub!UsbhHubProcessChangeWorker+0x7c
880bcd30 81d8c85a 85af7028 83ee1420 8367c580 usbhub!UsbhHubWorker+0x50
880bcd44 81c78fa0 864c3f58 00000000 8367c580 nt!IopProcessWorkItem+0x23
880bcd7c 81e254e0 864c3f58 880b7680 00000000 nt!ExpWorkerThread+0xfd
880bcdc0 81c9159e 81c78ea3 00000001 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
usbhub!PdoExt+1f
8b432bfd 8b4028 mov eax,dword ptr [eax+28h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: usbhub!PdoExt+1f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbhub
IMAGE_NAME: usbhub.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4549b278
FAILURE_BUCKET_ID: 0xD1_usbhub!PdoExt+1f
BUCKET_ID: 0xD1_usbhub!PdoExt+1f
Followup: MachineOwner
-
questo è quello dell'ultimo riavvio, è sempre la ram?
giannola
18-03-2008, 14:29
non è la ram ma sembra un conflitto del driver usb.
Probabilmente si è verificata una concorrenza tra usbhub e parport (che si occupa della porta parallela)
white.devils
18-03-2008, 17:02
mamma che casini che ha sto pc, da quando ho messo vista.
white.devils
20-03-2008, 09:32
ora c'è scritto questo dp l'ultimo riavvio...
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini032008-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.x86fre.vista_gdr.071009-1548
Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d11e10
Debug session time: Thu Mar 20 10:29:00.342 2008 (GMT+1)
System Uptime: 0 days 0:06:23.094
Loading Kernel Symbols
............................................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {63de900, 1b, 1, 81ca90b0}
Probably caused by : ntkrpamp.exe ( nt!KiUnwaitThread+19 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 063de900, memory referenced
Arg2: 0000001b, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81ca90b0, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'cdfs' and 'parport.sys' overlap
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d117e0
063de900
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KiUnwaitThread+19
81ca90b0 890a mov dword ptr [edx],ecx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: wmpnetwk.exe
IRP_ADDRESS: 00313b68
TRAP_FRAME: 989cfaa4 -- (.trap 0xffffffff989cfaa4)
ErrCode = 00000002
eax=83f44808 ebx=8530ccd0 ecx=863de900 edx=063de900 esi=8520d030 edi=8530ccc8
eip=81ca90b0 esp=989cfb18 ebp=989cfb2c iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!KiUnwaitThread+0x19:
81ca90b0 890a mov dword ptr [edx],ecx ds:0023:063de900=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 81ca90b0 to 81c8fd84
STACK_TEXT:
989cfaa4 81ca90b0 badb0d00 063de900 864ba3b8 nt!KiTrap0E+0x2ac
989cfb2c 81cb0ec3 00000000 989c403c 85313ba8 nt!KiUnwaitThread+0x19
989cfb7c 81cb1302 00313ba8 989cfba8 989cfbb4 nt!IopCompleteRequest+0x51e
989cfbd4 81cac9ea 00000000 00000000 00000000 nt!KiDeliverApc+0xce
989cfc1c 81cad431 864ba3b8 989cfd08 866ac5f0 nt!KiSwapThread+0x3a4
989cfc68 81d8b982 85209d10 989cfc01 00000001 nt!KeRemoveQueueEx+0x568
989cfcc0 81c7a036 85209d10 989cfcf8 989cfd20 nt!IoRemoveIoCompletion+0x23
989cfd54 81c8caaa 000001e8 01b4fd48 01b4fdcc nt!NtWaitForWorkViaWorkerFactory+0x1a1
989cfd54 77ac0f34 000001e8 01b4fd48 01b4fdcc nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
01b4fdcc 00000000 00000000 00000000 00000000 0x77ac0f34
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiUnwaitThread+19
81ca90b0 890a mov dword ptr [edx],ecx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiUnwaitThread+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c2f52
FAILURE_BUCKET_ID: 0xA_W_nt!KiUnwaitThread+19
BUCKET_ID: 0xA_W_nt!KiUnwaitThread+19
Followup: MachineOwner
---------
giannola
20-03-2008, 09:51
il problema dovrebbe essere causato da wmpnetwk.exe che è un servizio installato con wmp11 che serve a condividere i file multimediali in una rete.
Puoi tranquillamente disabilitarlo cliccando sui start -> esegui: services.msc
Fai doppio click su Servizio di condivisione in rete Windows Media Player, arresta il servizio e imposta il tipo di avvio su manuale o disabilitato.
;)
white.devils
20-03-2008, 10:07
caspita ma ogni problema si riavvia sto pc...
giannola
20-03-2008, 14:10
caspita ma ogni problema si riavvia sto pc...
vuol dire che c'è dell'hw difettoso, la colpa non è di vista.
white.devils
20-03-2008, 17:46
a sapere quale sia posso cambiarlo, da dove si puo vedere? ke test posso fare?se mi aiuti te ne sarò grato
giannola
20-03-2008, 18:52
a sapere quale sia posso cambiarlo, da dove si puo vedere? ke test posso fare?se mi aiuti te ne sarò grato
se, ha avuto problemi windows media player, escludendo la ram, i primi indagati sono la scheda audio e quella video o anche qualche accessorio collegato a usb che sfrutti la multimedialità e che potrebbe creare un conflitto.
white.devils
21-03-2008, 09:31
ma nn mi pare di aver avuto problemi con windows media player
giannola
21-03-2008, 11:38
ma nn mi pare di aver avuto problemi con windows media player
intanto il processo dell'ultimo errore che hai postato era un processo di wmp, l'hai disabilitato come ti ho detto ?
white.devils
21-03-2008, 12:23
ho messo avvio manuale come dicevi
white.devils
22-03-2008, 09:00
altro riavvio...
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini032208-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.x86fre.vista_gdr.071009-1548
Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d11e10
Debug session time: Sat Mar 22 09:54:01.494 2008 (GMT+1)
System Uptime: 0 days 0:10:23.204
Loading Kernel Symbols
.............................................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, b9abd8d, 8bfdb9c4, 0}
Probably caused by : tdx.sys ( tdx!TdxDeactivateTransportAddress+137 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 0b9abd8d, The address that the exception occurred at
Arg3: 8bfdb9c4, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.
FAULTING_IP:
+b9abd8d
0b9abd8d ?? ???
TRAP_FRAME: 8bfdb9c4 -- (.trap 0xffffffff8bfdb9c4)
ErrCode = 00000010
eax=841cc800 ebx=841cc800 ecx=00000000 edx=00000004 esi=841cc7c0 edi=00000000
eip=0b9abd8d esp=8bfdba38 ebp=8bfdba40 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
0b9abd8d ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 8b9d00ea to 0b9abd8d
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8bfdba34 8b9d00ea 841cc7c0 8bfdba54 8b9abd82 0xb9abd8d
8bfdba40 8b9abd82 841cc800 841cc9a0 81c47827 tcpip!WfpAleDecrementWaitRef+0x65
8bfdba54 8b9a40ab 841cc7c0 83fbf090 00000000 tcpip!WfpAleEndpointTeardownHandler+0x7e
8bfdba6c 8b9a4169 841cc9e4 8bfdba88 8b9a4028 tcpip!TcpCleanupEndpointWorkQueueRoutine+0x77
8bfdba78 8b9a4028 841cc9a0 841cc9a0 8bfdba9c tcpip!TcpCleanupEndpoint+0x1e
8bfdba88 8b9a4243 841cc9a0 00000000 83fbf098 tcpip!TcpDereferenceEndpoint+0x1c
8bfdba9c 8b9a4d84 841cc9a0 8bfdbae8 8bfdbb04 tcpip!TcpCloseEndpoint+0xc1
8bfdbaac 8b93e319 841cc9a0 8bfdbae8 83fbf090 tcpip!TcpTlEndpointCloseEndpoint+0x10
8bfdbb04 8b93e559 83fbf090 00000000 863aacc8 tdx!TdxDeactivateTransportAddress+0x137
8bfdbb18 8b944c1d 83fbf090 85dc4008 863aacc8 tdx!TdxDeleteTransportAddress+0x23
8bfdbb30 81c27f83 85dba268 863aacc8 863aacd8 tdx!TdxTdiDispatchCleanup+0x43
8bfdbb48 81d94e62 83656ab0 8367fbf0 00000001 nt!IofCallDriver+0x63
8bfdbb8c 81df328b 83656ab0 83e7f128 0012019f nt!IopCloseFile+0x386
8bfdbbdc 81df1676 83656ab0 0067fbf0 0012019f nt!ObpDecrementHandleCount+0x14c
8bfdbc2c 81df1718 88200188 9ccf39e0 83656ab0 nt!ObpCloseHandleTableEntry+0x23a
8bfdbc5c 81df180a 83656ab0 00000000 00000000 nt!ObpCloseHandle+0x73
8bfdbc70 81c8caaa 80000cf0 8bfdbd00 81c7e081 nt!NtClose+0x20
8bfdbc70 81c7e081 80000cf0 8bfdbd00 81c7e081 nt!KiFastCallEntry+0x12a
8bfdbcec 8b8d02ff 80000cf0 8655fda8 8b8cef0c nt!ZwClose+0x11
8bfdbd00 8b8aeb54 8655fda8 8b8cef08 8655fdf4 netbt!NbtTdiCloseAddress+0x30
8bfdbd14 8b8ae5dd 00000000 8655fda8 00000000 netbt!DelayedWipeOutLowerconn+0x2a
8bfdbd44 81c78fa0 8b8cef1c 00000000 85213d78 netbt!NTExecuteWorker+0x6a
8bfdbd7c 81e254e0 8b8cef1c 8bfd0680 00000000 nt!ExpWorkerThread+0xfd
8bfdbdc0 81c9159e 81c78ea3 80000000 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
tdx!TdxDeactivateTransportAddress+137
8b93e319 3d03010000 cmp eax,103h
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: tdx!TdxDeactivateTransportAddress+137
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tdx
IMAGE_NAME: tdx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4549b2fe
FAILURE_BUCKET_ID: 0x8E_tdx!TdxDeactivateTransportAddress+137
BUCKET_ID: 0x8E_tdx!TdxDeactivateTransportAddress+137
Followup: MachineOwner
---------
FulValBot
22-03-2008, 09:05
io direi però di provare a vedere se levando un blocco di ram l'errore si presenta ancora oppure no... prova prima uno poi l'altro modulo.
Built by: 6000.16575.x86fre.vista_gdr.071009-1548
Il tuo sistema non sembra aggiornato con le ultime patch, perchè il numero di versione del kernel deve essere "Built by: 6000.16584" e non 16575 (c:\windows\system32\ntoskrnl.exe)
giannola
22-03-2008, 09:34
ti direi di fare un controllo per verificare che non possa essere stato infettato da
rustock
http://www.symantec.com/security_response/writeup.jsp?docid=2006-011309-5412-99&tabid=2
altrimenti è un problema di modem
FulValBot
22-03-2008, 09:35
ah ricorda che i modem usb a volte provocano schermate blu. se il modem che usi va anche col cavo ethernet usa quello al posto dell'usb, potrebbe già risolversi.
giannola
22-03-2008, 09:38
ah ricorda che i modem usb a volte provocano schermate blu. se il modem che usi va anche col cavo ethernet usa quello al posto dell'usb, potrebbe già risolversi.
sei in ritardo :O :sofico:
FulValBot
22-03-2008, 09:39
sei in ritardo :O :sofico:
sbagliato, io ho direttamente specificato...
white.devils
22-03-2008, 11:33
aspettate ragazzi, una cosa alla volta, il pc in questione è un notebook, quindi nn saprei proprio cm fare x levare una ram, seconda cosa windows update è sempre attivo e se faccio cerca agg non ne trova ora, terza cosa cosa bisogna fare x vedere se si è infetti da quel trojan?, quarta cosa uso un router e mi collego wifi a internet
white.devils
22-03-2008, 11:51
x la cronaca, a me sembrano tutti diversi
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini032208-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.x86fre.vista_gdr.071009-1548
Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d11e10
Debug session time: Sat Mar 22 12:43:54.159 2008 (GMT+1)
System Uptime: 0 days 2:47:28.135
Loading Kernel Symbols
...........................................................................................................................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {6589db0, 1b, 1, 81ca90b0}
Probably caused by : ntkrpamp.exe ( nt!KiUnwaitThread+19 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 06589db0, memory referenced
Arg2: 0000001b, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 81ca90b0, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d117e0
06589db0
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KiUnwaitThread+19
81ca90b0 890a mov dword ptr [edx],ecx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: Aurora.scr
TRAP_FRAME: 87650e14 -- (.trap 0xffffffff87650e14)
ErrCode = 00000002
eax=84344808 ebx=00000000 ecx=86589db0 edx=06589db0 esi=8664bd78 edi=83de5178
eip=81ca90b0 esp=87650e88 ebp=87650e9c iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!KiUnwaitThread+0x19:
81ca90b0 890a mov dword ptr [edx],ecx ds:0023:06589db0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 81ca90b0 to 81c8fd84
STACK_TEXT:
87650e14 81ca90b0 badb0d00 06589db0 861d5902 nt!KiTrap0E+0x2ac
87650e9c 81ca9778 00000000 81cf4820 81cf6180 nt!KiUnwaitThread+0x19
87650f88 81ca9321 00000000 00000000 0009d40b nt!KiTimerExpiration+0x23f
87650ff4 81c90ecd 95983c28 00000000 00000000 nt!KiRetireDpcList+0xba
87650ff8 95983c28 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x3d
WARNING: Frame IP not in any known module. Following frames may be wrong.
81c90ecd 00000000 0000001a 00c1850f bb830000 0x95983c28
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiUnwaitThread+19
81ca90b0 890a mov dword ptr [edx],ecx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiUnwaitThread+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c2f52
FAILURE_BUCKET_ID: 0xA_W_nt!KiUnwaitThread+19
BUCKET_ID: 0xA_W_nt!KiUnwaitThread+19
Followup: MachineOwner
---------
guitar82
22-03-2008, 14:05
Sembra il messaggio di errore (con relativa schermata blu) che è apparso anche a me.
Si tratta di Zone Alarm Sescurity Suite che va in blocco con alcuni notebook sony.
Ho risolto mettendo Kaspersky.
Facci sapere se hai un VAIO e se usi Zone Alarm.
white.devils
22-03-2008, 14:58
no ho pakcard bell easynote con il firewall di windows
vBulletin® v3.6.4, Copyright ©2000-2025, Jelsoft Enterprises Ltd.