themad
13-02-2009, 13:52
Non sempre ma la maggior parte delle volte che spengo il pc mi va in crash e si riavvia.
Premetto che le RAM sono nuove e le ho gia testate con successo con il memtest 86.
Grazie a chi mi darà una mano.
Di seguito il file.dmp:
Microsoft (R) Windows Debugger Version 6.10.0003.233 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini021309-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista SP1 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
Machine Name:
Kernel base = 0xfffff800`01e19000 PsLoadedModuleList = 0xfffff800`01fdedb0
Debug session time: Fri Feb 13 13:42:01.377 2009 (GMT+1)
System Uptime: 0 days 1:51:03.527
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 110b, 25100004, fffff900c24eab10}
GetPointerFromAddress: unable to read from fffff80002042080
Probably caused by : win32k.sys ( win32k!FreeObject+57 )
Followup: MachineOwner
---------
1: kd>
1: kd>
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000110b, (reserved)
Arg3: 0000000025100004, Memory contents of the pool block
Arg4: fffff900c24eab10, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: fffff900c24eab10
FREED_POOL_TAG: Gla8
BUGCHECK_STR: 0xc2_7_Gla8
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: KHALMNPR.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80001f4dfa8 to fffff80001e6e350
STACK_TEXT:
fffffa60`08c226b8 fffff800`01f4dfa8 : 00000000`000000c2 00000000`00000007 00000000`0000110b 00000000`25100004 : nt!KeBugCheckEx
fffffa60`08c226c0 fffff960`000d5c8f : 00000000`00000001 fffffa60`08c22808 00000000`02010c82 00000000`02010c82 : nt!ExFreePool+0x462
fffffa60`08c22770 fffff960`000d8035 : fffff900`c25fa710 fffff960`000d53d8 fffffa60`08c22808 00000000`00000001 : win32k!FreeObject+0x57
fffffa60`08c227a0 fffff960`000d81df : 00000000`00000bd4 00000000`00000000 00000000`00000001 fffff900`c0002f80 : win32k!DC::vReleaseVis+0x75
fffffa60`08c227e0 fffff960`000de211 : 00000000`02010c82 00000000`00000001 00000000`00000001 fffff900`c007e010 : win32k!bDeleteDCInternal+0x18f
fffffa60`08c22840 fffff960`000d6364 : 00000000`00000000 fffff800`020a5600 fffff900`c0923010 fffffa80`08c2c040 : win32k!NtGdiCloseProcess+0xc1
fffffa60`08c228a0 fffff960`000d5313 : 00000000`00000000 fffff900`c0923010 00000000`00000000 fffff800`020a5660 : win32k!GdiProcessCallout+0x1f4
fffffa60`08c22920 fffff800`0211484b : fffffa80`03ca9e60 00000000`00000000 00000000`00000000 fffffa80`09390bb0 : win32k!W32pProcessCallout+0x6f
fffffa60`08c22950 fffff800`020a567d : fffffa60`40010004 fffff800`01e98501 fffffa80`0939d060 00000000`78457350 : nt!PspExitThread+0x467
fffffa60`08c22a10 fffff800`01e9856b : fffffa60`08c22ad8 00000000`00000000 fffffa80`09553a40 00000000`40010004 : nt!PsExitSpecialApc+0x1d
fffffa60`08c22a40 fffff800`01e9c235 : fffffa60`08c22ca0 fffffa60`08c22ae0 fffff800`020a68a4 00000000`00000001 : nt!KiDeliverApc+0x3bb
fffffa60`08c22ae0 fffff800`01e6de9d : fffffa80`09390bb0 00000000`00000000 00000000`00000000 fffffa80`09295e10 : nt!KiInitiateUserApc+0x75
fffffa60`08c22c20 00000000`776c5aba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0xa2
00000000`045ffe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776c5aba
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!FreeObject+57
fffff960`000d5c8f 488b5c2430 mov rbx,qword ptr [rsp+30h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!FreeObject+57
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 48d1bca9
FAILURE_BUCKET_ID: X64_0xc2_7_Gla8_win32k!FreeObject+57
BUCKET_ID: X64_0xc2_7_Gla8_win32k!FreeObject+57
Followup: MachineOwner
---------
1: kd> !analyze -v
Premetto che le RAM sono nuove e le ho gia testate con successo con il memtest 86.
Grazie a chi mi darà una mano.
Di seguito il file.dmp:
Microsoft (R) Windows Debugger Version 6.10.0003.233 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini021309-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista SP1 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
Machine Name:
Kernel base = 0xfffff800`01e19000 PsLoadedModuleList = 0xfffff800`01fdedb0
Debug session time: Fri Feb 13 13:42:01.377 2009 (GMT+1)
System Uptime: 0 days 1:51:03.527
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 110b, 25100004, fffff900c24eab10}
GetPointerFromAddress: unable to read from fffff80002042080
Probably caused by : win32k.sys ( win32k!FreeObject+57 )
Followup: MachineOwner
---------
1: kd>
1: kd>
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000110b, (reserved)
Arg3: 0000000025100004, Memory contents of the pool block
Arg4: fffff900c24eab10, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: fffff900c24eab10
FREED_POOL_TAG: Gla8
BUGCHECK_STR: 0xc2_7_Gla8
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: KHALMNPR.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80001f4dfa8 to fffff80001e6e350
STACK_TEXT:
fffffa60`08c226b8 fffff800`01f4dfa8 : 00000000`000000c2 00000000`00000007 00000000`0000110b 00000000`25100004 : nt!KeBugCheckEx
fffffa60`08c226c0 fffff960`000d5c8f : 00000000`00000001 fffffa60`08c22808 00000000`02010c82 00000000`02010c82 : nt!ExFreePool+0x462
fffffa60`08c22770 fffff960`000d8035 : fffff900`c25fa710 fffff960`000d53d8 fffffa60`08c22808 00000000`00000001 : win32k!FreeObject+0x57
fffffa60`08c227a0 fffff960`000d81df : 00000000`00000bd4 00000000`00000000 00000000`00000001 fffff900`c0002f80 : win32k!DC::vReleaseVis+0x75
fffffa60`08c227e0 fffff960`000de211 : 00000000`02010c82 00000000`00000001 00000000`00000001 fffff900`c007e010 : win32k!bDeleteDCInternal+0x18f
fffffa60`08c22840 fffff960`000d6364 : 00000000`00000000 fffff800`020a5600 fffff900`c0923010 fffffa80`08c2c040 : win32k!NtGdiCloseProcess+0xc1
fffffa60`08c228a0 fffff960`000d5313 : 00000000`00000000 fffff900`c0923010 00000000`00000000 fffff800`020a5660 : win32k!GdiProcessCallout+0x1f4
fffffa60`08c22920 fffff800`0211484b : fffffa80`03ca9e60 00000000`00000000 00000000`00000000 fffffa80`09390bb0 : win32k!W32pProcessCallout+0x6f
fffffa60`08c22950 fffff800`020a567d : fffffa60`40010004 fffff800`01e98501 fffffa80`0939d060 00000000`78457350 : nt!PspExitThread+0x467
fffffa60`08c22a10 fffff800`01e9856b : fffffa60`08c22ad8 00000000`00000000 fffffa80`09553a40 00000000`40010004 : nt!PsExitSpecialApc+0x1d
fffffa60`08c22a40 fffff800`01e9c235 : fffffa60`08c22ca0 fffffa60`08c22ae0 fffff800`020a68a4 00000000`00000001 : nt!KiDeliverApc+0x3bb
fffffa60`08c22ae0 fffff800`01e6de9d : fffffa80`09390bb0 00000000`00000000 00000000`00000000 fffffa80`09295e10 : nt!KiInitiateUserApc+0x75
fffffa60`08c22c20 00000000`776c5aba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0xa2
00000000`045ffe48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776c5aba
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!FreeObject+57
fffff960`000d5c8f 488b5c2430 mov rbx,qword ptr [rsp+30h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!FreeObject+57
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 48d1bca9
FAILURE_BUCKET_ID: X64_0xc2_7_Gla8_win32k!FreeObject+57
BUCKET_ID: X64_0xc2_7_Gla8_win32k!FreeObject+57
Followup: MachineOwner
---------
1: kd> !analyze -v