PDA

View Full Version : BSOD:system service exception


criiis
23-07-2011, 08:19
ciao a tutti da un po di tempo quando accendo il pc mi dà la schermata blu solo che non la fa sempre ma passa pure qualche giorno o settimana e non è sempre lo stesso tipo di errore che sembrava sempre riferito a dei driver, comunque ho fatto 2 passaggi di memtest e non si è riavviato.
ieri ho formattato perchè avevo l'hd pieno di roba:asd: e oggi mi ha ridato la schermata blu
posto il log del minidump
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960000f4c5f, fffff88002944ca0, 0}

Probably caused by : win32k.sys ( win32k!XEPALOBJ::vUnrefPalette+f )

Followup: MachineOwner
---------

2: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000f4c5f, Address of the instruction which caused the bugcheck
Arg3: fffff88002944ca0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
win32k!XEPALOBJ::vUnrefPalette+f
fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax]

CONTEXT: fffff88002944ca0 -- (.cxr 0xfffff88002944ca0)
rax=fffdf900c0097f20 rbx=fffff88002945760 rcx=fffff88002945760
rdx=fffff90000002000 rsi=fffff900c2378010 rdi=0000000000000001
rip=fffff960000f4c5f rsp=fffff88002945680 rbp=0000000000000001
r8=0000000000000820 r9=0000000000000000 r10=fffff80002a5a000
r11=0000000000000034 r12=fffff900c2378238 r13=0000000000000001
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!XEPALOBJ::vUnrefPalette+0xf:
fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax] ds:002b:fffdf900`c0097f20=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: Xfire.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960000f4c5f

STACK_TEXT:
fffff880`02945680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!XEPALOBJ::vUnrefPalette+0xf


FOLLOWUP_IP:
win32k!XEPALOBJ::vUnrefPalette+f
fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32k!XEPALOBJ::vUnrefPalette+f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0

STACK_COMMAND: .cxr 0xfffff88002944ca0 ; kb

FAILURE_BUCKET_ID: X64_0x3B_win32k!XEPALOBJ::vUnrefPalette+f

BUCKET_ID: X64_0x3B_win32k!XEPALOBJ::vUnrefPalette+f

Followup: MachineOwner
---------

l'errore sembra essere causato da xfire ma prima di formattare lo dava anche con altri programmi

metto anche i minidump dei bsod che mi dava prima di formattare

********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffffa8003646880, fffdfa8003646880, fffffa8003646880}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )

Followup: Pool_corruption
---------

3: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8003646880, the pool entry being checked.
Arg3: fffdfa8003646880, the read back flink freelist value (should be the same as 2).
Arg4: fffffa8003646880, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR: 0x19_3

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 0

LOCK_ADDRESS: fffff800030c9400 -- (!locks fffff800030c9400)

Resource @ nt!PiEngineLock (0xfffff800030c9400) Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE:
Lock address : 0xfffff800030c9400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002ff8d6f to fffff80002ec5700

STACK_TEXT:
fffff880`06991818 fffff800`02ff8d6f : 00000000`00000019 00000000`00000003 fffffa80`03646880 fffdfa80`03646880 : nt!KeBugCheckEx
fffff880`06991820 fffff800`03131799 : 00000980`00000004 fffff880`069919c0 00000000`00000001 00000000`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`06991910 fffff800`031318d3 : 00000000`00000002 00000000`00000001 fffff880`06991ae0 00000000`00000000 : nt!IopAllocateBuffer+0x21
fffff880`06991940 fffff800`03132c81 : 00000000`00000002 00000000`00000000 fffff880`06991b40 00000000`00000001 : nt!IopGetDeviceInterfaces+0xa7
fffff880`06991ab0 fffff800`03130abd : 00000000`00000002 00000000`00000000 00000000`00000000 fffff8a0`038eaa50 : nt!PiGetInterfaceDeviceList+0x41
fffff880`06991b10 fffff800`03166180 : fffff8a0`038eaa50 fffff800`00008000 fffff880`06991c01 fffff800`03390da0 : nt!PiControlGetInterfaceDeviceList+0x111
fffff880`06991b90 fffff800`02ec4953 : fffffa80`05705b60 00000000`007eed40 fffff880`06991c60 00000000`007eedc8 : nt!NtPlugPlayControl+0x100
fffff880`06991be0 00000000`76d8070a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`007eed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d8070a


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!ExDeferredFreePool+a56
fffff800`02ff8d6f cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!ExDeferredFreePool+a56

FOLLOWUP_NAME: Pool_corruption

IMAGE_NAME: Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56

BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56

Followup: Pool_corruption
---------

********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002e9f93d, Address of the instruction which caused the bugcheck
Arg3: fffff8800936b9d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP:
nt!KeAcquireGuardedMutex+1d
fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0

CONTEXT: fffff8800936b9d0 -- (.cxr 0xfffff8800936b9d0)
rax=fffff8a004e58780 rbx=fffdfa8004475a00 rcx=fffdfa8004475a00
rdx=fffff8a004e58870 rsi=fffff8800936c430 rdi=fffffa8006178060
rip=fffff80002e9f93d rsp=fffff8800936c3a0 rbp=0000000000000001
r8=0000000000000001 r9=fffff8800936c430 r10=fffff88002fd5ca0
r11=fffffa80044758c0 r12=fffff8a004e58801 r13=0000000000000000
r14=0000000000000000 r15=fffffa80037432a0
iopl=0 nv up ei ng nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210296
nt!KeAcquireGuardedMutex+0x1d:
fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0 ds:002b:fffdfa80`04475a00=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: gta-vc.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002e9f93d

STACK_TEXT:
fffff880`0936c3a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireGuardedMutex+0x1d


FOLLOWUP_IP:
nt!KeAcquireGuardedMutex+1d
fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KeAcquireGuardedMutex+1d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34

STACK_COMMAND: .cxr 0xfffff8800936b9d0 ; kb

FAILURE_BUCKET_ID: X64_0x3B_nt!KeAcquireGuardedMutex+1d

BUCKET_ID: X64_0x3B_nt!KeAcquireGuardedMutex+1d

Followup: MachineOwner
---------

********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880033a3248, fffff880033a2ab0, fffff8800125014b}

Probably caused by : Ntfs.sys ( Ntfs!NtfsLookupAllocation+eb )

Followup: MachineOwner
---------

0: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880033a3248
Arg3: fffff880033a2ab0
Arg4: fffff8800125014b

Debugging Details:
------------------


EXCEPTION_RECORD: fffff880033a3248 -- (.exr 0xfffff880033a3248)
ExceptionAddress: fffff8800125014b (Ntfs!NtfsLookupAllocation+0x00000000000000eb)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff880033a2ab0 -- (.cxr 0xfffff880033a2ab0)
rax=fffdf8a009c71950 rbx=fffff8a009c71970 rcx=fffff8a009c71950
rdx=0000000000000000 rsi=0000000000000000 rdi=fffff8a009c71880
rip=fffff8800125014b rsp=fffff880033a3480 rbp=fffff880033a3920
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffa8006119770 r12=0000000000000000 r13=0000000000000000
r14=fffff880033a3640 r15=fffff880033a36c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
Ntfs!NtfsLookupAllocation+0xeb:
fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8] ds:002b:fffdf8a0`09c71958=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 1

ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b30e0
ffffffffffffffff

FOLLOWUP_IP:
Ntfs!NtfsLookupAllocation+eb
fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8]

FAULTING_IP:
Ntfs!NtfsLookupAllocation+eb
fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8]

BUGCHECK_STR: 0x24

LAST_CONTROL_TRANSFER: from fffff880012f9515 to fffff8800125014b

STACK_TEXT:
fffff880`033a3480 fffff880`012f9515 : fffffa80`06119620 fffff8a0`09c71880 00000000`00000000 fffff880`033a3650 : Ntfs!NtfsLookupAllocation+0xeb
fffff880`033a35f0 fffff880`0137ac77 : fffffa80`06119620 fffff8a0`09c71880 fffffa80`046088e0 00000000`00000001 : Ntfs!NtfsPreloadAllocation+0x91
fffff880`033a36b0 fffff880`01344882 : fffffa80`06119620 00000000`00000008 fffffa80`04608800 fffff880`00000020 : Ntfs!NtfsGetRetrievalPointers+0x4d3
fffff880`033a3800 fffff880`012fb3ed : fffffa80`06119620 00000000`00000000 fffff880`033a3920 00000000`00000000 : Ntfs! ?? ::NNGAKEGL::`string'+0x1c8fd
fffff880`033a3840 fffff880`0107623f : fffff880`033a3990 fffffa80`04d93190 fffff880`033a3901 fffffa80`06119620 : Ntfs!NtfsFsdFileSystemControl+0x13d
fffff880`033a38e0 fffff880`0109591e : fffffa80`046088e0 fffffa80`0652f490 fffffa80`04608800 fffffa80`04d93190 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24 f
fffff880`033a3970 fffff800`03195467 : fffffa80`0652f490 fffff880`033a3c60 fffffa80`04d93578 fffffa80`04d93190 : fltmgr!FltpFsControl+0xee
fffff880`033a39d0 fffff800`0315e69a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`033a3b00 fffff800`02e7a953 : fffffa80`054b4340 00000000`00000001 fffffa80`0690c740 fffff800`03190164 : nt!NtFsControlFile+0x56
fffff880`033a3b70 00000000`76f3fa4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0389e5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f3fa4a


SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: Ntfs!NtfsLookupAllocation+eb

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4d79996d

STACK_COMMAND: .cxr 0xfffff880033a2ab0 ; kb

FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsLookupAllocation+eb

BUCKET_ID: X64_0x24_Ntfs!NtfsLookupAllocation+eb

Followup: MachineOwner


********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41284, fffff68000080001, 8e, fffff70001080000}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a13 )

Followup: MachineOwner
---------

3: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: fffff68000080001
Arg3: 000000000000008e
Arg4: fffff70001080000

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_41284

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: Xfire.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80002ee2493 to fffff80002e8d700

STACK_TEXT:
fffff880`08e565d8 fffff800`02ee2493 : 00000000`0000001a 00000000`00041284 fffff680`00080001 00000000`0000008e : nt!KeBugCheckEx
fffff880`08e565e0 fffff800`02ec03f9 : fffffa80`0549f3f8 00000000`00000000 00000000`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4a13
fffff880`08e56620 fffff800`02ec068a : fffffa80`006eeb90 fffffa80`0549f060 00000000`00000000 fffff680`00080158 : nt!MiTerminateWsle+0x29
fffff880`08e56660 fffff800`02ebe965 : fffffa80`0549f060 00000000`1002b000 00000000`00000000 00000000`02831000 : nt!MiDeletePageTableHierarchy+0xca
fffff880`08e56770 fffff800`02ec0e79 : fffffa80`00000000 00000000`1002bfff 00000000`00000000 fffffa80`0614eb60 : nt!MiDeleteVirtualAddresses+0x96c
fffff880`08e56930 fffff800`02e607cc : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`08e56a50 fffff800`0317194b : fffff8a0`0a33c5d0 00000000`00000001 00000000`00000000 fffffa80`0396c060 : nt!MmCleanProcessAddressSpace+0x228
fffff880`08e56aa0 fffff800`0314a7cb : 00000000`c000004b 00000000`00000001 00000000`7efa1000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`08e56b60 fffff800`02e8c953 : fffffa80`0549f060 00000000`c000004b 00000000`7efa1001 fffffa80`0396c060 : nt!NtTerminateProcess+0x25b
fffff880`08e56be0 00000000`77b1f97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04e6e808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b1f97a


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4a13
fffff800`02ee2493 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4a13

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34

FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a13

BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a13

Followup: MachineOwner
---------

Eress
23-07-2011, 16:58
I problemi sembrano collegati con quel client XFire, dovresti provare a disinstallarlo e vedere se le cose migliorano.

criiis
23-07-2011, 17:20
ne ha fatta un'altra poco fa. arrivo al desktop il catalyst control center crasha e poi fa il bsod
prima ho fatto anche lo scandisk e non ha trovato errori


*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800319a858, fffff8800319a0b0, fffff8800122e80c}

Probably caused by : Ntfs.sys ( Ntfs!NtfsDecrementCloseCounts+2c )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800319a858
Arg3: fffff8800319a0b0
Arg4: fffff8800122e80c

Debugging Details:
------------------


EXCEPTION_RECORD: fffff8800319a858 -- (.exr 0xfffff8800319a858)
ExceptionAddress: fffff8800122e80c (Ntfs!NtfsDecrementCloseCounts+0x000000000000002c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff8800319a0b0 -- (.cxr 0xfffff8800319a0b0)
rax=fffdfa80047f6180 rbx=fffffa8005543c70 rcx=fffffa8005543c70
rdx=fffff8a0041ceb90 rsi=fffff8a0041cea60 rdi=fffff8800319abf8
rip=fffff8800122e80c rsp=fffff8800319aa90 rbp=fffff80002e1e5a0
r8=fffff8a0041cedf8 r9=0000000000000000 r10=fffff8a0041cea60
r11=fffff8800319ab12 r12=fffffa80047f6180 r13=0000000000000000
r14=fffff8a0041cedf8 r15=0000000000000001
iopl=0 nv up ei pl zr ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010257
Ntfs!NtfsDecrementCloseCounts+0x2c:
fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh ds:002b:fffdfa80`047f625c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb10e0
ffffffffffffffff

FOLLOWUP_IP:
Ntfs!NtfsDecrementCloseCounts+2c
fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh

FAULTING_IP:
Ntfs!NtfsDecrementCloseCounts+2c
fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh

BUGCHECK_STR: 0x24

LAST_CONTROL_TRANSFER: from fffff880012c7813 to fffff8800122e80c

STACK_TEXT:
fffff880`0319aa90 fffff880`012c7813 : fffffa80`05543c70 fffff800`02e1e5a0 fffff8a0`041cea60 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0x2c
fffff880`0319aad0 fffff880`012a138f : fffffa80`05543c70 fffff8a0`041ceb90 fffff8a0`041cea60 fffffa80`047f6180 : Ntfs!NtfsCommonClose+0x353
fffff880`0319aba0 fffff800`02c88161 : 00000000`00000000 fffff880`012a1200 fffffa80`036cb001 fffff800`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`0319ac70 fffff800`02f1e166 : 0000baf0`8149fbcb fffffa80`036cb040 00000000`00000080 fffffa80`036559e0 : nt!ExpWorkerThread+0x111
fffff880`0319ad00 fffff800`02c59486 : fffff880`02f64180 fffffa80`036cb040 fffff880`02f6efc0 4104e0c1`04eac1c2 : nt!PspSystemThreadStartup+0x5a
fffff880`0319ad40 00000000`00000000 : fffff880`0319b000 fffff880`03195000 fffff880`0319a6c0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: Ntfs!NtfsDecrementCloseCounts+2c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f

STACK_COMMAND: .cxr 0xfffff8800319a0b0 ; kb

FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsDecrementCloseCounts+2c

BUCKET_ID: X64_0x24_Ntfs!NtfsDecrementCloseCounts+2c

Followup: MachineOwner
---------

Eress
23-07-2011, 18:46
Prova un rollback dei catalyst