|
|
|
![]() |
|
Strumenti |
![]() |
#1 |
Member
Iscritto dal: Jul 2009
Città: Milano/Lamezia Terme
Messaggi: 135
|
BSOD:system service exception
ciao a tutti da un po di tempo quando accendo il pc mi dà la schermata blu solo che non la fa sempre ma passa pure qualche giorno o settimana e non è sempre lo stesso tipo di errore che sembrava sempre riferito a dei driver, comunque ho fatto 2 passaggi di memtest e non si è riavviato.
ieri ho formattato perchè avevo l'hd pieno di roba ![]() posto il log del minidump Codice:
********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff960000f4c5f, fffff88002944ca0, 0} Probably caused by : win32k.sys ( win32k!XEPALOBJ::vUnrefPalette+f ) Followup: MachineOwner --------- 2: kd> !analyze -v ********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff960000f4c5f, Address of the instruction which caused the bugcheck Arg3: fffff88002944ca0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s. FAULTING_IP: win32k!XEPALOBJ::vUnrefPalette+f fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax] CONTEXT: fffff88002944ca0 -- (.cxr 0xfffff88002944ca0) rax=fffdf900c0097f20 rbx=fffff88002945760 rcx=fffff88002945760 rdx=fffff90000002000 rsi=fffff900c2378010 rdi=0000000000000001 rip=fffff960000f4c5f rsp=fffff88002945680 rbp=0000000000000001 r8=0000000000000820 r9=0000000000000000 r10=fffff80002a5a000 r11=0000000000000034 r12=fffff900c2378238 r13=0000000000000001 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010246 win32k!XEPALOBJ::vUnrefPalette+0xf: fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax] ds:002b:fffdf900`c0097f20=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: Xfire.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960000f4c5f STACK_TEXT: fffff880`02945680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!XEPALOBJ::vUnrefPalette+0xf FOLLOWUP_IP: win32k!XEPALOBJ::vUnrefPalette+f fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: win32k!XEPALOBJ::vUnrefPalette+f FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0 STACK_COMMAND: .cxr 0xfffff88002944ca0 ; kb FAILURE_BUCKET_ID: X64_0x3B_win32k!XEPALOBJ::vUnrefPalette+f BUCKET_ID: X64_0x3B_win32k!XEPALOBJ::vUnrefPalette+f Followup: MachineOwner --------- metto anche i minidump dei bsod che mi dava prima di formattare Codice:
********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* Use !analyze -v to get detailed debugging information. BugCheck 19, {3, fffffa8003646880, fffdfa8003646880, fffffa8003646880} Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 ) Followup: Pool_corruption --------- 3: kd> !analyze -v ********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* BAD_POOL_HEADER (19) The pool is already corrupt at the time of the current request. This may or may not be due to the caller. The internal pool links must be walked to figure out a possible cause of the problem, and then special pool applied to the suspect tags or the driver verifier to a suspect driver. Arguments: Arg1: 0000000000000003, the pool freelist is corrupt. Arg2: fffffa8003646880, the pool entry being checked. Arg3: fffdfa8003646880, the read back flink freelist value (should be the same as 2). Arg4: fffffa8003646880, the read back blink freelist value (should be the same as 2). Debugging Details: ------------------ BUGCHECK_STR: 0x19_3 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 LOCK_ADDRESS: fffff800030c9400 -- (!locks fffff800030c9400) Resource @ nt!PiEngineLock (0xfffff800030c9400) Available WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted. WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted. 1 total locks PNP_TRIAGE: Lock address : 0xfffff800030c9400 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff80002ff8d6f to fffff80002ec5700 STACK_TEXT: fffff880`06991818 fffff800`02ff8d6f : 00000000`00000019 00000000`00000003 fffffa80`03646880 fffdfa80`03646880 : nt!KeBugCheckEx fffff880`06991820 fffff800`03131799 : 00000980`00000004 fffff880`069919c0 00000000`00000001 00000000`00000000 : nt!ExDeferredFreePool+0xa56 fffff880`06991910 fffff800`031318d3 : 00000000`00000002 00000000`00000001 fffff880`06991ae0 00000000`00000000 : nt!IopAllocateBuffer+0x21 fffff880`06991940 fffff800`03132c81 : 00000000`00000002 00000000`00000000 fffff880`06991b40 00000000`00000001 : nt!IopGetDeviceInterfaces+0xa7 fffff880`06991ab0 fffff800`03130abd : 00000000`00000002 00000000`00000000 00000000`00000000 fffff8a0`038eaa50 : nt!PiGetInterfaceDeviceList+0x41 fffff880`06991b10 fffff800`03166180 : fffff8a0`038eaa50 fffff800`00008000 fffff880`06991c01 fffff800`03390da0 : nt!PiControlGetInterfaceDeviceList+0x111 fffff880`06991b90 fffff800`02ec4953 : fffffa80`05705b60 00000000`007eed40 fffff880`06991c60 00000000`007eedc8 : nt!NtPlugPlayControl+0x100 fffff880`06991be0 00000000`76d8070a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`007eed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d8070a STACK_COMMAND: kb FOLLOWUP_IP: nt!ExDeferredFreePool+a56 fffff800`02ff8d6f cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExDeferredFreePool+a56 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MODULE_NAME: Pool_Corruption FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56 BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56 Followup: Pool_corruption --------- Codice:
********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80002e9f93d, Address of the instruction which caused the bugcheck Arg3: fffff8800936b9d0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s. FAULTING_IP: nt!KeAcquireGuardedMutex+1d fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0 CONTEXT: fffff8800936b9d0 -- (.cxr 0xfffff8800936b9d0) rax=fffff8a004e58780 rbx=fffdfa8004475a00 rcx=fffdfa8004475a00 rdx=fffff8a004e58870 rsi=fffff8800936c430 rdi=fffffa8006178060 rip=fffff80002e9f93d rsp=fffff8800936c3a0 rbp=0000000000000001 r8=0000000000000001 r9=fffff8800936c430 r10=fffff88002fd5ca0 r11=fffffa80044758c0 r12=fffff8a004e58801 r13=0000000000000000 r14=0000000000000000 r15=fffffa80037432a0 iopl=0 nv up ei ng nz ac po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210296 nt!KeAcquireGuardedMutex+0x1d: fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0 ds:002b:fffdfa80`04475a00=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: gta-vc.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002e9f93d STACK_TEXT: fffff880`0936c3a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireGuardedMutex+0x1d FOLLOWUP_IP: nt!KeAcquireGuardedMutex+1d fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!KeAcquireGuardedMutex+1d FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34 STACK_COMMAND: .cxr 0xfffff8800936b9d0 ; kb FAILURE_BUCKET_ID: X64_0x3B_nt!KeAcquireGuardedMutex+1d BUCKET_ID: X64_0x3B_nt!KeAcquireGuardedMutex+1d Followup: MachineOwner --------- Codice:
********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff880033a3248, fffff880033a2ab0, fffff8800125014b} Probably caused by : Ntfs.sys ( Ntfs!NtfsLookupAllocation+eb ) Followup: MachineOwner --------- 0: kd> !analyze -v ********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff880033a3248 Arg3: fffff880033a2ab0 Arg4: fffff8800125014b Debugging Details: ------------------ EXCEPTION_RECORD: fffff880033a3248 -- (.exr 0xfffff880033a3248) ExceptionAddress: fffff8800125014b (Ntfs!NtfsLookupAllocation+0x00000000000000eb) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff880033a2ab0 -- (.cxr 0xfffff880033a2ab0) rax=fffdf8a009c71950 rbx=fffff8a009c71970 rcx=fffff8a009c71950 rdx=0000000000000000 rsi=0000000000000000 rdi=fffff8a009c71880 rip=fffff8800125014b rsp=fffff880033a3480 rbp=fffff880033a3920 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=fffffa8006119770 r12=0000000000000000 r13=0000000000000000 r14=fffff880033a3640 r15=fffff880033a36c0 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 Ntfs!NtfsLookupAllocation+0xeb: fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8] ds:002b:fffdf8a0`09c71958=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 1 ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b30e0 ffffffffffffffff FOLLOWUP_IP: Ntfs!NtfsLookupAllocation+eb fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8] FAULTING_IP: Ntfs!NtfsLookupAllocation+eb fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8] BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from fffff880012f9515 to fffff8800125014b STACK_TEXT: fffff880`033a3480 fffff880`012f9515 : fffffa80`06119620 fffff8a0`09c71880 00000000`00000000 fffff880`033a3650 : Ntfs!NtfsLookupAllocation+0xeb fffff880`033a35f0 fffff880`0137ac77 : fffffa80`06119620 fffff8a0`09c71880 fffffa80`046088e0 00000000`00000001 : Ntfs!NtfsPreloadAllocation+0x91 fffff880`033a36b0 fffff880`01344882 : fffffa80`06119620 00000000`00000008 fffffa80`04608800 fffff880`00000020 : Ntfs!NtfsGetRetrievalPointers+0x4d3 fffff880`033a3800 fffff880`012fb3ed : fffffa80`06119620 00000000`00000000 fffff880`033a3920 00000000`00000000 : Ntfs! ?? ::NNGAKEGL::`string'+0x1c8fd fffff880`033a3840 fffff880`0107623f : fffff880`033a3990 fffffa80`04d93190 fffff880`033a3901 fffffa80`06119620 : Ntfs!NtfsFsdFileSystemControl+0x13d fffff880`033a38e0 fffff880`0109591e : fffffa80`046088e0 fffffa80`0652f490 fffffa80`04608800 fffffa80`04d93190 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24 f fffff880`033a3970 fffff800`03195467 : fffffa80`0652f490 fffff880`033a3c60 fffffa80`04d93578 fffffa80`04d93190 : fltmgr!FltpFsControl+0xee fffff880`033a39d0 fffff800`0315e69a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607 fffff880`033a3b00 fffff800`02e7a953 : fffffa80`054b4340 00000000`00000001 fffffa80`0690c740 fffff800`03190164 : nt!NtFsControlFile+0x56 fffff880`033a3b70 00000000`76f3fa4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0389e5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f3fa4a SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: Ntfs!NtfsLookupAllocation+eb FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d79996d STACK_COMMAND: .cxr 0xfffff880033a2ab0 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsLookupAllocation+eb BUCKET_ID: X64_0x24_Ntfs!NtfsLookupAllocation+eb Followup: MachineOwner Codice:
********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41284, fffff68000080001, 8e, fffff70001080000} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a13 ) Followup: MachineOwner --------- 3: kd> !analyze -v ********************************************************** ********************* * * * Bugcheck Analysis * * * ********************************************************** ********************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041284, A PTE or the working set list is corrupt. Arg2: fffff68000080001 Arg3: 000000000000008e Arg4: fffff70001080000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41284 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: Xfire.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002ee2493 to fffff80002e8d700 STACK_TEXT: fffff880`08e565d8 fffff800`02ee2493 : 00000000`0000001a 00000000`00041284 fffff680`00080001 00000000`0000008e : nt!KeBugCheckEx fffff880`08e565e0 fffff800`02ec03f9 : fffffa80`0549f3f8 00000000`00000000 00000000`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4a13 fffff880`08e56620 fffff800`02ec068a : fffffa80`006eeb90 fffffa80`0549f060 00000000`00000000 fffff680`00080158 : nt!MiTerminateWsle+0x29 fffff880`08e56660 fffff800`02ebe965 : fffffa80`0549f060 00000000`1002b000 00000000`00000000 00000000`02831000 : nt!MiDeletePageTableHierarchy+0xca fffff880`08e56770 fffff800`02ec0e79 : fffffa80`00000000 00000000`1002bfff 00000000`00000000 fffffa80`0614eb60 : nt!MiDeleteVirtualAddresses+0x96c fffff880`08e56930 fffff800`02e607cc : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9 fffff880`08e56a50 fffff800`0317194b : fffff8a0`0a33c5d0 00000000`00000001 00000000`00000000 fffffa80`0396c060 : nt!MmCleanProcessAddressSpace+0x228 fffff880`08e56aa0 fffff800`0314a7cb : 00000000`c000004b 00000000`00000001 00000000`7efa1000 00000000`00000000 : nt!PspExitThread+0x92f fffff880`08e56b60 fffff800`02e8c953 : fffffa80`0549f060 00000000`c000004b 00000000`7efa1001 fffffa80`0396c060 : nt!NtTerminateProcess+0x25b fffff880`08e56be0 00000000`77b1f97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`04e6e808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b1f97a STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+4a13 fffff800`02ee2493 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4a13 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34 FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a13 BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a13 Followup: MachineOwner --------- |
![]() |
![]() |
![]() |
#2 |
Senior Member
Iscritto dal: Jan 2010
Messaggi: 37084
|
I problemi sembrano collegati con quel client XFire, dovresti provare a disinstallarlo e vedere se le cose migliorano.
|
![]() |
![]() |
![]() |
#3 |
Member
Iscritto dal: Jul 2009
Città: Milano/Lamezia Terme
Messaggi: 135
|
ne ha fatta un'altra poco fa. arrivo al desktop il catalyst control center crasha e poi fa il bsod
prima ho fatto anche lo scandisk e non ha trovato errori Codice:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff8800319a858, fffff8800319a0b0, fffff8800122e80c} Probably caused by : Ntfs.sys ( Ntfs!NtfsDecrementCloseCounts+2c ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff8800319a858 Arg3: fffff8800319a0b0 Arg4: fffff8800122e80c Debugging Details: ------------------ EXCEPTION_RECORD: fffff8800319a858 -- (.exr 0xfffff8800319a858) ExceptionAddress: fffff8800122e80c (Ntfs!NtfsDecrementCloseCounts+0x000000000000002c) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff8800319a0b0 -- (.cxr 0xfffff8800319a0b0) rax=fffdfa80047f6180 rbx=fffffa8005543c70 rcx=fffffa8005543c70 rdx=fffff8a0041ceb90 rsi=fffff8a0041cea60 rdi=fffff8800319abf8 rip=fffff8800122e80c rsp=fffff8800319aa90 rbp=fffff80002e1e5a0 r8=fffff8a0041cedf8 r9=0000000000000000 r10=fffff8a0041cea60 r11=fffff8800319ab12 r12=fffffa80047f6180 r13=0000000000000000 r14=fffff8a0041cedf8 r15=0000000000000001 iopl=0 nv up ei pl zr ac po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010257 Ntfs!NtfsDecrementCloseCounts+0x2c: fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh ds:002b:fffdfa80`047f625c=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb10e0 ffffffffffffffff FOLLOWUP_IP: Ntfs!NtfsDecrementCloseCounts+2c fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh FAULTING_IP: Ntfs!NtfsDecrementCloseCounts+2c fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from fffff880012c7813 to fffff8800122e80c STACK_TEXT: fffff880`0319aa90 fffff880`012c7813 : fffffa80`05543c70 fffff800`02e1e5a0 fffff8a0`041cea60 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0x2c fffff880`0319aad0 fffff880`012a138f : fffffa80`05543c70 fffff8a0`041ceb90 fffff8a0`041cea60 fffffa80`047f6180 : Ntfs!NtfsCommonClose+0x353 fffff880`0319aba0 fffff800`02c88161 : 00000000`00000000 fffff880`012a1200 fffffa80`036cb001 fffff800`00000002 : Ntfs!NtfsFspClose+0x15f fffff880`0319ac70 fffff800`02f1e166 : 0000baf0`8149fbcb fffffa80`036cb040 00000000`00000080 fffffa80`036559e0 : nt!ExpWorkerThread+0x111 fffff880`0319ad00 fffff800`02c59486 : fffff880`02f64180 fffffa80`036cb040 fffff880`02f6efc0 4104e0c1`04eac1c2 : nt!PspSystemThreadStartup+0x5a fffff880`0319ad40 00000000`00000000 : fffff880`0319b000 fffff880`03195000 fffff880`0319a6c0 00000000`00000000 : nt!KxStartSystemThread+0x16 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: Ntfs!NtfsDecrementCloseCounts+2c FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f STACK_COMMAND: .cxr 0xfffff8800319a0b0 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsDecrementCloseCounts+2c BUCKET_ID: X64_0x24_Ntfs!NtfsDecrementCloseCounts+2c Followup: MachineOwner --------- |
![]() |
![]() |
![]() |
Strumenti | |
|
|
Tutti gli orari sono GMT +1. Ora sono le: 13:22.