Torna indietro   Hardware Upgrade Forum > Software > Microsoft Windows > Microsoft Windows 7 e Vista

Intervista a Stop Killing Games: distruggere videogiochi è come bruciare la musica di Mozart
Intervista a Stop Killing Games: distruggere videogiochi è come bruciare la musica di Mozart
Mentre Ubisoft vorrebbe chiedere agli utenti, all'occorrenza, di distruggere perfino le copie fisiche dei propri giochi, il movimento Stop Killing Games si sta battendo per preservare quella che l'Unione Europea ha già riconosciuto come una forma d'arte. Abbiamo avuto modo di parlare con Daniel Ondruska, portavoce dell'Iniziativa Europa volta a preservare la conservazione dei videogiochi
Samsung Galaxy S25 Edge: il top di gamma ultrasottile e leggerissimo. La recensione
Samsung Galaxy S25 Edge: il top di gamma ultrasottile e leggerissimo. La recensione
Abbiamo provato il nuovo Galaxy S25 Edge, uno smartphone unico per il suo spessore di soli 5,8 mm e un peso super piuma. Parliamo di un device che ha pro e contro, ma sicuramente si differenzia dalla massa per la sua portabilità, ma non senza qualche compromesso. Ecco la nostra prova completa.
HP Elitebook Ultra G1i 14 è il notebook compatto, potente e robusto
HP Elitebook Ultra G1i 14 è il notebook compatto, potente e robusto
Pensato per il professionista sempre in movimento, HP Elitebook Ultra G1i 14 abbina una piattaforma Intel Core Ultra 7 ad una costruzione robusta, riuscendo a mantenere un peso contenuto e una facile trasportabilità. Ottime prestazioni per gli ambiti di produttività personale con un'autonomia lontano dalla presa di corrente che permette di lavorare per tutta la giornata
Tutti gli articoli Tutte le news

Vai al Forum
Rispondi
 
Strumenti
Old 23-07-2011, 08:19   #1
criiis
Member
 
Iscritto dal: Jul 2009
Città: Milano/Lamezia Terme
Messaggi: 135
BSOD:system service exception

ciao a tutti da un po di tempo quando accendo il pc mi dà la schermata blu solo che non la fa sempre ma passa pure qualche giorno o settimana e non è sempre lo stesso tipo di errore che sembrava sempre riferito a dei driver, comunque ho fatto 2 passaggi di memtest e non si è riavviato.
ieri ho formattato perchè avevo l'hd pieno di roba e oggi mi ha ridato la schermata blu
posto il log del minidump
Codice:
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff960000f4c5f, fffff88002944ca0, 0}

Probably caused by : win32k.sys ( win32k!XEPALOBJ::vUnrefPalette+f )

Followup: MachineOwner
---------

2: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000f4c5f, Address of the instruction which caused the bugcheck
Arg3: fffff88002944ca0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP: 
win32k!XEPALOBJ::vUnrefPalette+f
fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax]

CONTEXT: fffff88002944ca0 -- (.cxr 0xfffff88002944ca0)
rax=fffdf900c0097f20 rbx=fffff88002945760 rcx=fffff88002945760
rdx=fffff90000002000 rsi=fffff900c2378010 rdi=0000000000000001
rip=fffff960000f4c5f rsp=fffff88002945680 rbp=0000000000000001
r8=0000000000000820 r9=0000000000000000 r10=fffff80002a5a000
r11=0000000000000034 r12=fffff900c2378238 r13=0000000000000001
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!XEPALOBJ::vUnrefPalette+0xf:
fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax] ds:002b:fffdf900`c0097f20=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: Xfire.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960000f4c5f

STACK_TEXT: 
fffff880`02945680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!XEPALOBJ::vUnrefPalette+0xf


FOLLOWUP_IP: 
win32k!XEPALOBJ::vUnrefPalette+f
fffff960`000f4c5f 488b08 mov rcx,qword ptr [rax]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32k!XEPALOBJ::vUnrefPalette+f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0

STACK_COMMAND: .cxr 0xfffff88002944ca0 ; kb

FAILURE_BUCKET_ID: X64_0x3B_win32k!XEPALOBJ::vUnrefPalette+f

BUCKET_ID: X64_0x3B_win32k!XEPALOBJ::vUnrefPalette+f

Followup: MachineOwner
---------
l'errore sembra essere causato da xfire ma prima di formattare lo dava anche con altri programmi

metto anche i minidump dei bsod che mi dava prima di formattare

Codice:
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffffa8003646880, fffdfa8003646880, fffffa8003646880}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a56 )

Followup: Pool_corruption
---------

3: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8003646880, the pool entry being checked.
Arg3: fffdfa8003646880, the read back flink freelist value (should be the same as 2).
Arg4: fffffa8003646880, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR: 0x19_3

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 0

LOCK_ADDRESS: fffff800030c9400 -- (!locks fffff800030c9400)

Resource @ nt!PiEngineLock (0xfffff800030c9400) Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE: 
Lock address : 0xfffff800030c9400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff80002ff8d6f to fffff80002ec5700

STACK_TEXT: 
fffff880`06991818 fffff800`02ff8d6f : 00000000`00000019 00000000`00000003 fffffa80`03646880 fffdfa80`03646880 : nt!KeBugCheckEx
fffff880`06991820 fffff800`03131799 : 00000980`00000004 fffff880`069919c0 00000000`00000001 00000000`00000000 : nt!ExDeferredFreePool+0xa56
fffff880`06991910 fffff800`031318d3 : 00000000`00000002 00000000`00000001 fffff880`06991ae0 00000000`00000000 : nt!IopAllocateBuffer+0x21
fffff880`06991940 fffff800`03132c81 : 00000000`00000002 00000000`00000000 fffff880`06991b40 00000000`00000001 : nt!IopGetDeviceInterfaces+0xa7
fffff880`06991ab0 fffff800`03130abd : 00000000`00000002 00000000`00000000 00000000`00000000 fffff8a0`038eaa50 : nt!PiGetInterfaceDeviceList+0x41
fffff880`06991b10 fffff800`03166180 : fffff8a0`038eaa50 fffff800`00008000 fffff880`06991c01 fffff800`03390da0 : nt!PiControlGetInterfaceDeviceList+0x111
fffff880`06991b90 fffff800`02ec4953 : fffffa80`05705b60 00000000`007eed40 fffff880`06991c60 00000000`007eedc8 : nt!NtPlugPlayControl+0x100
fffff880`06991be0 00000000`76d8070a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`007eed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d8070a


STACK_COMMAND: kb

FOLLOWUP_IP: 
nt!ExDeferredFreePool+a56
fffff800`02ff8d6f cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!ExDeferredFreePool+a56

FOLLOWUP_NAME: Pool_corruption

IMAGE_NAME: Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56

BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a56

Followup: Pool_corruption
---------
Codice:
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002e9f93d, Address of the instruction which caused the bugcheck
Arg3: fffff8800936b9d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

FAULTING_IP: 
nt!KeAcquireGuardedMutex+1d
fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0

CONTEXT: fffff8800936b9d0 -- (.cxr 0xfffff8800936b9d0)
rax=fffff8a004e58780 rbx=fffdfa8004475a00 rcx=fffdfa8004475a00
rdx=fffff8a004e58870 rsi=fffff8800936c430 rdi=fffffa8006178060
rip=fffff80002e9f93d rsp=fffff8800936c3a0 rbp=0000000000000001
r8=0000000000000001 r9=fffff8800936c430 r10=fffff88002fd5ca0
r11=fffffa80044758c0 r12=fffff8a004e58801 r13=0000000000000000
r14=0000000000000000 r15=fffffa80037432a0
iopl=0 nv up ei ng nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210296
nt!KeAcquireGuardedMutex+0x1d:
fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0 ds:002b:fffdfa80`04475a00=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: gta-vc.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002e9f93d

STACK_TEXT: 
fffff880`0936c3a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireGuardedMutex+0x1d


FOLLOWUP_IP: 
nt!KeAcquireGuardedMutex+1d
fffff800`02e9f93d f00fba3100 lock btr dword ptr [rcx],0

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KeAcquireGuardedMutex+1d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34

STACK_COMMAND: .cxr 0xfffff8800936b9d0 ; kb

FAILURE_BUCKET_ID: X64_0x3B_nt!KeAcquireGuardedMutex+1d

BUCKET_ID: X64_0x3B_nt!KeAcquireGuardedMutex+1d

Followup: MachineOwner
---------
Codice:
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880033a3248, fffff880033a2ab0, fffff8800125014b}

Probably caused by : Ntfs.sys ( Ntfs!NtfsLookupAllocation+eb )

Followup: MachineOwner
---------

0: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880033a3248
Arg3: fffff880033a2ab0
Arg4: fffff8800125014b

Debugging Details:
------------------


EXCEPTION_RECORD: fffff880033a3248 -- (.exr 0xfffff880033a3248)
ExceptionAddress: fffff8800125014b (Ntfs!NtfsLookupAllocation+0x00000000000000eb)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff880033a2ab0 -- (.cxr 0xfffff880033a2ab0)
rax=fffdf8a009c71950 rbx=fffff8a009c71970 rcx=fffff8a009c71950
rdx=0000000000000000 rsi=0000000000000000 rdi=fffff8a009c71880
rip=fffff8800125014b rsp=fffff880033a3480 rbp=fffff880033a3920
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffa8006119770 r12=0000000000000000 r13=0000000000000000
r14=fffff880033a3640 r15=fffff880033a36c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
Ntfs!NtfsLookupAllocation+0xeb:
fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8] ds:002b:fffdf8a0`09c71958=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: svchost.exe

CURRENT_IRQL: 1

ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b30e0
ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsLookupAllocation+eb
fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8]

FAULTING_IP: 
Ntfs!NtfsLookupAllocation+eb
fffff880`0125014b 483b7008 cmp rsi,qword ptr [rax+8]

BUGCHECK_STR: 0x24

LAST_CONTROL_TRANSFER: from fffff880012f9515 to fffff8800125014b

STACK_TEXT: 
fffff880`033a3480 fffff880`012f9515 : fffffa80`06119620 fffff8a0`09c71880 00000000`00000000 fffff880`033a3650 : Ntfs!NtfsLookupAllocation+0xeb
fffff880`033a35f0 fffff880`0137ac77 : fffffa80`06119620 fffff8a0`09c71880 fffffa80`046088e0 00000000`00000001 : Ntfs!NtfsPreloadAllocation+0x91
fffff880`033a36b0 fffff880`01344882 : fffffa80`06119620 00000000`00000008 fffffa80`04608800 fffff880`00000020 : Ntfs!NtfsGetRetrievalPointers+0x4d3
fffff880`033a3800 fffff880`012fb3ed : fffffa80`06119620 00000000`00000000 fffff880`033a3920 00000000`00000000 : Ntfs! ?? ::NNGAKEGL::`string'+0x1c8fd
fffff880`033a3840 fffff880`0107623f : fffff880`033a3990 fffffa80`04d93190 fffff880`033a3901 fffffa80`06119620 : Ntfs!NtfsFsdFileSystemControl+0x13d
fffff880`033a38e0 fffff880`0109591e : fffffa80`046088e0 fffffa80`0652f490 fffffa80`04608800 fffffa80`04d93190 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24 f
fffff880`033a3970 fffff800`03195467 : fffffa80`0652f490 fffff880`033a3c60 fffffa80`04d93578 fffffa80`04d93190 : fltmgr!FltpFsControl+0xee
fffff880`033a39d0 fffff800`0315e69a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`033a3b00 fffff800`02e7a953 : fffffa80`054b4340 00000000`00000001 fffffa80`0690c740 fffff800`03190164 : nt!NtFsControlFile+0x56
fffff880`033a3b70 00000000`76f3fa4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0389e5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f3fa4a


SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: Ntfs!NtfsLookupAllocation+eb

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4d79996d

STACK_COMMAND: .cxr 0xfffff880033a2ab0 ; kb

FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsLookupAllocation+eb

BUCKET_ID: X64_0x24_Ntfs!NtfsLookupAllocation+eb

Followup: MachineOwner
Codice:
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41284, fffff68000080001, 8e, fffff70001080000}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a13 )

Followup: MachineOwner
---------

3: kd> !analyze -v
********************************************************** *********************
* *
* Bugcheck Analysis *
* *
********************************************************** *********************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: fffff68000080001
Arg3: 000000000000008e
Arg4: fffff70001080000

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_41284

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: Xfire.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80002ee2493 to fffff80002e8d700

STACK_TEXT: 
fffff880`08e565d8 fffff800`02ee2493 : 00000000`0000001a 00000000`00041284 fffff680`00080001 00000000`0000008e : nt!KeBugCheckEx
fffff880`08e565e0 fffff800`02ec03f9 : fffffa80`0549f3f8 00000000`00000000 00000000`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4a13
fffff880`08e56620 fffff800`02ec068a : fffffa80`006eeb90 fffffa80`0549f060 00000000`00000000 fffff680`00080158 : nt!MiTerminateWsle+0x29
fffff880`08e56660 fffff800`02ebe965 : fffffa80`0549f060 00000000`1002b000 00000000`00000000 00000000`02831000 : nt!MiDeletePageTableHierarchy+0xca
fffff880`08e56770 fffff800`02ec0e79 : fffffa80`00000000 00000000`1002bfff 00000000`00000000 fffffa80`0614eb60 : nt!MiDeleteVirtualAddresses+0x96c
fffff880`08e56930 fffff800`02e607cc : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`08e56a50 fffff800`0317194b : fffff8a0`0a33c5d0 00000000`00000001 00000000`00000000 fffffa80`0396c060 : nt!MmCleanProcessAddressSpace+0x228
fffff880`08e56aa0 fffff800`0314a7cb : 00000000`c000004b 00000000`00000001 00000000`7efa1000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`08e56b60 fffff800`02e8c953 : fffffa80`0549f060 00000000`c000004b 00000000`7efa1001 fffffa80`0396c060 : nt!NtTerminateProcess+0x25b
fffff880`08e56be0 00000000`77b1f97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04e6e808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b1f97a


STACK_COMMAND: kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+4a13
fffff800`02ee2493 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4a13

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34

FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a13

BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a13

Followup: MachineOwner
---------
criiis è offline   Rispondi citando il messaggio o parte di esso
Old 23-07-2011, 16:58   #2
Eress
Senior Member
 
L'Avatar di Eress
 
Iscritto dal: Jan 2010
Messaggi: 37084
I problemi sembrano collegati con quel client XFire, dovresti provare a disinstallarlo e vedere se le cose migliorano.
__________________
Analemma - Slowdive - Facebook
Motto Microsoft: "If it's broken, and I'm the one who broke it, don't fix it!"
Eress è offline   Rispondi citando il messaggio o parte di esso
Old 23-07-2011, 17:20   #3
criiis
Member
 
Iscritto dal: Jul 2009
Città: Milano/Lamezia Terme
Messaggi: 135
ne ha fatta un'altra poco fa. arrivo al desktop il catalyst control center crasha e poi fa il bsod
prima ho fatto anche lo scandisk e non ha trovato errori


Codice:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff8800319a858, fffff8800319a0b0, fffff8800122e80c}

Probably caused by : Ntfs.sys ( Ntfs!NtfsDecrementCloseCounts+2c )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff8800319a858
Arg3: fffff8800319a0b0
Arg4: fffff8800122e80c

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff8800319a858 -- (.exr 0xfffff8800319a858)
ExceptionAddress: fffff8800122e80c (Ntfs!NtfsDecrementCloseCounts+0x000000000000002c)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff8800319a0b0 -- (.cxr 0xfffff8800319a0b0)
rax=fffdfa80047f6180 rbx=fffffa8005543c70 rcx=fffffa8005543c70
rdx=fffff8a0041ceb90 rsi=fffff8a0041cea60 rdi=fffff8800319abf8
rip=fffff8800122e80c rsp=fffff8800319aa90 rbp=fffff80002e1e5a0
 r8=fffff8a0041cedf8  r9=0000000000000000 r10=fffff8a0041cea60
r11=fffff8800319ab12 r12=fffffa80047f6180 r13=0000000000000000
r14=fffff8a0041cedf8 r15=0000000000000001
iopl=0         nv up ei pl zr ac po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010257
Ntfs!NtfsDecrementCloseCounts+0x2c:
fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh ds:002b:fffdfa80`047f625c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb10e0
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsDecrementCloseCounts+2c
fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh

FAULTING_IP: 
Ntfs!NtfsDecrementCloseCounts+2c
fffff880`0122e80c f08380dc000000ff lock add dword ptr [rax+0DCh],0FFFFFFFFh

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff880012c7813 to fffff8800122e80c

STACK_TEXT:  
fffff880`0319aa90 fffff880`012c7813 : fffffa80`05543c70 fffff800`02e1e5a0 fffff8a0`041cea60 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0x2c
fffff880`0319aad0 fffff880`012a138f : fffffa80`05543c70 fffff8a0`041ceb90 fffff8a0`041cea60 fffffa80`047f6180 : Ntfs!NtfsCommonClose+0x353
fffff880`0319aba0 fffff800`02c88161 : 00000000`00000000 fffff880`012a1200 fffffa80`036cb001 fffff800`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`0319ac70 fffff800`02f1e166 : 0000baf0`8149fbcb fffffa80`036cb040 00000000`00000080 fffffa80`036559e0 : nt!ExpWorkerThread+0x111
fffff880`0319ad00 fffff800`02c59486 : fffff880`02f64180 fffffa80`036cb040 fffff880`02f6efc0 4104e0c1`04eac1c2 : nt!PspSystemThreadStartup+0x5a
fffff880`0319ad40 00000000`00000000 : fffff880`0319b000 fffff880`03195000 fffff880`0319a6c0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Ntfs!NtfsDecrementCloseCounts+2c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc14f

STACK_COMMAND:  .cxr 0xfffff8800319a0b0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsDecrementCloseCounts+2c

BUCKET_ID:  X64_0x24_Ntfs!NtfsDecrementCloseCounts+2c

Followup: MachineOwner
---------
criiis è offline   Rispondi citando il messaggio o parte di esso
Old 23-07-2011, 18:46   #4
Eress
Senior Member
 
L'Avatar di Eress
 
Iscritto dal: Jan 2010
Messaggi: 37084
Prova un rollback dei catalyst
__________________
Analemma - Slowdive - Facebook
Motto Microsoft: "If it's broken, and I'm the one who broke it, don't fix it!"
Eress è offline   Rispondi citando il messaggio o parte di esso
 Rispondi


Intervista a Stop Killing Games: distruggere videogiochi è come bruciare la musica di Mozart Intervista a Stop Killing Games: distruggere vid...
Samsung Galaxy S25 Edge: il top di gamma ultrasottile e leggerissimo. La recensione Samsung Galaxy S25 Edge: il top di gamma ultraso...
HP Elitebook Ultra G1i 14 è il notebook compatto, potente e robusto HP Elitebook Ultra G1i 14 è il notebook c...
Microsoft Surface Pro 12 è il 2 in 1 più compatto e silenzioso Microsoft Surface Pro 12 è il 2 in 1 pi&u...
Recensione REDMAGIC Astra Gaming Tablet: che spettacolo di tablet! Recensione REDMAGIC Astra Gaming Tablet: che spe...
Prodotti illegali su Temu: l'UE avvia pr...
La Cina vuole una governance globale del...
Aperta la CALL4INNOVIT 2025: al centro r...
ECOVACS DEEBOT T50 OMNI è recente...
Torvalds rilascia Linux 6.16, le novit&a...
Top 7 Amazon Bestseller: GoPro MAX fa un...
Steam cambia volto: scopri la nuova orga...
Hai una AnkerMake? Potrebbe essere gi&ag...
Lanciato il razzo spaziale Vega-C VV27 c...
Facebook è la prima piattaforma p...
Il co-creatore di ChatGPT è diven...
Thales Alenia Space e ASI siglano un acc...
L'app UE per la verifica dell'età...
Dynatrace potenzia la propria piattaform...
iPhone 17 Pro con funzioni fotografiche ...
Chromium
GPU-Z
OCCT
LibreOffice Portable
Opera One Portable
Opera One 106
CCleaner Portable
CCleaner Standard
Cpu-Z
Driver NVIDIA GeForce 546.65 WHQL
SmartFTP
Trillian
Google Chrome Portable
Google Chrome 120
VirtualBox
Tutti gli articoli Tutte le news Tutti i download

Strumenti

Regole
Non Puoi aprire nuove discussioni
Non Puoi rispondere ai messaggi
Non Puoi allegare file
Non Puoi modificare i tuoi messaggi

Il codice vB è On
Le Faccine sono On
Il codice [IMG] è On
Il codice HTML è Off
Vai al Forum


Tutti gli orari sono GMT +1. Ora sono le: 13:22.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Served by www3v