Dat55
Power Member
Tem-me dado BSOD nos últimos dias como podem ver na screen, alguém me pode ajudar? Colo aqui o debug e a screen do bluescreenview. este é o único ficheiro que tenho.
Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\113014-24984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17328.amd64fre.winblue_r3.140827-1500
Machine Name:
Kernel base = 0xfffff803`bea0a000 PsLoadedModuleList = 0xfffff803`bece0370
Debug session time: Sun Nov 30 11:49:06.663 2014 (UTC + 0:00)
System Uptime: 0 days 0:05:46.398
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {440, 2, 1, fffff803bea947e2}
Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShip+12 )
Followup: MachineOwner
---------
1: kd> !analyze –v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {440, 2, 1, fffff803bea947e2}
Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShip+12 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000440, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803bea947e2, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff803bed6a138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000440
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff803`bea947e2 48890a mov qword ptr [rdx],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
TRAP_FRAME: ffffd00082018ef0 -- (.trap 0xffffd00082018ef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003902800 rbx=0000000000000000 rcx=ffffd00082019118
rdx=0000000000000440 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803bea947e2 rsp=ffffd00082019080 rbp=ffffd00082019100
r8=0000000000000000 r9=0000000000000001 r10=0020000000030907
r11=fffffa8003907000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0x12:
fffff803`bea947e2 48890a mov qword ptr [rdx],rcx ds:00000000`00000440=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803beb64ce9 to fffff803beb591a0
STACK_TEXT:
ffffd000`82018da8 fffff803`beb64ce9 : 00000000`0000000a 00000000`00000440 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`82018db0 fffff803`beb6353a : fffffa80`00902790 fffff803`becab05e ffffc000`d37cf000 ffffd000`82018ef0 : nt!KiBugCheckDispatch+0x69
ffffd000`82018ef0 fffff803`bea947e2 : ffffc000`d39447d0 ffffd000`820194b8 ffffd000`82019189 fffff803`bede203b : nt!KiPageFault+0x23a
ffffd000`82019080 fffff803`bea646ff : fffffa80`00902790 00000000`00000000 ffffc000`d39cbd08 ffffc000`d39cbd14 : nt!KxWaitForLockOwnerShip+0x12
ffffd000`820190b0 fffff803`bea63a83 : 00000000`000300d3 fffffa80`00902790 fffff680`708d6868 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x7ef
ffffd000`820191f0 fffff803`bea6347b : ffffd000`82019248 00000000`00000000 ffffc000`d39448a0 fffff803`bede1770 : nt!MiPfnShareCountIsZero+0x83
ffffd000`82019220 fffff803`bea760e3 : 9a500000`2fecd867 00000000`00000005 fffff680`708d6878 fffff580`10804000 : nt!MiDeletePteRun+0x1ab
ffffd000`82019410 fffff803`bea5df66 : ffffe000`55f11080 fffff803`bed0a180 00000000`00000000 00000000`0000339e : nt!MiDeleteVirtualAddresses+0x463
ffffd000`820196a0 fffff803`bea59130 : ffffe000`55ec0870 00000000`00000010 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0xbc6
ffffd000`82019790 fffff803`beb649b3 : 00000000`00010002 ffffd000`82019a70 00000000`00000000 00000000`00000028 : nt!NtFreeVirtualMemory+0x820
ffffd000`820198f0 fffff803`beb5ce00 : fffff803`beebb50f 00000000`00000001 00000000`00000000 ffffe000`55f11080 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`82019a88 fffff803`beebb50f : 00000000`00000001 00000000`00000000 ffffe000`55f11080 00000000`00000000 : nt!KiServiceLinkage
ffffd000`82019a90 fffff803`bedec437 : 000000e1`1ac90000 00000000`00000000 ffffe000`548fc090 ffffe000`548fc090 : nt!RtlFreeUserStack+0x27
ffffd000`82019ac0 fffff803`bedb218b : ffffffff`00000000 ffffe000`55f11080 ffffe000`55f11001 00000000`00000000 : nt!PspExitThread+0x32f
ffffd000`82019bd0 fffff803`bedb2128 : ffffe000`55f11080 ffffe000`55f11080 00007ffa`369c114c 00007ff6`c9008000 : nt!PspTerminateThreadByPointer+0x47
ffffd000`82019c00 fffff803`beb649b3 : ffffe000`55f11080 ffffd000`82019cc0 00000000`00000010 00007ffa`369c114c : nt!NtTerminateThread+0x40
ffffd000`82019c40 00007ffa`38cb1baa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000e1`1ad0f818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`38cb1baa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+12
fffff803`bea947e2 48890a mov qword ptr [rdx],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53fe6f2e
IMAGE_VERSION: 6.3.9600.17328
BUCKET_ID_FUNC_OFFSET: 12
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kxwaitforlockownership
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\113014-24984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17328.amd64fre.winblue_r3.140827-1500
Machine Name:
Kernel base = 0xfffff803`bea0a000 PsLoadedModuleList = 0xfffff803`bece0370
Debug session time: Sun Nov 30 11:49:06.663 2014 (UTC + 0:00)
System Uptime: 0 days 0:05:46.398
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {440, 2, 1, fffff803bea947e2}
Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShip+12 )
Followup: MachineOwner
---------
1: kd> !analyze –v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {440, 2, 1, fffff803bea947e2}
Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShip+12 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000440, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803bea947e2, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff803bed6a138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000440
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff803`bea947e2 48890a mov qword ptr [rdx],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
TRAP_FRAME: ffffd00082018ef0 -- (.trap 0xffffd00082018ef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003902800 rbx=0000000000000000 rcx=ffffd00082019118
rdx=0000000000000440 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803bea947e2 rsp=ffffd00082019080 rbp=ffffd00082019100
r8=0000000000000000 r9=0000000000000001 r10=0020000000030907
r11=fffffa8003907000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0x12:
fffff803`bea947e2 48890a mov qword ptr [rdx],rcx ds:00000000`00000440=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803beb64ce9 to fffff803beb591a0
STACK_TEXT:
ffffd000`82018da8 fffff803`beb64ce9 : 00000000`0000000a 00000000`00000440 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`82018db0 fffff803`beb6353a : fffffa80`00902790 fffff803`becab05e ffffc000`d37cf000 ffffd000`82018ef0 : nt!KiBugCheckDispatch+0x69
ffffd000`82018ef0 fffff803`bea947e2 : ffffc000`d39447d0 ffffd000`820194b8 ffffd000`82019189 fffff803`bede203b : nt!KiPageFault+0x23a
ffffd000`82019080 fffff803`bea646ff : fffffa80`00902790 00000000`00000000 ffffc000`d39cbd08 ffffc000`d39cbd14 : nt!KxWaitForLockOwnerShip+0x12
ffffd000`820190b0 fffff803`bea63a83 : 00000000`000300d3 fffffa80`00902790 fffff680`708d6868 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x7ef
ffffd000`820191f0 fffff803`bea6347b : ffffd000`82019248 00000000`00000000 ffffc000`d39448a0 fffff803`bede1770 : nt!MiPfnShareCountIsZero+0x83
ffffd000`82019220 fffff803`bea760e3 : 9a500000`2fecd867 00000000`00000005 fffff680`708d6878 fffff580`10804000 : nt!MiDeletePteRun+0x1ab
ffffd000`82019410 fffff803`bea5df66 : ffffe000`55f11080 fffff803`bed0a180 00000000`00000000 00000000`0000339e : nt!MiDeleteVirtualAddresses+0x463
ffffd000`820196a0 fffff803`bea59130 : ffffe000`55ec0870 00000000`00000010 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0xbc6
ffffd000`82019790 fffff803`beb649b3 : 00000000`00010002 ffffd000`82019a70 00000000`00000000 00000000`00000028 : nt!NtFreeVirtualMemory+0x820
ffffd000`820198f0 fffff803`beb5ce00 : fffff803`beebb50f 00000000`00000001 00000000`00000000 ffffe000`55f11080 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`82019a88 fffff803`beebb50f : 00000000`00000001 00000000`00000000 ffffe000`55f11080 00000000`00000000 : nt!KiServiceLinkage
ffffd000`82019a90 fffff803`bedec437 : 000000e1`1ac90000 00000000`00000000 ffffe000`548fc090 ffffe000`548fc090 : nt!RtlFreeUserStack+0x27
ffffd000`82019ac0 fffff803`bedb218b : ffffffff`00000000 ffffe000`55f11080 ffffe000`55f11001 00000000`00000000 : nt!PspExitThread+0x32f
ffffd000`82019bd0 fffff803`bedb2128 : ffffe000`55f11080 ffffe000`55f11080 00007ffa`369c114c 00007ff6`c9008000 : nt!PspTerminateThreadByPointer+0x47
ffffd000`82019c00 fffff803`beb649b3 : ffffe000`55f11080 ffffd000`82019cc0 00000000`00000010 00007ffa`369c114c : nt!NtTerminateThread+0x40
ffffd000`82019c40 00007ffa`38cb1baa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000e1`1ad0f818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`38cb1baa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+12
fffff803`bea947e2 48890a mov qword ptr [rdx],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53fe6f2e
IMAGE_VERSION: 6.3.9600.17328
BUCKET_ID_FUNC_OFFSET: 12
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kxwaitforlockownership
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------