Ciao, questo è il risultato:
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\utente\Desktop\Mini121408-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\windows\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp3_gdr.080814-1236
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Sun Dec 14 22:40:49.421 2008 (GMT+1)
System Uptime: 0 days 1:10:22.113
Loading Kernel Symbols
..................................................................................................................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 8166d, 0, 0}
Probably caused by : memory_corruption ( nt!MiDecrementShareCount+4f )
Followup: MachineOwner
---------
0: kd> .restart /f
Loading Dump File [C:\Documents and Settings\utente\Desktop\Mini121408-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\windows\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp3_gdr.080814-1236
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Sun Dec 14 22:40:49.421 2008 (GMT+1)
System Uptime: 0 days 1:10:22.113
Loading Kernel Symbols
..................................................................................................................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 8166d, 0, 0}
Probably caused by : memory_corruption ( nt!MiDecrementShareCount+4f )
Followup: MachineOwner
QUESTO è LO SPECIFICO:
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 0008166d, page frame number
Arg3: 00000000, current page state
Arg4: 00000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: atiptaxx.exe
LAST_CONTROL_TRANSFER: from 80529c49 to 8053767a
STACK_TEXT:
ef93b520 80529c49 0000004e 00000099 0008166d nt!KeBugCheckEx+0x1b
ef93b54c 804f1110 77014000 c0300770 c01dc050 nt!MiDecrementShareCount+0x4f
ef93b578 804f1333 c01dc050 77014000 00000000 nt!MiDeletePte+0x197
ef93b63c 804f62d9 e1bb0c90 770e1fff 00000000 nt!MiDeleteVirtualAddresses+0x162
ef93b6e8 80500691 84b19da0 843cb838 84b19ed8 nt!MiRemoveMappedView+0x211
ef93b720 8058e3de 01b19da0 843d85c0 40010004 nt!MmCleanProcessAddressSpace+0x26e
ef93b7c0 8058eb3d 40010004 ef93b81c 804e75ba nt!PspExitThread+0x680
ef93b7cc 804e75ba 843d85c0 ef93b818 ef93b80c nt!PsExitSpecialApc+0x22
ef93b81c 804dda0a 00000001 00000000 ef93b834 nt!KiDeliverApc+0x1af
ef93b81c 7c91e440 00000001 00000000 ef93b834 nt!KiServiceExit+0x59
WARNING: Frame IP not in any known module. Following frames may be wrong.
00e7ff44 00000000 00000000 00000000 00000000 0x7c91e440
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDecrementShareCount+4f
80529c49 f6400401 test byte ptr [eax+4],1
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDecrementShareCount+4f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 48a4044a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+4f
BUCKET_ID: 0x4E_99_nt!MiDecrementShareCount+4f
Followup: MachineOwner
---------