Pantallazo azul en un portatil.

21/02/2006 - 23:52 por Manel | Informe spam
Hola, he tenido varios pantallazos azules en mi ordenador, y después de
seguir el manual de JM Tella en Multingles sobre BSOD, estoy sin ideas de
que pasa, os pongo el fichero que se genera al tratar el archivo dmp



Microsoft (R) Windows Debugger Version 6.5.0003.7

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\WINDOWS\MEMORY.DMP]

Kernel Complete Dump File: Full address space is available



Symbol search path is:
SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols

Executable search path is:

Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS 0xC0000147

Missing image name, possible corrupt data.

*** WARNING: Unable to verify timestamp for Unknown_Module_00ac03c0

*** ERROR: Module load completed but symbols could not be loaded for
Unknown_Module_00ac03c0

Debugger can not determine kernel base address

Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 2600.xpsp_sp2_rtm.040803-2158

Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20

Debug session time: Tue Feb 21 22:51:37.505 2006 (GMT+1)

System Uptime: 0 days 0:40:45.081

WARNING: Unable to reset page directories

Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS 0xC0000147

Missing image name, possible corrupt data.

*** WARNING: Unable to verify timestamp for Unknown_Module_00ac03c0

*** ERROR: Module load completed but symbols could not be loaded for
Unknown_Module_00ac03c0

Debugger can not determine kernel base address

Loading Kernel Symbols

Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS 0xC0000147

Missing image name, possible corrupt data.

.Unable to read KLDR_DATA_TABLE_ENTRY at 00ac03a8 - NTSTATUS 0xC0000147



Loading unloaded module list



*******************************************************************************

*
*

* Bugcheck Analysis
*

*
*

*******************************************************************************



Use !analyze -v to get detailed debugging information.



BugCheck A, {c, 2, 0, 80509f4a}



***** Debugger could not find nt in module list, module list might be
corrupt.

***** Followup with Debugger team



Probably caused by : Unknown_Image



Followup: MachineOwner





kd> !analyze -v

*******************************************************************************

*
*

* Bugcheck Analysis
*

*
*

*******************************************************************************



IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at
an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 0000000c, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, value 0 = read operation, 1 = write operation

Arg4: 80509f4a, address which referenced memory



Debugging Details:





***** Debugger could not find nt in module list, module list might be
corrupt.

***** Followup with Debugger team





READ_ADDRESS: unable to get nt!MmSpecialPoolStart

unable to get nt!MmSpecialPoolEnd

unable to get nt!MmPoolCodeStart

unable to get nt!MmPoolCodeEnd

0000000c



CURRENT_IRQL: 2



FAULTING_IP:

+ffffffff80509f4a

80509f4a 3932 cmp [edx],esi



DEFAULT_BUCKET_ID: DRIVER_FAULT



BUGCHECK_STR: 0xA



LAST_CONTROL_TRANSFER: from 00010101 to 804e2158



STACK_TEXT:

WARNING: Frame IP not in any known module. Following frames may be wrong.

f7af2b14 00010101 00010101 00010101 00010101 0x804e2158

f7af2b18 00010101 00010101 00010101 00010101 0x10101

f7af2b1c 00010101 00010101 00010101 00010101 0x10101

f7af2b20 00010101 00010101 00010101 00010101 0x10101

f7af2b24 00010101 00010101 00010101 00010101 0x10101

f7af2b28 00010101 00010101 00010101 00010101 0x10101

f7af2b2c 00010101 00010101 00010101 00010101 0x10101

f7af2b30 00010101 00010101 00010101 00010101 0x10101

f7af2b34 00010101 00010101 00010101 00010101 0x10101

f7af2b38 00010101 00010101 00010101 00010101 0x10101

f7af2b3c 00010101 00010101 00010101 00010101 0x10101

f7af2b40 00010101 00010101 00010101 00010101 0x10101

f7af2b44 00010101 00010101 00010101 00010101 0x10101

f7af2b48 00010101 00010101 00010101 00010101 0x10101

f7af2b4c 00010101 00010101 00010101 00010101 0x10101

f7af2b50 00010101 00010101 00010101 00010101 0x10101

f7af2b54 00010101 00010101 00010101 00010101 0x10101

f7af2b58 00010101 00010101 00010101 00010101 0x10101

f7af2b5c 00010101 00010101 00010101 00010101 0x10101

f7af2b60 00010101 00010101 00010101 00010101 0x10101

f7af2b64 00010101 00010101 00010101 00010101 0x10101

f7af2b68 00010101 00010101 00010101 00010101 0x10101

f7af2b6c 00010101 00010101 00010101 00010101 0x10101

f7af2b70 00010101 00010101 00010101 00010101 0x10101

f7af2b74 00010101 00010101 00010101 00010101 0x10101

f7af2b78 00010101 00010101 00010101 00010101 0x10101

f7af2b7c 00010101 00010101 00010101 00010101 0x10101

f7af2b80 00010101 00010101 00010101 00010101 0x10101

f7af2b84 00010101 00010101 00010101 00010101 0x10101

f7af2b88 00010101 00010101 00010101 00010101 0x10101

f7af2b8c 00010101 00010101 00010101 00010101 0x10101

f7af2b90 00010101 00010101 00010101 00010101 0x10101

f7af2b94 00010101 00010101 00010101 00010101 0x10101

f7af2b98 00010101 00010101 00010101 00010101 0x10101

f7af2b9c 00010101 00010101 00010101 00010101 0x10101

f7af2ba0 00010101 00010101 00010101 00010101 0x10101

f7af2ba4 00010101 00010101 00010101 00010101 0x10101

f7af2ba8 00010101 00010101 00010101 00010101 0x10101

f7af2bac 00010101 00010101 00010101 00010101 0x10101

f7af2bb0 00010101 00010101 00010101 00010101 0x10101

f7af2bb4 00010101 00010101 00010101 00010101 0x10101

f7af2bb8 00010101 00010101 00010101 00010101 0x10101

f7af2bbc 00010101 00010101 00010101 00010101 0x10101

f7af2bc0 00010101 00010101 00010101 00010101 0x10101

f7af2bc4 00010101 00010101 00010101 00010101 0x10101

f7af2bc8 00010101 00010101 00010101 00010101 0x10101

f7af2bcc 00010101 00010101 00010101 00010101 0x10101

f7af2bd0 00010101 00010101 00010101 00010101 0x10101

f7af2bd4 00010101 00010101 00010101 00000000 0x10101

f7af2bd8 00010101 00010101 00000000 00000000 0x10101





FOLLOWUP_IP:

+ffffffff804e2158

804e2158 f7457000000200 test dword ptr [ebp+0x70],0x20000



FOLLOWUP_NAME: MachineOwner



MODULE_NAME: Unknown_Module



IMAGE_NAME: Unknown_Image



DEBUG_FLR_IMAGE_TIMESTAMP: 0



STACK_COMMAND: kb



BUCKET_ID: CORRUPT_MODULELIST



Followup: MachineOwner







Gracias por la atención prestada, a ver si hay suerte y alguien sabe que es
lo que falla.
 

Leer las respuestas

#1 Manel
24/02/2006 - 19:47 | Informe spam
Gracias a todos los que lo hayáis leido, aunque nadie me ha dado una
solución o pista, bueno ya sabía que era difícil.




"Manel" escribió en el mensaje
news:OpVe%
Hola, he tenido varios pantallazos azules en mi ordenador, y después de
seguir el manual de JM Tella en Multingles sobre BSOD, estoy sin ideas de
que pasa, os pongo el fichero que se genera al tratar el archivo dmp



Microsoft (R) Windows Debugger Version 6.5.0003.7

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\WINDOWS\MEMORY.DMP]

Kernel Complete Dump File: Full address space is available



Symbol search path is:
SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols

Executable search path is:

Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS
0xC0000147

Missing image name, possible corrupt data.

*** WARNING: Unable to verify timestamp for Unknown_Module_00ac03c0

*** ERROR: Module load completed but symbols could not be loaded for
Unknown_Module_00ac03c0

Debugger can not determine kernel base address

Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 2600.xpsp_sp2_rtm.040803-2158

Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20

Debug session time: Tue Feb 21 22:51:37.505 2006 (GMT+1)

System Uptime: 0 days 0:40:45.081

WARNING: Unable to reset page directories

Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS
0xC0000147

Missing image name, possible corrupt data.

*** WARNING: Unable to verify timestamp for Unknown_Module_00ac03c0

*** ERROR: Module load completed but symbols could not be loaded for
Unknown_Module_00ac03c0

Debugger can not determine kernel base address

Loading Kernel Symbols

Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS
0xC0000147

Missing image name, possible corrupt data.

.Unable to read KLDR_DATA_TABLE_ENTRY at 00ac03a8 - NTSTATUS 0xC0000147



Loading unloaded module list



*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



Use !analyze -v to get detailed debugging information.



BugCheck A, {c, 2, 0, 80509f4a}



***** Debugger could not find nt in module list, module list might be
corrupt.

***** Followup with Debugger team



Probably caused by : Unknown_Image



Followup: MachineOwner





kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address
at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 0000000c, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, value 0 = read operation, 1 = write operation

Arg4: 80509f4a, address which referenced memory



Debugging Details:





***** Debugger could not find nt in module list, module list might be
corrupt.

***** Followup with Debugger team





READ_ADDRESS: unable to get nt!MmSpecialPoolStart

unable to get nt!MmSpecialPoolEnd

unable to get nt!MmPoolCodeStart

unable to get nt!MmPoolCodeEnd

0000000c



CURRENT_IRQL: 2



FAULTING_IP:

+ffffffff80509f4a

80509f4a 3932 cmp [edx],esi



DEFAULT_BUCKET_ID: DRIVER_FAULT



BUGCHECK_STR: 0xA



LAST_CONTROL_TRANSFER: from 00010101 to 804e2158



STACK_TEXT:

WARNING: Frame IP not in any known module. Following frames may be wrong.

f7af2b14 00010101 00010101 00010101 00010101 0x804e2158

f7af2b18 00010101 00010101 00010101 00010101 0x10101

f7af2b1c 00010101 00010101 00010101 00010101 0x10101

f7af2b20 00010101 00010101 00010101 00010101 0x10101

f7af2b24 00010101 00010101 00010101 00010101 0x10101

f7af2b28 00010101 00010101 00010101 00010101 0x10101

f7af2b2c 00010101 00010101 00010101 00010101 0x10101

f7af2b30 00010101 00010101 00010101 00010101 0x10101

f7af2b34 00010101 00010101 00010101 00010101 0x10101

f7af2b38 00010101 00010101 00010101 00010101 0x10101

f7af2b3c 00010101 00010101 00010101 00010101 0x10101

f7af2b40 00010101 00010101 00010101 00010101 0x10101

f7af2b44 00010101 00010101 00010101 00010101 0x10101

f7af2b48 00010101 00010101 00010101 00010101 0x10101

f7af2b4c 00010101 00010101 00010101 00010101 0x10101

f7af2b50 00010101 00010101 00010101 00010101 0x10101

f7af2b54 00010101 00010101 00010101 00010101 0x10101

f7af2b58 00010101 00010101 00010101 00010101 0x10101

f7af2b5c 00010101 00010101 00010101 00010101 0x10101

f7af2b60 00010101 00010101 00010101 00010101 0x10101

f7af2b64 00010101 00010101 00010101 00010101 0x10101

f7af2b68 00010101 00010101 00010101 00010101 0x10101

f7af2b6c 00010101 00010101 00010101 00010101 0x10101

f7af2b70 00010101 00010101 00010101 00010101 0x10101

f7af2b74 00010101 00010101 00010101 00010101 0x10101

f7af2b78 00010101 00010101 00010101 00010101 0x10101

f7af2b7c 00010101 00010101 00010101 00010101 0x10101

f7af2b80 00010101 00010101 00010101 00010101 0x10101

f7af2b84 00010101 00010101 00010101 00010101 0x10101

f7af2b88 00010101 00010101 00010101 00010101 0x10101

f7af2b8c 00010101 00010101 00010101 00010101 0x10101

f7af2b90 00010101 00010101 00010101 00010101 0x10101

f7af2b94 00010101 00010101 00010101 00010101 0x10101

f7af2b98 00010101 00010101 00010101 00010101 0x10101

f7af2b9c 00010101 00010101 00010101 00010101 0x10101

f7af2ba0 00010101 00010101 00010101 00010101 0x10101

f7af2ba4 00010101 00010101 00010101 00010101 0x10101

f7af2ba8 00010101 00010101 00010101 00010101 0x10101

f7af2bac 00010101 00010101 00010101 00010101 0x10101

f7af2bb0 00010101 00010101 00010101 00010101 0x10101

f7af2bb4 00010101 00010101 00010101 00010101 0x10101

f7af2bb8 00010101 00010101 00010101 00010101 0x10101

f7af2bbc 00010101 00010101 00010101 00010101 0x10101

f7af2bc0 00010101 00010101 00010101 00010101 0x10101

f7af2bc4 00010101 00010101 00010101 00010101 0x10101

f7af2bc8 00010101 00010101 00010101 00010101 0x10101

f7af2bcc 00010101 00010101 00010101 00010101 0x10101

f7af2bd0 00010101 00010101 00010101 00010101 0x10101

f7af2bd4 00010101 00010101 00010101 00000000 0x10101

f7af2bd8 00010101 00010101 00000000 00000000 0x10101





FOLLOWUP_IP:

+ffffffff804e2158

804e2158 f7457000000200 test dword ptr [ebp+0x70],0x20000



FOLLOWUP_NAME: MachineOwner



MODULE_NAME: Unknown_Module



IMAGE_NAME: Unknown_Image



DEBUG_FLR_IMAGE_TIMESTAMP: 0



STACK_COMMAND: kb



BUCKET_ID: CORRUPT_MODULELIST



Followup: MachineOwner







Gracias por la atención prestada, a ver si hay suerte y alguien sabe que
es lo que falla.


Preguntas similares