Hola, he tenido varios pantallazos azules en mi ordenador, y después de
seguir el manual de JM Tella en Multingles sobre BSOD, estoy sin ideas de
que pasa, os pongo el fichero que se genera al tratar el archivo dmp
Microsoft (R) Windows Debugger Version 6.5.0003.7
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Complete Dump File: Full address space is available
Symbol search path is:
SRV*c:\websymbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS 0xC0000147
Missing image name, possible corrupt data.
*** WARNING: Unable to verify timestamp for Unknown_Module_00ac03c0
*** ERROR: Module load completed but symbols could not be loaded for
Unknown_Module_00ac03c0
Debugger can not determine kernel base address
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_rtm.040803-2158
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Tue Feb 21 22:51:37.505 2006 (GMT+1)
System Uptime: 0 days 0:40:45.081
WARNING: Unable to reset page directories
Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS 0xC0000147
Missing image name, possible corrupt data.
*** WARNING: Unable to verify timestamp for Unknown_Module_00ac03c0
*** ERROR: Module load completed but symbols could not be loaded for
Unknown_Module_00ac03c0
Debugger can not determine kernel base address
Loading Kernel Symbols
Unable to read NT module Base Name string at 00ac03d8 - NTSTATUS 0xC0000147
Missing image name, possible corrupt data.
.Unable to read KLDR_DATA_TABLE_ENTRY at 00ac03a8 - NTSTATUS 0xC0000147
Loading unloaded module list
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {c, 2, 0, 80509f4a}
***** Debugger could not find nt in module list, module list might be
corrupt.
***** Followup with Debugger team
Probably caused by : Unknown_Image
Followup: MachineOwner
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at
an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 80509f4a, address which referenced memory
Debugging Details:
***** Debugger could not find nt in module list, module list might be
corrupt.
***** Followup with Debugger team
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
0000000c
CURRENT_IRQL: 2
FAULTING_IP:
+ffffffff80509f4a
80509f4a 3932 cmp [edx],esi
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 00010101 to 804e2158
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7af2b14 00010101 00010101 00010101 00010101 0x804e2158
f7af2b18 00010101 00010101 00010101 00010101 0x10101
f7af2b1c 00010101 00010101 00010101 00010101 0x10101
f7af2b20 00010101 00010101 00010101 00010101 0x10101
f7af2b24 00010101 00010101 00010101 00010101 0x10101
f7af2b28 00010101 00010101 00010101 00010101 0x10101
f7af2b2c 00010101 00010101 00010101 00010101 0x10101
f7af2b30 00010101 00010101 00010101 00010101 0x10101
f7af2b34 00010101 00010101 00010101 00010101 0x10101
f7af2b38 00010101 00010101 00010101 00010101 0x10101
f7af2b3c 00010101 00010101 00010101 00010101 0x10101
f7af2b40 00010101 00010101 00010101 00010101 0x10101
f7af2b44 00010101 00010101 00010101 00010101 0x10101
f7af2b48 00010101 00010101 00010101 00010101 0x10101
f7af2b4c 00010101 00010101 00010101 00010101 0x10101
f7af2b50 00010101 00010101 00010101 00010101 0x10101
f7af2b54 00010101 00010101 00010101 00010101 0x10101
f7af2b58 00010101 00010101 00010101 00010101 0x10101
f7af2b5c 00010101 00010101 00010101 00010101 0x10101
f7af2b60 00010101 00010101 00010101 00010101 0x10101
f7af2b64 00010101 00010101 00010101 00010101 0x10101
f7af2b68 00010101 00010101 00010101 00010101 0x10101
f7af2b6c 00010101 00010101 00010101 00010101 0x10101
f7af2b70 00010101 00010101 00010101 00010101 0x10101
f7af2b74 00010101 00010101 00010101 00010101 0x10101
f7af2b78 00010101 00010101 00010101 00010101 0x10101
f7af2b7c 00010101 00010101 00010101 00010101 0x10101
f7af2b80 00010101 00010101 00010101 00010101 0x10101
f7af2b84 00010101 00010101 00010101 00010101 0x10101
f7af2b88 00010101 00010101 00010101 00010101 0x10101
f7af2b8c 00010101 00010101 00010101 00010101 0x10101
f7af2b90 00010101 00010101 00010101 00010101 0x10101
f7af2b94 00010101 00010101 00010101 00010101 0x10101
f7af2b98 00010101 00010101 00010101 00010101 0x10101
f7af2b9c 00010101 00010101 00010101 00010101 0x10101
f7af2ba0 00010101 00010101 00010101 00010101 0x10101
f7af2ba4 00010101 00010101 00010101 00010101 0x10101
f7af2ba8 00010101 00010101 00010101 00010101 0x10101
f7af2bac 00010101 00010101 00010101 00010101 0x10101
f7af2bb0 00010101 00010101 00010101 00010101 0x10101
f7af2bb4 00010101 00010101 00010101 00010101 0x10101
f7af2bb8 00010101 00010101 00010101 00010101 0x10101
f7af2bbc 00010101 00010101 00010101 00010101 0x10101
f7af2bc0 00010101 00010101 00010101 00010101 0x10101
f7af2bc4 00010101 00010101 00010101 00010101 0x10101
f7af2bc8 00010101 00010101 00010101 00010101 0x10101
f7af2bcc 00010101 00010101 00010101 00010101 0x10101
f7af2bd0 00010101 00010101 00010101 00010101 0x10101
f7af2bd4 00010101 00010101 00010101 00000000 0x10101
f7af2bd8 00010101 00010101 00000000 00000000 0x10101
FOLLOWUP_IP:
+ffffffff804e2158
804e2158 f7457000000200 test dword ptr [ebp+0x70],0x20000
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: kb
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
Gracias por la atención prestada, a ver si hay suerte y alguien sabe que es
lo que falla.
Leer las respuestas