Soporte analisis pantallazo

19/08/2005 - 13:12 por g | Informe spam
Me podeis decir donde esta el fallo del pantallazo???



Microsoft (R) Windows Debugger Version 6.4.0007.2

Copyright (c) Microsoft Corporation. All rights reserved.



Loading Dump File [C:\Documents and
Settings\Administrador\Escritorio\Mini081905-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols

Executable search path is:

*** ERROR: Symbol file could not be found. Defaulted to export symbols for
ntoskrnl.exe -

Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 2600.xpsp_sp2_rtm.040803-2158

Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20

Debug session time: Fri Aug 19 11:33:41.879 2005 (GMT+2)

System Uptime: 0 days 19:03:49.656

*** ERROR: Symbol file could not be found. Defaulted to export symbols for
ntoskrnl.exe -

Loading Kernel Symbols



Loading unloaded module list

...

Loading User Symbols

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {28, 2, 0, 804f22b8}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

Followup: MachineOwner



kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at
an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 00000028, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, value 0 = read operation, 1 = write operation

Arg4: 804f22b8, address which referenced memory

Debugging Details:



***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

MODULE_NAME: nt

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 41108004

READ_ADDRESS: unable to get nt!MmSpecialPoolStart

unable to get nt!MmSpecialPoolEnd

unable to get nt!MmPoolCodeStart

unable to get nt!MmPoolCodeEnd

unable to get nt!MiSessionPoolStart

unable to get nt!MiSessionPoolEnd

00000028

CURRENT_IRQL: 2

FAULTING_IP:

nt!PsGetProcessJob+5c8

804f22b8 8b7828 mov edi,[eax+0x28]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

LAST_CONTROL_TRANSFER: from 80500e5f to 804f22b8

STACK_TEXT:

WARNING: Stack unwind information not available. Following frames may be
wrong.

f6c1ac24 80500e5f 05812163 00000000 81d0f3c0 nt!PsGetProcessJob+0x5c8

f6c1ac4c 804e510e e17df528 00000000 e1209fa8
nt!FsRtlRemovePerStreamContext+0xa98

f6c1ac70 804e3d38 81d0f3c0 00000000 e1751500 nt!KeCancelTimer+0x4f

f6c1ac88 80564045 81d0f3c0 00000001 e1209f80 nt!MmIsAddressValid+0x157

f6c1aca4 80563ff6 81d0f3c0 e1209f90 00000000 nt!SeDeleteAccessState+0x5a7

f6c1acc0 804e3c55 e1209fa8 00000000 000005dc nt!SeDeleteAccessState+0x558

f6c1ace4 80567543 81d09260 e1a04f78 81ddd5d8 nt!MmIsAddressValid+0x74

f6c1acfc 805675ac e1a04f78 e1209fa8 000005dc nt!RtlAddAtomToAtomTable+0x5a6

f6c1ad44 805675f6 000005dc 00000001 00000000 nt!RtlAddAtomToAtomTable+0x60f

f6c1ad58 804df06b 000005dc 0117fc7c 7c91eb94 nt!NtClose+0x1d

f6c1ad64 7c91eb94 badb0d00 0117fc78 f780a54a nt!ZwYieldExecution+0xb96

0117fc7c 00000000 00000000 00000000 00000000 0x7c91eb94



STACK_COMMAND: .bugcheck ; kb

FOLLOWUP_NAME: MachineOwner

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner
 

Leer las respuestas

#1 Marc [MVP Windows]
19/08/2005 - 13:27 | Informe spam
Pues no te puedo ayudar, ya que no has cargado los símbolos del depurador...

Debes tener mal la ruta de acceso a los mismos

"Symbol search path is:
SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols"

y al no cargarlos, no se entiende nada excepto que es un driver
(IRQL_NOT_LESS_OR_EQUAL (a))

Saludos,

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no
otorga ningún derecho.


"g" escribió:

Me podeis decir donde esta el fallo del pantallazo???



Microsoft (R) Windows Debugger Version 6.4.0007.2

Copyright (c) Microsoft Corporation. All rights reserved.



Loading Dump File [C:\Documents and
Settings\Administrador\Escritorio\Mini081905-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols

Executable search path is:

*** ERROR: Symbol file could not be found. Defaulted to export symbols for
ntoskrnl.exe -

Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 2600.xpsp_sp2_rtm.040803-2158

Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20

Debug session time: Fri Aug 19 11:33:41.879 2005 (GMT+2)

System Uptime: 0 days 19:03:49.656

*** ERROR: Symbol file could not be found. Defaulted to export symbols for
ntoskrnl.exe -

Loading Kernel Symbols

.

Loading unloaded module list



Loading User Symbols

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {28, 2, 0, 804f22b8}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

Followup: MachineOwner



kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at
an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 00000028, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, value 0 = read operation, 1 = write operation

Arg4: 804f22b8, address which referenced memory

Debugging Details:



***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

MODULE_NAME: nt

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 41108004

READ_ADDRESS: unable to get nt!MmSpecialPoolStart

unable to get nt!MmSpecialPoolEnd

unable to get nt!MmPoolCodeStart

unable to get nt!MmPoolCodeEnd

unable to get nt!MiSessionPoolStart

unable to get nt!MiSessionPoolEnd

00000028

CURRENT_IRQL: 2

FAULTING_IP:

nt!PsGetProcessJob+5c8

804f22b8 8b7828 mov edi,[eax+0x28]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

LAST_CONTROL_TRANSFER: from 80500e5f to 804f22b8

STACK_TEXT:

WARNING: Stack unwind information not available. Following frames may be
wrong.

f6c1ac24 80500e5f 05812163 00000000 81d0f3c0 nt!PsGetProcessJob+0x5c8

f6c1ac4c 804e510e e17df528 00000000 e1209fa8
nt!FsRtlRemovePerStreamContext+0xa98

f6c1ac70 804e3d38 81d0f3c0 00000000 e1751500 nt!KeCancelTimer+0x4f

f6c1ac88 80564045 81d0f3c0 00000001 e1209f80 nt!MmIsAddressValid+0x157

f6c1aca4 80563ff6 81d0f3c0 e1209f90 00000000 nt!SeDeleteAccessState+0x5a7

f6c1acc0 804e3c55 e1209fa8 00000000 000005dc nt!SeDeleteAccessState+0x558

f6c1ace4 80567543 81d09260 e1a04f78 81ddd5d8 nt!MmIsAddressValid+0x74

f6c1acfc 805675ac e1a04f78 e1209fa8 000005dc nt!RtlAddAtomToAtomTable+0x5a6

f6c1ad44 805675f6 000005dc 00000001 00000000 nt!RtlAddAtomToAtomTable+0x60f

f6c1ad58 804df06b 000005dc 0117fc7c 7c91eb94 nt!NtClose+0x1d

f6c1ad64 7c91eb94 badb0d00 0117fc78 f780a54a nt!ZwYieldExecution+0xb96

0117fc7c 00000000 00000000 00000000 00000000 0x7c91eb94



STACK_COMMAND: .bugcheck ; kb

FOLLOWUP_NAME: MachineOwner

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner






Preguntas similares