Últimos mensajes - Powered by IBM
- no almacena credenciales terminal server
- Error de Conexion FTP con IIS en Windows Server ...
- Como puedo compartir un servidor en dos dominios.
- tengo probles para insertar registros desde vfpro ...
- Restauración de archivos desde el disco duro
- Copias de seguridad VSS
- Volviendome loco con robocopy y net use..
- Programador de tareas - Estado servicio iniciando
- pregunta Wsus
- Error al agregar una unidad local a través de ...
Palabras claves
Error 2003 Server : Error del sistema: sistema detenido
01/04/2008 - 21:31 por ARKANO | Informe spam
Llevo varias semanas que el sistema me cierra la sesión al realizar
busquedas desde el explorador de ficheros, al volver a iniciar la
sesión me da el siguiente código de error:
El motivo facilitado por el usuario SERVIDOR\Administrador para el
último apagado inesperado del equipo es el siguiente: Error del
sistema: sistema detenido
Código de motivo: 0x805000f
Id. de error:
Cadena de control del error: 0x00000050 (0xfffffff0, 0x00000000,
0x808925cf, 0x00000000)
Comentario: 0x00000050 (0xfffffff0, 0x00000000, 0x808925cf,
0x00000000)
Además uno de los volumenes raid empieza a comprobar la paridad.
El fichero de errores me facilita la siguiente información:
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\Administrador\Escritorio
\WER9a34.dir00\Mini040108-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/
download/symbols
Executable search path is:
Map \WINDOWS\system32tkrnlpa.exe:
Image region 800:8e000 does not fit in mapping
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for
ntkrnlpa.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs)
Free x86 compatible
Product: Server, suite: TerminalServer SingleUserTS
Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
Debug session time: Tue Apr 1 20:54:50.437 2008 (GMT+2)
System Uptime: 0 days 0:06:31.066
Map \WINDOWS\system32tkrnlpa.exe:
Image region 800:8e000 does not fit in mapping
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for
ntkrnlpa.exe
Loading Kernel Symbols
...
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffff0, 0, 808925cf, 0}
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
Probably caused by : ntkrnlpa.exe ( nt+925cf )
Followup: MachineOwner
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffff0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 808925cf, If non-zero, the instruction address which referenced
the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
MODULE_NAME: nt
FAULTING_MODULE: 80800000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
fffffff0
FAULTING_IP:
nt+925cf
808925cf ?? ???
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
BUGCHECK_STR: 0x50
LAST_CONTROL_TRANSFER: from 8085eced to 80827c63
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may
be wrong.
f7902bdc 8085eced 00000050 fffffff0 00000000 nt+0x27c63
f7902c54 8088c798 00000000 fffffff0 00000000 nt+0x5eced
f7902c6c 808925cf badb0d00 fffffff6 00000019 nt+0x8c798
f7902d2c 808c6dd5 fffffff6 00000000 808a46c0 nt+0x925cf
f7902d48 808c7dba e2abd3b0 e29b76b0 f7902d80 nt+0xc6dd5
f7902d58 80814841 e2abd3b0 00000000 8a3933f0 nt+0xc7dba
f7902d80 8088043d 00000000 00000000 8a3933f0 nt+0x14841
f7902dac 80949b7c 00000000 00000000 00000000 nt+0x8043d
f7902ddc 8088e062 80880352 00000001 00000000 nt+0x149b7c
00000000 00000000 00000000 00000000 00000000 nt+0x8e062
STACK_COMMAND: kb
FOLLOWUP_IP:
nt+925cf
808925cf ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt+925cf
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlpa.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffff0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 808925cf, If non-zero, the instruction address which referenced
the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
MODULE_NAME: nt
FAULTING_MODULE: 80800000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19
READ_ADDRESS: fffffff0
FAULTING_IP:
nt+925cf
808925cf ?? ???
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
BUGCHECK_STR: 0x50
LAST_CONTROL_TRANSFER: from 8085eced to 80827c63
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may
be wrong.
f7902bdc 8085eced 00000050 fffffff0 00000000 nt+0x27c63
f7902c54 8088c798 00000000 fffffff0 00000000 nt+0x5eced
f7902c6c 808925cf badb0d00 fffffff6 00000019 nt+0x8c798
f7902d2c 808c6dd5 fffffff6 00000000 808a46c0 nt+0x925cf
f7902d48 808c7dba e2abd3b0 e29b76b0 f7902d80 nt+0xc6dd5
f7902d58 80814841 e2abd3b0 00000000 8a3933f0 nt+0xc7dba
f7902d80 8088043d 00000000 00000000 8a3933f0 nt+0x14841
f7902dac 80949b7c 00000000 00000000 00000000 nt+0x8043d
f7902ddc 8088e062 80880352 00000001 00000000 nt+0x149b7c
00000000 00000000 00000000 00000000 00000000 nt+0x8e062
STACK_COMMAND: kb
FOLLOWUP_IP:
nt+925cf
808925cf ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt+925cf
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlpa.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffff0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 808925cf, If non-zero, the instruction address which referenced
the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
MODULE_NAME: nt
FAULTING_MODULE: 80800000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19
READ_ADDRESS: fffffff0
FAULTING_IP:
nt+925cf
808925cf ?? ???
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
BUGCHECK_STR: 0x50
LAST_CONTROL_TRANSFER: from 8085eced to 80827c63
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may
be wrong.
f7902bdc 8085eced 00000050 fffffff0 00000000 nt+0x27c63
f7902c54 8088c798 00000000 fffffff0 00000000 nt+0x5eced
f7902c6c 808925cf badb0d00 fffffff6 00000019 nt+0x8c798
f7902d2c 808c6dd5 fffffff6 00000000 808a46c0 nt+0x925cf
f7902d48 808c7dba e2abd3b0 e29b76b0 f7902d80 nt+0xc6dd5
f7902d58 80814841 e2abd3b0 00000000 8a3933f0 nt+0xc7dba
f7902d80 8088043d 00000000 00000000 8a3933f0 nt+0x14841
f7902dac 80949b7c 00000000 00000000 00000000 nt+0x8043d
f7902ddc 8088e062 80880352 00000001 00000000 nt+0x149b7c
00000000 00000000 00000000 00000000 00000000 nt+0x8e062
STACK_COMMAND: kb
FOLLOWUP_IP:
nt+925cf
808925cf ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt+925cf
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlpa.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
Por mas vueltas que le doy no consigo dar con el problema.
Alguna sugerencia ????
Gracias por adelantado
busquedas desde el explorador de ficheros, al volver a iniciar la
sesión me da el siguiente código de error:
El motivo facilitado por el usuario SERVIDOR\Administrador para el
último apagado inesperado del equipo es el siguiente: Error del
sistema: sistema detenido
Código de motivo: 0x805000f
Id. de error:
Cadena de control del error: 0x00000050 (0xfffffff0, 0x00000000,
0x808925cf, 0x00000000)
Comentario: 0x00000050 (0xfffffff0, 0x00000000, 0x808925cf,
0x00000000)
Además uno de los volumenes raid empieza a comprobar la paridad.
El fichero de errores me facilita la siguiente información:
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\Administrador\Escritorio
\WER9a34.dir00\Mini040108-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/
download/symbols
Executable search path is:
Map \WINDOWS\system32tkrnlpa.exe:
Image region 800:8e000 does not fit in mapping
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for
ntkrnlpa.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs)
Free x86 compatible
Product: Server, suite: TerminalServer SingleUserTS
Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
Debug session time: Tue Apr 1 20:54:50.437 2008 (GMT+2)
System Uptime: 0 days 0:06:31.066
Map \WINDOWS\system32tkrnlpa.exe:
Image region 800:8e000 does not fit in mapping
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for
ntkrnlpa.exe
Loading Kernel Symbols
...
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffff0, 0, 808925cf, 0}
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
Probably caused by : ntkrnlpa.exe ( nt+925cf )
Followup: MachineOwner
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffff0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 808925cf, If non-zero, the instruction address which referenced
the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
MODULE_NAME: nt
FAULTING_MODULE: 80800000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
fffffff0
FAULTING_IP:
nt+925cf
808925cf ?? ???
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
BUGCHECK_STR: 0x50
LAST_CONTROL_TRANSFER: from 8085eced to 80827c63
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may
be wrong.
f7902bdc 8085eced 00000050 fffffff0 00000000 nt+0x27c63
f7902c54 8088c798 00000000 fffffff0 00000000 nt+0x5eced
f7902c6c 808925cf badb0d00 fffffff6 00000019 nt+0x8c798
f7902d2c 808c6dd5 fffffff6 00000000 808a46c0 nt+0x925cf
f7902d48 808c7dba e2abd3b0 e29b76b0 f7902d80 nt+0xc6dd5
f7902d58 80814841 e2abd3b0 00000000 8a3933f0 nt+0xc7dba
f7902d80 8088043d 00000000 00000000 8a3933f0 nt+0x14841
f7902dac 80949b7c 00000000 00000000 00000000 nt+0x8043d
f7902ddc 8088e062 80880352 00000001 00000000 nt+0x149b7c
00000000 00000000 00000000 00000000 00000000 nt+0x8e062
STACK_COMMAND: kb
FOLLOWUP_IP:
nt+925cf
808925cf ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt+925cf
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlpa.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffff0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 808925cf, If non-zero, the instruction address which referenced
the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
MODULE_NAME: nt
FAULTING_MODULE: 80800000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19
READ_ADDRESS: fffffff0
FAULTING_IP:
nt+925cf
808925cf ?? ???
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
BUGCHECK_STR: 0x50
LAST_CONTROL_TRANSFER: from 8085eced to 80827c63
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may
be wrong.
f7902bdc 8085eced 00000050 fffffff0 00000000 nt+0x27c63
f7902c54 8088c798 00000000 fffffff0 00000000 nt+0x5eced
f7902c6c 808925cf badb0d00 fffffff6 00000019 nt+0x8c798
f7902d2c 808c6dd5 fffffff6 00000000 808a46c0 nt+0x925cf
f7902d48 808c7dba e2abd3b0 e29b76b0 f7902d80 nt+0xc6dd5
f7902d58 80814841 e2abd3b0 00000000 8a3933f0 nt+0xc7dba
f7902d80 8088043d 00000000 00000000 8a3933f0 nt+0x14841
f7902dac 80949b7c 00000000 00000000 00000000 nt+0x8043d
f7902ddc 8088e062 80880352 00000001 00000000 nt+0x149b7c
00000000 00000000 00000000 00000000 00000000 nt+0x8e062
STACK_COMMAND: kb
FOLLOWUP_IP:
nt+925cf
808925cf ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt+925cf
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlpa.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
1: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffff0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 808925cf, If non-zero, the instruction address which referenced
the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
*************************************************************************
***
***
***
***
*** Your debugger is not using the correct symbols
***
***
***
*** In order for this command to work properly, your symbol path
***
*** must point to .pdb files that have full type information.
***
***
***
*** Certain .pdb files (such as the public OS symbols) do not
***
*** contain the required information. Contact the group that
***
*** provided you with these symbols if you need this command to
***
*** work.
***
***
***
*** Type referenced: nt!_KPRCB
***
***
***
*************************************************************************
MODULE_NAME: nt
FAULTING_MODULE: 80800000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19
READ_ADDRESS: fffffff0
FAULTING_IP:
nt+925cf
808925cf ?? ???
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
BUGCHECK_STR: 0x50
LAST_CONTROL_TRANSFER: from 8085eced to 80827c63
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may
be wrong.
f7902bdc 8085eced 00000050 fffffff0 00000000 nt+0x27c63
f7902c54 8088c798 00000000 fffffff0 00000000 nt+0x5eced
f7902c6c 808925cf badb0d00 fffffff6 00000019 nt+0x8c798
f7902d2c 808c6dd5 fffffff6 00000000 808a46c0 nt+0x925cf
f7902d48 808c7dba e2abd3b0 e29b76b0 f7902d80 nt+0xc6dd5
f7902d58 80814841 e2abd3b0 00000000 8a3933f0 nt+0xc7dba
f7902d80 8088043d 00000000 00000000 8a3933f0 nt+0x14841
f7902dac 80949b7c 00000000 00000000 00000000 nt+0x8043d
f7902ddc 8088e062 80880352 00000001 00000000 nt+0x149b7c
00000000 00000000 00000000 00000000 00000000 nt+0x8e062
STACK_COMMAND: kb
FOLLOWUP_IP:
nt+925cf
808925cf ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt+925cf
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlpa.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
Por mas vueltas que le doy no consigo dar con el problema.
Alguna sugerencia ????
Gracias por adelantado
Hacer una pregunta
Siga el debate
Tengo una respuesta
Viernes 05 de diciembre - 12:29
Registrar
Leer las respuestas