Para Tella: Congelado de pantalla (información del DUMP)

08/03/2006 - 08:38 por David Horno | Informe spam
Hola, la información que me a dado es la siguiente, no se si es correcto y
lo que le pasa:



Microsoft (R) Windows Debugger Version 6.6.0003.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and
Settings\aula210.SALESAL\Escritorio\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is:
SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86
compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.050301-1519
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805624a0
Debug session time: Tue Mar 7 20:59:53.781 2006 (GMT+1)
System Uptime: 0 days 0:01:01.468
Loading Kernel Symbols
.
Loading User Symbols
Loading unloaded module list
.
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck E2, {0, 0, 0, 0}

Probably caused by : i8042prt.sys ( i8042prt!I8xProcessCrashDump+237 )

Followup: MachineOwner


0: kd> 0: kd> !analyze -v
^ Syntax error in '0: kd> !analyze -v'
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

MANUALLY_INITIATED_CRASH (e2)
The user manually initiated this crash dump.
Arguments:
Arg1: 00000000
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:



BUGCHECK_STR: MANUALLY_INITIATED_CRASH

DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO

LAST_CONTROL_TRANSFER: from f78ca7fa to 805371aa

STACK_TEXT:
80556338 f78ca7fa 000000e2 00000000 00000000 nt!KeBugCheckEx+0x1b
80556354 f78ca032 0022c5f8 010000c6 00000000
i8042prt!I8xProcessCrashDump+0x237
8055639c 804db90f 8513cbb0 8522c540 00010009
i8042prt!I8042KeyboardInterruptService+0x21c
8055639c f7a6a062 8513cbb0 8522c540 00010009 nt!KiInterruptDispatch+0x45
80556450 804dcbef 00000000 0000000e 00000000 intelppm!AcpiC1Idle+0x12
80556454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x10


STACK_COMMAND: kb

FOLLOWUP_IP:
i8042prt!I8xProcessCrashDump+237
f78ca7fa 5d pop ebp

FAULTING_SOURCE_CODE:


SYMBOL_STACK_INDEX: 1

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: i8042prt!I8xProcessCrashDump+237

MODULE_NAME: i8042prt

IMAGE_NAME: i8042prt.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 41107ecc

FAILURE_BUCKET_ID:
MANUALLY_INITIATED_CRASH_i8042prt!I8xProcessCrashDump+237

BUCKET_ID: MANUALLY_INITIATED_CRASH_i8042prt!I8xProcessCrashDump+237

Followup: MachineOwner


0: kd> !IRP 87e5a490
87e5a490: Could not read Irp
0: kd> !IRP 00000000
Free build - use !irpfind to scan memory for any active IRPs
 

Leer las respuestas

#1 JM Tella Llop [MVP Windows]
08/03/2006 - 15:17 | Informe spam
Te tienes que mirar en la ayuda del Windbg cual es el comando para mirar los "bloqueos" ya que una tarea es la causante. La informacion que me has enviado no aporta nada porque, evidentemente, informa que el error lo he provocado el driver de tecladolo cual es correcto porque ha sido bajo peticion tuya para provocar el dump.-

Jose Manuel Tella Llop
MVP - Windows
(quitar XXX)
http://www.multingles.net/jmt.htm
news://jmtella.com

Este mensaje se proporciona "como está" sin garantías de ninguna clase,
y no otorga ningún derecho.

This posting is provided "AS IS" with no warranties, and confers no
rights.
You assume all risk for your use.



"David Horno" wrote in message news:%
Hola, la información que me a dado es la siguiente, no se si es correcto y
lo que le pasa:



Microsoft (R) Windows Debugger Version 6.6.0003.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and
Settings\aula210.SALESAL\Escritorio\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is:
SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86
compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.050301-1519
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805624a0
Debug session time: Tue Mar 7 20:59:53.781 2006 (GMT+1)
System Uptime: 0 days 0:01:01.468
Loading Kernel Symbols
.
Loading User Symbols
Loading unloaded module list
.
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck E2, {0, 0, 0, 0}

Probably caused by : i8042prt.sys ( i8042prt!I8xProcessCrashDump+237 )

Followup: MachineOwner


0: kd> 0: kd> !analyze -v
^ Syntax error in '0: kd> !analyze -v'
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

MANUALLY_INITIATED_CRASH (e2)
The user manually initiated this crash dump.
Arguments:
Arg1: 00000000
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:



BUGCHECK_STR: MANUALLY_INITIATED_CRASH

DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO

LAST_CONTROL_TRANSFER: from f78ca7fa to 805371aa

STACK_TEXT:
80556338 f78ca7fa 000000e2 00000000 00000000 nt!KeBugCheckEx+0x1b
80556354 f78ca032 0022c5f8 010000c6 00000000
i8042prt!I8xProcessCrashDump+0x237
8055639c 804db90f 8513cbb0 8522c540 00010009
i8042prt!I8042KeyboardInterruptService+0x21c
8055639c f7a6a062 8513cbb0 8522c540 00010009 nt!KiInterruptDispatch+0x45
80556450 804dcbef 00000000 0000000e 00000000 intelppm!AcpiC1Idle+0x12
80556454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x10


STACK_COMMAND: kb

FOLLOWUP_IP:
i8042prt!I8xProcessCrashDump+237
f78ca7fa 5d pop ebp

FAULTING_SOURCE_CODE:


SYMBOL_STACK_INDEX: 1

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: i8042prt!I8xProcessCrashDump+237

MODULE_NAME: i8042prt

IMAGE_NAME: i8042prt.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 41107ecc

FAILURE_BUCKET_ID:
MANUALLY_INITIATED_CRASH_i8042prt!I8xProcessCrashDump+237

BUCKET_ID: MANUALLY_INITIATED_CRASH_i8042prt!I8xProcessCrashDump+237

Followup: MachineOwner


0: kd> !IRP 87e5a490
87e5a490: Could not read Irp
0: kd> !IRP 00000000
Free build - use !irpfind to scan memory for any active IRPs


Preguntas similares