Hola experimento problemas de reinicio, adjunto un volcado de memoria por si
me podeis ayudar a resolver
el problema ya que no encuentro mucha informacion al respecto.
Sospecho que tiene que ver con el hipertreading, es decir mi placa emula dos
procesadores cuando en realidad solo tengo uno de 3,20 gh.
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is:
SRV*DownstreamStore*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86
compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18000.x86fre.longhorn_rtm.080118-1840
Kernel base = 0x81c47000 PsLoadedModuleList = 0x81d54930
Debug session time: Thu Apr 24 02:58:51.696 2008 (GMT+2)
System Uptime: 0 days 11:14:00.725
Loading Kernel Symbols
...
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details
Loading unloaded module list
..
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {80000ddb, 0, 80000ddb, 0}
PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details
Probably caused by : ntkrnlmp.exe ( nt!KiTrap0E+dc )
Followup: MachineOwner
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by
try-except,
it must be protected by a Probe. Typically the address is just plain bad or
it
is pointing at freed memory.
Arguments:
Arg1: 80000ddb, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 80000ddb, If non-zero, the instruction address which referenced the
bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details
READ_ADDRESS: 80000ddb
FAULTING_IP:
+ffffffff80000ddb
80000ddb ?? ???
MM_INTERNAL_CODE: 0
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: abeddc50 -- (.trap 0xffffffffabeddc50)
ErrCode = 00000000
eax040000 ebx=a5f75820 ecx8ec900 edxbf2d78 esie1e690
edibf2d78
eip000ddb esp=abeddcc4 ebp=abeddd14 iopl=0 nv up ei pl zr na pe
nc
cs 08 ss 10 ds 23 es 23 fs 30 gs 00
efl 010246
80000ddb ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 81ca1ae4 to 81cb7b4e
FAILED_INSTRUCTION_ADDRESS:
+ffffffff80000ddb
80000ddb ?? ???
STACK_TEXT:
abeddc38 81ca1ae4 00000000 80000ddb 00000000 nt!MmAccessFault+0x158
abeddc38 80000ddb 00000000 80000ddb 00000000 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
abeddcc0 81e37ce2 848ec900 93e1e6a8 00000410 0x80000ddb
abeddd14 81e37bbd a6900c38 a5f75820 848ec900
nt!ObpCloseHandleTableEntry+0x6d
abeddd44 81e38440 848ec900 84bf2d01 84bf2d01 nt!ObpCloseHandle+0x73
abeddd58 81c9e9aa 00000410 023af960 77709a94 nt!NtClose+0x20
abeddd58 77709a94 00000410 023af960 77709a94 nt!KiFastCallEntry+0x12a
023af960 00000000 00000000 00000000 00000000 0x77709a94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+dc
81ca1ae4 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiTrap0E+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 47918b0a
FAILURE_BUCKET_ID: 0x50_CODE_AV_BAD_IP_nt!KiTrap0E+dc
BUCKET_ID: 0x50_CODE_AV_BAD_IP_nt!KiTrap0E+dc
Followup: MachineOwner
0: kd> lmvm nt
start end module name
81c47000 81ff1000 nt (pdb symbols)
DownstreamStoretkrnlmp.pdb\9C9758628E684E648C0E7784551EE7C02tkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Sat Jan 19 06:30:50 2008 (47918B0A)
CheckSum: 0036A9CE
ImageSize: 003AA000
File version: 6.0.6001.18000
Product version: 6.0.6001.18000
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.0.6001.18000
FileVersion: 6.0.6001.18000 (longhorn_rtm.080118-1840)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
Leer las respuestas