Utilizamos Cookies de terceros para generar estadísticas de audiencia y mostrar publicidad personalizada analizando tu navegación. Si sigues navegando estarás aceptando su uso. Más información X
PortadaForo AyudaTutoriales
InicioForosForo Drivers

Quien sabe leer volcados de memoria, ayuda

luis060989
2010-01-18 00:29 - Respuestas: 1 - Tema nº: 2653037


Windows XP Profesional .

Mi problemas es el de la pantalla azul y con el programa de debugging tools for windows sace estos errores pero no los puedo leer, no se como traducirlos, alguien que me ayude a leerlos....


Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini010710-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload tosymbol locations. *
****************************************************************************
Executable search path is:
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0x804d7000 PsLoadedModuleList = 0x80553420
Debug session time: Thu Jan 7 13:23:50.515 2010 (GMT-8)
System Uptime: 0 days 0:14:53.085
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 80526d91, f7a77ca4, f7a779a0}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Probably caused by : ntoskrnl.exe ( nt+4fd91 )

Followup: MachineOwner
-


Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini010710-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload tosymbol locations. *
****************************************************************************
Executable search path is:
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0x804d7000 PsLoadedModuleList = 0x80553420
Debug session time: Thu Jan 7 13:23:50.515 2010 (GMT-8)
System Uptime: 0 days 0:14:53.085
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 80526d91, f7a77ca4, f7a779a0}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Probably caused by : ntoskrnl.exe ( nt+4fd91 )

Followup: MachineOwner
-

kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 80526d91, The address that the exception occurred at
Arg3: f7a77ca4, Exception Record Address
Arg4: f7a779a0, Context Record Address

Debugging Details:


***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************

MODULE_NAME: nt

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4a7833f0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - La instrucci n en "0x%08lx" hace referencia a la memoria en "0x%08lx". La memoria no se puede "%s".

FAULTING_IP:
nt+4fd91
80526d91 83661800 and dword ptr [esi+18h],0

EXCEPTION_RECORD: f7a77ca4 (.exr 0xfffffffff7a77ca4)
ExceptionAddress: 80526d91 (nt+0x0004fd91)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 00000027
Attempt to write to address 00000027

CONTEXT: f7a779a0 (.cxr 0xfffffffff7a779a0)
eax=000174de ebx=806d0298 ecx=80557928 edx=843ffea0 esi=0000000f edi=83ed1da8
eip=80526d91 esp=f7a77d6c ebp=f7a77dac iopl=0 nv up ei pl nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010217
nt+0x4fd91:
80526d91 83661800 and dword ptr [esi+18h],0 ds:0023:00000027=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WRONG_SYMBOLS

BUGCHECK_STR: 0x7E

LAST_CONTROL_TRANSFER: from 805c4d5c to 80526d91

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
f7a77dac 805c4d5c 00000000 00000000 00000000 nt+0x4fd91
f7a77ddc 805411e2 80533f06 00000002 00000000 nt+0xedd5c
00000000 00000000 00000000 00000000 00000000 nt+0x6a1e2


FOLLOWUP_IP:
nt+4fd91
80526d91 83661800 and dword ptr [esi+18h],0

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt+4fd91

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: ntoskrnl.exe

STACK_COMMAND: .cxr 0xfffffffff7a779a0 ; kb

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner
-



Comentarios adicionales: No había instalado ningún programa, ni cambiado nada de hardware en el PC.
Posibles soluciones:
Quien sabe leer volcados de memoria, ayudaQuien sabe leer volcados de memoria, ayuda
Por que el pc tiene tantos volcados de memoria?Por que el pc tiene tantos volcados de memoria?
Quien lo sabe??Quien lo sabe??
A ver quien lo sabeA ver quien lo sabe
¿quien lo sabe?¿quien lo sabe?
angel-caido

Re: Quien sabe leer volcados de memoria, ayuda - 2010-01-20 16:28 - Respuesta 2

hola luis60989,tu problema parece dado por el archivo,NTOSKRNL.EXE
debajo te pongo la posible solucion sacada de la web de FAQ del Servicio de InformáticaUniversidad de Jaén,espero que te sirva.sigue todos los pasos que te indica el texto a ver si se soluciona asi tu problema y luego nos cuentas
un saludo.
NTOSKRNL.EXE es el nucleo del sistema operativo windows XP , responsable de la carga, ejecución y comunicación con los controladores de los dispositivos. Después de su carga se inician los servicios y controladores.
Cuando en el proceso de arranque se nos muestra "ntoskrnl.exe está corrupto..." podemos recuperar el sistema mediante el siguiente procedimiento:
1) Arrancar con el CD de XP. Si no arrancase, en la BIOS debemos modificar los parámetros para que arranque primero desde CD.
2) En la primera pantalla, seleccionar "R" para entrar en la consola de recuperación.
3) Seleccionar el Windows que queremos reparar. Normalmente será el #1, y presionar enter.
4) Cuando nos lo solicite, teclear la contraseña del usuario "Administrador". (Normalmente no se coloca ninguna al momento de instalar Windows por lo que solo hay que pulsar la tecla enter para que continúe). La contraseña del usuario Administrador (que está oculto), es, en XP Profesional, la que se puso durante la instalación del sistema. Esta contraseña posteriormente ha podido ser cambiada.
5) Cambiar a la unidad de CD. Típicamente será la E: si solo tenemos una partición.
Cambiar por la letra correspondiente en otro caso. Escribe E: y presiona enter.
E:
Luego...
cd i386
expand ntoskrnl.ex_ C:\Windows\System32\ntoskrnl.exe
Si Windows XP estuviese instalado en otra localización distinta de c:\Windows, sustituirla en el comando anterior
Página:1

Respuestas relacionadas:

¿quién sabe algo de m.u.g.e.n?¿quién sabe algo de m.u.g.e.n?Foro
Quien sabe estoQuien sabe estoForo
Quien sabe si funcionaQuien sabe si funcionaForo
Alguien sabe de quien es un rfc?Alguien sabe de quien es un rfc?Foro
Quien sabe de excel?Quien sabe de excel?Foro
Quien sabe de formularios y html?Quien sabe de formularios y html?Foro
Quién sabe sobre el athlon xp-m?Quién sabe sobre el athlon xp-m?Foro
¿quién sabe algo de gandalf?¿quién sabe algo de gandalf?Foro
Quien sabe desbloquear hotmailQuien sabe desbloquear hotmailForo
Quien sabe configurar un router smc network ????Quien sabe configurar un router smc network ????Foro
InicioSecciones
^ SubirAviso legal
Política Privacidad
Configurarequipos20 Abril 2024