locked
Pantallazo azul (ntkrnlmp.exe). Ayuda Por favor RRS feed

  • Pregunta

  • Buenos días, acabo de analizar el MEMORY.DMP con el WinDbg y esto fue lo que botó (espero me puedan ayudar porque no se mucho sobre esto):


    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available

    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`03051670
    Debug session time: Sun Sep 25 20:07:15.901 2011 (UTC - 5:00)
    System Uptime: 0 days 21:40:02.978
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................Page 8c1ac not present in the dump file. Type ".hh dbgerr004" for details
    ...............................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 000007ff`fffdb018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    ..........................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck C2, {7, 109b, 10001d, fffffa800bc9c490}

    Probably caused by : ntkrnlmp.exe ( nt!IopPostProcessIrp+4d )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 000000000000109b, (reserved)
    Arg3: 000000000010001d, Memory contents of the pool block
    Arg4: fffffa800bc9c490, Address of the block of pool being deallocated

    Debugging Details:
    ------------------


    POOL_ADDRESS:  fffffa800bc9c490

    FREED_POOL_TAG:  Wait

    BUGCHECK_STR:  0xc2_7_Wait

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    PROCESS_NAME:  vmware-vmx.exe

    CURRENT_IRQL:  0

    IRP_ADDRESS:  fffffa7fffffff89

    LAST_CONTROL_TRANSFER:  from fffff80002fb6be9 to fffff80002e88c40

    STACK_TEXT: 
    fffff880`0e52d868 fffff800`02fb6be9 : 00000000`000000c2 00000000`00000007 00000000`0000109b 00000000`0010001d : nt!KeBugCheckEx
    fffff880`0e52d870 fffff800`02e9e596 : fffffa80`0bc9c490 fffffa80`05240b60 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x1201
    fffff880`0e52d920 fffff800`02e5896d : fffffa80`00000001 fffffa80`0be78d00 00000000`00000000 fffff800`02e8b4da : nt!IopCompleteRequest+0xac6
    fffff880`0e52d9f0 fffff800`031716e7 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopPostProcessIrp+0x4d
    fffff880`0e52da70 fffff800`03143ae5 : 00000000`00000000 fffff880`0e52db68 fffff880`0e52db60 ffffecbb`bc2d6e01 : nt!IoRemoveIoCompletion+0xe7
    fffff880`0e52db00 fffff800`02e87ed3 : fffffa80`05240b60 00000000`03adfe38 fffff880`0e52dbc8 00000000`00000000 : nt!NtRemoveIoCompletion+0x145
    fffff880`0e52dbb0 00000000`77a813aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`03adfe18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a813aa


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt!IopPostProcessIrp+4d
    fffff800`02e5896d 4883c478        add     rsp,78h

    SYMBOL_STACK_INDEX:  3

    SYMBOL_NAME:  nt!IopPostProcessIrp+4d

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3

    FAILURE_BUCKET_ID:  X64_0xc2_7_Wait_nt!IopPostProcessIrp+4d

    BUCKET_ID:  X64_0xc2_7_Wait_nt!IopPostProcessIrp+4d

    Followup: MachineOwner
    ---------

    Muchas gracias de antemano para los que me ayuden con este problema. Por lo visto tiene que ver con el VMWare Workstation que tengo instalado pero no sé bien. Saludos

    domingo, 2 de octubre de 2011 11:37

Todas las respuestas

  • Hola,

    ¿Cómo te está sucediendo el pantallazo y qué tan frecuente?

    Saludos,

    domingo, 2 de octubre de 2011 16:57
  • Hola Sergio, gracias por responder. El pantallazo solamente sucedió una vez (25/09/2011). No ha vuelto a pasar nada pero quería revisar el dmp a ver si era algo grave.

    Saludos

    lunes, 3 de octubre de 2011 0:33