Gracias por la atencion pero me surge un problema de un pantallazo azul que reinicia el equipo cuando va a inciar el SO (XP, en donde dice "bienvenidos"). Esto no es critico pues despues de un par de reinicios, logra entrar al escritorio y trabajar bien y hasta aveces no se reinicia, pero ps, otras veces si sucede y son hasta cuatro reinicios. He analizado el informe DMP con el WindDbg, y el causante probable es el ntkrnlpa.exe, pero no entiendo en que funciona este y que implicaciones tiene o que.....aqui dejo en informe, de antemano muchisimas gracias por la ayuda para el analisis de este informe y las posibles soluciones.
Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini010710-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt
Built by: 2600.xpsp_sp2_qfe.070227-2300
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805535a0
Debug session time: Thu Jan 7 17:49:14.218 2010 (GMT-3)
System Uptime: 0 days 0:00:23.781
Loading Kernel Symbols
...............................................................
...........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 71, {0, 0, 0, 0}
Probably caused by : ntkrnlpa.exe ( nt!Phase1Initialization+10cf )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SESSION5_INITIALIZATION_FAILED (71)
The bugcheck code (SESSION1 - SESSION5) indicates the point during
initialization when the failure was detected.
Arguments:
Arg1: 00000000, Indicates the NT status code that tripped Windows into thinking
that initialization failed.
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x71
LAST_CONTROL_TRANSFER: from 80684e77 to 804f8c1a
STACK_TEXT:
f7993840 80684e77 00000071 859c65b8 00000000 nt!KeBugCheck+0x14
f7993dac 805c5072 80085000 00000000 00000000 nt!Phase1Initialization+0x10cf
f7993ddc 80541362 80683da8 80085000 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!Phase1Initialization+10cf
80684e77 ffb5b0faffff push dword ptr [ebp-550h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!Phase1Initialization+10cf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlpa.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 45e54849
FAILURE_BUCKET_ID: 0x71_nt!Phase1Initialization+10cf
BUCKET_ID: 0x71_nt!Phase1Initialization+10cf
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini010710-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt
Built by: 2600.xpsp_sp2_qfe.070227-2300
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805535a0
Debug session time: Thu Jan 7 17:49:14.218 2010 (GMT-3)
System Uptime: 0 days 0:00:23.781
Loading Kernel Symbols
...............................................................
...........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 71, {0, 0, 0, 0}
Probably caused by : ntkrnlpa.exe ( nt!Phase1Initialization+10cf )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SESSION5_INITIALIZATION_FAILED (71)
The bugcheck code (SESSION1 - SESSION5) indicates the point during
initialization when the failure was detected.
Arguments:
Arg1: 00000000, Indicates the NT status code that tripped Windows into thinking
that initialization failed.
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x71
LAST_CONTROL_TRANSFER: from 80684e77 to 804f8c1a
STACK_TEXT:
f7993840 80684e77 00000071 859c65b8 00000000 nt!KeBugCheck+0x14
f7993dac 805c5072 80085000 00000000 00000000 nt!Phase1Initialization+0x10cf
f7993ddc 80541362 80683da8 80085000 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!Phase1Initialization+10cf
80684e77 ffb5b0faffff push dword ptr [ebp-550h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!Phase1Initialization+10cf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlpa.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 45e54849
FAILURE_BUCKET_ID: 0x71_nt!Phase1Initialization+10cf
BUCKET_ID: 0x71_nt!Phase1Initialization+10cf
Followup: MachineOwner