ShutDown Inesperado

02/10/2009 - 19:38 por JulFlo | Informe spam
Hola como estan? necesito ayuda tengo el siguiente problema el servidor se
apago inesperadamente y aca envio el error del dump file y los specs del
servidor

Hp proliant BL460c

Disco de 72GB SAS 10K
System
MS Windows-Server2003 R2
Enterprise Edition
Service Pack 2
Intel(R) Xeon R CPU
2.67 GHz 8.00GB RAM

de antemano gracias.

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and
Settings\Administrator\Desktop\Mini092209-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (8 procs) Free
x86 compatible
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
Debug session time: Tue Sep 22 10:40:47.545 2009 (GMT-6)
System Uptime: 4 days 0:18:56.937
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...
...
Loading User Symbols
Loading unloaded module list
.
*** WARNING: Unable to verify timestamp for win32k.sy
*******************************************************************************
*
*
* Bugcheck Analysis
*
*

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, f7747fe0, 0, 0}

Probably caused by : win32k.sys ( win32k!NtUserPostThreadMessage+79 )

Followup: MachineOwner


6: kd> !analyze -
*******************************************************************************
*
*
* Bugcheck Analysis
*
*

*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: f7747fe0
Arg3: 00000000
Arg4: 00000000

Debugging Details:



BUGCHECK_STR: 0x7f_8

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP

PROCESS_NAME: PI3270.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from bf8c45de to bf8980da

STACK_TEXT:
adbaa058 bf8c45de bca84be8 00000001 00000000
win32k!NtUserPostThreadMessage+0x79
adbaa0c0 bf89a85c e1266c38 e3dd98d0 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa10c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa1a8 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaa25c bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbaa2c4 bf89a85c e1266c38 e3f8f820 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa310 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa3ac bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaa460 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbaa4c8 bf89a85c e1266c38 e3e4f430 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa514 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa5b0 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaa664 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbaa6cc bf89a85c e1266c38 e2ffa930 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa718 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa7b4 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaa868 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbaa8d0 bf89a85c e1266c38 e1d4ff78 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa91c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa9b8 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaaa6c bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbaaad4 bf89a85c e1266c38 e2d7cb60 00000000 win32k!NtGdiAlphaBlend+0x882
adbaab20 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaabbc bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaac70 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbaacd8 bf89a85c e1266c38 e34a0700 00000000 win32k!NtGdiAlphaBlend+0x882
adbaad24 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaadc0 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaae74 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbaaedc bf89a85c e1266c38 e19fffc0 00000000 win32k!NtGdiAlphaBlend+0x882
adbaaf28 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaafc4 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbab078 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbab0e0 bf89a85c e1266c38 e3381be8 00000000 win32k!NtGdiAlphaBlend+0x882
adbab12c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab1c8 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbab27c bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbab2e4 bf89a85c e1266c38 e2516da8 00000000 win32k!NtGdiAlphaBlend+0x882
adbab330 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab3cc bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbab480 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbab4e8 bf89a85c e1266c38 e3ef9b38 00000000 win32k!NtGdiAlphaBlend+0x882
adbab534 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab5d0 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbab684 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbab6ec bf89a85c e1266c38 e3b62b08 00000000 win32k!NtGdiAlphaBlend+0x882
adbab738 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab7d4 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbab888 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbab8f0 bf89a85c e1266c38 e27ee3c0 00000000 win32k!NtGdiAlphaBlend+0x882
adbab93c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab9d8 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbaba8c bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbabaf4 bf89a85c e1266c38 e1554778 00000000 win32k!NtGdiAlphaBlend+0x882
adbabb40 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbabbdc bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbabc90 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbabcf8 bf89a85c e1266c38 e3eb1b28 00000000 win32k!NtGdiAlphaBlend+0x882
adbabd44 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbabde0 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbabe94 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbabefc bf89a85c e1266c38 e2e79078 00000000 win32k!NtGdiAlphaBlend+0x882
adbabf48 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbabfe4 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbac098 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbac100 bf89a85c e1266c38 e1f75878 00000000 win32k!NtGdiAlphaBlend+0x882
adbac14c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbac1e8 bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbac29c bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbac304 bf89a85c e1266c38 e1ce9e88 00000000 win32k!NtGdiAlphaBlend+0x882
adbac350 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbac3ec bf89d521 00000000 00000314 00000000 win32k!xxxReceiveMessage+0x24e
adbac4a0 bf8c45de bca84be8 00000001 00000000 win32k!NtGdiFlushUserBatch+0x2e
adbac508 bf89a85c e1266c38 e3d07bb0 00000000 win32k!NtGdiAlphaBlend+0x882
adbac554 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!NtUserPostThreadMessage+79
bf8980da ?? ???

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32k!NtUserPostThreadMessage+79

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 49e867f5

FAILURE_BUCKET_ID: 0x7f_8_win32k!NtUserPostThreadMessage+79

BUCKET_ID: 0x7f_8_win32k!NtUserPostThreadMessage+79

Followup: MachineOwner
 

Leer las respuestas

#1 José Antonio Quílez
03/10/2009 - 13:04 | Informe spam
¿Te ocurre repetidamente o sólo ha pasado una vez? En el segundo caso no
debería preocuparte en exceso. En el primero, lo primero que tendrías que
hacer es actualizar los drivers de los distintos dispositivos del servidor.
La verdad es que el minidump que pones no da muchas pistas de la causa real
del apagado del servidor.

Saludos
José Antonio Quílez

http://msmvps.com/blogs/quilez/


"JulFlo" escribió en el mensaje de
noticias:
Hola como estan? necesito ayuda tengo el siguiente problema el servidor se
apago inesperadamente y aca envio el error del dump file y los specs del
servidor

Hp proliant BL460c

Disco de 72GB SAS 10K
System
MS Windows-Server2003 R2
Enterprise Edition
Service Pack 2
Intel(R) Xeon R CPU
2.67 GHz 8.00GB RAM

de antemano gracias.

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and
Settings\Administrator\Desktop\Mini092209-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (8 procs) Free
x86 compatible
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
Debug session time: Tue Sep 22 10:40:47.545 2009 (GMT-6)
System Uptime: 4 days 0:18:56.937
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...
...
Loading User Symbols
Loading unloaded module list
.
*** WARNING: Unable to verify timestamp for win32k.sys
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, f7747fe0, 0, 0}

Probably caused by : win32k.sys ( win32k!NtUserPostThreadMessage+79 )

Followup: MachineOwner


6: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: f7747fe0
Arg3: 00000000
Arg4: 00000000

Debugging Details:



BUGCHECK_STR: 0x7f_8

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP

PROCESS_NAME: PI3270.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from bf8c45de to bf8980da

STACK_TEXT:
adbaa058 bf8c45de bca84be8 00000001 00000000
win32k!NtUserPostThreadMessage+0x79
adbaa0c0 bf89a85c e1266c38 e3dd98d0 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa10c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa1a8 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaa25c bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbaa2c4 bf89a85c e1266c38 e3f8f820 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa310 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa3ac bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaa460 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbaa4c8 bf89a85c e1266c38 e3e4f430 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa514 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa5b0 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaa664 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbaa6cc bf89a85c e1266c38 e2ffa930 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa718 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa7b4 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaa868 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbaa8d0 bf89a85c e1266c38 e1d4ff78 00000000 win32k!NtGdiAlphaBlend+0x882
adbaa91c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaa9b8 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaaa6c bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbaaad4 bf89a85c e1266c38 e2d7cb60 00000000 win32k!NtGdiAlphaBlend+0x882
adbaab20 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaabbc bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaac70 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbaacd8 bf89a85c e1266c38 e34a0700 00000000 win32k!NtGdiAlphaBlend+0x882
adbaad24 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaadc0 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaae74 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbaaedc bf89a85c e1266c38 e19fffc0 00000000 win32k!NtGdiAlphaBlend+0x882
adbaaf28 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbaafc4 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbab078 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbab0e0 bf89a85c e1266c38 e3381be8 00000000 win32k!NtGdiAlphaBlend+0x882
adbab12c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab1c8 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbab27c bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbab2e4 bf89a85c e1266c38 e2516da8 00000000 win32k!NtGdiAlphaBlend+0x882
adbab330 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab3cc bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbab480 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbab4e8 bf89a85c e1266c38 e3ef9b38 00000000 win32k!NtGdiAlphaBlend+0x882
adbab534 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab5d0 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbab684 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbab6ec bf89a85c e1266c38 e3b62b08 00000000 win32k!NtGdiAlphaBlend+0x882
adbab738 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab7d4 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbab888 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbab8f0 bf89a85c e1266c38 e27ee3c0 00000000 win32k!NtGdiAlphaBlend+0x882
adbab93c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbab9d8 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbaba8c bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbabaf4 bf89a85c e1266c38 e1554778 00000000 win32k!NtGdiAlphaBlend+0x882
adbabb40 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbabbdc bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbabc90 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbabcf8 bf89a85c e1266c38 e3eb1b28 00000000 win32k!NtGdiAlphaBlend+0x882
adbabd44 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbabde0 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbabe94 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbabefc bf89a85c e1266c38 e2e79078 00000000 win32k!NtGdiAlphaBlend+0x882
adbabf48 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbabfe4 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbac098 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbac100 bf89a85c e1266c38 e1f75878 00000000 win32k!NtGdiAlphaBlend+0x882
adbac14c bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbac1e8 bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbac29c bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbac304 bf89a85c e1266c38 e1ce9e88 00000000 win32k!NtGdiAlphaBlend+0x882
adbac350 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e
adbac3ec bf89d521 00000000 00000314 00000000
win32k!xxxReceiveMessage+0x24e
adbac4a0 bf8c45de bca84be8 00000001 00000000
win32k!NtGdiFlushUserBatch+0x2e
adbac508 bf89a85c e1266c38 e3d07bb0 00000000 win32k!NtGdiAlphaBlend+0x882
adbac554 bf8c4bd6 00000200 00000000 00000000 win32k!InternalSetTimer+0x10e


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!NtUserPostThreadMessage+79
bf8980da ?? ???

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32k!NtUserPostThreadMessage+79

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 49e867f5

FAILURE_BUCKET_ID: 0x7f_8_win32k!NtUserPostThreadMessage+79

BUCKET_ID: 0x7f_8_win32k!NtUserPostThreadMessage+79

Followup: MachineOwner





Preguntas similares