suvaldykit
Member
- Oct 13, 2012
- 7
Hi Everyone,
Recently our Server started to crash. I have managed to get DMP file analized, but now i am not sure what is actually causing it to crash, can anyone help me with this DMP file, i need to find out is this specialized software we use "TP Shell" is causing crashes or this file win32k.sys is causing problems. If this win32k.sys file crashes, i please for help what is this file about? And possible fix senarios. Thank you. I cant really restore server to earlier point of time it will cause all production a hassle.
Here is my dmp file:
Looking forward to your comments, if we agree that its Tp Shell software fault, i will handle problem to vendor of this software, but i need to be sure, if its not, i will have to contact MS support, but i rather not.
Help is very much appreciated.
Recently our Server started to crash. I have managed to get DMP file analized, but now i am not sure what is actually causing it to crash, can anyone help me with this DMP file, i need to find out is this specialized software we use "TP Shell" is causing crashes or this file win32k.sys is causing problems. If this win32k.sys file crashes, i please for help what is this file about? And possible fix senarios. Thank you. I cant really restore server to earlier point of time it will cause all production a hassle.
Here is my dmp file:
Code:
[COLOR=#000000][FONT=verdana]Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Copyright (c) Microsoft Corporation. All rights reserved.[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Loading Dump File [C:\Windows\MEMORY.DMP][/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Kernel Summary Dump File: Only kernel address space is available[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Symbol search path is: SRV*f:\symbols*[/FONT][/COLOR][URL]http://msdl.microsoft.com/download/symbols[/URL]
[COLOR=#000000][FONT=verdana]Executable search path is: [/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Windows 7 Kernel Version 7601 (Service Pack 1) MP (16 procs) Free x64[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Product: LanManNt, suite: TerminalServer[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Machine Name:[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Kernel base = 0xfffff800`01856000 PsLoadedModuleList = 0xfffff800`01a9a670[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Debug session time: Sun Oct 7 07:22:32.513 2012 (UTC + 3:00)[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]System Uptime: 2 days 9:56:46.865[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Loading Kernel Symbols[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]...............................................................[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]................................................................[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana].................................[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Loading User Symbols[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]PEB is paged out (Peb.Ldr = 000007ff`fffdd018). Type ".hh dbgerr001" for details[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Loading unloaded module list[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]..........[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]*******************************************************************************[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]* *[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]* Bugcheck Analysis *[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]* *[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]*******************************************************************************[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Use !analyze -v to get detailed debugging information.[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]BugCheck 3B, {c0000005, fffff960000bd010, fffff8800e684c10, 0}[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Page 1632 not present in the dump file. Type ".hh dbgerr004" for details[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Probably caused by : win32k.sys ( win32k!xxxProcessEventMessage+1c0 )[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Followup: MachineOwner[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]---------[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]12: kd> !analyze -v[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]*******************************************************************************[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]* *[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]* Bugcheck Analysis *[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]* *[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]*******************************************************************************[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]SYSTEM_SERVICE_EXCEPTION (3b)[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]An exception happened while executing a system service routine.[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Arguments:[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Arg1: 00000000c0000005, Exception code that caused the bugcheck[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Arg2: fffff960000bd010, Address of the instruction which caused the bugcheck[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Arg3: fffff8800e684c10, Address of the context record for the exception that caused the bugcheck[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Arg4: 0000000000000000, zero.[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Debugging Details:[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]------------------[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]FAULTING_IP: [/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]win32k!xxxProcessEventMessage+1c0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff960`000bd010 017308 add dword ptr [rbx+8],esi[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]CONTEXT: fffff8800e684c10 -- (.cxr 0xfffff8800e684c10)[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]rax=fffff8800e685640 rbx=0000000000000000 rcx=fffff8800e685598[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]rdx=fffff900c0a0c010 rsi=0000000000000001 rdi=0000000000000000[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]rip=fffff960000bd010 rsp=fffff8800e6855f0 rbp=fffff8800e685790[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]r8=0000000000000000 r9=0000000000000000 r10=0000000000000000[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]r11=fffff8800e685510 r12=fffff900c2059c20 r13=fffff8800e685b68[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]r14=fffff900c2059c20 r15=0000000000000001[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]iopl=0 nv up ei ng nz na pe nc[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]win32k!xxxProcessEventMessage+0x1c0:[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff960`000bd010 017308 add dword ptr [rbx+8],esi ds:002b:00000000`00000008=????????[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Resetting default scope[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]BUGCHECK_STR: 0x3B[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]PROCESS_NAME: TP.Shell.XAF.W[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]CURRENT_IRQL: 0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]LAST_CONTROL_TRANSFER: from fffff960000d0b6d to fffff960000bd010[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]STACK_TEXT: [/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff880`0e6855f0 fffff960`000d0b6d : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000018 : win32k!xxxProcessEventMessage+0x1c0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff880`0e6856c0 fffff960`0010b747 : fffff900`c2059c20 fffff880`0e685b68 fffff900`c0a066e0 00000000`00000400 : win32k!xxxScanSysQueue+0x575[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff880`0e685a00 fffff960`0010bbd5 : 00000000`00000400 fffff800`000020c8 00000000`00000400 fffffa80`00007fff : win32k!xxxRealInternalGetMessage+0x453[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff880`0e685ae0 fffff960`00104627 : 00000000`00000000 00000000`00000000 fffff900`c0a09c30 fffff900`c01194a0 : win32k!xxxInternalGetMessage+0x35[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff880`0e685b20 fffff800`018d4453 : fffffa80`13d75b00 00000000`001dc6b8 fffff880`0e685bc8 00000000`00000000 : win32k!NtUserPeekMessage+0x77[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff880`0e685bb0 00000000`772f908a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]00000000`001dc698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772f908a[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]FOLLOWUP_IP: [/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]win32k!xxxProcessEventMessage+1c0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]fffff960`000bd010 017308 add dword ptr [rbx+8],esi[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]SYMBOL_STACK_INDEX: 0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]SYMBOL_NAME: win32k!xxxProcessEventMessage+1c0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]FOLLOWUP_NAME: MachineOwner[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]MODULE_NAME: win32k[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]IMAGE_NAME: win32k.sys[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]DEBUG_FLR_IMAGE_TIMESTAMP: 5006fd0d[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]STACK_COMMAND: .cxr 0xfffff8800e684c10 ; kb[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]FAILURE_BUCKET_ID: X64_0x3B_win32k!xxxProcessEventMessage+1c0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]BUCKET_ID: X64_0x3B_win32k!xxxProcessEventMessage+1c0[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]Followup: MachineOwner[/FONT][/COLOR]
[COLOR=#000000][FONT=verdana]---------[/FONT][/COLOR]
Looking forward to your comments, if we agree that its Tp Shell software fault, i will handle problem to vendor of this software, but i need to be sure, if its not, i will have to contact MS support, but i rather not.
Help is very much appreciated.
Last edited by a moderator: