Te irq not equal.... są najsmutniejsze do analizy, bo mogą być spowodowane i wadliwym driverem i konfliktem driverów i uszkodzeniem sprzętu. HGW. Zgłaszany jest błąd drivera dla procesu rmma.exe
Kod:
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8054c0b9, The address that the exception occurred at
Arg3: f76a5f58, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo
FAULTING_IP:
nt!ExDeferredFreePool+fd
8054c0b9 8913 mov dword ptr [ebx],edx
TRAP_FRAME: f76a5f58 -- (.trap 0xfffffffff76a5f58)
ErrCode = 00000002
eax=e172a3b0 ebx=00000500 ecx=e172a3f0 edx=00b1fbe8 esi=89c27050 edi=000001ff
eip=8054c0b9 esp=f76a5fcc ebp=f76a600c iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!ExDeferredFreePool+0xfd:
8054c0b9 8913 mov dword ptr [ebx],edx ds:0023:00000500=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: rmma.exe
LAST_CONTROL_TRANSFER: from 8054c09e to 8054c0b9
STACK_TEXT:
f76a600c 8054c09e e1306008 e130c084 00000000 nt!ExDeferredFreePool+0xfd
f76a604c bf802a7d e130c008 00000000 f76a6068 nt!ExFreePoolWithTag+0x489
f76a605c bf805891 e130c008 f76a6088 bf8054d6 win32k!HeavyFreePool+0xbb
f76a6068 bf8054d6 e130c008 00000005 f76a62e4 win32k!FreeObject+0x25
f76a6088 bf870573 00000000 00000000 00000000 win32k!SURFMEM::~SURFMEM+0x62
f76a6730 bf8ba5d7 e1325850 f76a686c e1300500 win32k!EngTextOut+0x8cc
f76a677c bf8ba76a bf870200 f76a6800 e1325850 win32k!OffTextOut+0x71
f76a6810 bf811b14 e1325850 f76a686c e1300500 win32k!SpTextOut+0x9d
f76a6a98 bf81300e f76a6d38 e12594dc e1259538 win32k!GreExtTextOutWLocked+0xfbf
f76a6c00 bf80c411 f76a6d38 7ffde410 0000006c win32k!GreBatchTextOut+0x344
f76a6d54 804de7be 00000092 0012effc 0012f560 win32k!NtGdiFlushUserBatch+0x11b
f76a6ddc 804f88ea a91dc928 86949ad8 00000000 nt!KiFastCallEntry+0xca
f76a6de0 a91dc928 86949ad8 00000000 00201373 nt!KiThreadStartup+0x16
WARNING: Stack unwind information not available. Following frames may be wrong.
f76a6de4 86949ad8 00000000 00201373 00120000 amon+0x1928
f76a6de8 00000000 00201373 00120000 00000000 0x86949ad8
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+fd
8054c0b9 8913 mov dword ptr [ebx],edx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+fd
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: 0x8E_nt!ExDeferredFreePool+fd
BUCKET_ID: 0x8E_nt!ExDeferredFreePool+fd
Followup: Pool_corruption
---------