*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, a30cc82b, a82b3c68, 0}
Probably caused by : win32k.sys ( win32k!HMAllocObject+29 )
Followup: MachineOwner
---------
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: a30cc82b, The address that the exception occurred at
Arg3: a82b3c68, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!HMAllocObject+29
a30cc82b 8b80b8000000 mov eax,dword ptr [eax+0B8h]
TRAP_FRAME: a82b3c68 -- (.trap 0xffffffffa82b3c68)
ErrCode = 00000000
eax=0003afbe ebx=a30cc50e ecx=883ae300 edx=00000000 esi=00000024 edi=00000003
eip=a30cc82b esp=a82b3cdc ebp=a82b3cf4 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
win32k!HMAllocObject+0x29:
a30cc82b 8b80b8000000 mov eax,dword ptr [eax+0B8h] ds:0023:0003b076=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from a3095539 to a30cc82b
STACK_TEXT:
a82b3cf4 a3095539 0003afbe 00000000 00000003 win32k!HMAllocObject+0x29
a82b3d10 a30cc5aa 00000000 00000000 002abffc win32k!_CreateEmptyCursorObject+0x17
a82b3d24 82a4e3ea 00000000 00000026 002ac09c win32k!NtUserCallOneParam+0x2f
a82b3d24 772764f4 00000000 00000026 002ac09c nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
002ac09c 00000000 00000000 00000000 00000000 0x772764f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!HMAllocObject+29
a30cc82b 8b80b8000000 mov eax,dword ptr [eax+0B8h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!HMAllocObject+29
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4df2d4c9
FAILURE_BUCKET_ID: 0x8E_win32k!HMAllocObject+29
BUCKET_ID: 0x8E_win32k!HMAllocObject+29
Followup: MachineOwner
---------