*** Fatal System Error: 0x00000050
|
(0xA8E91000,0x00000001,0x9975D22E,0x00000000)
|
|
Driver at fault:
|
*** ATMFD.DLL - Address 9975D22E base at 99731000, DateStamp 00000000
|
.
|
Break instruction exception - code 80000003 (first chance)
|
|
A fatal system error has occurred.
|
Debugger entered on first try; Bugcheck callbacks have not been invoked.
|
|
A fatal system error has occurred.
|
|
Connected to Windows 8 9600 x86 compatible target at (Wed Nov 19 15:48:13.241 2014 (UTC + 1:00)), ptr64 FALSE
|
Loading Kernel Symbols
|
...............................................................
|
................................................................
|
.........................
|
Loading User Symbols
|
..............
|
Loading unloaded module list
|
........
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
Use !analyze -v to get detailed debugging information.
|
|
BugCheck 50, {a8e91000, 1, 9975d22e, 0}
|
|
Probably caused by : ATMFD.DLL ( ATMFD+2c22e )
|
|
Followup: MachineOwner
|
---------
|
|
nt!RtlpBreakWithStatusInstruction:
|
81b0eef4 cc int 3
|
0: kd> .reload
|
Connected to Windows 8 9600 x86 compatible target at (Wed Nov 19 16:01:53.366 2014 (UTC + 1:00)), ptr64 FALSE
|
Loading Kernel Symbols
|
...............................................................
|
................................................................
|
.........................
|
Loading User Symbols
|
..............
|
Loading unloaded module list
|
........
|
0: kd> !analyze -v
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
PAGE_FAULT_IN_NONPAGED_AREA (50)
|
Invalid system memory was referenced. This cannot be protected by try-except,
|
it must be protected by a Probe. Typically the address is just plain bad or it
|
is pointing at freed memory.
|
Arguments:
|
Arg1: a8e91000, memory referenced.
|
Arg2: 00000001, value 0 = read operation, 1 = write operation.
|
Arg3: 9975d22e, If non-zero, the instruction address which referenced the bad memory
|
address.
|
Arg4: 00000000, (reserved)
|
|
Debugging Details:
|
------------------
|
|
|
WRITE_ADDRESS: a8e91000 Paged session pool
|
|
FAULTING_IP:
|
ATMFD+2c22e
|
9975d22e 8901 mov dword ptr [ecx],eax
|
|
MM_INTERNAL_CODE: 0
|
|
IMAGE_NAME: ATMFD.DLL
|
|
DEBUG_FLR_IMAGE_TIMESTAMP: 52158fac
|
|
MODULE_NAME: ATMFD
|
|
FAULTING_MODULE: 99731000 ATMFD
|
|
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
|
|
BUGCHECK_STR: AV
|
|
PROCESS_NAME: csrss.exe
|
|
CURRENT_IRQL: 0
|
|
TRAP_FRAME: 89b37e4c -- (.trap 0xffffffff89b37e4c)
|
ErrCode = 00000002
|
eax=00000000 ebx=00000000 ecx=41414141 edx=a8e91000 esi=00000016 edi=89b380ac
|
eip=9975d22e esp=89b37ec0 ebp=89b385c4 iopl=0 nv up ei ng nz ac pe nc
|
cs=0008 ss=0010 ds=000c es=0023 fs=0030 gs=0023 efl=00010296
|
ATMFD+0x2c22e:
|
9975d22e 8901 mov dword ptr [ecx],eax ds:000c:4141=????????
|
Resetting default scope
|
|
LAST_CONTROL_TRANSFER: from 81b8fcbe to 81b0eef4
|
|
STACK_TEXT:
|
89b3785c 81b8fcbe 00000003 c5a5f0aa 00000065 nt!RtlpBreakWithStatusInstruction
|
89b378b0 81b8f7d8 81c1f138 89b37cac 89b37d20 nt!KiBugCheckDebugBreak+0x1f
|
89b37c80 81b0dab6 00000050 a8e91000 00000001 nt!KeBugCheck2+0x676
|
89b37ca4 81b0d9ed 00000050 a8e91000 00000001 nt!KiBugCheck2+0xc6
|
89b37cc4 81b2c70c 00000050 a8e91000 00000001 nt!KeBugCheckEx+0x19
|
89b37d20 81a56fa5 89b37e4c 000185ec 89b37d98 nt! ?? ::FNODOBFM::`string'+0x534a
|
89b37da8 81b21ff5 00000001 a8e91000 00000000 nt!MmAccessFault+0x735
|
89b37da8 9975d22e 00000001 a8e91000 00000000 nt!KiTrap0E+0xf1
|
WARNING: Stack unwind information not available. Following frames may be wrong.
|
89b385c4 9976137c 89b38818 89b3885c 89b3883c ATMFD+0x2c22e
|
89b386a4 9975064b 89b38818 89b3885c 89b3883c ATMFD+0x3037c
|
89b387b0 997506fe 89b3885c 00000000 89b3883c ATMFD+0x1f64b
|
89b387d4 99743e2e a8e95c70 99775268 89b38818 ATMFD+0x1f6fe
|
89b38944 99743b52 ffffffff 89b38ac0 a8e462e0 ATMFD+0x12e2e
|
89b38994 99734f11 ffffffff 89b38ac0 00000000 ATMFD+0x12b52
|
89b389e8 90f58f3a 90c7e010 a8e92768 00000001 ATMFD+0x3f11
|
89b38a44 90f5983d 90c7e010 a8e92768 00000001 win32k!PDEVOBJ::QueryFontData+0x5c
|
89b38a7c 90f596f1 a8e92768 00000042 89b38ac0 win32k!ulCallAndConvertFontOutput+0x2a
|
89b38b0c 90f59908 00000061 00000001 89b38c9c win32k!xInsertMetricsPlusRFONTOBJ+0x185
|
89b38b20 90eb4294 a8e958cc 00000061 00000000 win32k!RFONTOBJ::bInsertMetricsPlus+0x25
|
89b38b50 90eb3fe9 0000001a 00000104 a8e956f0 win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x149
|
89b38ba0 90f97259 89b38c80 89b38c9c 00000008 win32k!ESTROBJ::vCharPos_H3+0xa1
|
89b38c1c 90eb479b 90c41068 0000001a 89b38c80 win32k!ESTROBJ::vInit+0x889
|
89b38e50 90eb49e8 0000001a ffffffff 89b38e94 win32k!GreGetTextExtentExW+0x17d
|
89b38f2c 81b1eb27 0a010619 00c11d80 0000001a win32k!NtGdiGetTextExtentExW+0x16b
|
89b38f2c 77056ce4 0a010619 00c11d80 0000001a nt!KiSystemServicePostCall
|
00aeece8 00000000 00000000 00000000 00000000 ntdll!KiFastSystemCallRet
|
|
|
STACK_COMMAND: kb
|
|
FOLLOWUP_IP:
|
ATMFD+2c22e
|
9975d22e 8901 mov dword ptr [ecx],eax
|
|
SYMBOL_STACK_INDEX: 8
|
|
SYMBOL_NAME: ATMFD+2c22e
|
|
FOLLOWUP_NAME: MachineOwner
|
|
FAILURE_BUCKET_ID: AV_ATMFD+2c22e
|
|
BUCKET_ID: AV_ATMFD+2c22e
|
|
Followup: MachineOwner
|
---------
|
|
|