BugCheck 50, {fffff900c0ba0564, 1, fffff960000fdd46, 0}
[U][B][COLOR=#ff0000]Could not read faulting driver name[/COLOR][/B][/U]
Probably caused by : win32k.sys ( win32k!fs__NewTransformation+52 )
Followup: MachineOwner
[COLOR=#ff0000][U][B]PAGE_FAULT_IN_NONPAGED_AREA (50)[/B][/U][/COLOR]
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c0ba0564, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff960000fdd46, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
[COLOR=#ff0000][U][B]Could not read faulting driver name[/B][/U][/COLOR]
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002913100
fffff900c0ba0564
FAULTING_IP:
win32k!fs__NewTransformation+52
fffff960`000fdd46 44894408fc mov dword ptr [rax+rcx-4],r8d
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005d293b0 -- (.trap 0xfffff88005d293b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000004f10 rbx=0000000000000000 rcx=fffff900c0b9b658
rdx=fffff900c0b9b0d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960000fdd46 rsp=fffff88005d29540 rbp=fffff900c0a16af0
r8=0000000073666e74 r9=0000000000000000 r10=0000000000000001
r11=fffff88005d29610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32k!fs__NewTransformation+0x52:
fffff960`000fdd46 44894408fc mov dword ptr [rax+rcx-4],r8d ds:fffff900`c0ba0564=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000268c9fc to fffff800026e0c40
STACK_TEXT:
fffff880`05d29248 fffff800`0268c9fc : 00000000`00000050 fffff900`c0ba0564 00000000`00000001 fffff880`05d293b0 : nt!KeBugCheckEx
fffff880`05d29250 fffff800`026ded6e : 00000000`00000001 fffff900`c0ba0564 fffff900`c20db200 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x4611f
fffff880`05d293b0 fffff960`000fdd46 : fffff900`c0a32ca0 fffff960`000cfd70 00000000`000001b8 fffff800`026ea82b : nt!KiPageFault+0x16e
fffff880`05d29540 fffff960`000fdc91 : 00000000`00000000 fffff900`c0b9b0d0 00000000`00000001 fffff900`c20c8f20 : win32k!fs__NewTransformation+0x52
fffff880`05d295f0 fffff960`000fd665 : fffff900`c0a16af0 00000000`00000001 00000000`00000000 fffff900`c0a32cb8 : win32k!bSetXform+0x599
fffff880`05d29670 fffff960`000fcfb0 : fffff900`c0a16af0 00000000`ffffffff 00000000`00000003 00000000`ffffffff : win32k!bGrabXform+0xa1
fffff880`05d296a0 fffff960`000fce2e : fffff8a0`037b8640 00000000`ffffffff fffff900`c0a32ca0 fffff900`c0a32ca0 : win32k!ttfdQueryFontData+0x120
fffff880`05d29700 fffff960`000d0c0e : fffff960`000fcdbc fffff900`c0a32ca0 00000000`00000003 00000000`00000002 : win32k!ttfdSemQueryFontData+0x72
fffff880`05d29760 fffff960`000ca46e : fffff880`05d29ad0 fffff900`c0b38614 00000000`00000000 fffff880`05d298b0 : win32k!PDEVOBJ::QueryFontData+0x82
fffff880`05d297f0 fffff960`000d0364 : fffff900`c0091000 fffff900`c20c8dc0 fffff900`c0b38614 00000000`00000000 : win32k!RFONTOBJ::bGetDEVICEMETRICS+0x6a
fffff880`05d29840 fffff960`00129cbc : fffff900`c0b38500 fffff880`05d29ad0 fffff880`05d299d0 fffff880`05d29b20 : win32k!RFONTOBJ::bRealizeFont+0x2fc
fffff880`05d29960 fffff960`000fb0e1 : 00000000`10018000 fffff900`00000000 000007fc`00000000 00000001`00000002 : win32k!RFONTOBJ::bInit+0x548
fffff880`05d29a80 fffff960`000fb077 : 00000000`00000000 fffff880`05d29ca0 00000000`70616d63 00000408`0a492800 : win32k!ulGetFontData2+0x31
fffff880`05d29af0 fffff960`000faf4d : 00000000`ffffffff 00000000`ffffffff 00000000`00000000 00000000`740daddc : win32k!ulGetFontData+0x7f
fffff880`05d29b40 fffff800`026dfed3 : ffffffff`b20107fc 00000000`00000000 00000000`0026e0c8 00000000`00000000 : win32k!NtGdiGetFontData+0x4d
fffff880`05d29bb0 00000000`74100b4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0026e0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74100b4a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!fs__NewTransformation+52
fffff960`000fdd46 44894408fc mov dword ptr [rax+rcx-4],r8d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!fs__NewTransformation+52
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ecdcd5a
FAILURE_BUCKET_ID: X64_0x50_win32k!fs__NewTransformation+52
BUCKET_ID: X64_0x50_win32k!fs__NewTransformation+52
Followup: MachineOwner