*** Fatal System Error: 0x00000050
|
(0xFFADEFFC,0x00000001,0x94EB3D6A,0x00000000)
|
|
Driver at fault:
|
*** win32k.sys - Address 94EB3D6A base at 94E00000, DateStamp 54ee8ecd
|
.
|
Break instruction exception - code 80000003 (first chance)
|
|
A fatal system error has occurred.
|
Debugger entered on first try; Bugcheck callbacks have not been invoked.
|
|
A fatal system error has occurred.
|
|
Connected to Windows 7 7601 x86 compatible target at (Fri Mar 27 12:47:43.661 2015 (UTC + 1:00)), ptr64 FALSE
|
Loading Kernel Symbols
|
...............................................................
|
................................................................
|
.........................
|
Loading User Symbols
|
................................................................
|
.................
|
Loading unloaded module list
|
......
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
Use !analyze -v to get detailed debugging information.
|
|
BugCheck 50, {ffadeffc, 1, 94eb3d6a, 0}
|
|
Probably caused by : win32k.sys ( win32k!CreateXlateObject+332 )
|
|
Followup: MachineOwner
|
---------
|
|
Assertion: *** DPC watchdog timeout
|
This is NOT a break in update time
|
This is most likely a BUG in an ISR
|
Perform a stack trace to find the culprit
|
The period will be doubled on continuation
|
Use gh to continue!!
|
|
nt!KeAccumulateTicks+0x3c5:
|
82a7f38c cd2c int 2Ch
|
0: kd> !analyze -v
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
PAGE_FAULT_IN_NONPAGED_AREA (50)
|
Invalid system memory was referenced. This cannot be protected by try-except,
|
it must be protected by a Probe. Typically the address is just plain bad or it
|
is pointing at freed memory.
|
Arguments:
|
Arg1: ffadeffc, memory referenced.
|
Arg2: 00000001, value 0 = read operation, 1 = write operation.
|
Arg3: 94eb3d6a, If non-zero, the instruction address which referenced the bad memory
|
address.
|
Arg4: 00000000, (reserved)
|
|
Debugging Details:
|
------------------
|
|
|
WRITE_ADDRESS: ffadeffc Paged session pool
|
|
FAULTING_IP:
|
win32k!CreateXlateObject+332
|
94eb3d6a 8907 mov dword ptr [edi],eax
|
|
MM_INTERNAL_CODE: 0
|
|
IMAGE_NAME: win32k.sys
|
|
DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd
|
|
MODULE_NAME: win32k
|
|
FAULTING_MODULE: 94e00000 win32k
|
|
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
|
|
BUGCHECK_STR: 0x50
|
|
PROCESS_NAME: iexplore.exe
|
|
CURRENT_IRQL: 1c
|
|
TRAP_FRAME: 97c538dc -- (.trap 0xffffffff97c538dc)
|
ErrCode = 00000002
|
eax=00476c61 ebx=ffbbd210 ecx=00470000 edx=00006c00 esi=ffadf0d8 edi=ffadeffc
|
eip=94eb3d6a esp=97c53950 ebp=97c5396c iopl=0 nv up ei ng nz na po nc
|
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
|
win32k!CreateXlateObject+0x332:
|
94eb3d6a 8907 mov dword ptr [edi],eax ds:0023:ffadeffc=????????
|
Resetting default scope
|
|
LAST_CONTROL_TRANSFER: from 82a7e853 to 82a7f38c
|
|
STACK_TEXT:
|
97c53300 82a7e853 0002625a 00000000 000b9000 nt!KeAccumulateTicks+0x3c5
|
97c53340 82a7e700 82e310a8 4b6399de 00000000 nt!KeUpdateRunTime+0x145
|
97c53398 82a7df03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613
|
97c53398 82e310a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
|
97c5341c 82e1fb8c 00001000 00000000 97c5347c hal!READ_PORT_USHORT+0x8
|
97c5342c 82e1fcf5 82ae2f92 85b77a31 00000065 hal!HalpCheckPowerButton+0x2e
|
97c53430 82ae2f92 85b77a31 00000065 00000000 hal!HaliHaltSystem+0x7
|
97c5347c 82ae3a39 00000003 00000000 0000af9e nt!KiBugCheckDebugBreak+0x73
|
97c53840 82a919ad 00000050 ffadeffc 00000001 nt!KeBugCheck2+0x68b
|
97c538c4 82a44a78 00000001 ffadeffc 00000000 nt!MmAccessFault+0x104
|
97c538c4 94eb3d6a 00000001 ffadeffc 00000000 nt!KiTrap0E+0xdc
|
97c5396c 94eb2329 00000000 00000000 fe8a70c8 win32k!CreateXlateObject+0x332
|
97c539a8 94ec0317 00000000 00000000 fe8a70c8 win32k!EXLATEOBJ::bInitXlateObj+0xdc
|
97c53bfc 82a41896 09010e20 00ffffff 00000000 win32k!NtGdiAlphaBlend+0x56d
|
97c53bfc 77c170f4 09010e20 00ffffff 00000000 nt!KiSystemServicePostCall
|
0026c1b8 7620847c 76208460 09010e20 00000102 ntdll!KiFastSystemCallRet
|
0026c1bc 76208460 09010e20 00000102 00000003 GDI32!NtGdiAlphaBlend+0xc
|
0026c204 74b01694 09010e20 00000102 00000003 GDI32!GdiAlphaBlend+0xf0
|
0026c3c0 74b6c703 0010cb68 0026c3dc 0026cb84 comctl32!CImageList::Draw+0xf30
|
0026c428 6a342c38 0010cb68 00000000 09010e20 comctl32!ImageList_Draw+0x7c
|
0026c450 6a342e5f 0010cb68 00000000 09010e20 IEFRAME!ImageList_Draw+0x40
|
0026c49c 6a340dde 0026cb84 0026cb84 00000000 IEFRAME!CNavToolbarCombo::_PaintSearchGlyphButton+0xa4
|
0026c4b0 6a340934 0026cb84 00000000 0026c72c IEFRAME!CNavToolbarCombo::OnPaintItem+0x4e
|
0026c674 6a33fe77 0000004e 00000000 0026cb84 IEFRAME!CAddressBand::_OnNotify+0xe8
|
0026c6b0 7660c4e7 0003034c 0000004e 00000000 IEFRAME!CAddressBand::_AddressBandWndProc+0xdf
|
0026c6dc 7660c5e7 6a33fd70 0003034c 0000004e user32!InternalCallWinProc+0x23
|
0026c754 76601b31 000819dc 6a33fd70 0003034c user32!UserCallWinProcCheckWow+0x14b
|
0026c784 76601b57 6a33fd70 0003034c 0000004e user32!CallWindowProcAorW+0x99
|
0026c7a4 74aff443 6a33fd70 0003034c 0000004e user32!CallWindowProcW+0x1b
|
0026c7c0 74aff5ee 0003034c 0000004e 00000000 comctl32!CallOriginalWndProc+0x1a
|
0026c824 74aff5a2 00106948 0003034c 0000004e comctl32!CallNextSubclassProc+0x3d
|
0026c848 6a351c70 0003034c 0000004e 00000000 comctl32!DefSubclassProc+0x46
|
0026c86c 74aff5ee 0003034c 0000004e 00000000 IEFRAME!CIMEHandler::s_WndProc+0x60
|
0026c8d0 74aff490 00106948 0003034c 0000004e comctl32!CallNextSubclassProc+0x3d
|
0026c930 7660c4e7 0003034c 0000004e 00000000 comctl32!MasterSubclassProc+0x54
|
0026c95c 7660c5e7 74aff44c 0003034c 0000004e user32!InternalCallWinProc+0x23
|
0026c9d4 76605294 000819dc 74aff44c 0003034c user32!UserCallWinProcCheckWow+0x14b
|
0026ca14 76605582 000dbba8 010dbb10 00000000 user32!SendMessageWorker+0x4d0
|
0026ca34 74afc05c 0003034c 0000004e 00000000 user32!SendMessageW+0x7c
|
0026cad0 74af5eba 0010c770 fffffff4 0026cb84 comctl32!CCSendNotify+0xc19
|
0026cae4 74ae2d74 0010c770 00010001 0026cb84 comctl32!CICustomDrawNotify+0x2c
|
0026cc30 74ae296f 09010e20 00000102 00000000 comctl32!CToolbar::DrawButton+0x145
|
0026cc94 74ae2720 09010e20 0026cd30 0026cd6c comctl32!CToolbar::DrawToolbarH+0x1ae
|
0026cd44 74ae261d 09010e20 0026ce0c 0026cd6c comctl32!CToolbar::TBPaintImpl+0xd5
|
0026cda8 74ae24cd 1a010ed8 0026ce0c 00000000 comctl32!CToolbar::TBPaint+0x18c
|
0026ce48 74af1618 00030344 0000000f 00000000 comctl32!CToolbar::ToolbarWndProc+0xd34
|
0026ce68 7660c4e7 00030344 0000000f 00000000 comctl32!CToolbar::s_ToolbarWndProc+0x9d
|
0026ce94 7660c5e7 74af15dd 00030344 0000000f user32!InternalCallWinProc+0x23
|
0026cf0c 76601b31 000819dc 74af15dd 00030344 user32!UserCallWinProcCheckWow+0x14b
|
0026cf3c 76601b57 74af15dd 00030344 0000000f user32!CallWindowProcAorW+0x99
|
0026cf5c 74aff443 74af15dd 00030344 0000000f user32!CallWindowProcW+0x1b
|
0026cf78 74aff5ee 00030344 0000000f 00000000 comctl32!CallOriginalWndProc+0x1a
|
0026cfdc 74aff5a2 00106858 00030344 0000000f comctl32!CallNextSubclassProc+0x3d
|
0026d000 6a35605a 00030344 0000000f 00000000 comctl32!DefSubclassProc+0x46
|
0026d03c 74aff5ee 00030344 0000000f 00000000 IEFRAME!CAddressBand::s_TBWndProc+0x6a
|
0026d0a0 74aff490 00106858 00030344 0000000f comctl32!CallNextSubclassProc+0x3d
|
0026d100 7660c4e7 00030344 0000000f 00000000 comctl32!MasterSubclassProc+0x54
|
0026d12c 7660c5e7 74aff44c 00030344 0000000f user32!InternalCallWinProc+0x23
|
0026d1a4 76604f0e 000819dc 74aff44c 00030344 user32!UserCallWinProcCheckWow+0x14b
|
0026d200 76604f7d 010dbcb8 0000000f 00000000 user32!DispatchClientMessage+0xda
|
0026d228 77c1702e 0026d240 00000018 0026d28c user32!__fnDWORD+0x24
|
0026d254 76605d0c 76605d33 0026d2c4 14a27fcf ntdll!KiUserCallbackDispatcher+0x2e
|
0026d258 76605d33 0026d2c4 14a27fcf 00000000 user32!NtUserDispatchMessage+0xc
|
0026d29c 7660cc70 74aff44c 00000000 0026d300 user32!DispatchMessageWorker+0x3d5
|
0026d2ac 6a3fa68f 0026d2c4 00000000 000d0b80 user32!DispatchMessageW+0xf
|
0026d300 6a4633b7 000a7738 00000001 00061d00 IEFRAME!CBrowserFrame::FrameMessagePump+0x13b
|
0026e3e8 6a46398b 00000001 00000000 00061db8 IEFRAME!BrowserThreadProc+0x24e
|
0026e404 6a4638df 00061db8 00000000 00061db8 IEFRAME!BrowserNewThreadProc+0x8b
|
0026f47c 6a463713 00061db8 0026f6c0 00000000 IEFRAME!SHOpenFolderWindow+0xcf
|
0026f6ac 6a463573 0007f610 00000001 00000000 IEFRAME!IEWinMain+0x18b
|
0026f6e8 6a3843ed 00000001 00000000 0026f9a0 IEFRAME!LCIEStartAsFrame+0x4c0
|
0026f6f8 00fc15c6 0007f610 00000001 00000001 IEFRAME!DesktopFrameProcess+0x1d
|
0026f9a0 00fc1491 00fc0000 00000000 00061b22 iexplore!wWinMain+0x501
|
0026fa34 779eee1c 7ffd8000 0026fa80 77c337eb iexplore!_imp_load__WaitForInputIdle+0x26c
|
0026fa40 77c337eb 7ffd8000 7758e029 00000000 kernel32!BaseThreadInitThunk+0xe
|
|
|
STACK_COMMAND: kb
|
|
FOLLOWUP_IP:
|
win32k!CreateXlateObject+332
|
94eb3d6a 8907 mov dword ptr [edi],eax
|
|
SYMBOL_STACK_INDEX: b
|
|
SYMBOL_NAME: win32k!CreateXlateObject+332
|
|
FOLLOWUP_NAME: MachineOwner
|
|
FAILURE_BUCKET_ID: 0x50_win32k!CreateXlateObject+332
|
|
BUCKET_ID: 0x50_win32k!CreateXlateObject+332
|
|
Followup: MachineOwner
|
---------
|