*** Fatal System Error: 0x00000050 (0xFFADEFFC,0x00000001,0x94EB3D6A,0x00000000) Driver at fault: *** win32k.sys - Address 94EB3D6A base at 94E00000, DateStamp 54ee8ecd . Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows 7 7601 x86 compatible target at (Fri Mar 27 12:47:43.661 2015 (UTC + 1:00)), ptr64 FALSE Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols ................................................................ ................. Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {ffadeffc, 1, 94eb3d6a, 0} Probably caused by : win32k.sys ( win32k!CreateXlateObject+332 ) Followup: MachineOwner --------- Assertion: *** DPC watchdog timeout This is NOT a break in update time This is most likely a BUG in an ISR Perform a stack trace to find the culprit The period will be doubled on continuation Use gh to continue!! nt!KeAccumulateTicks+0x3c5: 82a7f38c cd2c int 2Ch 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffadeffc, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 94eb3d6a, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000000, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: ffadeffc Paged session pool FAULTING_IP: win32k!CreateXlateObject+332 94eb3d6a 8907 mov dword ptr [edi],eax MM_INTERNAL_CODE: 0 IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd MODULE_NAME: win32k FAULTING_MODULE: 94e00000 win32k DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: iexplore.exe CURRENT_IRQL: 1c TRAP_FRAME: 97c538dc -- (.trap 0xffffffff97c538dc) ErrCode = 00000002 eax=00476c61 ebx=ffbbd210 ecx=00470000 edx=00006c00 esi=ffadf0d8 edi=ffadeffc eip=94eb3d6a esp=97c53950 ebp=97c5396c iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282 win32k!CreateXlateObject+0x332: 94eb3d6a 8907 mov dword ptr [edi],eax ds:0023:ffadeffc=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82a7e853 to 82a7f38c STACK_TEXT: 97c53300 82a7e853 0002625a 00000000 000b9000 nt!KeAccumulateTicks+0x3c5 97c53340 82a7e700 82e310a8 4b6399de 00000000 nt!KeUpdateRunTime+0x145 97c53398 82a7df03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613 97c53398 82e310a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13 97c5341c 82e1fb8c 00001000 00000000 97c5347c hal!READ_PORT_USHORT+0x8 97c5342c 82e1fcf5 82ae2f92 85b77a31 00000065 hal!HalpCheckPowerButton+0x2e 97c53430 82ae2f92 85b77a31 00000065 00000000 hal!HaliHaltSystem+0x7 97c5347c 82ae3a39 00000003 00000000 0000af9e nt!KiBugCheckDebugBreak+0x73 97c53840 82a919ad 00000050 ffadeffc 00000001 nt!KeBugCheck2+0x68b 97c538c4 82a44a78 00000001 ffadeffc 00000000 nt!MmAccessFault+0x104 97c538c4 94eb3d6a 00000001 ffadeffc 00000000 nt!KiTrap0E+0xdc 97c5396c 94eb2329 00000000 00000000 fe8a70c8 win32k!CreateXlateObject+0x332 97c539a8 94ec0317 00000000 00000000 fe8a70c8 win32k!EXLATEOBJ::bInitXlateObj+0xdc 97c53bfc 82a41896 09010e20 00ffffff 00000000 win32k!NtGdiAlphaBlend+0x56d 97c53bfc 77c170f4 09010e20 00ffffff 00000000 nt!KiSystemServicePostCall 0026c1b8 7620847c 76208460 09010e20 00000102 ntdll!KiFastSystemCallRet 0026c1bc 76208460 09010e20 00000102 00000003 GDI32!NtGdiAlphaBlend+0xc 0026c204 74b01694 09010e20 00000102 00000003 GDI32!GdiAlphaBlend+0xf0 0026c3c0 74b6c703 0010cb68 0026c3dc 0026cb84 comctl32!CImageList::Draw+0xf30 0026c428 6a342c38 0010cb68 00000000 09010e20 comctl32!ImageList_Draw+0x7c 0026c450 6a342e5f 0010cb68 00000000 09010e20 IEFRAME!ImageList_Draw+0x40 0026c49c 6a340dde 0026cb84 0026cb84 00000000 IEFRAME!CNavToolbarCombo::_PaintSearchGlyphButton+0xa4 0026c4b0 6a340934 0026cb84 00000000 0026c72c IEFRAME!CNavToolbarCombo::OnPaintItem+0x4e 0026c674 6a33fe77 0000004e 00000000 0026cb84 IEFRAME!CAddressBand::_OnNotify+0xe8 0026c6b0 7660c4e7 0003034c 0000004e 00000000 IEFRAME!CAddressBand::_AddressBandWndProc+0xdf 0026c6dc 7660c5e7 6a33fd70 0003034c 0000004e user32!InternalCallWinProc+0x23 0026c754 76601b31 000819dc 6a33fd70 0003034c user32!UserCallWinProcCheckWow+0x14b 0026c784 76601b57 6a33fd70 0003034c 0000004e user32!CallWindowProcAorW+0x99 0026c7a4 74aff443 6a33fd70 0003034c 0000004e user32!CallWindowProcW+0x1b 0026c7c0 74aff5ee 0003034c 0000004e 00000000 comctl32!CallOriginalWndProc+0x1a 0026c824 74aff5a2 00106948 0003034c 0000004e comctl32!CallNextSubclassProc+0x3d 0026c848 6a351c70 0003034c 0000004e 00000000 comctl32!DefSubclassProc+0x46 0026c86c 74aff5ee 0003034c 0000004e 00000000 IEFRAME!CIMEHandler::s_WndProc+0x60 0026c8d0 74aff490 00106948 0003034c 0000004e comctl32!CallNextSubclassProc+0x3d 0026c930 7660c4e7 0003034c 0000004e 00000000 comctl32!MasterSubclassProc+0x54 0026c95c 7660c5e7 74aff44c 0003034c 0000004e user32!InternalCallWinProc+0x23 0026c9d4 76605294 000819dc 74aff44c 0003034c user32!UserCallWinProcCheckWow+0x14b 0026ca14 76605582 000dbba8 010dbb10 00000000 user32!SendMessageWorker+0x4d0 0026ca34 74afc05c 0003034c 0000004e 00000000 user32!SendMessageW+0x7c 0026cad0 74af5eba 0010c770 fffffff4 0026cb84 comctl32!CCSendNotify+0xc19 0026cae4 74ae2d74 0010c770 00010001 0026cb84 comctl32!CICustomDrawNotify+0x2c 0026cc30 74ae296f 09010e20 00000102 00000000 comctl32!CToolbar::DrawButton+0x145 0026cc94 74ae2720 09010e20 0026cd30 0026cd6c comctl32!CToolbar::DrawToolbarH+0x1ae 0026cd44 74ae261d 09010e20 0026ce0c 0026cd6c comctl32!CToolbar::TBPaintImpl+0xd5 0026cda8 74ae24cd 1a010ed8 0026ce0c 00000000 comctl32!CToolbar::TBPaint+0x18c 0026ce48 74af1618 00030344 0000000f 00000000 comctl32!CToolbar::ToolbarWndProc+0xd34 0026ce68 7660c4e7 00030344 0000000f 00000000 comctl32!CToolbar::s_ToolbarWndProc+0x9d 0026ce94 7660c5e7 74af15dd 00030344 0000000f user32!InternalCallWinProc+0x23 0026cf0c 76601b31 000819dc 74af15dd 00030344 user32!UserCallWinProcCheckWow+0x14b 0026cf3c 76601b57 74af15dd 00030344 0000000f user32!CallWindowProcAorW+0x99 0026cf5c 74aff443 74af15dd 00030344 0000000f user32!CallWindowProcW+0x1b 0026cf78 74aff5ee 00030344 0000000f 00000000 comctl32!CallOriginalWndProc+0x1a 0026cfdc 74aff5a2 00106858 00030344 0000000f comctl32!CallNextSubclassProc+0x3d 0026d000 6a35605a 00030344 0000000f 00000000 comctl32!DefSubclassProc+0x46 0026d03c 74aff5ee 00030344 0000000f 00000000 IEFRAME!CAddressBand::s_TBWndProc+0x6a 0026d0a0 74aff490 00106858 00030344 0000000f comctl32!CallNextSubclassProc+0x3d 0026d100 7660c4e7 00030344 0000000f 00000000 comctl32!MasterSubclassProc+0x54 0026d12c 7660c5e7 74aff44c 00030344 0000000f user32!InternalCallWinProc+0x23 0026d1a4 76604f0e 000819dc 74aff44c 00030344 user32!UserCallWinProcCheckWow+0x14b 0026d200 76604f7d 010dbcb8 0000000f 00000000 user32!DispatchClientMessage+0xda 0026d228 77c1702e 0026d240 00000018 0026d28c user32!__fnDWORD+0x24 0026d254 76605d0c 76605d33 0026d2c4 14a27fcf ntdll!KiUserCallbackDispatcher+0x2e 0026d258 76605d33 0026d2c4 14a27fcf 00000000 user32!NtUserDispatchMessage+0xc 0026d29c 7660cc70 74aff44c 00000000 0026d300 user32!DispatchMessageWorker+0x3d5 0026d2ac 6a3fa68f 0026d2c4 00000000 000d0b80 user32!DispatchMessageW+0xf 0026d300 6a4633b7 000a7738 00000001 00061d00 IEFRAME!CBrowserFrame::FrameMessagePump+0x13b 0026e3e8 6a46398b 00000001 00000000 00061db8 IEFRAME!BrowserThreadProc+0x24e 0026e404 6a4638df 00061db8 00000000 00061db8 IEFRAME!BrowserNewThreadProc+0x8b 0026f47c 6a463713 00061db8 0026f6c0 00000000 IEFRAME!SHOpenFolderWindow+0xcf 0026f6ac 6a463573 0007f610 00000001 00000000 IEFRAME!IEWinMain+0x18b 0026f6e8 6a3843ed 00000001 00000000 0026f9a0 IEFRAME!LCIEStartAsFrame+0x4c0 0026f6f8 00fc15c6 0007f610 00000001 00000001 IEFRAME!DesktopFrameProcess+0x1d 0026f9a0 00fc1491 00fc0000 00000000 00061b22 iexplore!wWinMain+0x501 0026fa34 779eee1c 7ffd8000 0026fa80 77c337eb iexplore!_imp_load__WaitForInputIdle+0x26c 0026fa40 77c337eb 7ffd8000 7758e029 00000000 kernel32!BaseThreadInitThunk+0xe STACK_COMMAND: kb FOLLOWUP_IP: win32k!CreateXlateObject+332 94eb3d6a 8907 mov dword ptr [edi],eax SYMBOL_STACK_INDEX: b SYMBOL_NAME: win32k!CreateXlateObject+332 FOLLOWUP_NAME: MachineOwner FAILURE_BUCKET_ID: 0x50_win32k!CreateXlateObject+332 BUCKET_ID: 0x50_win32k!CreateXlateObject+332 Followup: MachineOwner ---------