******************************************************************************* * * This is the string you add to your checkin description * Driver Verifier: Enabled for win32k.sys on Build 7601 Swoke0cxHt9I3y4CfWvmAH * ******************************************************************************* nt!DbgLoadImageSymbols+0x47: 82a2f578 cc int 3 kd> g *** Fatal System Error: 0x00000050 (0xDEADBEEF,0x00000008,0xDEADBEEF,0x00000002) Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows 7 7601 x86 compatible target at (Tue Mar 31 13:54:11.041 2015 (UTC + 2:00)), ptr64 FALSE Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols ................ Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {deadbeef, 8, deadbeef, 2} *** WARNING: Unable to verify checksum for a32.exe *** ERROR: Module load completed but symbols could not be loaded for a32.exe Probably caused by : win32k.sys ( win32k!OffCopyBits+7d ) Followup: MachineOwner --------- Assertion: *** DPC watchdog timeout This is NOT a break in update time This is most likely a BUG in an ISR Perform a stack trace to find the culprit The period will be doubled on continuation Use gh to continue!! nt!KeAccumulateTicks+0x3c5: 82a9238c cd2c int 2Ch kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: deadbeef, memory referenced. Arg2: 00000008, value 0 = read operation, 1 = write operation. Arg3: deadbeef, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ READ_ADDRESS: deadbeef FAULTING_IP: +0 deadbeef ?? ??? MM_INTERNAL_CODE: 2 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: a32.exe CURRENT_IRQL: 1c TRAP_FRAME: 9791b020 -- (.trap 0xffffffff9791b020) ErrCode = 00000010 eax=9791b0bc ebx=00000000 ecx=bebebfd9 edx=00000001 esi=ffffffa4 edi=fffffee5 eip=deadbeef esp=9791b094 ebp=9791b0d8 iopl=0 nv up ei ng nz ac po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010292 deadbeef ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from 82a91853 to 82a9238c FAILED_INSTRUCTION_ADDRESS: +0 deadbeef ?? ??? STACK_TEXT: 9791aa48 82a91853 0002625a 00000000 00004c00 nt!KeAccumulateTicks+0x3c5 9791aa88 82a91700 82e440a8 1a6bd1bc 00000000 nt!KeUpdateRunTime+0x145 9791aae0 82a90f03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613 9791aae0 82e440a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13 9791ab64 82e32b8c 00001000 00000000 9791abc4 hal!READ_PORT_USHORT+0x8 9791ab74 82e32cf5 82af5f92 32861bf1 00000065 hal!HalpCheckPowerButton+0x2e 9791ab78 82af5f92 32861bf1 00000065 00000000 hal!HaliHaltSystem+0x7 9791abc4 82af6a39 00000003 c06037a8 deadbeef nt!KiBugCheckDebugBreak+0x73 9791af88 82aa49ad 00000050 deadbeef 00000008 nt!KeBugCheck2+0x68b 9791b008 82a57a78 00000008 deadbeef 00000000 nt!MmAccessFault+0x104 9791b008 deadbeef 00000008 deadbeef 00000000 nt!KiTrap0E+0xdc WARNING: Frame IP not in any known module. Following frames may be wrong. 9791b090 825c7f27 fd8de010 001e0000 00000000 0xdeadbeef 9791b0d8 825e18a1 deadbeef 9791b168 fd8de010 win32k!OffCopyBits+0x7d 9791b184 825b76f0 fef78178 00000034 00000000 win32k!vSpRedrawArea+0x226 9791b240 825b820f 9791b4d4 9791b4b8 9791b4e0 win32k!ENUMUNDERLAYS::bEnum+0x20c 9791b4cc 82574d7e fef10db8 00000000 00000000 win32k!SpBitBlt+0x49b 9791b630 8263aebc 00000000 9791b7c8 00000008 win32k!BLTRECORD::bBitBlt+0x844 9791b750 8263ab69 9791b7c8 9791b7d4 fe5d6728 win32k!GreRectBlt+0x1ad 9791bbb0 8263a667 02010930 2228d244 7778db3e win32k!GreRectangle+0x4dc 9791bc18 82a54896 02010930 2228d244 7778db3e win32k!NtGdiRectangle+0x7c 9791bc18 773770f4 02010930 2228d244 7778db3e nt!KiSystemServicePostCall 0013fdcc 008f10c0 00000000 02010930 2228d244 ntdll!KiFastSystemCallRet 0013fdec 008f138d 02010930 2228d244 7778db3e a32+0x10c0 0013fe80 008f160d 00000001 0026ee48 00274ef0 a32+0x138d 0013fec8 774cee1c 7ffd9000 0013ff14 773937eb a32+0x160d 0013fed4 773937eb 7ffd9000 7757ddc1 00000000 kernel32!BaseThreadInitThunk+0xe 0013ff14 773937be 008f168a 7ffd9000 00000000 ntdll!__RtlUserThreadStart+0x70 0013ff2c 00000000 008f168a 7ffd9000 00000000 ntdll!_RtlUserThreadStart+0x1b STACK_COMMAND: kb FOLLOWUP_IP: win32k!OffCopyBits+7d 825c7f27 894514 mov dword ptr [ebp+14h],eax SYMBOL_STACK_INDEX: c SYMBOL_NAME: win32k!OffCopyBits+7d FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd FAILURE_BUCKET_ID: 0x50_VRF_BAD_IP_win32k!OffCopyBits+7d BUCKET_ID: 0x50_VRF_BAD_IP_win32k!OffCopyBits+7d Followup: MachineOwner ---------