*** Fatal System Error: 0x00000050 (0xFE400264,0x00000001,0x82A8C240,0x00000000) Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows 7 7601 x86 compatible target at (Tue Mar 31 15:10:44.409 2015 (UTC + 2:00)), ptr64 FALSE Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols ......................... Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fe400264, 1, 82a8c240, 0} Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 ) Followup: MachineOwner --------- Assertion: *** DPC watchdog timeout This is NOT a break in update time This is most likely a BUG in an ISR Perform a stack trace to find the culprit The period will be doubled on continuation Use gh to continue!! nt!KeAccumulateTicks+0x3c5: 82acd38c cd2c int 2Ch kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fe400264, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 82a8c240, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000000, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: fe400264 Paged session pool FAULTING_IP: nt!RtlFillMemoryUlong+10 82a8c240 f3ab rep stos dword ptr es:[edi] MM_INTERNAL_CODE: 0 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: notepad.exe CURRENT_IRQL: 1c TRAP_FRAME: 89fd3244 -- (.trap 0xffffffff89fd3244) ErrCode = 00000002 eax=00ffffff ebx=00000277 ecx=00000077 edx=000000bb esi=fe196154 edi=fe400264 eip=82a8c240 esp=89fd32b8 ebp=89fd32ec iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 nt!RtlFillMemoryUlong+0x10: 82a8c240 f3ab rep stos dword ptr es:[edi] Resetting default scope LAST_CONTROL_TRANSFER: from 82acc853 to 82acd38c STACK_TEXT: 89fd2c68 82acc853 0002625a 00000000 00003d00 nt!KeAccumulateTicks+0x3c5 89fd2ca8 82acc700 82a340a8 a9afaab8 00000000 nt!KeUpdateRunTime+0x145 89fd2d00 82acbf03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613 89fd2d00 82a340a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13 89fd2d84 82a22b8c 00001000 00000000 89fd2de4 hal!READ_PORT_USHORT+0x8 89fd2d94 82a22cf5 82b30f92 2fffb59a 00000065 hal!HalpCheckPowerButton+0x2e 89fd2d98 82b30f92 2fffb59a 00000065 00000000 hal!HaliHaltSystem+0x7 89fd2de4 82b31a39 00000003 00000000 00000000 nt!KiBugCheckDebugBreak+0x73 89fd31a8 82adf9ad 00000050 fe400264 00000001 nt!KeBugCheck2+0x68b 89fd322c 82a92a78 00000001 fe400264 00000000 nt!MmAccessFault+0x104 89fd322c 82a8c240 00000001 fe400264 00000000 nt!KiTrap0E+0xdc 89fd32b8 82629c5b fe400264 000001dc 00ffffff nt!RtlFillMemoryUlong+0x10 89fd32ec 82629b0c 89fd3320 00000001 fe0ff154 win32k!vSolidFillRect1+0x107 89fd348c 8260bd44 82629b54 89fd3650 89fd37e8 win32k!vDIBSolidBlt+0x1f5 89fd3500 827373f4 fe0ff010 00000000 00000000 win32k!EngBitBlt+0x258 89fd3610 8261bfb8 fe0ff010 00000000 00000000 win32k!PanBitBlt+0xf6 89fd3670 826181e0 827372fe 89fd3914 ffb83018 win32k!OffBitBlt+0x97 89fd3928 82630b37 ffb83018 00000000 00000000 win32k!SpBitBlt+0x46c 89fd398c 82630cbf fe08e648 89fd39f4 89fd39e4 win32k!GrePatBltLockedDC+0x22b 89fd3a38 825c1a4e 89fd3a68 0000f0f0 89fd3a98 win32k!GrePolyPatBltInternal+0x176 89fd3a74 825c1ac5 23010242 00f00021 89fd3a98 win32k!GrePolyPatBlt+0x45 89fd3aac 825a0637 23010242 89fd3af0 01100060 win32k!FillRect+0x58 89fd3ad0 825a0548 fea47658 fea47658 23010242 win32k!xxxPaintRect+0x72 89fd3b00 825a06e4 fea47658 fea47658 23010242 win32k!xxxFillWindow+0x39 89fd3b28 825ff86b fea47658 00000014 23010242 win32k!xxxDWP_EraseBkgnd+0x8f 89fd3ba4 8260d8dc fea47658 00000014 23010242 win32k!xxxRealDefWindowProc+0x33a 89fd3bbc 825d83af fea47658 00000014 23010242 win32k!xxxWrapRealDefWindowProc+0x2b 89fd3bd8 8260d798 fea47658 00000014 23010242 win32k!NtUserfnNCDESTROY+0x27 89fd3c10 82a8f896 000401ca 00000014 23010242 win32k!NtUserMessageCall+0xcf 89fd3c10 77c170f4 000401ca 00000014 23010242 nt!KiSystemServicePostCall 0016f604 76aa4f51 76aa517d 000401ca 00000014 ntdll!KiFastSystemCallRet 0016f608 76aa517d 000401ca 00000014 23010242 USER32!NtUserMessageCall+0xc 0016f68c 76aa5138 000401ca 00000014 23010242 USER32!RealDefWindowProcWorker+0x72 0016f6a8 74741e60 000401ca 00000014 23010242 USER32!RealDefWindowProcW+0x47 0016f704 74741f20 00000000 00000000 23010242 uxtheme!_ThemeDefWindowProc+0x197 0016f720 76aa5fc3 000401ca 00000014 23010242 uxtheme!ThemeDefWindowProcW+0x18 0016f768 00e21554 000401ca 00000014 23010242 USER32!DefWindowProcW+0x68 0016f788 76aac4e7 000401ca 00000014 23010242 notepad!NPWndProc+0x16d 0016f7b4 76aa5f9f 00e214de 000401ca 00000014 USER32!InternalCallWinProc+0x23 0016f82c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0 0016f888 76aa4f7d 00e97658 00000014 23010242 USER32!DispatchClientMessage+0xda 0016f8b0 77c1702e 0016f8c8 00000018 0016f9b8 USER32!__fnDWORD+0x24 0016f8dc 76aa4f51 76aa517d 000401ca 0000000f ntdll!KiUserCallbackDispatcher+0x2e 0016f8e0 76aa517d 000401ca 0000000f 00000000 USER32!NtUserMessageCall+0xc 0016f964 76aa5138 000401ca 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72 0016f980 76aa50d1 000401ca 0000000f 00000000 USER32!RealDefWindowProcW+0x47 0016f9c8 00e21554 000401ca 0000000f 00000000 USER32!DefWindowProcW+0x6f 0016f9e8 76aac4e7 000401ca 0000000f 00000000 notepad!NPWndProc+0x16d 0016fa14 76aa5f9f 00e214de 000401ca 0000000f USER32!InternalCallWinProc+0x23 0016fa8c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0 0016fae8 76aa4f7d 00e97658 0000000f 00000000 USER32!DispatchClientMessage+0xda 0016fb10 77c1702e 0016fb28 00000018 0016fb74 USER32!__fnDWORD+0x24 0016fb3c 76aa5d0c 76aa5d33 0016fbac 369bad71 ntdll!KiUserCallbackDispatcher+0x2e 0016fb40 76aa5d33 0016fbac 369bad71 76aacde8 USER32!NtUserDispatchMessage+0xc 0016fb84 76aacc70 00e214de 00000000 0016fbc8 USER32!DispatchMessageWorker+0x3d5 0016fb94 00e214d7 0016fbac 00000000 00e2c25c USER32!DispatchMessageW+0xf 0016fbc8 00e216ec 00e20000 00000000 001e3872 notepad!WinMain+0xdd 0016fc58 768aee1c 7ffdf000 0016fca4 77c337eb notepad!_initterm_e+0x1a1 0016fc64 77c337eb 7ffdf000 77dfe2df 00000000 kernel32!BaseThreadInitThunk+0xe 0016fca4 77c337be 00e23689 7ffdf000 00000000 ntdll!__RtlUserThreadStart+0x70 0016fcbc 00000000 00e23689 7ffdf000 00000000 ntdll!_RtlUserThreadStart+0x1b STACK_COMMAND: kb FOLLOWUP_IP: win32k!vSolidFillRect1+107 82629c5b 8b55f4 mov edx,dword ptr [ebp-0Ch] SYMBOL_STACK_INDEX: c SYMBOL_NAME: win32k!vSolidFillRect1+107 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd FAILURE_BUCKET_ID: 0x50_win32k!vSolidFillRect1+107 BUCKET_ID: 0x50_win32k!vSolidFillRect1+107 Followup: MachineOwner