Connected to Windows 7 7601 x86 compatible target at (Wed Apr 8 12:51:04.114 2015 (UTC + 2:00)), ptr64 FALSE Kernel Debugger connection established. Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols;srv*c:\symbols*http://chromium-browser-symsrv.commondatastorage.googleapis.comSRV*c:\symbols\*http://symbols.mozilla.org/firefox;srv*c:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com Executable search path is: Windows 7 Kernel Version 7601 MP (1 procs) Free x86 compatible Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526 Machine Name: Kernel base = 0x82a3f000 PsLoadedModuleList = 0x82b895b0 System Uptime: not available nt!DbgLoadImageSymbols+0x47: 82a57578 cc int 3 kd> g ******************************************************************************* * * This is the string you add to your checkin description * Driver Verifier: Enabled for win32k.sys on Build 7601 Swoke0cxHt9I3y4CfWvmAH * ******************************************************************************* nt!DbgLoadImageSymbols+0x47: 82a57578 cc int 3 kd> g *** Fatal System Error: 0x00000050 (0x80E7B7BC,0x00000001,0x82A79240,0x00000002) Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows 7 7601 x86 compatible target at (Wed Apr 8 13:07:03.186 2015 (UTC + 2:00)), ptr64 FALSE Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols ............... Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {80e7b7bc, 1, 82a79240, 2} *** WARNING: Unable to verify timestamp for a43.exe *** ERROR: Module load completed but symbols could not be loaded for a43.exe Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 ) Followup: MachineOwner --------- Assertion: *** DPC watchdog timeout This is NOT a break in update time This is most likely a BUG in an ISR Perform a stack trace to find the culprit The period will be doubled on continuation Use gh to continue!! nt!KeAccumulateTicks+0x3c5: 82aba38c cd2c int 2Ch kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: 80e7b7bc, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 82a79240, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000002, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: 80e7b7bc FAULTING_IP: nt!RtlFillMemoryUlong+10 82a79240 f3ab rep stos dword ptr es:[edi] MM_INTERNAL_CODE: 2 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: a43.exe CURRENT_IRQL: 1c TRAP_FRAME: 957275cc -- (.trap 0xffffffff957275cc) ErrCode = 00000002 eax=00ffffff ebx=00000001 ecx=00000069 edx=0000006a esi=80e7b7b8 edi=80e7b7bc eip=82a79240 esp=95727640 ebp=95727674 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 nt!RtlFillMemoryUlong+0x10: 82a79240 f3ab rep stos dword ptr es:[edi] Resetting default scope LAST_CONTROL_TRANSFER: from 82ab9853 to 82aba38c STACK_TEXT: 95726ff0 82ab9853 0002625a 00000000 0000f100 nt!KeAccumulateTicks+0x3c5 95727030 82ab9700 82a210a8 81aa1d2a 00000000 nt!KeUpdateRunTime+0x145 95727088 82ab8f03 95727002 95727002 000000d1 nt!KeUpdateSystemTime+0x613 95727088 82a210a8 95727002 95727002 000000d1 nt!KeUpdateSystemTimeAssist+0x13 9572710c 82a0fb8c 00001000 00000000 9572716c hal!READ_PORT_USHORT+0x8 9572711c 82a0fcf5 82b1df92 792fe921 00000065 hal!HalpCheckPowerButton+0x2e 95727120 82b1df92 792fe921 00000065 00000000 hal!HaliHaltSystem+0x7 9572716c 82b1ea39 00000003 c0602038 80e7b7bc nt!KiBugCheckDebugBreak+0x73 95727530 82acc9ad 00000050 80e7b7bc 00000001 nt!KeBugCheck2+0x68b 957275b4 82a7fa78 00000001 80e7b7bc 00000000 nt!MmAccessFault+0x104 957275b4 82a79240 00000001 80e7b7bc 00000000 nt!KiTrap0E+0xdc 95727640 824e9c5b 80e7b7bc 000001a4 00ffffff nt!RtlFillMemoryUlong+0x10 95727674 824e9a63 95727944 00000001 01440000 win32k!vSolidFillRect1+0x107 95727814 824cbd44 824e9b54 95727944 00000000 win32k!vDIBSolidBlt+0x14c 95727888 824f0b37 faea6db8 00000000 00000000 win32k!EngBitBlt+0x258 957278ec 824f0cbf fa5c2d68 95727954 95727944 win32k!GrePatBltLockedDC+0x22b 95727998 82481a4e 957279c8 0000f0f0 95727a10 win32k!GrePolyPatBltInternal+0x176 957279d4 82459f46 1a010869 00f00021 957279fc win32k!GrePolyPatBlt+0x45 95727a68 82462f0f 1a010869 95727ab4 00000002 win32k!DrawEdge+0x25b 95727ae4 82461a40 fca40030 1a010869 0000980c win32k!xxxDrawCaptionBar+0x1ea 95727b28 824bfc43 fca40030 1a010869 00000000 win32k!xxxDrawWindowFrame+0x143 95727ba4 824cd8dc fca40030 00000085 00000001 win32k!xxxRealDefWindowProc+0x712 95727bbc 824983af fca40030 00000085 00000001 win32k!xxxWrapRealDefWindowProc+0x2b 95727bd8 824cd798 fca40030 00000085 00000001 win32k!NtUserfnNCDESTROY+0x27 95727c10 82a7c896 000c00d4 00000085 00000001 win32k!NtUserMessageCall+0xcf 95727c10 777570f4 000c00d4 00000085 00000001 nt!KiSystemServicePostCall 0021f220 77864f51 7786517d 000c00d4 00000085 ntdll!KiFastSystemCallRet 0021f224 7786517d 000c00d4 00000085 00000001 USER32!NtUserMessageCall+0xc 0021f2a8 77865138 000c00d4 00000085 00000001 USER32!RealDefWindowProcWorker+0x72 0021f2c4 74281e60 000c00d4 00000085 00000001 USER32!RealDefWindowProcW+0x47 0021f320 74281f20 00000000 00000000 00000001 uxtheme!_ThemeDefWindowProc+0x197 0021f33c 77865fc3 000c00d4 00000085 00000001 uxtheme!ThemeDefWindowProcW+0x18 0021f384 77874ec7 000c00d4 00000085 00000001 USER32!DefWindowProcW+0x68 0021f3a8 7786c4e7 000c00d4 00000085 00000001 USER32!DDEMLServerWndProc+0x71 0021f3d4 77865f9f 77874e86 000c00d4 00000085 USER32!InternalCallWinProc+0x23 0021f44c 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0 0021f4a8 77864f7d 00610030 00000085 00000001 USER32!DispatchClientMessage+0xda 0021f4d0 7775702e 0021f4e8 00000018 0021f5d8 USER32!__fnDWORD+0x24 0021f4fc 77864f51 7786517d 000c00d4 0000000f ntdll!KiUserCallbackDispatcher+0x2e 0021f500 7786517d 000c00d4 0000000f 00000000 USER32!NtUserMessageCall+0xc 0021f584 77865138 000c00d4 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72 0021f5a0 778650d1 000c00d4 0000000f 00000000 USER32!RealDefWindowProcW+0x47 0021f5e8 77874ec7 000c00d4 0000000f 00000000 USER32!DefWindowProcW+0x6f 0021f60c 7786c4e7 000c00d4 0000000f 00000000 USER32!DDEMLServerWndProc+0x71 0021f638 77865f9f 77874e86 000c00d4 0000000f USER32!InternalCallWinProc+0x23 0021f6b0 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0 0021f70c 77864f7d 00610030 0000000f 00000000 USER32!DispatchClientMessage+0xda 0021f734 7775702e 0021f74c 00000018 0021f868 USER32!__fnDWORD+0x24 0021f760 77866445 7786647a 0021f7d4 00010010 ntdll!KiUserCallbackDispatcher+0x2e 0021f764 7786647a 0021f7d4 00010010 00000000 USER32!NtUserPeekMessage+0xc 0021f78c 77862b1b 0021f7d4 00010010 00000000 USER32!_PeekMessage+0x73 0021f7b8 013410f6 0021f7d4 00010010 00000000 USER32!PeekMessageA+0x12a WARNING: Stack unwind information not available. Following frames may be wrong. 0021f830 013412ff 00000002 003d1168 003d4f00 a43+0x10f6 0021f878 7634ee1c 7ffd8000 0021f8c4 777737eb a43+0x12ff 0021f884 777737eb 7ffd8000 7751e6e1 00000000 kernel32!BaseThreadInitThunk+0xe 0021f8c4 777737be 0134137c 7ffd8000 00000000 ntdll!__RtlUserThreadStart+0x70 0021f8dc 00000000 0134137c 7ffd8000 00000000 ntdll!_RtlUserThreadStart+0x1b STACK_COMMAND: kb FOLLOWUP_IP: win32k!vSolidFillRect1+107 824e9c5b 8b55f4 mov edx,dword ptr [ebp-0Ch] SYMBOL_STACK_INDEX: c SYMBOL_NAME: win32k!vSolidFillRect1+107 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd FAILURE_BUCKET_ID: 0x50_VRF_win32k!vSolidFillRect1+107 BUCKET_ID: 0x50_VRF_win32k!vSolidFillRect1+107 Followup: MachineOwner