|
*** Fatal System Error: 0x00000050
|
(0xFE400264,0x00000001,0x82A8C240,0x00000000)
|
|
Break instruction exception - code 80000003 (first chance)
|
|
A fatal system error has occurred.
|
Debugger entered on first try; Bugcheck callbacks have not been invoked.
|
|
A fatal system error has occurred.
|
|
Connected to Windows 7 7601 x86 compatible target at (Tue Mar 31 15:10:44.409 2015 (UTC + 2:00)), ptr64 FALSE
|
Loading Kernel Symbols
|
...............................................................
|
................................................................
|
.........................
|
Loading User Symbols
|
.........................
|
Loading unloaded module list
|
....
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
Use !analyze -v to get detailed debugging information.
|
|
BugCheck 50, {fe400264, 1, 82a8c240, 0}
|
|
Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 )
|
|
Followup: MachineOwner
|
---------
|
|
Assertion: *** DPC watchdog timeout
|
This is NOT a break in update time
|
This is most likely a BUG in an ISR
|
Perform a stack trace to find the culprit
|
The period will be doubled on continuation
|
Use gh to continue!!
|
|
nt!KeAccumulateTicks+0x3c5:
|
82acd38c cd2c int 2Ch
|
kd> !analyze -v
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
PAGE_FAULT_IN_NONPAGED_AREA (50)
|
Invalid system memory was referenced. This cannot be protected by try-except,
|
it must be protected by a Probe. Typically the address is just plain bad or it
|
is pointing at freed memory.
|
Arguments:
|
Arg1: fe400264, memory referenced.
|
Arg2: 00000001, value 0 = read operation, 1 = write operation.
|
Arg3: 82a8c240, If non-zero, the instruction address which referenced the bad memory
|
address.
|
Arg4: 00000000, (reserved)
|
|
Debugging Details:
|
------------------
|
|
|
WRITE_ADDRESS: fe400264 Paged session pool
|
|
FAULTING_IP:
|
nt!RtlFillMemoryUlong+10
|
82a8c240 f3ab rep stos dword ptr es:[edi]
|
|
MM_INTERNAL_CODE: 0
|
|
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
|
|
BUGCHECK_STR: 0x50
|
|
PROCESS_NAME: notepad.exe
|
|
CURRENT_IRQL: 1c
|
|
TRAP_FRAME: 89fd3244 -- (.trap 0xffffffff89fd3244)
|
ErrCode = 00000002
|
eax=00ffffff ebx=00000277 ecx=00000077 edx=000000bb esi=fe196154 edi=fe400264
|
eip=82a8c240 esp=89fd32b8 ebp=89fd32ec iopl=0 nv up ei pl nz na pe nc
|
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
|
nt!RtlFillMemoryUlong+0x10:
|
82a8c240 f3ab rep stos dword ptr es:[edi]
|
Resetting default scope
|
|
LAST_CONTROL_TRANSFER: from 82acc853 to 82acd38c
|
|
STACK_TEXT:
|
89fd2c68 82acc853 0002625a 00000000 00003d00 nt!KeAccumulateTicks+0x3c5
|
89fd2ca8 82acc700 82a340a8 a9afaab8 00000000 nt!KeUpdateRunTime+0x145
|
89fd2d00 82acbf03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613
|
89fd2d00 82a340a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
|
89fd2d84 82a22b8c 00001000 00000000 89fd2de4 hal!READ_PORT_USHORT+0x8
|
89fd2d94 82a22cf5 82b30f92 2fffb59a 00000065 hal!HalpCheckPowerButton+0x2e
|
89fd2d98 82b30f92 2fffb59a 00000065 00000000 hal!HaliHaltSystem+0x7
|
89fd2de4 82b31a39 00000003 00000000 00000000 nt!KiBugCheckDebugBreak+0x73
|
89fd31a8 82adf9ad 00000050 fe400264 00000001 nt!KeBugCheck2+0x68b
|
89fd322c 82a92a78 00000001 fe400264 00000000 nt!MmAccessFault+0x104
|
89fd322c 82a8c240 00000001 fe400264 00000000 nt!KiTrap0E+0xdc
|
89fd32b8 82629c5b fe400264 000001dc 00ffffff nt!RtlFillMemoryUlong+0x10
|
89fd32ec 82629b0c 89fd3320 00000001 fe0ff154 win32k!vSolidFillRect1+0x107
|
89fd348c 8260bd44 82629b54 89fd3650 89fd37e8 win32k!vDIBSolidBlt+0x1f5
|
89fd3500 827373f4 fe0ff010 00000000 00000000 win32k!EngBitBlt+0x258
|
89fd3610 8261bfb8 fe0ff010 00000000 00000000 win32k!PanBitBlt+0xf6
|
89fd3670 826181e0 827372fe 89fd3914 ffb83018 win32k!OffBitBlt+0x97
|
89fd3928 82630b37 ffb83018 00000000 00000000 win32k!SpBitBlt+0x46c
|
89fd398c 82630cbf fe08e648 89fd39f4 89fd39e4 win32k!GrePatBltLockedDC+0x22b
|
89fd3a38 825c1a4e 89fd3a68 0000f0f0 89fd3a98 win32k!GrePolyPatBltInternal+0x176
|
89fd3a74 825c1ac5 23010242 00f00021 89fd3a98 win32k!GrePolyPatBlt+0x45
|
89fd3aac 825a0637 23010242 89fd3af0 01100060 win32k!FillRect+0x58
|
89fd3ad0 825a0548 fea47658 fea47658 23010242 win32k!xxxPaintRect+0x72
|
89fd3b00 825a06e4 fea47658 fea47658 23010242 win32k!xxxFillWindow+0x39
|
89fd3b28 825ff86b fea47658 00000014 23010242 win32k!xxxDWP_EraseBkgnd+0x8f
|
89fd3ba4 8260d8dc fea47658 00000014 23010242 win32k!xxxRealDefWindowProc+0x33a
|
89fd3bbc 825d83af fea47658 00000014 23010242 win32k!xxxWrapRealDefWindowProc+0x2b
|
89fd3bd8 8260d798 fea47658 00000014 23010242 win32k!NtUserfnNCDESTROY+0x27
|
89fd3c10 82a8f896 000401ca 00000014 23010242 win32k!NtUserMessageCall+0xcf
|
89fd3c10 77c170f4 000401ca 00000014 23010242 nt!KiSystemServicePostCall
|
0016f604 76aa4f51 76aa517d 000401ca 00000014 ntdll!KiFastSystemCallRet
|
0016f608 76aa517d 000401ca 00000014 23010242 USER32!NtUserMessageCall+0xc
|
0016f68c 76aa5138 000401ca 00000014 23010242 USER32!RealDefWindowProcWorker+0x72
|
0016f6a8 74741e60 000401ca 00000014 23010242 USER32!RealDefWindowProcW+0x47
|
0016f704 74741f20 00000000 00000000 23010242 uxtheme!_ThemeDefWindowProc+0x197
|
0016f720 76aa5fc3 000401ca 00000014 23010242 uxtheme!ThemeDefWindowProcW+0x18
|
0016f768 00e21554 000401ca 00000014 23010242 USER32!DefWindowProcW+0x68
|
0016f788 76aac4e7 000401ca 00000014 23010242 notepad!NPWndProc+0x16d
|
0016f7b4 76aa5f9f 00e214de 000401ca 00000014 USER32!InternalCallWinProc+0x23
|
0016f82c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0
|
0016f888 76aa4f7d 00e97658 00000014 23010242 USER32!DispatchClientMessage+0xda
|
0016f8b0 77c1702e 0016f8c8 00000018 0016f9b8 USER32!__fnDWORD+0x24
|
0016f8dc 76aa4f51 76aa517d 000401ca 0000000f ntdll!KiUserCallbackDispatcher+0x2e
|
0016f8e0 76aa517d 000401ca 0000000f 00000000 USER32!NtUserMessageCall+0xc
|
0016f964 76aa5138 000401ca 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72
|
0016f980 76aa50d1 000401ca 0000000f 00000000 USER32!RealDefWindowProcW+0x47
|
0016f9c8 00e21554 000401ca 0000000f 00000000 USER32!DefWindowProcW+0x6f
|
0016f9e8 76aac4e7 000401ca 0000000f 00000000 notepad!NPWndProc+0x16d
|
0016fa14 76aa5f9f 00e214de 000401ca 0000000f USER32!InternalCallWinProc+0x23
|
0016fa8c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0
|
0016fae8 76aa4f7d 00e97658 0000000f 00000000 USER32!DispatchClientMessage+0xda
|
0016fb10 77c1702e 0016fb28 00000018 0016fb74 USER32!__fnDWORD+0x24
|
0016fb3c 76aa5d0c 76aa5d33 0016fbac 369bad71 ntdll!KiUserCallbackDispatcher+0x2e
|
0016fb40 76aa5d33 0016fbac 369bad71 76aacde8 USER32!NtUserDispatchMessage+0xc
|
0016fb84 76aacc70 00e214de 00000000 0016fbc8 USER32!DispatchMessageWorker+0x3d5
|
0016fb94 00e214d7 0016fbac 00000000 00e2c25c USER32!DispatchMessageW+0xf
|
0016fbc8 00e216ec 00e20000 00000000 001e3872 notepad!WinMain+0xdd
|
0016fc58 768aee1c 7ffdf000 0016fca4 77c337eb notepad!_initterm_e+0x1a1
|
0016fc64 77c337eb 7ffdf000 77dfe2df 00000000 kernel32!BaseThreadInitThunk+0xe
|
0016fca4 77c337be 00e23689 7ffdf000 00000000 ntdll!__RtlUserThreadStart+0x70
|
0016fcbc 00000000 00e23689 7ffdf000 00000000 ntdll!_RtlUserThreadStart+0x1b
|
|
|
STACK_COMMAND: kb
|
|
FOLLOWUP_IP:
|
win32k!vSolidFillRect1+107
|
82629c5b 8b55f4 mov edx,dword ptr [ebp-0Ch]
|
|
SYMBOL_STACK_INDEX: c
|
|
SYMBOL_NAME: win32k!vSolidFillRect1+107
|
|
FOLLOWUP_NAME: MachineOwner
|
|
MODULE_NAME: win32k
|
|
IMAGE_NAME: win32k.sys
|
|
DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd
|
|
FAILURE_BUCKET_ID: 0x50_win32k!vSolidFillRect1+107
|
|
BUCKET_ID: 0x50_win32k!vSolidFillRect1+107
|
|
Followup: MachineOwner
|