Connected to Windows 7 7601 x86 compatible target at (Wed Apr 8 12:51:04.114 2015 (UTC + 2:00)), ptr64 FALSE
|
Kernel Debugger connection established.
|
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols;srv*c:\symbols*http://chromium-browser-symsrv.commondatastorage.googleapis.comSRV*c:\symbols\*http://symbols.mozilla.org/firefox;srv*c:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com
|
Executable search path is:
|
Windows 7 Kernel Version 7601 MP (1 procs) Free x86 compatible
|
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
|
Machine Name:
|
Kernel base = 0x82a3f000 PsLoadedModuleList = 0x82b895b0
|
System Uptime: not available
|
nt!DbgLoadImageSymbols+0x47:
|
82a57578 cc int 3
|
kd> g
|
*******************************************************************************
|
*
|
* This is the string you add to your checkin description
|
* Driver Verifier: Enabled for win32k.sys on Build 7601 Swoke0cxHt9I3y4CfWvmAH
|
*
|
*******************************************************************************
|
nt!DbgLoadImageSymbols+0x47:
|
82a57578 cc int 3
|
kd> g
|
|
*** Fatal System Error: 0x00000050
|
(0x80E7B7BC,0x00000001,0x82A79240,0x00000002)
|
|
Break instruction exception - code 80000003 (first chance)
|
|
A fatal system error has occurred.
|
Debugger entered on first try; Bugcheck callbacks have not been invoked.
|
|
A fatal system error has occurred.
|
|
Connected to Windows 7 7601 x86 compatible target at (Wed Apr 8 13:07:03.186 2015 (UTC + 2:00)), ptr64 FALSE
|
Loading Kernel Symbols
|
...............................................................
|
................................................................
|
.........................
|
Loading User Symbols
|
...............
|
Loading unloaded module list
|
....
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
Use !analyze -v to get detailed debugging information.
|
|
BugCheck 50, {80e7b7bc, 1, 82a79240, 2}
|
|
*** WARNING: Unable to verify timestamp for a43.exe
|
*** ERROR: Module load completed but symbols could not be loaded for a43.exe
|
Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 )
|
|
Followup: MachineOwner
|
---------
|
|
Assertion: *** DPC watchdog timeout
|
This is NOT a break in update time
|
This is most likely a BUG in an ISR
|
Perform a stack trace to find the culprit
|
The period will be doubled on continuation
|
Use gh to continue!!
|
|
nt!KeAccumulateTicks+0x3c5:
|
82aba38c cd2c int 2Ch
|
kd> !analyze -v
|
*******************************************************************************
|
* *
|
* Bugcheck Analysis *
|
* *
|
*******************************************************************************
|
|
PAGE_FAULT_IN_NONPAGED_AREA (50)
|
Invalid system memory was referenced. This cannot be protected by try-except,
|
it must be protected by a Probe. Typically the address is just plain bad or it
|
is pointing at freed memory.
|
Arguments:
|
Arg1: 80e7b7bc, memory referenced.
|
Arg2: 00000001, value 0 = read operation, 1 = write operation.
|
Arg3: 82a79240, If non-zero, the instruction address which referenced the bad memory
|
address.
|
Arg4: 00000002, (reserved)
|
|
Debugging Details:
|
------------------
|
|
|
WRITE_ADDRESS: 80e7b7bc
|
|
FAULTING_IP:
|
nt!RtlFillMemoryUlong+10
|
82a79240 f3ab rep stos dword ptr es:[edi]
|
|
MM_INTERNAL_CODE: 2
|
|
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
|
|
BUGCHECK_STR: 0x50
|
|
PROCESS_NAME: a43.exe
|
|
CURRENT_IRQL: 1c
|
|
TRAP_FRAME: 957275cc -- (.trap 0xffffffff957275cc)
|
ErrCode = 00000002
|
eax=00ffffff ebx=00000001 ecx=00000069 edx=0000006a esi=80e7b7b8 edi=80e7b7bc
|
eip=82a79240 esp=95727640 ebp=95727674 iopl=0 nv up ei pl nz na pe nc
|
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
|
nt!RtlFillMemoryUlong+0x10:
|
82a79240 f3ab rep stos dword ptr es:[edi]
|
Resetting default scope
|
|
LAST_CONTROL_TRANSFER: from 82ab9853 to 82aba38c
|
|
STACK_TEXT:
|
95726ff0 82ab9853 0002625a 00000000 0000f100 nt!KeAccumulateTicks+0x3c5
|
95727030 82ab9700 82a210a8 81aa1d2a 00000000 nt!KeUpdateRunTime+0x145
|
95727088 82ab8f03 95727002 95727002 000000d1 nt!KeUpdateSystemTime+0x613
|
95727088 82a210a8 95727002 95727002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
|
9572710c 82a0fb8c 00001000 00000000 9572716c hal!READ_PORT_USHORT+0x8
|
9572711c 82a0fcf5 82b1df92 792fe921 00000065 hal!HalpCheckPowerButton+0x2e
|
95727120 82b1df92 792fe921 00000065 00000000 hal!HaliHaltSystem+0x7
|
9572716c 82b1ea39 00000003 c0602038 80e7b7bc nt!KiBugCheckDebugBreak+0x73
|
95727530 82acc9ad 00000050 80e7b7bc 00000001 nt!KeBugCheck2+0x68b
|
957275b4 82a7fa78 00000001 80e7b7bc 00000000 nt!MmAccessFault+0x104
|
957275b4 82a79240 00000001 80e7b7bc 00000000 nt!KiTrap0E+0xdc
|
95727640 824e9c5b 80e7b7bc 000001a4 00ffffff nt!RtlFillMemoryUlong+0x10
|
95727674 824e9a63 95727944 00000001 01440000 win32k!vSolidFillRect1+0x107
|
95727814 824cbd44 824e9b54 95727944 00000000 win32k!vDIBSolidBlt+0x14c
|
95727888 824f0b37 faea6db8 00000000 00000000 win32k!EngBitBlt+0x258
|
957278ec 824f0cbf fa5c2d68 95727954 95727944 win32k!GrePatBltLockedDC+0x22b
|
95727998 82481a4e 957279c8 0000f0f0 95727a10 win32k!GrePolyPatBltInternal+0x176
|
957279d4 82459f46 1a010869 00f00021 957279fc win32k!GrePolyPatBlt+0x45
|
95727a68 82462f0f 1a010869 95727ab4 00000002 win32k!DrawEdge+0x25b
|
95727ae4 82461a40 fca40030 1a010869 0000980c win32k!xxxDrawCaptionBar+0x1ea
|
95727b28 824bfc43 fca40030 1a010869 00000000 win32k!xxxDrawWindowFrame+0x143
|
95727ba4 824cd8dc fca40030 00000085 00000001 win32k!xxxRealDefWindowProc+0x712
|
95727bbc 824983af fca40030 00000085 00000001 win32k!xxxWrapRealDefWindowProc+0x2b
|
95727bd8 824cd798 fca40030 00000085 00000001 win32k!NtUserfnNCDESTROY+0x27
|
95727c10 82a7c896 000c00d4 00000085 00000001 win32k!NtUserMessageCall+0xcf
|
95727c10 777570f4 000c00d4 00000085 00000001 nt!KiSystemServicePostCall
|
0021f220 77864f51 7786517d 000c00d4 00000085 ntdll!KiFastSystemCallRet
|
0021f224 7786517d 000c00d4 00000085 00000001 USER32!NtUserMessageCall+0xc
|
0021f2a8 77865138 000c00d4 00000085 00000001 USER32!RealDefWindowProcWorker+0x72
|
0021f2c4 74281e60 000c00d4 00000085 00000001 USER32!RealDefWindowProcW+0x47
|
0021f320 74281f20 00000000 00000000 00000001 uxtheme!_ThemeDefWindowProc+0x197
|
0021f33c 77865fc3 000c00d4 00000085 00000001 uxtheme!ThemeDefWindowProcW+0x18
|
0021f384 77874ec7 000c00d4 00000085 00000001 USER32!DefWindowProcW+0x68
|
0021f3a8 7786c4e7 000c00d4 00000085 00000001 USER32!DDEMLServerWndProc+0x71
|
0021f3d4 77865f9f 77874e86 000c00d4 00000085 USER32!InternalCallWinProc+0x23
|
0021f44c 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0
|
0021f4a8 77864f7d 00610030 00000085 00000001 USER32!DispatchClientMessage+0xda
|
0021f4d0 7775702e 0021f4e8 00000018 0021f5d8 USER32!__fnDWORD+0x24
|
0021f4fc 77864f51 7786517d 000c00d4 0000000f ntdll!KiUserCallbackDispatcher+0x2e
|
0021f500 7786517d 000c00d4 0000000f 00000000 USER32!NtUserMessageCall+0xc
|
0021f584 77865138 000c00d4 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72
|
0021f5a0 778650d1 000c00d4 0000000f 00000000 USER32!RealDefWindowProcW+0x47
|
0021f5e8 77874ec7 000c00d4 0000000f 00000000 USER32!DefWindowProcW+0x6f
|
0021f60c 7786c4e7 000c00d4 0000000f 00000000 USER32!DDEMLServerWndProc+0x71
|
0021f638 77865f9f 77874e86 000c00d4 0000000f USER32!InternalCallWinProc+0x23
|
0021f6b0 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0
|
0021f70c 77864f7d 00610030 0000000f 00000000 USER32!DispatchClientMessage+0xda
|
0021f734 7775702e 0021f74c 00000018 0021f868 USER32!__fnDWORD+0x24
|
0021f760 77866445 7786647a 0021f7d4 00010010 ntdll!KiUserCallbackDispatcher+0x2e
|
0021f764 7786647a 0021f7d4 00010010 00000000 USER32!NtUserPeekMessage+0xc
|
0021f78c 77862b1b 0021f7d4 00010010 00000000 USER32!_PeekMessage+0x73
|
0021f7b8 013410f6 0021f7d4 00010010 00000000 USER32!PeekMessageA+0x12a
|
WARNING: Stack unwind information not available. Following frames may be wrong.
|
0021f830 013412ff 00000002 003d1168 003d4f00 a43+0x10f6
|
0021f878 7634ee1c 7ffd8000 0021f8c4 777737eb a43+0x12ff
|
0021f884 777737eb 7ffd8000 7751e6e1 00000000 kernel32!BaseThreadInitThunk+0xe
|
0021f8c4 777737be 0134137c 7ffd8000 00000000 ntdll!__RtlUserThreadStart+0x70
|
0021f8dc 00000000 0134137c 7ffd8000 00000000 ntdll!_RtlUserThreadStart+0x1b
|
|
|
STACK_COMMAND: kb
|
|
FOLLOWUP_IP:
|
win32k!vSolidFillRect1+107
|
824e9c5b 8b55f4 mov edx,dword ptr [ebp-0Ch]
|
|
SYMBOL_STACK_INDEX: c
|
|
SYMBOL_NAME: win32k!vSolidFillRect1+107
|
|
FOLLOWUP_NAME: MachineOwner
|
|
MODULE_NAME: win32k
|
|
IMAGE_NAME: win32k.sys
|
|
DEBUG_FLR_IMAGE_TIMESTAMP: 54ee8ecd
|
|
FAILURE_BUCKET_ID: 0x50_VRF_win32k!vSolidFillRect1+107
|
|
BUCKET_ID: 0x50_VRF_win32k!vSolidFillRect1+107
|
|
Followup: MachineOwner
|