Connected to Windows 7 7601 x86 compatible target at (Wed Apr  8 12:51:04.114 2015 (UTC + 2:00)), ptr64 FALSE
Kernel Debugger connection established.
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols;srv*c:\symbols*http://chromium-browser-symsrv.commondatastorage.googleapis.comSRV*c:\symbols\*http://symbols.mozilla.org/firefox;srv*c:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com
Executable search path is: 
Windows 7 Kernel Version 7601 MP (1 procs) Free x86 compatible
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82a3f000 PsLoadedModuleList = 0x82b895b0
System Uptime: not available
nt!DbgLoadImageSymbols+0x47:
82a57578 cc              int     3
kd> g
*******************************************************************************
*
* This is the string you add to your checkin description
* Driver Verifier: Enabled for win32k.sys on Build 7601 Swoke0cxHt9I3y4CfWvmAH
*
*******************************************************************************
nt!DbgLoadImageSymbols+0x47:
82a57578 cc              int     3
kd> g

*** Fatal System Error: 0x00000050
                       (0x80E7B7BC,0x00000001,0x82A79240,0x00000002)

Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

Connected to Windows 7 7601 x86 compatible target at (Wed Apr  8 13:07:03.186 2015 (UTC + 2:00)), ptr64 FALSE
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
...............
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {80e7b7bc, 1, 82a79240, 2}

*** WARNING: Unable to verify timestamp for a43.exe
*** ERROR: Module load completed but symbols could not be loaded for a43.exe
Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 )

Followup: MachineOwner
---------

Assertion: *** DPC watchdog timeout
    This is NOT a break in update time
    This is most likely a BUG in an ISR
    Perform a stack trace to find the culprit
    The period will be doubled on continuation
    Use gh to continue!!

nt!KeAccumulateTicks+0x3c5:
82aba38c cd2c            int     2Ch
kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 80e7b7bc, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 82a79240, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


WRITE_ADDRESS:  80e7b7bc 

FAULTING_IP: 
nt!RtlFillMemoryUlong+10
82a79240 f3ab            rep stos dword ptr es:[edi]

MM_INTERNAL_CODE:  2

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  a43.exe

CURRENT_IRQL:  1c

TRAP_FRAME:  957275cc -- (.trap 0xffffffff957275cc)
ErrCode = 00000002
eax=00ffffff ebx=00000001 ecx=00000069 edx=0000006a esi=80e7b7b8 edi=80e7b7bc
eip=82a79240 esp=95727640 ebp=95727674 iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!RtlFillMemoryUlong+0x10:
82a79240 f3ab            rep stos dword ptr es:[edi]
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82ab9853 to 82aba38c

STACK_TEXT:  
95726ff0 82ab9853 0002625a 00000000 0000f100 nt!KeAccumulateTicks+0x3c5
95727030 82ab9700 82a210a8 81aa1d2a 00000000 nt!KeUpdateRunTime+0x145
95727088 82ab8f03 95727002 95727002 000000d1 nt!KeUpdateSystemTime+0x613
95727088 82a210a8 95727002 95727002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
9572710c 82a0fb8c 00001000 00000000 9572716c hal!READ_PORT_USHORT+0x8
9572711c 82a0fcf5 82b1df92 792fe921 00000065 hal!HalpCheckPowerButton+0x2e
95727120 82b1df92 792fe921 00000065 00000000 hal!HaliHaltSystem+0x7
9572716c 82b1ea39 00000003 c0602038 80e7b7bc nt!KiBugCheckDebugBreak+0x73
95727530 82acc9ad 00000050 80e7b7bc 00000001 nt!KeBugCheck2+0x68b
957275b4 82a7fa78 00000001 80e7b7bc 00000000 nt!MmAccessFault+0x104
957275b4 82a79240 00000001 80e7b7bc 00000000 nt!KiTrap0E+0xdc
95727640 824e9c5b 80e7b7bc 000001a4 00ffffff nt!RtlFillMemoryUlong+0x10
95727674 824e9a63 95727944 00000001 01440000 win32k!vSolidFillRect1+0x107
95727814 824cbd44 824e9b54 95727944 00000000 win32k!vDIBSolidBlt+0x14c
95727888 824f0b37 faea6db8 00000000 00000000 win32k!EngBitBlt+0x258
957278ec 824f0cbf fa5c2d68 95727954 95727944 win32k!GrePatBltLockedDC+0x22b
95727998 82481a4e 957279c8 0000f0f0 95727a10 win32k!GrePolyPatBltInternal+0x176
957279d4 82459f46 1a010869 00f00021 957279fc win32k!GrePolyPatBlt+0x45
95727a68 82462f0f 1a010869 95727ab4 00000002 win32k!DrawEdge+0x25b
95727ae4 82461a40 fca40030 1a010869 0000980c win32k!xxxDrawCaptionBar+0x1ea
95727b28 824bfc43 fca40030 1a010869 00000000 win32k!xxxDrawWindowFrame+0x143
95727ba4 824cd8dc fca40030 00000085 00000001 win32k!xxxRealDefWindowProc+0x712
95727bbc 824983af fca40030 00000085 00000001 win32k!xxxWrapRealDefWindowProc+0x2b
95727bd8 824cd798 fca40030 00000085 00000001 win32k!NtUserfnNCDESTROY+0x27
95727c10 82a7c896 000c00d4 00000085 00000001 win32k!NtUserMessageCall+0xcf
95727c10 777570f4 000c00d4 00000085 00000001 nt!KiSystemServicePostCall
0021f220 77864f51 7786517d 000c00d4 00000085 ntdll!KiFastSystemCallRet
0021f224 7786517d 000c00d4 00000085 00000001 USER32!NtUserMessageCall+0xc
0021f2a8 77865138 000c00d4 00000085 00000001 USER32!RealDefWindowProcWorker+0x72
0021f2c4 74281e60 000c00d4 00000085 00000001 USER32!RealDefWindowProcW+0x47
0021f320 74281f20 00000000 00000000 00000001 uxtheme!_ThemeDefWindowProc+0x197
0021f33c 77865fc3 000c00d4 00000085 00000001 uxtheme!ThemeDefWindowProcW+0x18
0021f384 77874ec7 000c00d4 00000085 00000001 USER32!DefWindowProcW+0x68
0021f3a8 7786c4e7 000c00d4 00000085 00000001 USER32!DDEMLServerWndProc+0x71
0021f3d4 77865f9f 77874e86 000c00d4 00000085 USER32!InternalCallWinProc+0x23
0021f44c 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0
0021f4a8 77864f7d 00610030 00000085 00000001 USER32!DispatchClientMessage+0xda
0021f4d0 7775702e 0021f4e8 00000018 0021f5d8 USER32!__fnDWORD+0x24
0021f4fc 77864f51 7786517d 000c00d4 0000000f ntdll!KiUserCallbackDispatcher+0x2e
0021f500 7786517d 000c00d4 0000000f 00000000 USER32!NtUserMessageCall+0xc
0021f584 77865138 000c00d4 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72
0021f5a0 778650d1 000c00d4 0000000f 00000000 USER32!RealDefWindowProcW+0x47
0021f5e8 77874ec7 000c00d4 0000000f 00000000 USER32!DefWindowProcW+0x6f
0021f60c 7786c4e7 000c00d4 0000000f 00000000 USER32!DDEMLServerWndProc+0x71
0021f638 77865f9f 77874e86 000c00d4 0000000f USER32!InternalCallWinProc+0x23
0021f6b0 77864f0e 00000000 77874e86 000c00d4 USER32!UserCallWinProcCheckWow+0xe0
0021f70c 77864f7d 00610030 0000000f 00000000 USER32!DispatchClientMessage+0xda
0021f734 7775702e 0021f74c 00000018 0021f868 USER32!__fnDWORD+0x24
0021f760 77866445 7786647a 0021f7d4 00010010 ntdll!KiUserCallbackDispatcher+0x2e
0021f764 7786647a 0021f7d4 00010010 00000000 USER32!NtUserPeekMessage+0xc
0021f78c 77862b1b 0021f7d4 00010010 00000000 USER32!_PeekMessage+0x73
0021f7b8 013410f6 0021f7d4 00010010 00000000 USER32!PeekMessageA+0x12a
WARNING: Stack unwind information not available. Following frames may be wrong.
0021f830 013412ff 00000002 003d1168 003d4f00 a43+0x10f6
0021f878 7634ee1c 7ffd8000 0021f8c4 777737eb a43+0x12ff
0021f884 777737eb 7ffd8000 7751e6e1 00000000 kernel32!BaseThreadInitThunk+0xe
0021f8c4 777737be 0134137c 7ffd8000 00000000 ntdll!__RtlUserThreadStart+0x70
0021f8dc 00000000 0134137c 7ffd8000 00000000 ntdll!_RtlUserThreadStart+0x1b


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!vSolidFillRect1+107
824e9c5b 8b55f4          mov     edx,dword ptr [ebp-0Ch]

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  win32k!vSolidFillRect1+107

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0x50_VRF_win32k!vSolidFillRect1+107

BUCKET_ID:  0x50_VRF_win32k!vSolidFillRect1+107

Followup: MachineOwner
