
*** Fatal System Error: 0x00000050
                       (0xFE400264,0x00000001,0x82A8C240,0x00000000)

Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

Connected to Windows 7 7601 x86 compatible target at (Tue Mar 31 15:10:44.409 2015 (UTC + 2:00)), ptr64 FALSE
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
.........................
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fe400264, 1, 82a8c240, 0}

Probably caused by : win32k.sys ( win32k!vSolidFillRect1+107 )

Followup: MachineOwner
---------

Assertion: *** DPC watchdog timeout
    This is NOT a break in update time
    This is most likely a BUG in an ISR
    Perform a stack trace to find the culprit
    The period will be doubled on continuation
    Use gh to continue!!

nt!KeAccumulateTicks+0x3c5:
82acd38c cd2c            int     2Ch
kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fe400264, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 82a8c240, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


WRITE_ADDRESS:  fe400264 Paged session pool

FAULTING_IP: 
nt!RtlFillMemoryUlong+10
82a8c240 f3ab            rep stos dword ptr es:[edi]

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  notepad.exe

CURRENT_IRQL:  1c

TRAP_FRAME:  89fd3244 -- (.trap 0xffffffff89fd3244)
ErrCode = 00000002
eax=00ffffff ebx=00000277 ecx=00000077 edx=000000bb esi=fe196154 edi=fe400264
eip=82a8c240 esp=89fd32b8 ebp=89fd32ec iopl=0         nv up ei pl nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
nt!RtlFillMemoryUlong+0x10:
82a8c240 f3ab            rep stos dword ptr es:[edi]
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82acc853 to 82acd38c

STACK_TEXT:  
89fd2c68 82acc853 0002625a 00000000 00003d00 nt!KeAccumulateTicks+0x3c5
89fd2ca8 82acc700 82a340a8 a9afaab8 00000000 nt!KeUpdateRunTime+0x145
89fd2d00 82acbf03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613
89fd2d00 82a340a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
89fd2d84 82a22b8c 00001000 00000000 89fd2de4 hal!READ_PORT_USHORT+0x8
89fd2d94 82a22cf5 82b30f92 2fffb59a 00000065 hal!HalpCheckPowerButton+0x2e
89fd2d98 82b30f92 2fffb59a 00000065 00000000 hal!HaliHaltSystem+0x7
89fd2de4 82b31a39 00000003 00000000 00000000 nt!KiBugCheckDebugBreak+0x73
89fd31a8 82adf9ad 00000050 fe400264 00000001 nt!KeBugCheck2+0x68b
89fd322c 82a92a78 00000001 fe400264 00000000 nt!MmAccessFault+0x104
89fd322c 82a8c240 00000001 fe400264 00000000 nt!KiTrap0E+0xdc
89fd32b8 82629c5b fe400264 000001dc 00ffffff nt!RtlFillMemoryUlong+0x10
89fd32ec 82629b0c 89fd3320 00000001 fe0ff154 win32k!vSolidFillRect1+0x107
89fd348c 8260bd44 82629b54 89fd3650 89fd37e8 win32k!vDIBSolidBlt+0x1f5
89fd3500 827373f4 fe0ff010 00000000 00000000 win32k!EngBitBlt+0x258
89fd3610 8261bfb8 fe0ff010 00000000 00000000 win32k!PanBitBlt+0xf6
89fd3670 826181e0 827372fe 89fd3914 ffb83018 win32k!OffBitBlt+0x97
89fd3928 82630b37 ffb83018 00000000 00000000 win32k!SpBitBlt+0x46c
89fd398c 82630cbf fe08e648 89fd39f4 89fd39e4 win32k!GrePatBltLockedDC+0x22b
89fd3a38 825c1a4e 89fd3a68 0000f0f0 89fd3a98 win32k!GrePolyPatBltInternal+0x176
89fd3a74 825c1ac5 23010242 00f00021 89fd3a98 win32k!GrePolyPatBlt+0x45
89fd3aac 825a0637 23010242 89fd3af0 01100060 win32k!FillRect+0x58
89fd3ad0 825a0548 fea47658 fea47658 23010242 win32k!xxxPaintRect+0x72
89fd3b00 825a06e4 fea47658 fea47658 23010242 win32k!xxxFillWindow+0x39
89fd3b28 825ff86b fea47658 00000014 23010242 win32k!xxxDWP_EraseBkgnd+0x8f
89fd3ba4 8260d8dc fea47658 00000014 23010242 win32k!xxxRealDefWindowProc+0x33a
89fd3bbc 825d83af fea47658 00000014 23010242 win32k!xxxWrapRealDefWindowProc+0x2b
89fd3bd8 8260d798 fea47658 00000014 23010242 win32k!NtUserfnNCDESTROY+0x27
89fd3c10 82a8f896 000401ca 00000014 23010242 win32k!NtUserMessageCall+0xcf
89fd3c10 77c170f4 000401ca 00000014 23010242 nt!KiSystemServicePostCall
0016f604 76aa4f51 76aa517d 000401ca 00000014 ntdll!KiFastSystemCallRet
0016f608 76aa517d 000401ca 00000014 23010242 USER32!NtUserMessageCall+0xc
0016f68c 76aa5138 000401ca 00000014 23010242 USER32!RealDefWindowProcWorker+0x72
0016f6a8 74741e60 000401ca 00000014 23010242 USER32!RealDefWindowProcW+0x47
0016f704 74741f20 00000000 00000000 23010242 uxtheme!_ThemeDefWindowProc+0x197
0016f720 76aa5fc3 000401ca 00000014 23010242 uxtheme!ThemeDefWindowProcW+0x18
0016f768 00e21554 000401ca 00000014 23010242 USER32!DefWindowProcW+0x68
0016f788 76aac4e7 000401ca 00000014 23010242 notepad!NPWndProc+0x16d
0016f7b4 76aa5f9f 00e214de 000401ca 00000014 USER32!InternalCallWinProc+0x23
0016f82c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0
0016f888 76aa4f7d 00e97658 00000014 23010242 USER32!DispatchClientMessage+0xda
0016f8b0 77c1702e 0016f8c8 00000018 0016f9b8 USER32!__fnDWORD+0x24
0016f8dc 76aa4f51 76aa517d 000401ca 0000000f ntdll!KiUserCallbackDispatcher+0x2e
0016f8e0 76aa517d 000401ca 0000000f 00000000 USER32!NtUserMessageCall+0xc
0016f964 76aa5138 000401ca 0000000f 00000000 USER32!RealDefWindowProcWorker+0x72
0016f980 76aa50d1 000401ca 0000000f 00000000 USER32!RealDefWindowProcW+0x47
0016f9c8 00e21554 000401ca 0000000f 00000000 USER32!DefWindowProcW+0x6f
0016f9e8 76aac4e7 000401ca 0000000f 00000000 notepad!NPWndProc+0x16d
0016fa14 76aa5f9f 00e214de 000401ca 0000000f USER32!InternalCallWinProc+0x23
0016fa8c 76aa4f0e 00000000 00e214de 000401ca USER32!UserCallWinProcCheckWow+0xe0
0016fae8 76aa4f7d 00e97658 0000000f 00000000 USER32!DispatchClientMessage+0xda
0016fb10 77c1702e 0016fb28 00000018 0016fb74 USER32!__fnDWORD+0x24
0016fb3c 76aa5d0c 76aa5d33 0016fbac 369bad71 ntdll!KiUserCallbackDispatcher+0x2e
0016fb40 76aa5d33 0016fbac 369bad71 76aacde8 USER32!NtUserDispatchMessage+0xc
0016fb84 76aacc70 00e214de 00000000 0016fbc8 USER32!DispatchMessageWorker+0x3d5
0016fb94 00e214d7 0016fbac 00000000 00e2c25c USER32!DispatchMessageW+0xf
0016fbc8 00e216ec 00e20000 00000000 001e3872 notepad!WinMain+0xdd
0016fc58 768aee1c 7ffdf000 0016fca4 77c337eb notepad!_initterm_e+0x1a1
0016fc64 77c337eb 7ffdf000 77dfe2df 00000000 kernel32!BaseThreadInitThunk+0xe
0016fca4 77c337be 00e23689 7ffdf000 00000000 ntdll!__RtlUserThreadStart+0x70
0016fcbc 00000000 00e23689 7ffdf000 00000000 ntdll!_RtlUserThreadStart+0x1b


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!vSolidFillRect1+107
82629c5b 8b55f4          mov     edx,dword ptr [ebp-0Ch]

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  win32k!vSolidFillRect1+107

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0x50_win32k!vSolidFillRect1+107

BUCKET_ID:  0x50_win32k!vSolidFillRect1+107

Followup: MachineOwner
