APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80017863aa0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff800`17863aa0 4883ec28 sub rsp,28h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x1
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff800176620ab to fffff800175f3ea0
STACK_TEXT:
ffffa388`f62cab68 fffff800`176620ab : 00000000`00000001 fffff800`17863aa0 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa388`f62cab70 fffff800`17466dd5 : ffffd784`583e7140 00000000`00000080 ffffd784`58283040 00000000`00490055 : nt!ExpWorkerThread+0x1a029b
ffffa388`f62cac10 fffff800`175fb4f8 : ffffc680`a1d40180 ffffd784`583e7140 fffff800`17466d80 0020006b`0061006d : nt!PspSystemThreadStartup+0x55
ffffa388`f62cac60 00000000`00000000 : ffffa388`f62cb000 ffffa388`f62c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: .bugcheck ; kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff800175963ae-fffff800175963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:20 7e fc f8 ]
4 errors : !nt (fffff800175963ae-fffff800175963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffaa9965ac4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd809c5a8b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
FAULTING_IP:
+3318fa474849359
00007ffa`a9965ac4 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x1
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80152005e69 to fffff80151ff3ea0
STACK_TEXT:
fffffd80`9c5a89b8 fffff801`52005e69 : 00000000`00000001 00007ffa`a9965ac4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffffd80`9c5a89c0 fffff801`52005d33 : ffffb508`d2c80080 ffffb508`d2c80080 00000140`5d50f778 00000000`00000020 : nt!KiBugCheckDispatch+0x69
fffffd80`9c5a8b00 00007ffa`a9965ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000003b`f467f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a9965ac4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffb4a910e047a2-ffffb4a910e047a3 2 bytes - win32kbase!DxgkEngVisRgnUniq+12
[ 48 ff:4c 8b ]
ffffb4a910e047a9-ffffb4a910e047ac 4 bytes - win32kbase!DxgkEngVisRgnUniq+19 (+0x07)
[ 0f 1f 44 00:e8 72 dc 2d ]
ffffb4a910e047ec-ffffb4a910e047ed 2 bytes - win32kbase!DxgkEngVisRgnUniq+5c (+0x43)
[ 48 ff:4c 8b ]
ffffb4a910e047f3-ffffb4a910e047f6 4 bytes - win32kbase!DxgkEngVisRgnUniq+63 (+0x07)
[ 0f 1f 44 00:e8 28 dc 2d ]
ffffb4a910e047f8-ffffb4a910e047f9 2 bytes - win32kbase!DxgkEngVisRgnUniq+68 (+0x05)
[ 48 ff:4c 8b ]
ffffb4a910e047ff-ffffb4a910e04802 4 bytes - win32kbase!DxgkEngVisRgnUniq+6f (+0x07)
[ 0f 1f 44 00:e8 1c dc 2d ]
ffffb4a910e19c77-ffffb4a910e19c7c 6 bytes - win32kbase!GreDeleteObject+d7 (+0x15478)
[ ff 15 3b 73 26 00:e8 24 86 2c 00 90 ]
ffffb4a910e19c92-ffffb4a910e19c97 6 bytes - win32kbase!GreDeleteObject+f2 (+0x1b)
[ ff 15 20 73 26 00:e8 09 86 2c 00 90 ]
ffffb4a910e37348-ffffb4a910e3734d 6 bytes - win32kbase!DxgkEngAssertGdiOutput+98 (+0x1d6b6)
[ ff 15 6a 9c 24 00:e8 53 af 2a 00 90 ]
ffffb4a910e378b3-ffffb4a910e378b4 2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+33 (+0x56b)
[ 48 ff:4c 8b ]
ffffb4a910e378ba-ffffb4a910e378bd 4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+3a (+0x07)
[ 0f 1f 44 00:e8 61 ab 2a ]
ffffb4a910e378c9-ffffb4a910e378ca 2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+49 (+0x0f)
[ 48 ff:4c 8b ]
ffffb4a910e378d0-ffffb4a910e378d3 4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+50 (+0x07)
[ 0f 1f 44 00:e8 4b ab 2a ]
ffffb4a910e37900-ffffb4a910e37901 2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+80 (+0x30)
[ 48 ff:4c 8b ]
ffffb4a910e37907-ffffb4a910e3790a 4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+87 (+0x07)
[ 0f 1f 44 00:e8 14 ab 2a ]
ffffb4a910e37914-ffffb4a910e37915 2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+94 (+0x0d)
[ 48 ff:4c 8b ]
ffffb4a910e3791b-ffffb4a910e3791e 4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+9b (+0x07)
[ 0f 1f 44 00:e8 00 ab 2a ]
ffffb4a910e3792e-ffffb4a910e3792f 2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+ae (+0x13)
[ 48 ff:4c 8b ]
ffffb4a910e37935-ffffb4a910e37938 4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+b5 (+0x07)
[ 0f 1f 44 00:e8 e6 aa 2a ]
ffffb4a910e3795d-ffffb4a910e3795e 2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+dd (+0x28)
[ 48 ff:4c 8b ]
ffffb4a910e37964-ffffb4a910e37967 4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+e4 (+0x07)
[ 0f 1f 44 00:e8 b7 aa 2a ]
ffffb4a910e37973-ffffb4a910e37974 2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+f3 (+0x0f)
[ 48 ff:4c 8b ]
ffffb4a910e3797a-ffffb4a910e3797d 4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+fa (+0x07)
[ 0f 1f 44 00:e8 a1 aa 2a ]
ffffb4a910e37bcf-ffffb4a910e37bd0 2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+6f (+0x255)
[ 48 ff:4c 8b ]
ffffb4a910e37bd6-ffffb4a910e37bd9 4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+76 (+0x07)
[ 0f 1f 44 00:e8 45 a8 2a ]
ffffb4a910e37bdb-ffffb4a910e37bdc 2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+7b (+0x05)
[ 48 ff:4c 8b ]
ffffb4a910e37be2-ffffb4a910e37be5 4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+82 (+0x07)
[ 0f 1f 44 00:e8 39 a8 2a ]
ffffb4a910e37c06-ffffb4a910e37c07 2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+a6 (+0x24)
[ 48 ff:4c 8b ]
ffffb4a910e37c0d-ffffb4a910e37c10 4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+ad (+0x07)
[ 0f 1f 44 00:e8 0e a8 2a ]
ffffb4a910e37c12-ffffb4a910e37c13 2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b2 (+0x05)
[ 48 ff:4c 8b ]
ffffb4a910e37c19-ffffb4a910e37c1c 4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b9 (+0x07)
[ 0f 1f 44 00:e8 02 a8 2a ]
ffffb4a910e37c3d-ffffb4a910e37c3e 2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+dd (+0x24)
[ 48 ff:4c 8b ]
ffffb4a910e37c44-ffffb4a910e37c47 4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e4 (+0x07)
[ 0f 1f 44 00:e8 d7 a7 2a ]
ffffb4a910e37c49-ffffb4a910e37c4a 2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e9 (+0x05)
[ 48 ff:4c 8b ]
ffffb4a910e37c50-ffffb4a910e37c53 4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+f0 (+0x07)
[ 0f 1f 44 00:e8 cb a7 2a ]
ffffb4a910e54ada-ffffb4a910e54adb 2 bytes - win32kbase!GreCombineRgn+8a (+0x1ce8a)
[ 48 ff:4c 8b ]
ffffb4a910e54ae1-ffffb4a910e54ae4 4 bytes - win32kbase!GreCombineRgn+91 (+0x07)
[ 0f 1f 44 00:e8 3a d9 28 ]
ffffb4a910e54aeb-ffffb4a910e54aec 2 bytes - win32kbase!GreCombineRgn+9b (+0x0a)
[ 48 ff:4c 8b ]
ffffb4a910e54af2-ffffb4a910e54af5 4 bytes - win32kbase!GreCombineRgn+a2 (+0x07)
[ 0f 1f 44 00:e8 29 d9 28 ]
ffffb4a910e54b0c-ffffb4a910e54b0d 2 bytes - win32kbase!GreCombineRgn+bc (+0x1a)
[ 48 ff:4c 8b ]
ffffb4a910e54b13-ffffb4a910e54b16 4 bytes - win32kbase!GreCombineRgn+c3 (+0x07)
[ 0f 1f 44 00:e8 08 d9 28 ]
ffffb4a910e54b1d-ffffb4a910e54b1e 2 bytes - win32kbase!GreCombineRgn+cd (+0x0a)
[ 48 ff:4c 8b ]
ffffb4a910e54b24-ffffb4a910e54b27 4 bytes - win32kbase!GreCombineRgn+d4 (+0x07)
[ 0f 1f 44 00:e8 f7 d8 28 ]
ffffb4a910e54b46-ffffb4a910e54b47 2 bytes - win32kbase!GreCombineRgn+f6 (+0x22)
[ 48 ff:4c 8b ]
ffffb4a910e54b4d-ffffb4a910e54b4f 3 bytes - win32kbase!GreCombineRgn+fd (+0x07)
[ 0f 1f 44:e8 ce d8 ]
ffffb4a910e66a29-ffffb4a910e66a2a 2 bytes - win32kbase!UserEnterUserCritSecShared+29 (+0x11edc)
[ 48 ff:4c 8b ]
ffffb4a910e66a30-ffffb4a910e66a33 4 bytes - win32kbase!UserEnterUserCritSecShared+30 (+0x07)
[ 0f 1f 44 00:e8 eb b9 27 ]
ffffb4a910e66a3f-ffffb4a910e66a40 2 bytes - win32kbase!UserEnterUserCritSecShared+3f (+0x0f)
[ 48 ff:4c 8b ]
ffffb4a910e66a46-ffffb4a910e66a49 4 bytes - win32kbase!UserEnterUserCritSecShared+46 (+0x07)
[ 0f 1f 44 00:e8 d5 b9 27 ]
ffffb4a910e66a71-ffffb4a910e66a72 2 bytes - win32kbase!UserEnterUserCritSecShared+71 (+0x2b)
[ 48 ff:4c 8b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
289 errors : !win32kbase (ffffb4a910e047a2-ffffb4a9110044a9)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffde81ecdf9a90, Address of resource
Arg2: ffffde81f2c8e080, Address of thread
Arg3: ffffde81f1955710, Address of owner table if there is one
Arg4: 0000000000000002
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xE3
PROCESS_NAME: SystemSettings
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff8055b26bc89 to fffff8055b1f3ea0
STACK_TEXT:
ffffb18f`a78a0918 fffff805`5b26bc89 : 00000000`000000e3 ffffde81`ecdf9a90 ffffde81`f2c8e080 ffffde81`f1955710 : nt!KeBugCheckEx
ffffb18f`a78a0920 fffff805`5b0e1ef9 : ffffde81`ecdf9a90 ffffb18f`a78a0ec0 00000000`00000000 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x18b909
ffffb18f`a78a09e0 ffffddae`9a664cf4 : 00000000`00000000 00000000`00000000 ffffddd7`06121010 fffff805`5b0cbad2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffffb18f`a78a0a40 ffffddae`9a74892e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001042 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffffb18f`a78a0ab0 ffffddae`9aa6dbd1 : ffffde81`f2c8e080 ffffb18f`00000000 ffffddd7`06121010 00000000`00000000 : win32kbase!NtUserSystemParametersInfo+0x119e
ffffb18f`a78a0e00 fffff805`5b2058b8 : ffffde81`f2c8e080 ffffde81`f0abbbe0 ffffb18f`00000000 ffffb18f`a543eb80 : win32k!NtUserSystemParametersInfo+0x15
ffffb18f`a78a0e40 00007ff8`b3901884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`7017e158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b3901884
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffddae9a645679-ffffddae9a64567e 6 bytes - win32kbase!Win32FreePool+19
[ ff 15 39 b9 23 00:e8 22 cc 29 00 90 ]
ffffddae9a645692-ffffddae9a645697 6 bytes - win32kbase!Win32FreePool+32 (+0x19)
[ ff 15 20 b9 23 00:e8 09 cc 29 00 90 ]
ffffddae9a6456db-ffffddae9a6456dc 2 bytes - win32kbase!AllocAce+2b (+0x49)
[ 48 ff:4c 8b ]
ffffddae9a6456e2-ffffddae9a6456e5 4 bytes - win32kbase!AllocAce+32 (+0x07)
[ 0f 1f 44 00:e8 39 cd 29 ]
ffffddae9a645723-ffffddae9a645728 6 bytes - win32kbase!AllocAce+73 (+0x41)
[ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
ffffddae9a64574f-ffffddae9a645754 6 bytes - win32kbase!AllocAce+9f (+0x2c)
[ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
ffffddae9a664d14-ffffddae9a664d15 2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1f5c5)
[ 48 ff:4c 8b ]
ffffddae9a664d1b-ffffddae9a664d1e 4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
[ 0f 1f 44 00:e8 00 d7 27 ]
ffffddae9a6a3f31 - win32kbase!PopAndFreeAlwaysW32ThreadLock+15 (+0x3f216)
[ 00:90 ]
ffffddae9a6a3f59-ffffddae9a6a3f5a 2 bytes - win32kbase!UpdatesLockedForDwm+19 (+0x28)
[ 48 ff:4c 8b ]
ffffddae9a6a3f60-ffffddae9a6a3f63 4 bytes - win32kbase!UpdatesLockedForDwm+20 (+0x07)
[ 0f 1f 44 00:e8 bb e4 23 ]
ffffddae9a6a70d3-ffffddae9a6a70d8 6 bytes - win32kbase!CInputSink::MarkInvalid+13 (+0x3173)
[ ff 15 df 9e 1d 00:e8 c8 b1 23 00 90 ]
ffffddae9a6a713a-ffffddae9a6a713b 2 bytes - win32kbase!CompositionInputObject::LockForWrite+2a (+0x67)
[ 48 ff:4c 8b ]
ffffddae9a6a7141-ffffddae9a6a7144 4 bytes - win32kbase!CompositionInputObject::LockForWrite+31 (+0x07)
[ 0f 1f 44 00:e8 da b2 23 ]
ffffddae9a6a7195-ffffddae9a6a719a 6 bytes - win32kbase!CPushLock::AcquireLockExclusive+15 (+0x54)
[ ff 15 1d 9e 1d 00:e8 06 b1 23 00 90 ]
ffffddae9a6a719f-ffffddae9a6a71a0 2 bytes - win32kbase!CPushLock::AcquireLockExclusive+1f (+0x0a)
[ 48 ff:4c 8b ]
ffffddae9a6a71a6-ffffddae9a6a71a9 4 bytes - win32kbase!CPushLock::AcquireLockExclusive+26 (+0x07)
[ 0f 1f 44 00:e8 75 b2 23 ]
ffffddae9a6a71b1-ffffddae9a6a71b2 2 bytes - win32kbase!CPushLock::AcquireLockExclusive+31 (+0x0b)
[ 48 ff:4c 8b ]
ffffddae9a6a71b8-ffffddae9a6a71bb 4 bytes - win32kbase!CPushLock::AcquireLockExclusive+38 (+0x07)
[ 0f 1f 44 00:e8 63 b2 23 ]
ffffddae9a6abc5a-ffffddae9a6abc5b 2 bytes - win32kbase!MarkImmersiveProcess+5a (+0x4aa2)
[ 48 ff:4c 8b ]
ffffddae9a6abc61-ffffddae9a6abc64 4 bytes - win32kbase!MarkImmersiveProcess+61 (+0x07)
[ 0f 1f 44 00:e8 ba 67 23 ]
ffffddae9a6abc6e-ffffddae9a6abc6f 2 bytes - win32kbase!MarkImmersiveProcess+6e (+0x0d)
[ 48 ff:4c 8b ]
ffffddae9a6abc75-ffffddae9a6abc78 4 bytes - win32kbase!MarkImmersiveProcess+75 (+0x07)
[ 0f 1f 44 00:e8 a6 67 23 ]
ffffddae9a6abcc6-ffffddae9a6abcc7 2 bytes - win32kbase!MarkImmersiveProcess+c6 (+0x51)
[ 48 ff:4c 8b ]
ffffddae9a6abccd-ffffddae9a6abcd0 4 bytes - win32kbase!MarkImmersiveProcess+cd (+0x07)
[ 0f 1f 44 00:e8 4e 67 23 ]
ffffddae9a6abcd6-ffffddae9a6abcd7 2 bytes - win32kbase!MarkImmersiveProcess+d6 (+0x09)
[ 48 ff:4c 8b ]
ffffddae9a6abcdd-ffffddae9a6abce0 4 bytes - win32kbase!MarkImmersiveProcess+dd (+0x07)
[ 0f 1f 44 00:e8 3e 67 23 ]
ffffddae9a6ac0ce-ffffddae9a6ac0d3 6 bytes - win32kbase!CInputSink::IsLockValid+e (+0x3f1)
[ ff 15 e4 4e 1d 00:e8 cd 61 23 00 90 ]
ffffddae9a6ac10c-ffffddae9a6ac111 6 bytes - win32kbase!IsGetLayeredOrRedirectedParentSupported+10 (+0x3e)
[ ff 15 a6 4e 1d 00:e8 8f 61 23 00 90 ]
ffffddae9a6ac163-ffffddae9a6ac164 2 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+33 (+0x57)
[ 48 ff:4c 8b ]
ffffddae9a6ac16a-ffffddae9a6ac16d 4 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+3a (+0x07)
[ 0f 1f 44 00:e8 b1 62 23 ]
ffffddae9a6b809e-ffffddae9a6b80a3 6 bytes - win32kbase!CInputSink::Delete+2e (+0xbf34)
[ ff 15 14 8f 1c 00:e8 fd a1 22 00 90 ]
ffffddae9a6b80b2-ffffddae9a6b80b7 6 bytes - win32kbase!CInputSink::Delete+42 (+0x14)
[ ff 15 00 8f 1c 00:e8 e9 a1 22 00 90 ]
ffffddae9a6c0a2a-ffffddae9a6c0a2b 2 bytes - win32kbase!CInpLockGuard::UnLock+1a (+0x8978)
[ 48 ff:4c 8b ]
ffffddae9a6c0a31-ffffddae9a6c0a34 4 bytes - win32kbase!CInpLockGuard::UnLock+21 (+0x07)
[ 0f 1f 44 00:e8 ea 19 22 ]
ffffddae9a6c0a60-ffffddae9a6c0a61 2 bytes - win32kbase!CInpLockGuard::isOwned+10 (+0x2f)
[ 48 ff:4c 8b ]
ffffddae9a6c0a67-ffffddae9a6c0a6a 4 bytes - win32kbase!CInpLockGuard::isOwned+17 (+0x07)
[ 0f 1f 44 00:e8 b4 19 22 ]
ffffddae9a6c0a75-ffffddae9a6c0a76 2 bytes - win32kbase!CInpLockGuard::isOwned+25 (+0x0e)
[ 48 ff:4c 8b ]
ffffddae9a6c0a7c-ffffddae9a6c0a7f 4 bytes - win32kbase!CInpLockGuard::isOwned+2c (+0x07)
[ 0f 1f 44 00:e8 9f 19 22 ]
ffffddae9a6c0ac8-ffffddae9a6c0ac9 2 bytes - win32kbase!SetGlobalCursorLevel+28 (+0x4c)
[ 48 ff:4c 8b ]
ffffddae9a6c0acf-ffffddae9a6c0ad2 4 bytes - win32kbase!SetGlobalCursorLevel+2f (+0x07)
[ 0f 1f 44 00:e8 4c 19 22 ]
ffffddae9a7489df-ffffddae9a7489e0 2 bytes - win32kbase!NtUserUnloadKeyboardLayout+2f (+0x87f10)
[ 48 ff:4c 8b ]
ffffddae9a7489e6-ffffddae9a7489e9 4 bytes - win32kbase!NtUserUnloadKeyboardLayout+36 (+0x07)
[ 0f 1f 44 00:e8 35 9a 19 ]
ffffddae9a7489f5-ffffddae9a7489f6 2 bytes - win32kbase!NtUserUnloadKeyboardLayout+45 (+0x0f)
[ 48 ff:4c 8b ]
ffffddae9a7489fc - win32kbase!NtUserUnloadKeyboardLayout+4c (+0x07)
[ 0f:e8 ]
ffffddae9a7489fe-ffffddae9a7489ff 2 bytes - win32kbase!NtUserUnloadKeyboardLayout+4e (+0x02)
[ 44 00:9a 19 ]
ffffddae9a748a29-ffffddae9a748a2a 2 bytes - win32kbase!NtUserUnloadKeyboardLayout+79 (+0x2b)
[ 48 ff:4c 8b ]
164 errors : !win32kbase (ffffddae9a645679-ffffddae9a748a2a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa85aac444
Arg3: 000000000000001d
Arg4: ffffaa89e2699b00
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_61941
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: EpicGamesLaunc
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff8006a072c08 to fffff80069ff3ea0
STACK_TEXT:
ffffaa89`e2699958 fffff800`6a072c08 : 00000000`0000001a 00000000`00061941 00007ffa`85aac444 00000000`0000001d : nt!KeBugCheckEx
ffffaa89`e2699960 fffff800`6a00205e : ffffad88`53bbe080 00000000`00000000 ffffffff`ffff63c0 00000000`00000000 : nt!MmAccessFault+0x184488
ffffaa89`e2699b00 00007ffa`85aac444 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`f2e2fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`85aac444
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80069f963ae-fffff80069f963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:e0 fb f7 ef ]
4 errors : !nt (fffff80069f963ae-fffff80069f963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------