KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE (162)
A lock tracked by AutoBoost was released by a thread that did not own the lock.
This is typically caused when some thread releases a lock on behalf of another
thread (which is not legal with AutoBoost tracking enabled) or when some thread
tries to release a lock it no longer owns.
Arguments:
Arg1: ffffe001e5a4c080, The address of the thread
Arg2: fffff801335d80d0, The lock address
Arg3: 00000000ffffffff, The session ID of the thread
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P1.40
BIOS_DATE: 10/31/2012
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: N68C-GS FX
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: ffffe001e5a4c080
BUGCHECK_P2: fffff801335d80d0
BUGCHECK_P3: ffffffff
BUGCHECK_P4: 0
CPU_COUNT: 3
CPU_MHZ: 83e
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 2
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x162
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-K01TCKK
ANALYSIS_SESSION_TIME: 05-21-2019 15:12:34.0676
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff801333f13f0 to fffff801333cc9a0
STACK_TEXT:
ffffd001`0d208f88 fffff801`333f13f0 : 00000000`00000162 ffffe001`e5a4c080 fffff801`335d80d0 00000000`ffffffff : nt!KeBugCheckEx
ffffd001`0d208f90 fffff801`332c6d28 : 00000000`00000001 fffff801`335d80c0 fffff801`335d80d0 00000001`00000000 : nt! ?? ::FNODOBFM::`string'+0x14540
ffffd001`0d208fd0 fffff801`332c67bf : 00000000`00000040 ffffd001`0d209120 ffffe001`e19d25d8 00000000`00000800 : nt!MiChargeWsles+0x194
ffffd001`0d209020 fffff801`332c6476 : 00000000`00000000 ffffe001`e19d25d8 00000000`00000000 ffffe001`e5676f00 : nt!MiObtainSystemCacheView+0x47
ffffd001`0d2091d0 fffff801`332c601e : ffffe001`00000001 ffffc001`9bfdade0 ffffe001`e5676f38 fffff801`3357f830 : nt!MmMapViewInSystemCache+0x9e
ffffd001`0d209340 fffff801`33333526 : 00000000`00000001 ffffe001`e5720df0 00000000`00000000 ffffc001`00000000 : nt!CcGetVacbMiss+0x122
ffffd001`0d2093d0 fffff801`33334a7d : 00000000`00000000 00000000`000077c3 ffffd001`0d2094d8 ffffd001`0d2094ac : nt!CcGetVirtualAddress+0x366
ffffd001`0d209470 fffff801`33367120 : ffffe001`e5720df0 00000024`10aee951 ffffd001`0d2095c8 ffffc001`00000007 : nt!CcMapAndCopyInToCache+0x14d
ffffd001`0d209560 fffff800`f1add68a : 00000000`00000007 ffffd001`0d209870 ffffc001`9c251140 00000000`00000701 : nt!CcCopyWriteEx+0x260
ffffd001`0d209600 fffff800`f1ae0b87 : ffffe001`e3320c98 ffffe001`e5ae4501 00000000`00000000 ffffe001`e3320c98 : Ntfs!NtfsCommonWrite+0xcaa
ffffd001`0d209840 fffff800`f193ab1e : ffffe001`e5fbdc00 ffffe001`e5b07510 00000000`00000000 ffffe001`e5b078b0 : Ntfs!NtfsFsdWrite+0x203
ffffd001`0d209900 fffff800`f19390c2 : ffffd001`0d2099c0 ffffe001`e2d4a040 ffffe001`e5ae4550 ffffe001`e5b07510 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd001`0d2099a0 fffff801`33662788 : 00000000`00000001 ffffd001`0d209a81 ffffe001`e5ae4550 fffff800`f1963a83 : fltmgr!FltpDispatch+0xb2
ffffd001`0d209a00 fffff801`336892d6 : ffffe001`e5ae4504 ffffe001`e5ae4550 ffffd001`0d209b18 ffffe001`e5b07510 : nt!IopSynchronousServiceTail+0x170
ffffd001`0d209ad0 fffff801`333d81b3 : ffffe001`746c6644 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x682
ffffd001`0d209bd0 00007ffe`cdf70cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000024`10aee758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`cdf70cca
THREAD_SHA1_HASH_MOD_FUNC: 5bc022311a49d4b5a12f61537e1ed20f4c80da3f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5a1d5ac71103a503db5b0ac8889db597e72bd37a
THREAD_SHA1_HASH_MOD: b28d851ef7201e117cab079988ee3efc98250d67
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+14540
fffff801`333f13f0 cc int 3
FAULT_INSTR_CODE: 58bcccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+14540
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54503718
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14540
FAILURE_BUCKET_ID: 0x162_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0x162_nt!_??_::FNODOBFM::_string_
PRIMARY_PROBLEM_CLASS: 0x162_nt!_??_::FNODOBFM::_string_
TARGET_TIME: 2019-05-20T09:14:56.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 777
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x162_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {5bfa73e6-c957-661c-d3fe-95f3c8575c24}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd00025430cb9, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803a29194a7, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.Elapsed.Sec
Value: 7
Key : Analysis.Memory.CommitPeak.Mb
Value: 60
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P1.40
BIOS_DATE: 10/31/2012
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: N68C-GS FX
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: ffffd00025430cb9
BUGCHECK_P2: c
BUGCHECK_P3: 1
BUGCHECK_P4: fffff803a29194a7
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803a2bd3298
GetUlongPtrFromAddress: unable to read from fffff803a2bd3520
ffffd00025430cb9
CURRENT_IRQL: c
FAULTING_IP:
nt!KiIpiSendRequest+2a7
fffff803`a29194a7 088d793848d1 or byte ptr [rbp-2EB7C787h],cl
CPU_COUNT: 3
CPU_MHZ: 83e
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: 2
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
BAD_PAGES_DETECTED: 2f
ANALYSIS_SESSION_HOST: DESKTOP-K01TCKK
ANALYSIS_SESSION_TIME: 05-21-2019 15:13:17.0615
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: ffffd00053fad1b0 -- (.trap 0xffffd00053fad1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000006 rbx=0000000000000000 rcx=ffffd00046d3aec0
rdx=5555555555555555 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803a29194a7 rsp=ffffd00053fad340 rbp=ffffd00053fad440
r8=ffffd00046d35180 r9=0000000000000004 r10=0000000000000001
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiIpiSendRequest+0x2a7:
fffff803`a29194a7 088d793848d1 or byte ptr [rbp-2EB7C787h],cl ss:0018:ffffd000`25430cb9=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803a29cc4e9 to fffff803a29c09a0
STACK_TEXT:
ffffd000`53fad068 fffff803`a29cc4e9 : 00000000`0000000a ffffd000`25430cb9 00000000`0000000c 00000000`00000001 : nt!KeBugCheckEx
ffffd000`53fad070 fffff803`a29cad3a : 00000000`00000001 f8011538`e0000002 ffff83c1`90ca9300 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffd000`53fad1b0 fffff803`a29194a7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`53fad340 fffff803`a2917db7 : 00000000`00000000 fffff803`a291c527 00000000`00000000 fffff803`a29206f9 : nt!KiIpiSendRequest+0x2a7
ffffd000`53fad550 fffff803`a291aa06 : 00000000`00000000 55a00000`6f608001 ffffd000`53fad780 00000000`00000000 : nt!KeFlushSingleTb+0x203
ffffd000`53fad680 fffff803`a291e0e0 : ffffd000`53fadc20 fffffa80`01e4b0f0 00000000`06000000 ffffd000`53fadc40 : nt!MiStealPage+0x1266
ffffd000`53fadb20 fffff803`a2a787be : ffffffff`ffffffff 00000000`00000001 ffffd000`53fadc40 fffffa80`ffffffff : nt!MiClaimPhysicalRun+0x1e4
ffffd000`53fadba0 fffff803`a2e7875c : ffffe001`00000000 ffffe001`c0000709 00000000`00000000 00000000`00000000 : nt!MiScrubNode+0xfa
ffffd000`53fadc20 fffff803`a290c38c : fffff803`a2e7871c ffffe001`1a44e880 ffffe001`1ca53320 ffffe001`1a44e880 : nt!MiScrubMemoryWorker+0x40
ffffd000`53fadc90 fffff803`a2971c70 : 00000000`00000000 ffffe001`1a44e880 00000000`00000080 ffffe001`1a44e880 : nt!ExpWorkerThread+0x28c
ffffd000`53fadd40 fffff803`a29c6fc6 : fffff803`a2b73180 ffffe001`1a44e880 ffffe001`1b4be880 00000000`000001dc : nt!PspSystemThreadStartup+0x58
ffffd000`53fadda0 00000000`00000000 : ffffd000`53fae000 ffffd000`53fa8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
2 errors : !nt (fffff803a29194a7-fffff803a29195a7)
fffff803a29194a0 55 55 55 55 55 55 55 *08 8d 79 38 48 d1 e8 48 23 UUUUUUU..y8H..H#
...
fffff803a29195a0 c3 41 8b c4 e9 35 fe *bf ff 48 8b 54 24 48 48 8b .A...5...H.T$HH.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2019-05-18T21:09:01.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 1d7c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
*** Memory manager detected 47 instance(s) of page corruption, target is likely to have memory corruption.