BSOD Memory_Management every 3omin

Mart456

Reputable
Sep 8, 2014
1
0
4,510
Hi,

Yesterday i was having multiple BSOD,

irql_not_less_or_equal &
Memory_Management

I have re installed as many drivers as i could and it seems the irql_not_less_or_equal is not happening any more but i am still getting Memory Management BSOD's

Is it possible for someone to have a look at the attached dump file,

Many thanks

Dump file:
CSS:
Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17238.amd64fre.winblue_gdr.140723-2018
Machine Name:
Kernel base = 0xfffff800`21a02000 PsLoadedModuleList = 0xfffff800`21ccc350
Debug session time: Mon Sep  8 13:47:08.488 2014 (UTC - 6:00)
System Uptime: 0 days 0:02:00.215
Loading Kernel Symbols
...............................................................
................................................................
...................Page 113301 not present in the dump file. Type ".hh dbgerr004" for details
.Page 11d83a not present in the dump file. Type ".hh dbgerr004" for details
..........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`fe863018).  Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5100, fffff6f0004d7ac8, 1, 1f3ca00000220}

Probably caused by : Npfs.SYS ( Npfs!NpAddDataQueueEntry+22b )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5100

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80021b80565 to fffff80021b55ca0

STACK_TEXT:  
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8          mov     rdi,rax

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  Npfs!NpAddDataQueueEntry+22b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  5215f8a9

BUCKET_ID_FUNC_OFFSET:  22b

FAILURE_BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_5100_npfs!npadddataqueueentry

FAILURE_ID_HASH:  {062eda43-abef-230c-8dc0-4845c85a0f02}

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5100

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80021b80565 to fffff80021b55ca0

STACK_TEXT:  
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8          mov     rdi,rax

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  Npfs!NpAddDataQueueEntry+22b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  5215f8a9

BUCKET_ID_FUNC_OFFSET:  22b

FAILURE_BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_5100_npfs!npadddataqueueentry

FAILURE_ID_HASH:  {062eda43-abef-230c-8dc0-4845c85a0f02}

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5100

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80021b80565 to fffff80021b55ca0

STACK_TEXT:  
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8          mov     rdi,rax

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  Npfs!NpAddDataQueueEntry+22b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  5215f8a9

BUCKET_ID_FUNC_OFFSET:  22b

FAILURE_BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_5100_npfs!npadddataqueueentry

FAILURE_ID_HASH:  {062eda43-abef-230c-8dc0-4845c85a0f02}

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5100

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80021b80565 to fffff80021b55ca0

STACK_TEXT:  
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8          mov     rdi,rax

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  Npfs!NpAddDataQueueEntry+22b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  5215f8a9

BUCKET_ID_FUNC_OFFSET:  22b

FAILURE_BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

BUCKET_ID:  0x1a_5100_Npfs!NpAddDataQueueEntry

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_5100_npfs!npadddataqueueentry

FAILURE_ID_HASH:  {062eda43-abef-230c-8dc0-4845c85a0f02}

Followup: MachineOwner
---------
 

puttu94

Reputable
Apr 21, 2014
44
0
4,540
if u re on desktop, open up ur pc take off CMOS battery, and power supply to board and CPU socket for 1 hour, put them back..
if u re on a laptop, use the laptop so that the battery should be really empty-meaning that u should not be able to boot up without plugging in..then take the battery off leave it for an hour and put it back, plug it in, boot up and u should be good to go..

Note: if u have any drives encrypted with bitlocker, those will all lose encryption.. u will have to encrypt again..

Cheers,
Prahlad
 

adamv1

Honorable
Jan 29, 2013
174
0
10,710
Updating chrome may help since that is the program that is running while the problem occurs. Resetting the bios is probably not going to solve this issue. Some more info would help, like, when does it happen? Are you using a specific program when this happens? How often does this happen? Every day, every hour, every few minutes? When was the last time you changed hardware, re applied the thermal compound? What kind of computer is this, a laptop, desktop. It looks like you have windows 8, that is about the only useful information the bug check will give us other than there was a problem with the memory management system and here are the hashes I was running when it occurred.