Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17238.amd64fre.winblue_gdr.140723-2018
Machine Name:
Kernel base = 0xfffff800`21a02000 PsLoadedModuleList = 0xfffff800`21ccc350
Debug session time: Mon Sep 8 13:47:08.488 2014 (UTC - 6:00)
System Uptime: 0 days 0:02:00.215
Loading Kernel Symbols
...............................................................
................................................................
...................Page 113301 not present in the dump file. Type ".hh dbgerr004" for details
.Page 11d83a not present in the dump file. Type ".hh dbgerr004" for details
..........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`fe863018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5100, fffff6f0004d7ac8, 1, 1f3ca00000220}
Probably caused by : Npfs.SYS ( Npfs!NpAddDataQueueEntry+22b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5100
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff80021b80565 to fffff80021b55ca0
STACK_TEXT:
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002
STACK_COMMAND: kb
FOLLOWUP_IP:
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8 mov rdi,rax
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: Npfs!NpAddDataQueueEntry+22b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f8a9
BUCKET_ID_FUNC_OFFSET: 22b
FAILURE_BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_5100_npfs!npadddataqueueentry
FAILURE_ID_HASH: {062eda43-abef-230c-8dc0-4845c85a0f02}
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5100
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff80021b80565 to fffff80021b55ca0
STACK_TEXT:
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002
STACK_COMMAND: kb
FOLLOWUP_IP:
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8 mov rdi,rax
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: Npfs!NpAddDataQueueEntry+22b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f8a9
BUCKET_ID_FUNC_OFFSET: 22b
FAILURE_BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_5100_npfs!npadddataqueueentry
FAILURE_ID_HASH: {062eda43-abef-230c-8dc0-4845c85a0f02}
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5100
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff80021b80565 to fffff80021b55ca0
STACK_TEXT:
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002
STACK_COMMAND: kb
FOLLOWUP_IP:
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8 mov rdi,rax
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: Npfs!NpAddDataQueueEntry+22b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f8a9
BUCKET_ID_FUNC_OFFSET: 22b
FAILURE_BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_5100_npfs!npadddataqueueentry
FAILURE_ID_HASH: {062eda43-abef-230c-8dc0-4845c85a0f02}
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the bugcheck.
Arg2: fffff6f0004d7ac8
Arg3: 0000000000000001
Arg4: 0001f3ca00000220
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5100
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff80021b80565 to fffff80021b55ca0
STACK_TEXT:
ffffd000`23f922d8 fffff800`21b80565 : 00000000`0000001a 00000000`00005100 fffff6f0`004d7ac8 00000000`00000001 : nt!KeBugCheckEx
ffffd000`23f922e0 fffff800`21a6b1ea : 00000000`00000006 00000000`00000000 00000000`00000006 00000000`00000308 : nt! ?? ::FNODOBFM::`string'+0x1a3b5
ffffd000`23f92430 fffff800`21a6a512 : fffff800`00000002 00000000`00000200 fffff800`21cdf840 00000000`00000000 : nt!MiAllocatePoolPages+0x146
ffffd000`23f92480 fffff800`21c96f23 : 00000000`00000000 00000000`7246704e 00000000`00001000 00000000`00005990 : nt!ExpAllocateBigPool+0xd2
ffffd000`23f92580 fffff800`21a2b6ff : 00000000`00000000 00000000`00005990 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xa73
ffffd000`23f92650 fffff801`38fe845b : fffff800`21a02000 00000000`00000000 00000000`00001000 ffffe000`00000000 : nt!ExAllocatePoolWithQuotaTag+0x5f
ffffd000`23f926e0 fffff801`38fe8824 : ffffc001`f1395210 ffffd000`23f92820 ffffc001`f1395258 ffffb953`00005990 : Npfs!NpAddDataQueueEntry+0x22b
ffffd000`23f92740 fffff801`38fe85cf : ffffe000`94c51010 00000000`06a5b000 00000000`00000000 ffffe000`9a9e4880 : Npfs!NpCommonWrite+0x1f4
ffffd000`23f927d0 fffff801`37a7a0f5 : ffffe000`9458e040 ffffe000`9aa27f20 ffffe000`94c51010 ffffd000`23f92850 : Npfs!NpFsdWrite+0x5f
ffffd000`23f92840 fffff800`21da7498 : 00000000`00000001 ffffd000`23f92921 ffffe000`9aa27f20 ffffe000`9ada2301 : fltmgr!FltpDispatch+0xf5
ffffd000`23f928a0 fffff800`21da6e44 : ffffe000`9aa27f04 ffffe000`9aa27f20 ffffb953`25eebb08 ffffe000`9aa27f20 : nt!IopSynchronousServiceTail+0x16c
ffffd000`23f92970 fffff800`21b614b3 : ffffe000`9a9e4801 00000000`00000000 00000000`00000001 00000000`01249644 : nt!NtWriteFile+0x750
ffffd000`23f92a90 00000000`00bf0002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0053f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xbf0002
STACK_COMMAND: kb
FOLLOWUP_IP:
Npfs!NpAddDataQueueEntry+22b
fffff801`38fe845b 488bf8 mov rdi,rax
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: Npfs!NpAddDataQueueEntry+22b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f8a9
BUCKET_ID_FUNC_OFFSET: 22b
FAILURE_BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
BUCKET_ID: 0x1a_5100_Npfs!NpAddDataQueueEntry
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_5100_npfs!npadddataqueueentry
FAILURE_ID_HASH: {062eda43-abef-230c-8dc0-4845c85a0f02}
Followup: MachineOwner
---------