MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffff9081453567b8, Address of the IRP
Arg2: 0000000000001232
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3889
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8706
Key : Analysis.Init.CPU.mSec
Value: 280
Key : Analysis.Init.Elapsed.mSec
Value: 3630
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 110221-5515-01.dmp
BUGCHECK_CODE: 44
BUGCHECK_P1: ffff9081453567b8
BUGCHECK_P2: 1232
BUGCHECK_P3: 0
BUGCHECK_P4: 0
IRP_ADDRESS: ffff9081453567b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Launcher.exe
STACK_TEXT:
ffff9081`453566e8 fffff807`1983c23e : 00000000`00000044 ffff9081`453567b8 00000000`00001232 00000000`00000000 : nt!KeBugCheckEx
ffff9081`453566f0 fffff807`19684de7 : 00000000`00001000 ffff9081`45356a02 ffffe68d`3940c4b8 ffff940d`faebc800 : nt!IopfCompleteRequest+0x1b743e
ffff9081`453567e0 fffff807`1f72a7d8 : 00000000`00000001 ffffe68d`00000001 fffff807`00000000 ffff940e`0f905890 : nt!IofCompleteRequest+0x17
ffff9081`45356810 fffff807`1821738b : ffff940d`faebc800 ffff940d`faeba060 ffff9081`45356930 fffff807`17238180 : Npfs!NpFastRead+0x1f8
ffff9081`453568a0 fffff807`1824bb2d : ffff940e`0f905890 ffff9081`45356970 ffff9081`45356a10 ffff9081`45356a38 : FLTMGR!FltpPerformFastIoCall+0x16b
ffff9081`45356900 fffff807`19a8c49f : ffff940e`0f905890 00000000`00000000 00000000`00000000 ffff940e`00000000 : FLTMGR!FltpFastIoRead+0x1dd
ffff9081`453569b0 fffff807`19808bb8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x37f
ffff9081`45356a90 00007ffd`9f58ce34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b9`ea2fe5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`9f58ce34
SYMBOL_NAME: Npfs!NpFastRead+1f8
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1f8
FAILURE_BUCKET_ID: 0x44_Npfs!NpFastRead
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {86b7726c-e1a8-7fbc-1f00-18525c488171}
Followup: MachineOwner
---------
2: kd> !blackboxpnp
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132803455833860250
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SWD\MMDEVAPI\{0.0.0.00000000}.{24815350-f88e-4e66-9fb4-eb6f69ab34df}
VetoString :