BSOD, computer idling with driver verifier running


  1. Posts : 11
    Windows 7 Ultimate 64bit
       #1

    BSOD, computer idling with driver verifier running


    Have had problems with bluescreens and whocrashed told me it was most likely caused by some driver.
    Turned on verifier after your guide and it crashed after I went to bed..
      My Computer


  2. Posts : 4,772
    Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
       #2

    Hi there!

    Seems like the crashes are caused by netr28x.sys i.e. Ralink 802.11n Wireless Adapters. I would recommend to remove to and reinstall it. Then disable Driver Verifier.


    Code:
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000010, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002aa830f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cff100
    GetUlongFromAddress: unable to read from fffff80002cff1c0
     0000000000000010 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!RtlInsertEntryHashTable+73
    fffff800`02aa830f 488b4810        mov     rcx,qword ptr [rax+10h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TAG_NOT_DEFINED_c000000f:  FFFFF80000BA2FB0
    
    TRAP_FRAME:  fffff80000b9a290 -- (.trap 0xfffff80000b9a290)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa8009286928 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002aa830f rsp=fffff80000b9a420 rbp=fffff80000b9b238
     r8=fffffa8007a2f3c0  r9=000000000000007f r10=000013f1cdf7d6bb
    r11=000000000000ccbc r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    nt!RtlInsertEntryHashTable+0x73:
    fffff800`02aa830f 488b4810        mov     rcx,qword ptr [rax+10h] ds:00000000`00000010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ac71a9 to fffff80002ac7c00
    
    STACK_TEXT:  
    fffff800`00b9a148 fffff800`02ac71a9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff800`00b9a150 fffff800`02ac5e20 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`00b9b3d8 : nt!KiBugCheckDispatch+0x69
    fffff800`00b9a290 fffff800`02aa830f : fffffa80`08285070 00000000`00000000 00000000`00000003 00000000`0000000b : nt!KiPageFault+0x260
    fffff800`00b9a420 fffff880`01778bc5 : fffff800`00b9b3d8 fffff880`01947980 fffff880`01947980 00000000`00000005 : nt!RtlInsertEntryHashTable+0x73
    fffff800`00b9a470 fffff880`01778d13 : fffffa80`0a38bdb0 00000000`00000005 fffff880`0438c075 fffff880`04393eca : NETIO!KfdAleInsertFlowContextTable+0xb5
    fffff800`00b9a4c0 fffff880`018491f5 : 00000000`00000000 fffff880`042fc001 00000000`00000002 00000000`00000007 : NETIO!KfdAleInitializeFlowTable+0x13
    fffff800`00b9a4f0 fffff880`01848894 : fffff880`02da2110 fffff980`017f4310 fffffa80`0a38bdb0 00000000`00000000 : tcpip!WfpAlepAuthorizeReceive+0x7a5
    fffff800`00b9ab20 fffff880`0184759c : 00000000`00000000 fffffa80`0000002c 00000000`00000000 fffffa80`094118e0 : tcpip!WfpAleAuthorizeReceive+0x584
    fffff800`00b9ae00 fffff880`0187e78e : 00000000`00000000 fffff800`00b9b280 fffff800`00b9b338 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x29c
    fffff800`00b9aef0 fffff880`0188a27d : 00000000`00000002 fffff880`016af755 fffffa80`07a21ee0 fffff980`16e9ceb0 : tcpip!ProcessALEForTransportPacket+0x5fe
    fffff800`00b9b160 fffff880`0187f70f : fffffa80`0a38bdb0 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!ProcessAleForNonTcpIn+0x1ad
    fffff800`00b9b280 fffff880`01860891 : fffffa80`00000011 fffffa80`07c90002 fffffa80`07b875d4 00000000`00000004 : tcpip!WfpProcessInTransportStackIndication+0xb1f
    fffff800`00b9b5f0 fffff880`01882f73 : fffffa80`07c976f0 fffffa80`07a74820 00000000`00000000 fffffa80`07b8f000 : tcpip!InetInspectReceiveDatagram+0x121
    fffff800`00b9b6b0 fffff880`01883325 : fffffa80`07c976f0 fffffa80`096ea800 fffffa80`07b84800 fffff880`01773872 : tcpip!UdpBeginMessageIndication+0x83
    fffff800`00b9b800 fffff880`0187d97d : fffffa80`00000000 fffffa80`07c976f0 fffffa80`07a74820 fffff880`05e4d050 : tcpip!UdpDeliverDatagrams+0xd5
    fffff800`00b9b990 fffff880`0185bc37 : fffffa80`07baa3a0 fffffa80`07ba74e0 fffffa80`00000002 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x1ed
    fffff800`00b9baa0 fffff880`0185b74a : 00000000`00000000 fffff880`0196e9a0 fffff800`00b9bc60 fffff980`758dcd3e : tcpip!IppDeliverListToProtocol+0xf7
    fffff800`00b9bb60 fffff880`0185ad49 : fffff880`0196e9a0 fffff980`03d92f50 00000000`00000011 fffff800`00b9bc50 : tcpip!IppProcessDeliverList+0x5a
    fffff800`00b9bc00 fffff880`018589ef : fffff800`9801a8c0 fffff880`0196e9a0 fffff880`0196e9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff800`00b9bce0 fffff880`01857fc2 : fffffa80`09414a00 00000000`00000000 fffffa80`09410401 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff800`00b9bee0 fffff880`018573ea : fffffa80`09410490 fffff800`00b9c010 fffffa80`09410490 fffffa80`06680000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff800`00b9bfc0 fffff800`02ad3878 : fffff980`16e9ceb0 00000000`00004800 fffff800`02c50cc0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff800`00b9c010 fffff880`01857ae2 : fffff880`01857310 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff800`00b9c0f0 fffff880`0173d0eb : fffff980`07da48d0 00000000`00000000 fffffa80`07fc11a0 fffffa80`07fc11a0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff800`00b9c160 fffff880`01706ad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff800`00b9c1d0 fffff880`016895d4 : fffffa80`07fc11a0 00000000`00000002 00000000`00000001 fffff980`16e9ceb0 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff800`00b9c650 fffff880`01689549 : 00000000`00000000 00000000`00000000 fffffa80`094033e0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24
    fffff800`00b9c690 fffff880`016894e0 : fffff880`0392d5c0 fffffa80`09406010 fffffa80`094033e0 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff800`00b9c6d0 fffff880`038f67ee : fffffa80`09406010 00000000`00000000 fffff980`16e9ceb0 fffff880`0392d5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff800`00b9c710 fffff880`01689549 : fffff980`046e2c80 00000000`00000000 00000000`00000001 00000000`00000000 : nwifi!Pt6Receive+0x296
    fffff800`00b9c770 fffff880`016894e0 : fffff980`017f4328 fffff880`02d9f0c7 fffff880`02da0340 fffff880`0448c2de : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff800`00b9c7b0 fffff880`02d9b9c0 : fffff880`02da2110 00000000`00000000 00000000`00000001 fffff980`017f4d78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff800`00b9c7f0 fffff880`016a20a7 : fffffa80`07fc11a0 fffff980`03d92e20 fffff980`03d92e20 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158
    fffff800`00b9c850 fffff880`04393294 : 00000000`0000005a fffffa80`08273800 fffffa80`08200000 fffffa80`075f4000 : ndis! ?? ::FNODOBFM::`string'+0xcd8f
    fffff800`00b9c8a0 00000000`0000005a : fffffa80`08273800 fffffa80`08200000 fffffa80`075f4000 fffff880`00000000 : netr28x+0x97294
    fffff800`00b9c8a8 fffffa80`08273800 : fffffa80`08200000 fffffa80`075f4000 fffff880`00000000 fffff800`00000000 : 0x5a
    fffff800`00b9c8b0 fffffa80`08200000 : fffffa80`075f4000 fffff880`00000000 fffff800`00000000 00000000`00000000 : 0xfffffa80`08273800
    fffff800`00b9c8b8 fffffa80`075f4000 : fffff880`00000000 fffff800`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`08200000
    fffff800`00b9c8c0 fffff880`00000000 : fffff800`00000000 00000000`00000000 00000000`00000000 fffffa80`08200000 : 0xfffffa80`075f4000
    fffff800`00b9c8c8 fffff800`00000000 : 00000000`00000000 00000000`00000000 fffffa80`08200000 00000000`00000d58 : 0xfffff880`00000000
    fffff800`00b9c8d0 00000000`00000000 : 00000000`00000000 fffffa80`08200000 00000000`00000d58 fffffa80`08200000 : 0xfffff800`00000000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!KfdAleInsertFlowContextTable+b5
    fffff880`01778bc5 84c0            test    al,al
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  NETIO!KfdAleInsertFlowContextTable+b5
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5034f6a0
    
    FAILURE_BUCKET_ID:  X64_0xA_NETIO!KfdAleInsertFlowContextTable+b5
    
    BUCKET_ID:  X64_0xA_NETIO!KfdAleInsertFlowContextTable+b5
    
    Followup: MachineOwner
      My Computer


  3. Posts : 11
    Windows 7 Ultimate 64bit
    Thread Starter
       #3

    Thanks, I know windows update installed/updated those drivers just a few days ago.. and I did have BSOD problems before i even installed the PCI-E wifi card.. But I will try removing it and reinstalling when I get back home from work.
      My Computer


  4. Posts : 11
    Windows 7 Ultimate 64bit
    Thread Starter
       #4

    Okey, So i uninstalled the drivers and installed again. Could not find any newer updated drivers for windows 7 sadly. Worked find with for some time although limited use.. Got two crashes within an hour now, one during a malware scan (microsoft windows malicious software removal tool), and then when I was launching diablo 3 because my bnet account apparently had been suspended because of someone trying to get access to it.

    Once also my spotify crashed and the sound was ****ed up badly and when I was rebooting I got a bsod during logoff (not sure if a log from that one is in the rar)
      My Computer


  5. Posts : 4,772
    Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
       #5

    Mezzlock said:
    Okey, So i uninstalled the drivers and installed again. Could not find any newer updated drivers for windows 7 sadly. Worked find with for some time although limited use.. Got two crashes within an hour now, one during a malware scan (microsoft windows malicious software removal tool), and then when I was launching diablo 3 because my bnet account apparently had been suspended because of someone trying to get access to it.

    Once also my spotify crashed and the sound was ****ed up badly and when I was rebooting I got a bsod during logoff (not sure if a log from that one is in the rar)
    Run a Hardware Diagnostic Hardware Diagnostic | Captain Debugger (RAM & Hard drive) Seems like it might be Hardware issue.

    Code:
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffffaa0045a4ed4, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff880012c86de, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb4100
    GetUlongFromAddress: unable to read from fffff80002cb41c0
     fffffaa0045a4ed4 Nonpaged pool
    
    FAULTING_IP: 
    Ntfs!NtfsTeardownStructures+18e
    fffff880`012c86de 418b41d4        mov     eax,dword ptr [r9-2Ch]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  MRT.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff88009aba210 -- (.trap 0xfffff88009aba210)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8009984b01 rbx=0000000000000000 rcx=fffffa8006f64800
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880012c86de rsp=fffff88009aba3a0 rbp=fffff88009aba7a0
     r8=fffffa8008b5cdd8  r9=fffffaa0045a4f00 r10=fffff88009aba4b0
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    Ntfs!NtfsTeardownStructures+0x18e:
    fffff880`012c86de 418b41d4        mov     eax,dword ptr [r9-2Ch] ds:fffffaa0`045a4ed4=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002af95a3 to fffff80002a7cc00
    
    STACK_TEXT:  
    fffff880`09aba0a8 fffff800`02af95a3 : 00000000`00000050 fffffaa0`045a4ed4 00000000`00000000 fffff880`09aba210 : nt!KeBugCheckEx
    fffff880`09aba0b0 fffff800`02a7ad2e : 00000000`00000000 fffffaa0`045a4ed4 00000000`00000000 fffff8a0`045a4a90 : nt! ?? ::FNODOBFM::`string'+0x43801
    fffff880`09aba210 fffff880`012c86de : fffff8a0`045a4a90 fffff880`09aba7a0 fffff880`09aba455 fffffa80`096f4010 : nt!KiPageFault+0x16e
    fffff880`09aba3a0 fffff880`012b6735 : fffffa80`096f4010 00000000`00000000 00000000`00000001 00000000`00000000 : Ntfs!NtfsTeardownStructures+0x18e
    fffff880`09aba420 fffff880`012595df : fffffa80`096f4010 fffffa80`06f64180 fffffa80`09810d01 fffff880`09aba600 : Ntfs!NtfsFlushVolume+0x515
    fffff880`09aba550 fffff880`01246c7f : fffffa80`096f4010 fffff880`00e55001 fffffa80`06e8fe10 fffffa80`09910d00 : Ntfs!NtfsVolumeDasdIo+0x1d3
    fffff880`09aba600 fffff880`01248478 : fffffa80`096f4010 fffffa80`09a17740 fffff880`09aba701 fffffa80`09810d00 : Ntfs!NtfsCommonRead+0x5bf
    fffff880`09aba770 fffff880`00e02bcf : fffffa80`09a17a50 fffffa80`09a17740 fffffa80`09810d30 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
    fffff880`09aba820 fffff880`00e016df : fffffa80`06e81860 00000000`00000001 fffffa80`06e81800 fffffa80`09a17740 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`09aba8b0 fffff800`02d87d1b : 00000000`00000000 fffffa80`09910d10 00000000`00000001 fffffa80`09a17740 : fltmgr!FltpDispatch+0xcf
    fffff880`09aba910 fffff800`02d67a03 : fffffa80`09910d10 fffffa80`09910d10 fffffa80`09910d10 fffff880`009eb180 : nt!IopSynchronousServiceTail+0xfb
    fffff880`09aba980 fffff800`02a7be93 : 00000000`000003a4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
    fffff880`09abaa70 00000000`77b5137a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`072bdf58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b5137a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    Ntfs!NtfsTeardownStructures+18e
    fffff880`012c86de 418b41d4        mov     eax,dword ptr [r9-2Ch]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  Ntfs!NtfsTeardownStructures+18e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Ntfs
    
    IMAGE_NAME:  Ntfs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5167f5fc
    
    FAILURE_BUCKET_ID:  X64_0x50_Ntfs!NtfsTeardownStructures+18e
    
    BUCKET_ID:  X64_0x50_Ntfs!NtfsTeardownStructures+18e
    
    Followup: MachineOwner
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:27.
Find Us