New
#1
BSOD, computer idling with driver verifier running
Have had problems with bluescreens and whocrashed told me it was most likely caused by some driver.
Turned on verifier after your guide and it crashed after I went to bed..
Have had problems with bluescreens and whocrashed told me it was most likely caused by some driver.
Turned on verifier after your guide and it crashed after I went to bed..
Hi there!
Seems like the crashes are caused by netr28x.sys i.e. Ralink 802.11n Wireless Adapters. I would recommend to remove to and reinstall it. Then disable Driver Verifier.
Code:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000010, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002aa830f, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cff100 GetUlongFromAddress: unable to read from fffff80002cff1c0 0000000000000010 Nonpaged pool CURRENT_IRQL: 2 FAULTING_IP: nt!RtlInsertEntryHashTable+73 fffff800`02aa830f 488b4810 mov rcx,qword ptr [rax+10h] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TAG_NOT_DEFINED_c000000f: FFFFF80000BA2FB0 TRAP_FRAME: fffff80000b9a290 -- (.trap 0xfffff80000b9a290) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffa8009286928 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002aa830f rsp=fffff80000b9a420 rbp=fffff80000b9b238 r8=fffffa8007a2f3c0 r9=000000000000007f r10=000013f1cdf7d6bb r11=000000000000ccbc r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe cy nt!RtlInsertEntryHashTable+0x73: fffff800`02aa830f 488b4810 mov rcx,qword ptr [rax+10h] ds:00000000`00000010=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ac71a9 to fffff80002ac7c00 STACK_TEXT: fffff800`00b9a148 fffff800`02ac71a9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`00b9a150 fffff800`02ac5e20 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`00b9b3d8 : nt!KiBugCheckDispatch+0x69 fffff800`00b9a290 fffff800`02aa830f : fffffa80`08285070 00000000`00000000 00000000`00000003 00000000`0000000b : nt!KiPageFault+0x260 fffff800`00b9a420 fffff880`01778bc5 : fffff800`00b9b3d8 fffff880`01947980 fffff880`01947980 00000000`00000005 : nt!RtlInsertEntryHashTable+0x73 fffff800`00b9a470 fffff880`01778d13 : fffffa80`0a38bdb0 00000000`00000005 fffff880`0438c075 fffff880`04393eca : NETIO!KfdAleInsertFlowContextTable+0xb5 fffff800`00b9a4c0 fffff880`018491f5 : 00000000`00000000 fffff880`042fc001 00000000`00000002 00000000`00000007 : NETIO!KfdAleInitializeFlowTable+0x13 fffff800`00b9a4f0 fffff880`01848894 : fffff880`02da2110 fffff980`017f4310 fffffa80`0a38bdb0 00000000`00000000 : tcpip!WfpAlepAuthorizeReceive+0x7a5 fffff800`00b9ab20 fffff880`0184759c : 00000000`00000000 fffffa80`0000002c 00000000`00000000 fffffa80`094118e0 : tcpip!WfpAleAuthorizeReceive+0x584 fffff800`00b9ae00 fffff880`0187e78e : 00000000`00000000 fffff800`00b9b280 fffff800`00b9b338 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x29c fffff800`00b9aef0 fffff880`0188a27d : 00000000`00000002 fffff880`016af755 fffffa80`07a21ee0 fffff980`16e9ceb0 : tcpip!ProcessALEForTransportPacket+0x5fe fffff800`00b9b160 fffff880`0187f70f : fffffa80`0a38bdb0 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!ProcessAleForNonTcpIn+0x1ad fffff800`00b9b280 fffff880`01860891 : fffffa80`00000011 fffffa80`07c90002 fffffa80`07b875d4 00000000`00000004 : tcpip!WfpProcessInTransportStackIndication+0xb1f fffff800`00b9b5f0 fffff880`01882f73 : fffffa80`07c976f0 fffffa80`07a74820 00000000`00000000 fffffa80`07b8f000 : tcpip!InetInspectReceiveDatagram+0x121 fffff800`00b9b6b0 fffff880`01883325 : fffffa80`07c976f0 fffffa80`096ea800 fffffa80`07b84800 fffff880`01773872 : tcpip!UdpBeginMessageIndication+0x83 fffff800`00b9b800 fffff880`0187d97d : fffffa80`00000000 fffffa80`07c976f0 fffffa80`07a74820 fffff880`05e4d050 : tcpip!UdpDeliverDatagrams+0xd5 fffff800`00b9b990 fffff880`0185bc37 : fffffa80`07baa3a0 fffffa80`07ba74e0 fffffa80`00000002 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x1ed fffff800`00b9baa0 fffff880`0185b74a : 00000000`00000000 fffff880`0196e9a0 fffff800`00b9bc60 fffff980`758dcd3e : tcpip!IppDeliverListToProtocol+0xf7 fffff800`00b9bb60 fffff880`0185ad49 : fffff880`0196e9a0 fffff980`03d92f50 00000000`00000011 fffff800`00b9bc50 : tcpip!IppProcessDeliverList+0x5a fffff800`00b9bc00 fffff880`018589ef : fffff800`9801a8c0 fffff880`0196e9a0 fffff880`0196e9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a fffff800`00b9bce0 fffff880`01857fc2 : fffffa80`09414a00 00000000`00000000 fffffa80`09410401 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f fffff800`00b9bee0 fffff880`018573ea : fffffa80`09410490 fffff800`00b9c010 fffffa80`09410490 fffffa80`06680000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2 fffff800`00b9bfc0 fffff800`02ad3878 : fffff980`16e9ceb0 00000000`00004800 fffff800`02c50cc0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda fffff800`00b9c010 fffff880`01857ae2 : fffff880`01857310 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8 fffff800`00b9c0f0 fffff880`0173d0eb : fffff980`07da48d0 00000000`00000000 fffffa80`07fc11a0 fffffa80`07fc11a0 : tcpip!FlReceiveNetBufferListChain+0xb2 fffff800`00b9c160 fffff880`01706ad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb fffff800`00b9c1d0 fffff880`016895d4 : fffffa80`07fc11a0 00000000`00000002 00000000`00000001 fffff980`16e9ceb0 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6 fffff800`00b9c650 fffff880`01689549 : 00000000`00000000 00000000`00000000 fffffa80`094033e0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x24 fffff800`00b9c690 fffff880`016894e0 : fffff880`0392d5c0 fffffa80`09406010 fffffa80`094033e0 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff800`00b9c6d0 fffff880`038f67ee : fffffa80`09406010 00000000`00000000 fffff980`16e9ceb0 fffff880`0392d5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff800`00b9c710 fffff880`01689549 : fffff980`046e2c80 00000000`00000000 00000000`00000001 00000000`00000000 : nwifi!Pt6Receive+0x296 fffff800`00b9c770 fffff880`016894e0 : fffff980`017f4328 fffff880`02d9f0c7 fffff880`02da0340 fffff880`0448c2de : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff800`00b9c7b0 fffff880`02d9b9c0 : fffff880`02da2110 00000000`00000000 00000000`00000001 fffff980`017f4d78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff800`00b9c7f0 fffff880`016a20a7 : fffffa80`07fc11a0 fffff980`03d92e20 fffff980`03d92e20 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158 fffff800`00b9c850 fffff880`04393294 : 00000000`0000005a fffffa80`08273800 fffffa80`08200000 fffffa80`075f4000 : ndis! ?? ::FNODOBFM::`string'+0xcd8f fffff800`00b9c8a0 00000000`0000005a : fffffa80`08273800 fffffa80`08200000 fffffa80`075f4000 fffff880`00000000 : netr28x+0x97294 fffff800`00b9c8a8 fffffa80`08273800 : fffffa80`08200000 fffffa80`075f4000 fffff880`00000000 fffff800`00000000 : 0x5a fffff800`00b9c8b0 fffffa80`08200000 : fffffa80`075f4000 fffff880`00000000 fffff800`00000000 00000000`00000000 : 0xfffffa80`08273800 fffff800`00b9c8b8 fffffa80`075f4000 : fffff880`00000000 fffff800`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`08200000 fffff800`00b9c8c0 fffff880`00000000 : fffff800`00000000 00000000`00000000 00000000`00000000 fffffa80`08200000 : 0xfffffa80`075f4000 fffff800`00b9c8c8 fffff800`00000000 : 00000000`00000000 00000000`00000000 fffffa80`08200000 00000000`00000d58 : 0xfffff880`00000000 fffff800`00b9c8d0 00000000`00000000 : 00000000`00000000 fffffa80`08200000 00000000`00000d58 fffffa80`08200000 : 0xfffff800`00000000 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!KfdAleInsertFlowContextTable+b5 fffff880`01778bc5 84c0 test al,al SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: NETIO!KfdAleInsertFlowContextTable+b5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0 FAILURE_BUCKET_ID: X64_0xA_NETIO!KfdAleInsertFlowContextTable+b5 BUCKET_ID: X64_0xA_NETIO!KfdAleInsertFlowContextTable+b5 Followup: MachineOwner
Thanks, I know windows update installed/updated those drivers just a few days ago.. and I did have BSOD problems before i even installed the PCI-E wifi card.. But I will try removing it and reinstalling when I get back home from work.
Okey, So i uninstalled the drivers and installed again. Could not find any newer updated drivers for windows 7 sadly. Worked find with for some time although limited use.. Got two crashes within an hour now, one during a malware scan (microsoft windows malicious software removal tool), and then when I was launching diablo 3 because my bnet account apparently had been suspended because of someone trying to get access to it.
Once also my spotify crashed and the sound was ****ed up badly and when I was rebooting I got a bsod during logoff (not sure if a log from that one is in the rar)
Run a Hardware Diagnostic Hardware Diagnostic | Captain Debugger (RAM & Hard drive) Seems like it might be Hardware issue.
Code:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffaa0045a4ed4, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff880012c86de, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb4100 GetUlongFromAddress: unable to read from fffff80002cb41c0 fffffaa0045a4ed4 Nonpaged pool FAULTING_IP: Ntfs!NtfsTeardownStructures+18e fffff880`012c86de 418b41d4 mov eax,dword ptr [r9-2Ch] MM_INTERNAL_CODE: 5 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: MRT.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff88009aba210 -- (.trap 0xfffff88009aba210) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa8009984b01 rbx=0000000000000000 rcx=fffffa8006f64800 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff880012c86de rsp=fffff88009aba3a0 rbp=fffff88009aba7a0 r8=fffffa8008b5cdd8 r9=fffffaa0045a4f00 r10=fffff88009aba4b0 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc Ntfs!NtfsTeardownStructures+0x18e: fffff880`012c86de 418b41d4 mov eax,dword ptr [r9-2Ch] ds:fffffaa0`045a4ed4=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002af95a3 to fffff80002a7cc00 STACK_TEXT: fffff880`09aba0a8 fffff800`02af95a3 : 00000000`00000050 fffffaa0`045a4ed4 00000000`00000000 fffff880`09aba210 : nt!KeBugCheckEx fffff880`09aba0b0 fffff800`02a7ad2e : 00000000`00000000 fffffaa0`045a4ed4 00000000`00000000 fffff8a0`045a4a90 : nt! ?? ::FNODOBFM::`string'+0x43801 fffff880`09aba210 fffff880`012c86de : fffff8a0`045a4a90 fffff880`09aba7a0 fffff880`09aba455 fffffa80`096f4010 : nt!KiPageFault+0x16e fffff880`09aba3a0 fffff880`012b6735 : fffffa80`096f4010 00000000`00000000 00000000`00000001 00000000`00000000 : Ntfs!NtfsTeardownStructures+0x18e fffff880`09aba420 fffff880`012595df : fffffa80`096f4010 fffffa80`06f64180 fffffa80`09810d01 fffff880`09aba600 : Ntfs!NtfsFlushVolume+0x515 fffff880`09aba550 fffff880`01246c7f : fffffa80`096f4010 fffff880`00e55001 fffffa80`06e8fe10 fffffa80`09910d00 : Ntfs!NtfsVolumeDasdIo+0x1d3 fffff880`09aba600 fffff880`01248478 : fffffa80`096f4010 fffffa80`09a17740 fffff880`09aba701 fffffa80`09810d00 : Ntfs!NtfsCommonRead+0x5bf fffff880`09aba770 fffff880`00e02bcf : fffffa80`09a17a50 fffffa80`09a17740 fffffa80`09810d30 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8 fffff880`09aba820 fffff880`00e016df : fffffa80`06e81860 00000000`00000001 fffffa80`06e81800 fffffa80`09a17740 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`09aba8b0 fffff800`02d87d1b : 00000000`00000000 fffffa80`09910d10 00000000`00000001 fffffa80`09a17740 : fltmgr!FltpDispatch+0xcf fffff880`09aba910 fffff800`02d67a03 : fffffa80`09910d10 fffffa80`09910d10 fffffa80`09910d10 fffff880`009eb180 : nt!IopSynchronousServiceTail+0xfb fffff880`09aba980 fffff800`02a7be93 : 00000000`000003a4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631 fffff880`09abaa70 00000000`77b5137a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`072bdf58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b5137a STACK_COMMAND: kb FOLLOWUP_IP: Ntfs!NtfsTeardownStructures+18e fffff880`012c86de 418b41d4 mov eax,dword ptr [r9-2Ch] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: Ntfs!NtfsTeardownStructures+18e FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5167f5fc FAILURE_BUCKET_ID: X64_0x50_Ntfs!NtfsTeardownStructures+18e BUCKET_ID: X64_0x50_Ntfs!NtfsTeardownStructures+18e Followup: MachineOwner