BSOD possibly when updating World of Warships


  1. Posts : 1
    Windows 7 Home Premium x64
       #1

    BSOD possibly when updating World of Warships


    I've been having these BSOD since yesterday, and i think it's caused by a client update of the game World of Warships. After the first BSOD (i was updating the game) i used the PC without a problem for a while. Then i decided to resume the update and 10 minutes later another BSOD happened. I have attached the crash files.
      My Computer


  2. Posts : 646
    NT4
       #2

    Your dumps are blaming NETwNs64.sys which is an intel wifi driver Driver Reference Table - Netwsw00.sys

    Check the intel site and see if you can find a newer driver for it.


    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    Use !analyze -v to get detailed debugging information.
    BugCheck D1, {fffff8800bb3a000, 2, 0, fffff88006821660}
    *** WARNING: Unable to verify timestamp for NETwNs64.sys
    *** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys
    Probably caused by : NETwNs64.sys ( NETwNs64+7660 )
    Followup: MachineOwner
    ---------
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff8800bb3a000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88006821660, address which referenced memory
    Debugging Details:
    ------------------
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034bf100
    GetUlongFromAddress: unable to read from fffff800034bf1c0
     fffff8800bb3a000 Nonpaged pool
    CURRENT_IRQL:  2
    FAULTING_IP: 
    NETwNs64+7660
    fffff880`06821660 0fb74702        movzx   eax,word ptr [rdi+2]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    BUGCHECK_STR:  0xD1
    PROCESS_NAME:  WoWSLauncher.e
    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
    TRAP_FRAME:  fffff8800ca316f0 -- (.trap 0xfffff8800ca316f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000004d5e rbx=0000000000000000 rcx=0000000000000020
    rdx=0000000000000800 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88006821660 rsp=fffff8800ca31880 rbp=0000000000000000
     r8=fffff8800ca31960  r9=fffff8800ca318e0 r10=fffffa800b80e078
    r11=fffffa800b80e060 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    NETwNs64+0x7660:
    fffff880`06821660 0fb74702        movzx   eax,word ptr [rdi+2] ds:00000000`00000002=????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80003281fe9 to fffff80003282a40
    STACK_TEXT:  
    fffff880`0ca315a8 fffff800`03281fe9 : 00000000`0000000a fffff880`0bb3a000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0ca315b0 fffff800`03280c60 : fffffa80`0a7f6d00 fffffa80`09c1fb40 fffffa80`062fc9d8 fffffa80`05b2fdf0 : nt!KiBugCheckDispatch+0x69
    fffff880`0ca316f0 fffff880`06821660 : fffffa80`09c1bda0 fffffa80`09c1bea0 00000000`0cf3ca45 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`0ca31880 fffffa80`09c1bda0 : fffffa80`09c1bea0 00000000`0cf3ca45 00000000`00000001 00000000`00000020 : NETwNs64+0x7660
    fffff880`0ca31888 fffffa80`09c1bea0 : 00000000`0cf3ca45 00000000`00000001 00000000`00000020 fffff880`069feeba : 0xfffffa80`09c1bda0
    fffff880`0ca31890 00000000`0cf3ca45 : 00000000`00000001 00000000`00000020 fffff880`069feeba 00000000`00000020 : 0xfffffa80`09c1bea0
    fffff880`0ca31898 00000000`00000001 : 00000000`00000020 fffff880`069feeba 00000000`00000020 00000000`ffffffff : 0xcf3ca45
    fffff880`0ca318a0 00000000`00000020 : fffff880`069feeba 00000000`00000020 00000000`ffffffff fffff880`0ca31ad0 : 0x1
    fffff880`0ca318a8 fffff880`069feeba : 00000000`00000020 00000000`ffffffff fffff880`0ca31ad0 fffffa80`09b81cd0 : 0x20
    fffff880`0ca318b0 00000000`00000020 : 00000000`ffffffff fffff880`0ca31ad0 fffffa80`09b81cd0 00000000`ffffffff : NETwNs64+0x1e4eba
    fffff880`0ca318b8 00000000`ffffffff : fffff880`0ca31ad0 fffffa80`09b81cd0 00000000`ffffffff fffff880`06abb901 : 0x20
    fffff880`0ca318c0 fffff880`0ca31ad0 : fffffa80`09b81cd0 00000000`ffffffff fffff880`06abb901 00000000`00000020 : 0xffffffff
    fffff880`0ca318c8 fffffa80`09b81cd0 : 00000000`ffffffff fffff880`06abb901 00000000`00000020 fffff880`00000800 : 0xfffff880`0ca31ad0
    fffff880`0ca318d0 00000000`ffffffff : fffff880`06abb901 00000000`00000020 fffff880`00000800 fffffa80`0b5efed0 : 0xfffffa80`09b81cd0
    fffff880`0ca318d8 fffff880`06abb901 : 00000000`00000020 fffff880`00000800 fffffa80`0b5efed0 00000000`00000000 : 0xffffffff
    fffff880`0ca318e0 00000000`00000020 : fffff880`00000800 fffffa80`0b5efed0 00000000`00000000 fffff880`0ca31914 : NETwNs64+0x2a1901
    fffff880`0ca318e8 fffff880`00000800 : fffffa80`0b5efed0 00000000`00000000 fffff880`0ca31914 fffff800`03338864 : 0x20
    fffff880`0ca318f0 fffffa80`0b5efed0 : 00000000`00000000 fffff880`0ca31914 fffff800`03338864 00000035`00000020 : 0xfffff880`00000800
    fffff880`0ca318f8 00000000`00000000 : fffff880`0ca31914 fffff800`03338864 00000035`00000020 00000000`00000000 : 0xfffffa80`0b5efed0
    
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    NETwNs64+7660
    fffff880`06821660 0fb74702        movzx   eax,word ptr [rdi+2]
    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  NETwNs64+7660
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: NETwNs64
    IMAGE_NAME:  NETwNs64.sys
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cd92d8f
    FAILURE_BUCKET_ID:  X64_0xD1_NETwNs64+7660
    BUCKET_ID:  X64_0xD1_NETwNs64+7660
    ANALYSIS_SOURCE:  KM
    FAILURE_ID_HASH_STRING:  km:x64_0xd1_netwns64+7660
    FAILURE_ID_HASH:  {1eec629e-9598-ccde-f6f0-ce7c4455fa85}
    Followup: MachineOwner
    ---------
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 11:29.
Find Us