BSOD at idle now


  1. Posts : 1
    Windows 7 Ultimate x64
       #1

    BSOD at idle now


    I was plagued by multiple BSOD's about two months back and replaced my onboard NIC with an Intel PCI card a couple of weeks ago (and disabled the onboard in the BIOS). I thought I had the problem licked but over the last 7-10 days I've had BSOD's while the computer has been idle overnight (typically happens early morning) - it's not sleeping or hibernating at any point.

    I've attached the DM logs as instructed, and would really appreciate help diagnosing this. The error has been different every time so it's pretty frustrating. Thanks very much!
      My Computer


  2. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #2

    First, you have 30 startup items, which is bad. Free up the startup. Windows does not need any other program to auto start with it, but the auto start programs often conflicts and causes various problems including BSODs.

    1. Click on the Start button
    2. Type “msconfig (without quotes), click the resulting link. It will open the System Configuration window.
    3. Select the “Startup” tab.
    4. Deselect all items other than the antivirus.
    5. Apply > OK
    6. Accept then restart.

    As they all are installed in your computer, you can call them anytime, from Start > All Programs. No need to keep them always running in the background.

    Second, Update the Intel ethernet driver from Motherboards | Z87-PRO(V EDITION) | ASUS Global

    Third, did you have any Symantec or Norton software installed, that you have uninstalled latter? Leftovers of Symantec are remaining there, which is contributing to BSODs.
    ____________________________________________________________
    Code:
    BugCheck D1, {0, 2, 1, fffff88001a4fba0}
    
    *** WARNING: Unable to verify timestamp for e1q62x64.sys
    *** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
    Probably caused by : vpcnfltr.sys ( vpcnfltr!FilterReceiveNetBufferLists+60d )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff88001a4fba0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003314100
    GetUlongFromAddress: unable to read from fffff800033141c0
     0000000000000000 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    ndis!NdisAllocatePacket+90
    fffff880`01a4fba0 488937          mov     qword ptr [rdi],rsi
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
    
    TRAP_FRAME:  fffff880078f0fd0 -- (.trap 0xfffff880078f0fd0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000f06 rbx=0000000000000000 rcx=fffffa800c9e0580
    rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001a4fba0 rsp=fffff880078f1160 rbp=0000000000000000
     r8=fffffa800c9e0500  r9=0000000000000000 r10=fffffa8013bf8020
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    ndis!NdisAllocatePacket+0x90:
    fffff880`01a4fba0 488937          mov     qword ptr [rdi],rsi ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030dd429 to fffff800030dde80
    
    STACK_TEXT:  
    fffff880`078f0e88 fffff800`030dd429 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`078f0e90 fffff800`030dc0a0 : 00000000`00000000 00000000`00000006 fffffa80`0cb89000 fffffa80`10387870 : nt!KiBugCheckDispatch+0x69
    fffff880`078f0fd0 fffff880`01a4fba0 : 00000000`00000000 fffff880`01c58de2 fffff880`078f1258 fffffa80`0c9e0588 : nt!KiPageFault+0x260
    fffff880`078f1160 fffff880`01a4ff5b : fffffa80`10387870 fffff880`078f1258 fffffa80`10789802 00000000`00000000 : ndis!NdisAllocatePacket+0x90
    fffff880`078f11e0 fffff880`01acdbde : fffffa80`0cb89640 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisXlateRecvNetBufferListsToPacketArray+0x8b
    fffff880`078f1250 fffff880`01a505d4 : fffffa80`0fed71a0 fffff800`00040001 00000000`00000007 fffffa80`10443e60 : ndis!ndisMDispatchReceiveNetBufferLists+0x2de
    fffff880`078f16d0 fffff880`01a50549 : fffffa80`103e0000 00000000`00000000 00000000`00000401 fffffa80`10387870 : ndis!ndisMTopReceiveNetBufferLists+0x24
    fffff880`078f1710 fffff880`01a504e0 : 00000000`00000000 fffff880`01a514d0 00000000`00000000 00000000`00000028 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`078f1750 fffff880`031ea505 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000007 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`078f1790 fffff880`01a690a7 : 00000000`0000017a fffffa80`0fed71a0 fffffa80`00000000 fffff880`01aa9110 : vpcnfltr!FilterReceiveNetBufferLists+0x60d
    fffff880`078f1830 fffff880`04c26833 : fffffa80`1064b000 00000000`00000007 fffffa80`10387870 fffffa80`1064be00 : ndis! ?? ::FNODOBFM::`string'+0xcd8f
    fffff880`078f1880 fffffa80`1064b000 : 00000000`00000007 fffffa80`10387870 fffffa80`1064be00 00000000`00000801 : e1q62x64+0x26833
    fffff880`078f1888 00000000`00000007 : fffffa80`10387870 fffffa80`1064be00 00000000`00000801 00000000`00000007 : 0xfffffa80`1064b000
    fffff880`078f1890 fffffa80`10387870 : fffffa80`1064be00 00000000`00000801 00000000`00000007 00000000`00000007 : 0x7
    fffff880`078f1898 fffffa80`1064be00 : 00000000`00000801 00000000`00000007 00000000`00000007 fffff880`04c26a01 : 0xfffffa80`10387870
    fffff880`078f18a0 00000000`00000801 : 00000000`00000007 00000000`00000007 fffff880`04c26a01 00000000`00000001 : 0xfffffa80`1064be00
    fffff880`078f18a8 00000000`00000007 : 00000000`00000007 fffff880`04c26a01 00000000`00000001 fffffa80`10387870 : 0x801
    fffff880`078f18b0 00000000`00000007 : fffff880`04c26a01 00000000`00000001 fffffa80`10387870 fffffa80`10465e20 : 0x7
    fffff880`078f18b8 fffff880`04c26a01 : 00000000`00000001 fffffa80`10387870 fffffa80`10465e20 fffffa80`1064b000 : 0x7
    fffff880`078f18c0 00000000`00000001 : fffffa80`10387870 fffffa80`10465e20 fffffa80`1064b000 fffffa80`00000000 : e1q62x64+0x26a01
    fffff880`078f18c8 fffffa80`10387870 : fffffa80`10465e20 fffffa80`1064b000 fffffa80`00000000 fffffa80`1064b000 : 0x1
    fffff880`078f18d0 fffffa80`10465e20 : fffffa80`1064b000 fffffa80`00000000 fffffa80`1064b000 0000000a`00000201 : 0xfffffa80`10387870
    fffff880`078f18d8 fffffa80`1064b000 : fffffa80`00000000 fffffa80`1064b000 0000000a`00000201 00000000`00000000 : 0xfffffa80`10465e20
    fffff880`078f18e0 fffffa80`00000000 : fffffa80`1064b000 0000000a`00000201 00000000`00000000 fffff880`078f1ad8 : 0xfffffa80`1064b000
    fffff880`078f18e8 fffffa80`1064b000 : 0000000a`00000201 00000000`00000000 fffff880`078f1ad8 fffff880`078f1a00 : 0xfffffa80`00000000
    fffff880`078f18f0 0000000a`00000201 : 00000000`00000000 fffff880`078f1ad8 fffff880`078f1a00 00000000`00000010 : 0xfffffa80`1064b000
    fffff880`078f18f8 00000000`00000000 : fffff880`078f1ad8 fffff880`078f1a00 00000000`00000010 00000000`00000000 : 0x0000000a`00000201
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    vpcnfltr!FilterReceiveNetBufferLists+60d
    fffff880`031ea505 83c8ff          or      eax,0FFFFFFFFh
    
    SYMBOL_STACK_INDEX:  9
    
    SYMBOL_NAME:  vpcnfltr!FilterReceiveNetBufferLists+60d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: vpcnfltr
    
    IMAGE_NAME:  vpcnfltr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7b278
    
    IMAGE_VERSION:  6.1.7601.17514
    
    FAILURE_BUCKET_ID:  X64_0xD1_vpcnfltr!FilterReceiveNetBufferLists+60d
    
    BUCKET_ID:  X64_0xD1_vpcnfltr!FilterReceiveNetBufferLists+60d
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0xd1_vpcnfltr!filterreceivenetbufferlists+60d
    
    FAILURE_ID_HASH:  {fd549d6c-d639-f6fa-8ef2-df6e3fc2320c}
    
    Followup: MachineOwner
    ---------
    Code:
    BugCheck 1E, {ffffffffc0000005, c, 0, 1}
    
    *** WARNING: Unable to verify timestamp for PGPfsfd.sys
    *** ERROR: Module load completed but symbols could not be loaded for PGPfsfd.sys
    *** WARNING: Unable to verify timestamp for MpFilter.sys
    *** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys
    Probably caused by : PGPfsfd.sys ( PGPfsfd+1f077 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: 000000000000000c, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000001, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b4100
    GetUlongFromAddress: unable to read from fffff800032b41c0
     0000000000000000 Nonpaged pool
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
    
    FAULTING_IP: 
    +1
    00000000`0000000c ??              ???
    
    BUGCHECK_STR:  0x1E_c0000005_R
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    PROCESS_NAME:  Dropbox.exe
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
    
    TRAP_FRAME:  fffff8800aad96e0 -- (.trap 0xfffff8800aad96e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000096196d10002 rbx=0000000000000000 rcx=fffffa800c9590c0
    rdx=fffffa800f6becb1 rsi=0000000000000000 rdi=0000000000000000
    rip=000000000000000c rsp=fffff8800aad9870 rbp=fffffa800ce13010
     r8=0000000000000001  r9=0000000000000000 r10=fffffa800c9590c0
    r11=fffffa800ce13400 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    00000000`0000000c ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030c8a18 to fffff8000307de80
    
    STACK_TEXT:  
    fffff880`0aad8e58 fffff800`030c8a18 : 00000000`0000001e ffffffff`c0000005 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0aad8e60 fffff800`0307d502 : fffff880`0aad9638 fffff880`0aad9920 fffff880`0aad96e0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x487ed
    fffff880`0aad9500 fffff800`0307c07a : 00000000`00000000 00000000`00000001 fffffa80`1493d400 fffff880`0aad9920 : nt!KiExceptionDispatch+0xc2
    fffff880`0aad96e0 00000000`0000000c : fffff880`0aad9920 fffff880`010ec471 fffffa80`0fc09860 fffff880`0aad9b98 : nt!KiPageFault+0x23a
    fffff880`0aad9870 fffff880`0aad9920 : fffff880`010ec471 fffffa80`0fc09860 fffff880`0aad9b98 fffff880`0aad9a60 : 0xc
    fffff880`0aad9878 fffff880`010ec471 : fffffa80`0fc09860 fffff880`0aad9b98 fffff880`0aad9a60 fffffa80`142abbf0 : 0xfffff880`0aad9920
    fffff880`0aad9880 fffff880`010ea6c7 : fffffa80`0ce13010 fffffa80`0c9590c0 fffffa80`0f601040 fffffa80`0fc07de0 : fltmgr!FltpPassThrough+0x421
    fffff880`0aad9900 fffff880`01168077 : fffffa80`0fbe7590 fffff880`010f8dca fffff880`0aad9b98 fffffa80`129dae60 : fltmgr!FltpDispatch+0xb7
    fffff880`0aad9960 fffffa80`0fbe7590 : fffff880`010f8dca fffff880`0aad9b98 fffffa80`129dae60 00000000`00000042 : PGPfsfd+0x1f077
    fffff880`0aad9968 fffff880`010f8dca : fffff880`0aad9b98 fffffa80`129dae60 00000000`00000042 00000000`00000000 : 0xfffffa80`0fbe7590
    fffff880`0aad9970 fffff880`011a554d : 00000000`00000000 fffff880`01188000 fffffa80`0ce13010 fffffa80`0f601d80 : fltmgr!FltGetStreamContext+0x4a
    fffff880`0aad99a0 00000000`00000000 : fffff880`01188000 fffffa80`0ce13010 fffffa80`0f601d80 fffffa80`0ce13010 : MpFilter+0x2854d
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    PGPfsfd+1f077
    fffff880`01168077 ??              ???
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  PGPfsfd+1f077
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: PGPfsfd
    
    IMAGE_NAME:  PGPfsfd.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  503d1ea1
    
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_R_PGPfsfd+1f077
    
    BUCKET_ID:  X64_0x1E_c0000005_R_PGPfsfd+1f077
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0x1e_c0000005_r_pgpfsfd+1f077
    
    FAILURE_ID_HASH:  {ac7eafd6-21e9-7322-5a0c-1097f997af89}
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmvm PGPfsfd
    start             end                 module name
    fffff880`01149000 fffff880`0117d000   PGPfsfd  T (no symbols)           
        Loaded symbol image file: PGPfsfd.sys
        Image path: \SystemRoot\System32\Drivers\PGPfsfd.sys
        Image name: PGPfsfd.sys
        Timestamp:        Wed Aug 29 01:10:17 2012 (503D1EA1)
        CheckSum:         0003160D
        ImageSize:        00034000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:53.
Find Us