Hi,
I will do my best to professionally assist you! :grin1:
We have various bug checks:
IRQL_NOT_LESS_OR_EQUAL (a)
This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
This bug check is issued if paged memory (or invalid memory) is accessed when the IRQL is too high. The error that generates this bug check usually occurs after the installation of a faulty device driver, system service, or BIOS.
IMAGE_NAME:
hardware
MODULE_NAME:
hardware
^^ Hardware image/module named faults, interesting that we'd see that.
Code:
0: kd> kv
Child-SP RetAddr : Args to Child : Call Site
fffff880`0a825c78 fffff800`048ca169 : 00000000`0000000a 00000000`00000021 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a825c80 fffff800`048c8de0 : 00000000`00000000 00000000`00000000 fffffa80`09745410 fffffa80`07b55d08 : nt!KiBugCheckDispatch+0x69
fffff880`0a825dc0 fffff800`04811771 : fffffa80`07b20a70 fffffa80`045a1a60 00000000`00000001 fffffa80`07b55d08 : nt!KiPageFault+0x260 (TrapFrame @ fffff880`0a825dc0)
fffff880`0a825f58 fffffa80`07b55d08 : fffffa80`07b55d00 00000000`00000050 00000000`00000000 00000000`af2c9aa0 : [COLOR=#ff0000]hal!HalpMapTransfer+0x2f1[/COLOR]
fffff880`0a825fe8 fffffa80`07b55d00 : 00000000`00000050 00000000`00000000 00000000`af2c9aa0 fffffa80`07b20a01 : 0xfffffa80`07b55d08
fffff880`0a825ff0 00000000`00000050 : 00000000`00000000 00000000`af2c9aa0 fffffa80`07b20a01 fffffa80`08e31402 : 0xfffffa80`07b55d00
fffff880`0a825ff8 00000000`00000000 : 00000000`af2c9aa0 fffffa80`07b20a01 fffffa80`08e31402 fffff800`0481094f : 0x50
Hardware Abstraction Layer (why we saw the hardware image/module faults) calling into a pagefault.
PAGE_FAULT_IN_NONPAGED_AREA (50)
This indicates that invalid system memory has been referenced.
Bug check 0x50 usually occurs after the installation of faulty hardware or in the event of failure of installed hardware (usually related to defective RAM, be it main memory, L2 RAM cache, or video RAM).
Another common cause is the installation of a faulty system service.
Antivirus software can also trigger this error, as can a corrupted NTFS volume.
BugCheck 50, {
fffff14001f52620, 1,
fffff80004b39878, 7}
^^ Address
fffff14001f52620 was written to by the instruction at address
fffff80004b39878.
Code:
2: kd> !pte fffff14001f52620
VA fffff14001f52620
PXE at FFFFF6FB7DBEDF10 PPE at FFFFF6FB7DBE2800 PDE at FFFFF6FB7C500078 PTE at FFFFF6F8A000FA90
contains 0000000000000000
[COLOR=#ff0000][B]not valid[/B][/COLOR]
^^ We can see from the above that the address
fffff14001f52620 is indeed invalid. With this said, why did
fffff14001f52620 attempt to write to
fffff80004b39878?
Code:
2: kd> kv
Child-SP RetAddr : Args to Child : Call Site
fffff880`0a10b4f8 fffff800`0490453b : 00000000`00000050 fffff140`01f52620 00000000`00000001 fffff880`0a10b660 : nt!KeBugCheckEx
fffff880`0a10b500 fffff800`04885cee : 00000000`00000001 fffff140`01f52620 0000012f`00000000 fffff8a0`036f8c10 : nt! ?? ::FNODOBFM::`string'+0x43781
fffff880`0a10b660 fffff800`04b39878 : fffff8a0`00e0da88 fffff8a0`00e0da70 fffff8a0`00e0da70 00000000`0026fd01 : nt!KiPageFault+0x16e (TrapFrame @ [COLOR=#ff0000]fffff880`0a10b660[/COLOR])
fffff880`0a10b7f0 fffff800`04b74780 : 00000000`00000198 fffff8a0`00e0da88 fffff8a0`00e0da70 00000000`00000000 : nt!RtlpAtomMapAtomToHandleEntry+0x48
fffff880`0a10b820 fffff800`04b79ec8 : fffff8a0`00e0da70 00000000`00000034 fffff880`0a10baf8 00000000`0045f874 : nt!RtlLookupAtomInAtomTable+0x100
fffff880`0a10b880 fffff800`04886e53 : fffffa80`0995f060 00000000`0045f838 fffffa80`0995f060 fffffa80`0a47fa90 : nt!NtFindAtom+0xe7
fffff880`0a10bae0 00000000`74de2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`0a10bae0)
00000000`0026eae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74de2e09
Code:
2: kd> .trap [COLOR=#ff0000]fffff880`0a10b660[/COLOR]
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a001020660 rbx=0000000000000000 rcx=fffff8a000f31fc0
rdx=fffff8a000f31f90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80004b39878 [COLOR=#006400]rsp=fffff8800a10b7f0[/COLOR] rbp=fffff8800a10bb60
r8=fffff8a001020000 r9=0000000000000198 r10=00000000000015c7
r11=fffff8a000e0da70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!RtlpAtomMapAtomToHandleEntry+0x48:
[COLOR=#008080]fffff800`04b39878[/COLOR] f0830c2400 lock or dword ptr [rsp],0 ss:0018:[COLOR=#0000ff]fffff880`0a10b7f0[/COLOR]=00e0da88
On the instrucion we failed on, address
fffff800`04b39878 deferenced
rsp where
rsp is
fffff8800a10b7f0. All of this would result in a memory write to the address
fffff880`0a10b7f0.
Code:
2: kd> dd fffff880`0a10b7f0
fffff880`0a10b7f0 00e0da88 fffff8a0 00e0da70 fffff8a0
fffff880`0a10b800 00e0da70 fffff8a0 0026fd01 00000000
fffff880`0a10b810 00000000 00000000 04b74780 fffff800
fffff880`0a10b820 00000198 00000000 00e0da88 fffff8a0
fffff880`0a10b830 00e0da70 fffff8a0 00000000 00000000
fffff880`0a10b840 00000000 00000000 0995f060 fffffa80
fffff880`0a10b850 0026fd01 00000000 0a10b8b0 fffff880
fffff880`0a10b860 04fc3434 00000000 0045f874 00000000
Code:
2: kd> r cr2
Last set context:
cr2=[COLOR=#ff0000]fffff14001f52620[/COLOR]
^^ The 1st parameter address was stored in cr2 prior to calling the page fault handler.
Right, so from all of the above,
fffff880`0a10b7f0 was meant to be written to and appears to be a valid address. However, the bugcheck 1st parameter and cr2 indicate a failure to write to
fffff14001f52620. This does not make any sense whatsoever.
Another way to describe it -
RtlpAtomMapAtomToHandleEntry asked the hardware to write to
fffff880`0a10b7f0, and the hardware came back and said 'I cannot write to
fffff14001f52620'. This is
very likely a hardware issue. I would be absolutely stunned if this was related to software.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
A driver tried to access an address that is pageable (or that is completely invalid) while the IRQL was too high. This bug check is usually caused by drivers that have used improper addresses.
Code:
0: kd> .trap fffff800`00ba2080
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8008f19916 rsi=0000000000000000 rdi=0000000000000000
[COLOR=#4b0082]rip=fffff88004f222f3[/COLOR] rsp=fffff80000ba2210 rbp=0000000000000001
r8=fffffa80081d7000 r9=0000000000000001 r10=0000000000000000
r11=fffff80000ba2110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
[COLOR=#ff0000]rtwlane+0x4e2f3[/COLOR]:
fffff880`04f222f3 41b1ff mov r9b,0FFh
Code:
0: kd> u @rip
rtwlane+0x4e2f3:
fffff880`04f222f3 41b1ff mov r9b,0FFh
fffff880`04f222f6 4438a3aaa80000 cmp byte ptr [rbx+0A8AAh],r12b
fffff880`04f222fd 7409 [COLOR=#ff0000]je[/COLOR] [COLOR=#ff0000]rtwlane+0x4e308[/COLOR] (fffff880`04f22308)
fffff880`04f222ff 4439a354f71600 cmp dword ptr [rbx+16F754h],r12d
fffff880`04f22306 7407 [COLOR=#ff0000]je[/COLOR] [COLOR=#ff0000]rtwlane+0x4e30f[/COLOR] (fffff880`04f2230f)
fffff880`04f22308 44888b4c9a0000 mov byte ptr [rbx+9A4Ch],r9b
fffff880`04f2230f 488b872c030000 mov rax,qword ptr [rdi+32Ch]
fffff880`04f22316 0fb74f14 movzx ecx,word ptr [rdi+14h]
^^ rtwlane.sys is the Realtek PCI-E Wireless LAN NIC NDIS driver.
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
This bug check appears very infrequently.
^^ Generally shows up when hardware is the issue.
Before declaring this is hardware, let's take a look at the raw stack of the most recent crash dump (the 0xA):
Code:
fffff880`0a825db8 fffff800`048c8de0 nt!KiPageFault+0x260
fffff880`0a825dc0 00000000`00000000
fffff880`0a825e20 fffff880`0a825e30
fffff880`0a825e28 fffff880`018d42a0 ndis!ndisAcquireReadLockPerCpuRefCnt+0x20
fffff880`0a825e30 00000000`00000000
fffff880`0a825e88 00000000`00000000
fffff880`0a825e90 00000000`00000021
fffff880`0a825e98 fffff880`01805efc NETIO!KfdClassify+0x24c
fffff880`0a825ea0 fffffa80`0a040004
fffff880`0a825ee8 fffffa80`07b20930
fffff880`0a825ef0 fffffa80`07b20a70
fffff880`0a825ef8 fffff800`0480e593 hal!HalpDmaMapScatterTransfer+0xa3
fffff880`0a825f00 fffffa80`07b20a70
fffff880`0a825f08 fffffa80`07b20a00
fffff880`0a825f10 00000000`00000aa0
fffff880`0a825f18 fffffa80`07b20a70
fffff880`0a825f20 00000000`00000002
fffff880`0a825f28 fffff800`04811771 hal!HalpMapTransfer+0x2f1
fffff880`0a825f30 00000000`00000010
fffff880`0a825f90 fffffa80`07b20930
fffff880`0a825fc8 00000000`00000001
fffff880`0a825fd0 fffffa80`045a1a60
fffff880`0a825fd8 fffff800`04811472 hal!IoMapTransfer+0x8e
fffff880`0a825fe0 fffffa80`07b55d08
fffff880`0a826010 fffffa80`08e31402
fffff880`0a826018 fffff800`0481094f hal!HalpAllocateAdapterCallback+0xc7
fffff880`0a826020 00000000`00000000
fffff880`0a826028 fffff800`0480dfb9 hal!HalpDmaAllocateMapRegisters+0x71
fffff880`0a826030 00000000`00000000
fffff880`0a826038 00000000`00000002
fffff880`0a826040 fffffa80`07b55d08
fffff880`0a826048 fffff880`018ed701 ndis!ndisReleaseReadWriteLockX+0x41
fffff880`0a826068 00000000`00000000
fffff880`0a826070 fffff880`04ebbe20Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Rt64win7+0x1fe20
^^ I chopped quite a bit of it, but kept it informative enough. Right, so this is why we're seeing mention of the Hardware Abstraction Layer (HAL), and Realtek's NDIS driver. Rt64win7.sys = Realtek RTL8168D/8111D Family PCI-E Gigabit Ethernet NIC. Above that, we have various network related routines (ndis, tcpip, etc).
Again, before absolutely claiming this is hardware, I'd like to remove avast! from the equation and replace it with MSE as it
may be causing NETBIOS conflicts and fooling Windows into thinking this is a hardware problem.
avast! removal - avast! Uninstall Utility | Download aswClear for avast! Removal
MSE - Microsoft Security Essentials - Microsoft Windows
-- Also be sure all of your Realtek network drivers are up to date from the manufacturers website. You can alternatively check this site -
Realtek
Regards,
Patrick