2 Replies Latest reply on Jul 7, 2016 8:49 AM by aokiji

    Open Windows/Task Manager Flickering in windows 10

    aokiji

      got this problem of open aplications/task manager flickering and this will also cuase fps in games to constatly stutter

       

      i have removed all drivers and re installed them , my card is a R9 290 Asus Direct CU II

       

      this only started to happen now recently

        • Re: Open Windows/Task Manager Flickering in windows 10
          amdpete

          Check that your monitor is running the correct refresh rate and that the monitor cable isn't faulty.

            • Re: Open Windows/Task Manager Flickering in windows 10
              aokiji

              ok will give that a go , and then the other thing is im getting BSOD relating to wfplwfs.sys

              i have tried to remove my CPU overclock and that did not change anything , removed all drivers and reinstalled them still nothing and then i also tried other ram in my machine which also proved futile

               

              have you come across this problem?\

               

              here is my minidump info

               

              *******************************************************************************
              *                                                                             *
              *                        Bugcheck Analysis                                    *
              *                                                                             *
              *******************************************************************************

              Use !analyze -v to get detailed debugging information.

              BugCheck D1, {ffffe001343f7000, 2, 0, fffff801522a5860}

              Probably caused by : wfplwfs.sys ( wfplwfs!L2802_3ParseMacHeader+8c )

              Followup:     MachineOwner
              ---------

              5: kd> !analyze -v
              *******************************************************************************
              *                                                                             *
              *                        Bugcheck Analysis                                    *
              *                                                                             *
              *******************************************************************************

              DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
              An attempt was made to access a pageable (or completely invalid) address at an
              interrupt request level (IRQL) that is too high.  This is usually
              caused by drivers using improper addresses.
              If kernel debugger is available get stack backtrace.
              Arguments:
              Arg1: ffffe001343f7000, memory referenced
              Arg2: 0000000000000002, IRQL
              Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
              Arg4: fffff801522a5860, address which referenced memory

              Debugging Details:
              ------------------


              DUMP_CLASS: 1

              DUMP_QUALIFIER: 400

              BUILD_VERSION_STRING:  10586.420.amd64fre.th2_release_sec.160527-1834

              SYSTEM_MANUFACTURER:  To be filled by O.E.M.

              SYSTEM_PRODUCT_NAME:  To be filled by O.E.M.

              SYSTEM_SKU:  To be filled by O.E.M.

              SYSTEM_VERSION:  To be filled by O.E.M.

              BIOS_VENDOR:  American Megatrends Inc.

              BIOS_VERSION:  1703

              BIOS_DATE:  10/17/2012

              BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

              BASEBOARD_PRODUCT:  Crosshair V Formula

              BASEBOARD_VERSION:  Rev 1.xx

              DUMP_TYPE:  2

              DUMP_FILE_ATTRIBUTES: 0x8
                Kernel Generated Triage Dump

              BUGCHECK_P1: ffffe001343f7000

              BUGCHECK_P2: 2

              BUGCHECK_P3: 0

              BUGCHECK_P4: fffff801522a5860

              READ_ADDRESS: fffff802feff7520: Unable to get MiVisibleState
              ffffe001343f7000

              CURRENT_IRQL:  2

              FAULTING_IP:
              wfplwfs!L2802_3ParseMacHeader+8c
              fffff801`522a5860 0fb64a10        movzx   ecx,byte ptr [rdx+10h]

              CPU_COUNT: 8

              CPU_MHZ: 11a3

              CPU_VENDOR:  AuthenticAMD

              CPU_FAMILY: 15

              CPU_MODEL: 1

              CPU_STEPPING: 2

              CUSTOMER_CRASH_COUNT:  1

              DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

              BUGCHECK_STR:  AV

              PROCESS_NAME:  WTFast.exe

              ANALYSIS_SESSION_HOST:  AOKIJI-GAMING

              ANALYSIS_SESSION_TIME:  07-07-2016 15:46:37.0920

              ANALYSIS_VERSION: 10.0.10586.567 amd64fre

              TRAP_FRAME:  ffffd00042bb4ef0 -- (.trap 0xffffd00042bb4ef0)
              NOTE: The trap frame does not contain all registers.
              Some register values may be zeroed or incorrect.
              rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
              rdx=ffffe001343f6ff0 rsi=0000000000000000 rdi=0000000000000000
              rip=fffff801522a5860 rsp=ffffd00042bb5080 rbp=0000000000000016
              r8=0000000000000000  r9=ffffd00042bb5114 r10=0000000000000039
              r11=ffffd00042bb5178 r12=0000000000000000 r13=0000000000000000
              r14=0000000000000000 r15=0000000000000000
              iopl=0         nv up ei ng nz na po cy
              wfplwfs!L2802_3ParseMacHeader+0x8c:
              fffff801`522a5860 0fb64a10        movzx   ecx,byte ptr [rdx+10h] ds:ffffe001`343f7000=??
              Resetting default scope

              LAST_CONTROL_TRANSFER:  from fffff802fedc63e9 to fffff802fedbb7a0

              STACK_TEXT: 
              ffffd000`42bb4da8 fffff802`fedc63e9 : 00000000`0000000a ffffe001`343f7000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
              ffffd000`42bb4db0 fffff802`fedc4bc7 : 00000000`00000000 00000000`00000000 ffffe001`2f4e9550 ffffd000`42bb5020 : nt!KiBugCheckDispatch+0x69
              ffffd000`42bb4ef0 fffff801`522a5860 : ffffe001`33daf7d0 ffffd000`42bb5140 ffffe001`343f6fa0 00000000`000007ff : nt!KiPageFault+0x247
              ffffd000`42bb5080 fffff801`522a1bc2 : 00000000`00000000 ffffd000`42bb5131 00000000`00000039 00000000`00000000 : wfplwfs!L2802_3ParseMacHeader+0x8c
              ffffd000`42bb50d0 fffff801`522a1a4c : ffffe001`31a1ac01 ffffe001`31a1ac20 00000000`00000000 00000000`00000000 : wfplwfs!L2802_3IsNetBufferListPermitted+0x62
              ffffd000`42bb5180 fffff801`522a6a92 : 00000000`00000001 00000000`00000039 ffffd000`42bb52b8 ffffe001`31a1ac20 : wfplwfs!L2InspectNetBufferLists+0x104
              ffffd000`42bb5240 fffff801`51e0e43b : 00000000`00000000 ffffe001`33daf7d0 fffff801`522a6a10 00000000`00000000 : wfplwfs!LwfUpperSendNetBufferLists+0x82
              ffffd000`42bb52b0 fffff801`51e0b7e9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallSendHandler+0x3b
              ffffd000`42bb5300 fffff801`527638cc : ffffe001`33741450 ffffe001`33daf7d0 ffffe001`00000000 ffffe001`36609e20 : ndis!NdisSendNetBufferLists+0x239
              ffffd000`42bb5450 fffff801`5275e4a3 : ffffe001`36609e20 ffffe001`35478ad8 ffffe001`35478ad0 ffffe001`352f3010 : raspppoe!PrSend+0xc0
              ffffd000`42bb5480 fffff801`5275e215 : ffffe001`30a11130 00000000`00000000 ffffe001`3075d918 fffff802`fec071ce : raspppoe!MpSendPacketOnCall+0x223
              ffffd000`42bb54e0 fffff801`5279c9f6 : ffffe001`3470bd20 ffffe001`3075d240 ffffe001`2f4e9550 ffffe001`3470bff0 : raspppoe!MpCoSendNetBufferListChain+0x125
              ffffd000`42bb5510 fffff801`5277c8c6 : 00000000`00000000 ffffd000`42bb5660 ffffe001`35ece1d0 00000000`00000021 : ndiswan!SendOnLink+0x236
              ffffd000`42bb5560 fffff801`5279c53f : 00000000`00000000 ffffe001`3075d240 ffffe001`3075d240 ffffe001`35709410 : ndiswan!FramePacketFast+0x1fa
              ffffd000`42bb56b0 fffff801`5279cc76 : ffffe001`3075d240 ffffe001`00000000 ffffd000`00000000 ffffd000`42bb57c0 : ndiswan!SendFromProtocol+0x14b
              ffffd000`42bb5740 fffff801`5277ca73 : ffffe001`2f4e9501 ffffe001`2f4e9500 00000000`00000001 00000000`00000001 : ndiswan!SendPacketOnBundle+0x1fa
              ffffd000`42bb57b0 fffff801`5277deab : ffffe001`35709410 ffffd000`42bb5840 ffffe001`2f4e9550 ffffe001`3075d240 : ndiswan!NdisWanQueueSend+0x17b
              ffffd000`42bb57e0 fffff801`52777c97 : ffffe001`33984b02 ffffe001`34d05560 ffffe001`35ece1d0 00000000`00000000 : ndiswan!ApplyQoSAndQueueSend+0x4cf
              ffffd000`42bb5880 fffff801`51e0e1b4 : 00000000`00000000 ffffe001`33984b02 00000000`00000000 00000000`00000001 : ndiswan!MPSendNetBufferListChain+0x167
              ffffd000`42bb58c0 fffff801`51e0e43b : 00000000`00000001 00000000`00000000 fffff801`51e0e0d0 00000000`00000000 : ndis!ndisMSendNBLToMiniport+0xe4
              ffffd000`42bb5970 fffff801`51e0b88e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallSendHandler+0x3b
              ffffd000`42bb59c0 fffff801`53fbe276 : ffffe001`36ac7b80 ffffe001`2f4e9550 ffffe001`00000000 ffffe001`354b3580 : ndis!NdisSendNetBufferLists+0x2de
              ffffd000`42bb5b10 fffff801`5200becd : ffffe001`308d7010 00000000`00000000 ffffe001`2fa2da78 00000000`00000000 : wanarp!WanIpSendPackets+0x276
              ffffd000`42bb5c10 fffff801`5200b745 : 00000000`00000004 00000000`00000000 ffffe001`34db7390 ffffd000`42bb6170 : tcpip!IppFragmentPackets+0x27d
              ffffd000`42bb5ce0 fffff801`52009da8 : ffffe001`36cbd040 00000000`00000000 ffffe001`2fa2da78 00000000`0000284d : tcpip!IppDispatchSendPacketHelper+0x16f5
              ffffd000`42bb5f00 fffff801`52007f02 : ffffe001`2fa2da70 ffffe001`2fa2da78 ffffe001`2fa2da70 ffffd000`42bb6420 : tcpip!IppPacketizeDatagrams+0x2f8
              ffffd000`42bb6040 fffff801`51ffa494 : 00000000`00000000 fffff801`51f21800 fffff801`5217c000 ffffe001`30c25540 : tcpip!IppSendDatagramsCommon+0x4b2
              ffffd000`42bb6240 fffff801`521415eb : fffff801`5217c000 fffff801`5217c000 00000000`00000000 fffff801`5217c000 : tcpip!IppSendControl+0x190
              ffffd000`42bb62c0 fffff801`52140cec : 00000000`000027dc 00000000`00000000 ffffd000`42bb6610 00000000`00000000 : tcpip!Ipv4SetEchoRequestCreate+0x8d3
              ffffd000`42bb6560 fffff801`51f39954 : 00000000`00000000 ffffe001`356ea7c0 00000000`00000006 00000000`00000000 : tcpip!Ipv4SetAllEchoRequestParameters+0x13c
              ffffd000`42bb65d0 fffff801`52f41677 : ffffe001`36494ea0 ffffd000`42bb6b80 ffffe001`356ea820 ffffe001`356ea7c0 : NETIO!NsiSetAllParametersEx+0xe4
              ffffd000`42bb6660 fffff801`52f42314 : fffff801`52f40000 ffffe001`3479ed80 ffffe001`3479ecb0 00000000`c0000910 : nsiproxy!NsippSetAllParameters+0x197
              ffffd000`42bb6810 fffff802`ff07b852 : ffffe001`350e8e20 ffffe001`350e8e20 00000000`00000001 ffffe001`32890a80 : nsiproxy!NsippDispatch+0x134
              ffffd000`42bb6850 fffff802`ff07a6e6 : 00000000`19bce548 ffffd000`42bb6b80 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x1162
              ffffd000`42bb6a20 fffff802`fedc60a3 : ffffe001`36707080 00000000`19bce4e8 ffffd000`42bb6aa8 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
              ffffd000`42bb6a90 00000000`71e921bc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
              00000000`19bcedf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x71e921bc


              STACK_COMMAND:  kb

              THREAD_SHA1_HASH_MOD_FUNC:  265993e67d8f8b4ba65ad420c5eee8436320af79

              THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4f65be22189a97a3a669c8276daac8dc309d5836

              THREAD_SHA1_HASH_MOD:  e9e6f43938f67be47e69a68f1dd19b1a4216994e

              FOLLOWUP_IP:
              wfplwfs!L2802_3ParseMacHeader+8c
              fffff801`522a5860 0fb64a10        movzx   ecx,byte ptr [rdx+10h]

              FAULT_INSTR_CODE:  104ab60f

              SYMBOL_STACK_INDEX:  3

              SYMBOL_NAME:  wfplwfs!L2802_3ParseMacHeader+8c

              FOLLOWUP_NAME:  MachineOwner

              MODULE_NAME: wfplwfs

              IMAGE_NAME:  wfplwfs.sys

              DEBUG_FLR_IMAGE_TIMESTAMP:  5632d7b4

              IMAGE_VERSION:  10.0.10586.0

              BUCKET_ID_FUNC_OFFSET:  8c

              FAILURE_BUCKET_ID:  AV_wfplwfs!L2802_3ParseMacHeader

              BUCKET_ID:  AV_wfplwfs!L2802_3ParseMacHeader

              PRIMARY_PROBLEM_CLASS:  AV_wfplwfs!L2802_3ParseMacHeader

              TARGET_TIME:  2016-07-02T10:35:15.000Z

              OSBUILD:  10586

              OSSERVICEPACK:  0

              SERVICEPACK_NUMBER: 0

              OS_REVISION: 0

              SUITE_MASK:  272

              PRODUCT_TYPE:  1

              OSPLATFORM_TYPE:  x64

              OSNAME:  Windows 10

              OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

              OS_LOCALE: 

              USER_LCID:  0

              OSBUILD_TIMESTAMP:  2016-05-28 05:59:07

              BUILDDATESTAMP_STR:  160527-1834

              BUILDLAB_STR:  th2_release_sec

              BUILDOSVER_STR:  10.0.10586.420.amd64fre.th2_release_sec.160527-1834

              ANALYSIS_SESSION_ELAPSED_TIME: 453

              ANALYSIS_SOURCE:  KM

              FAILURE_ID_HASH_STRING:  km:av_wfplwfs!l2802_3parsemacheader

              FAILURE_ID_HASH:  {42506a1c-4f35-d68c-b8aa-78c1e9f3a63d}

              Followup:     MachineOwner
              ---------