Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSoD HP Touchsmart tm2-1079cl notebook


13 Feb 2011   #1

WIndows 7 Home Premium
 
 
BSoD HP Touchsmart tm2-1079cl notebook

Hi,

I've included all the files you have asked for to diagnose the problem.

The laptop had Windows 7 Home, but then I upgraded to Windows 7 Ultimate (x64) three days ago (through Windows Anytime Upgrade) thinking it would eliminate the BsOD. It hasn't. This began happening recently, but now it happens frequently. I have not installed any new programs when this problem began. My version of Windows Ultimate is a full retail version I purchased.

I purchased this laptop from my brother, but it shouldn't be more than a year old.

Thank you for your help,
Myers

My System SpecsSystem Spec
.

14 Feb 2011   #2

Win 8 Release candidate 8400
 
 

Quote   Quote: Originally Posted by vmhatup View Post
Hi,

I've included all the files you have asked for to diagnose the problem.

The laptop had Windows 7 Home, but then I upgraded to Windows 7 Ultimate (x64) three days ago (through Windows Anytime Upgrade) thinking it would eliminate the BsOD. It hasn't. This began happening recently, but now it happens frequently. I have not installed any new programs when this problem began. My version of Windows Ultimate is a full retail version I purchased.

I purchased this laptop from my brother, but it shouldn't be more than a year old.

Thank you for your help,
Myers

You have three glaring problems

Your Avast , old drivers, and Zone Alarm (NETIO.sys).
I would remove avast and replace with Microsoft security essentials and the win 7 firewall. Remove Zone alarm.

The most recent crash was probably caused by an interaction between ZAP and Avast.

http://files.avast.com/files/eng/aswclear5.exe

http://www.microsoft.com/security_essentials/

http://download.zonealarm.com/bin/fr...cpes_clean.exe

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\021011-30825-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e45e50
Debug session time: Thu Feb 10 10:40:47.378 2011 (GMT-5)
System Uptime: 0 days 19:25:16.718
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 406f8, fffff80002c40ec0}

Unable to load image aswTdi.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000406f8
Arg4: fffff80002c40ec0

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002c77ca9 to fffff80002c78740

STACK_TEXT:  
fffff800`04964d28 fffff800`02c77ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000406f8 : nt!KeBugCheckEx
fffff800`04964d30 fffff800`02c76172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04964e70 fffff800`02c40ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`092c7b40 fffff880`01f72c5a : 00730074`0072006f 076be4f2`00000000 005f0067`00000012 00690074`0070006f : nt!SeAccessCheckFromState+0x58
fffff880`092c8230 fffff880`01f7094f : 00610072`0054006c 006f0070`0073006e 00410073`00740072 00610068`0070006c : NETIO!CompareSecurityContexts+0x6a
fffff880`092c82a0 fffff880`01f729b5 : 005f0067`00000028 00610072`00540066 006f0070`0073006e 00530073`00740072 : NETIO!MatchValues+0xef
fffff880`092c82f0 fffff880`01f72845 : fffffa80`07c5c1d0 fffffa80`073ff110 fffff880`092c8518 fffff880`092c8c50 : NETIO!FilterMatch+0x95
fffff880`092c8340 fffff880`01f73ccb : 00000000`00000000 00000000`00000000 fffff880`092c8c50 fffff880`092c8500 : NETIO!IndexListClassify+0x69
fffff880`092c83c0 fffff880`0203f417 : fffff880`092c8898 fffff880`092c8898 fffff880`092c95d0 fffffa80`0845fd50 : NETIO!KfdClassify+0xa4e
fffff880`092c8730 fffff880`0203883e : fffff880`02147690 00000000`00000000 fffffa80`064e0410 00000000`00000000 : tcpip!WfpAleClassify+0x57
fffff880`092c8770 fffff880`02037cd5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`092c8e80 fffff880`0203b886 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`092c9150 fffff880`0203e5e4 : 00000000`00000000 fffff880`092c9588 fffff880`092c9590 00000000`00000001 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`092c9240 fffff880`02037019 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`092c94b0 fffff880`02065ef6 : 00000000`00000000 fffff800`02d30002 fffffa80`03f48900 fffffa80`05d614c1 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`092c9680 fffff880`0206b1ee : fffffa80`03f4c900 fffff880`01f6e804 fffff880`0216d9a0 fffffa80`064e0410 : tcpip!IppSendDatagramsCommon+0x526
fffff880`092c9950 fffff880`02035db8 : fffffa80`064e0410 fffffa80`0845fd50 fffffa80`0845fd50 fffffa80`03f4c900 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`092c9990 fffff880`0203632d : fffffa80`0435f680 fffffa80`0421f740 fffff880`092ca2e0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`092c9d10 fffff880`02035fb5 : fffff880`092ca240 00000000`000014c1 00000000`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x35d
fffff880`092ca100 fffff800`02c87e5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`092ca130 fffff880`02036578 : fffff880`02035fa0 fffff880`092ca240 fffff880`092ca402 fffffa80`040cddc0 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`092ca210 fffff880`03615f45 : fffffa80`05721120 fffffa80`0697c350 fffffa80`043d6cd0 fffffa80`064858de : tcpip!UdpTlProviderSendMessages+0x78
fffff880`092ca290 fffff880`03615ff2 : 00000000`00000002 fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`064858a8 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`092ca370 fffff880`023641a8 : fffffa80`074bd980 ffffffff`ffffffff fffffa80`05d3e7c0 fffffa80`074bd980 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`092ca3a0 fffffa80`074bd980 : ffffffff`ffffffff fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`05758900 : aswTdi+0x11a8
fffff880`092ca3a8 ffffffff`ffffffff : fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`05758900 fffffa80`064e14c1 : 0xfffffa80`074bd980
fffff880`092ca3b0 fffffa80`05d3e7c0 : fffffa80`074bd980 fffffa80`05758900 fffffa80`064e14c1 ffffc114`ac10130b : 0xffffffff`ffffffff
fffff880`092ca3b8 fffffa80`074bd980 : fffffa80`05758900 fffffa80`064e14c1 ffffc114`ac10130b ffff0000`0b1a4025 : 0xfffffa80`05d3e7c0
fffff880`092ca3c0 fffffa80`05758900 : fffffa80`064e14c1 ffffc114`ac10130b ffff0000`0b1a4025 00000000`0000003e : 0xfffffa80`074bd980
fffff880`092ca3c8 fffffa80`064e14c1 : ffffc114`ac10130b ffff0000`0b1a4025 00000000`0000003e fffffa80`043b01a0 : 0xfffffa80`05758900
fffff880`092ca3d0 ffffc114`ac10130b : ffff0000`0b1a4025 00000000`0000003e fffffa80`043b01a0 fffffa80`05d3e7c0 : 0xfffffa80`064e14c1
fffff880`092ca3d8 ffff0000`0b1a4025 : 00000000`0000003e fffffa80`043b01a0 fffffa80`05d3e7c0 fffffa80`074bd820 : 0xffffc114`ac10130b
fffff880`092ca3e0 00000000`0000003e : fffffa80`043b01a0 fffffa80`05d3e7c0 fffffa80`074bd820 fffffa80`05cdfbc0 : 0xffff0000`0b1a4025
fffff880`092ca3e8 fffffa80`043b01a0 : fffffa80`05d3e7c0 fffffa80`074bd820 fffffa80`05cdfbc0 fffff880`02364647 : 0x3e
fffff880`092ca3f0 fffffa80`05d3e7c0 : fffffa80`074bd820 fffffa80`05cdfbc0 fffff880`02364647 fffff880`092ca4e0 : 0xfffffa80`043b01a0
fffff880`092ca3f8 fffffa80`074bd820 : fffffa80`05cdfbc0 fffff880`02364647 fffff880`092ca4e0 fffff880`014a671a : 0xfffffa80`05d3e7c0
fffff880`092ca400 fffffa80`05cdfbc0 : fffff880`02364647 fffff880`092ca4e0 fffff880`014a671a fffffa80`05cdfa70 : 0xfffffa80`074bd820
fffff880`092ca408 fffff880`02364647 : fffff880`092ca4e0 fffff880`014a671a fffffa80`05cdfa70 00000000`00000000 : 0xfffffa80`05cdfbc0
fffff880`092ca410 fffff880`092ca4e0 : fffff880`014a671a fffffa80`05cdfa70 00000000`00000000 fffffa80`043b01a0 : aswTdi+0x1647
fffff880`092ca418 fffff880`014a671a : fffffa80`05cdfa70 00000000`00000000 fffffa80`043b01a0 fffffa80`064dd710 : 0xfffff880`092ca4e0
fffff880`092ca420 fffff880`014a6542 : 00000000`00000000 fffff880`092ca500 fffffa80`064dd710 fffffa80`074bd820 : netbt!GetIrp+0x52
fffff880`092ca450 fffff880`014a6f61 : fffffa80`064858a8 fffffa80`064858a8 fffffa80`040063f0 fffff880`092ca550 : netbt!TdiSendDatagram+0x187
fffff880`092ca4c0 fffff880`014b3329 : fffffa80`04a17e50 fffffa80`064856f0 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1
fffff880`092ca550 fffff880`014b30e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`014dc114 : netbt!UdpSendResponse+0x4e0
fffff880`092ca5d0 fffff880`014a7be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`092ca700 fffff880`014a5b47 : 00000000`00000032 fffffa80`065fc90c 00000000`00000032 fffff880`092ca902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`092ca740 fffff880`02369443 : fffffa80`03dfa680 00000000`00000032 fffff880`0236e820 fffffa80`03dfa680 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`092ca7e0 fffffa80`03dfa680 : 00000000`00000032 fffff880`0236e820 fffffa80`03dfa680 00000000`00000000 : aswTdi+0x6443
fffff880`092ca7e8 00000000`00000032 : fffff880`0236e820 fffffa80`03dfa680 00000000`00000000 00000000`00000004 : 0xfffffa80`03dfa680
fffff880`092ca7f0 fffff880`0236e820 : fffffa80`03dfa680 00000000`00000000 00000000`00000004 00000000`00000032 : 0x32
fffff880`092ca7f8 fffffa80`03dfa680 : 00000000`00000000 00000000`00000004 00000000`00000032 00000000`00000032 : aswTdi+0xb820
fffff880`092ca800 00000000`00000000 : 00000000`00000004 00000000`00000032 00000000`00000032 fffff880`092ca928 : 0xfffffa80`03dfa680


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!CompareSecurityContexts+6a
fffff880`01f72c5a 448b442470      mov     r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------


Old drivers needing update
Code:
iirsp.sys    12/13/2005 16:47:54    0x439f418a    fffff880`0174a000    fffff880`0175b000        0x00011000                    
nfrd960.sys    6/6/2006 16:11:48    0x4485ef94    fffff880`016a4000    fffff880`016b4000        0x00010000                    
adpu320.sys    2/27/2007 19:04:15    0x45e4c6ff    fffff880`015bb000    fffff880`015ea000        0x0002f000                    
adpahci.sys    5/1/2007 12:30:09    0x46377921    fffff880`01565000    fffff880`015bb000        0x00056000                    
arc.sys    5/24/2007 16:27:55    0x4656035b    fffff880`01470000    fffff880`01489000        0x00019000                    
SiSRaid2.sys    9/24/2008 13:28:20    0x48da86c4    fffff880`01a64000    fffff880`01a72000        0x0000e000                    
000.fcl    9/26/2008 8:11:22    0x48dcdf7a    fffff880`08399000    fffff880`083c4000        0x0002b000                    
sisraid4.sys    10/1/2008 16:56:04    0x48e3f1f4    fffff880`01a72000    fffff880`01a8a000        0x00018000                    
adp94xx.sys    12/5/2008 18:54:42    0x4939bf42    fffff880`014ea000    fffff880`01565000        0x0007b000                    
lsi_fc.sys    12/9/2008 17:46:09    0x493ef531    fffff880`0175b000    fffff880`0177a000        0x0001f000                    
arcsas.sys    1/14/2009 14:27:37    0x496e3ca9    fffff880`01489000    fffff880`014a4000        0x0001b000                    
ql2300.sys    1/22/2009 18:05:06    0x4978fba2    fffff880`01824000    fffff880`019c8000        0x001a4000                    
vsmraid.sys    1/30/2009 20:18:57    0x4983a701    fffff880`01a94000    fffff880`01abe000        0x0002a000                    
elxstor.sys    2/3/2009 17:52:11    0x4988ca9b    fffff880`016c3000    fffff880`0174a000        0x00087000                    
stexstor.sys    2/17/2009 18:03:36    0x499b4248    fffff880`01a8a000    fffff880`01a94000        0x0000a000                    
amdsbs.sys    3/20/2009 13:36:03    0x49c3e213    fffff880`0141e000    fffff880`01465000        0x00047000                    
iaStorV.sys    4/8/2009 11:57:17    0x49dcd76d    fffff880`010cf000    fffff880`011ed000        0x0011e000                    
lsi_scsi.sys    4/16/2009 17:13:50    0x49e7ad9e    fffff880`0178d000    fffff880`017ac000        0x0001f000                    
HpqKbFiltr.sys    4/29/2009 8:48:30    0x49f85aae    fffff880`04bd9000    fffff080`04be5000        0xfffff8000000c000                    
spldr.sys    5/11/2009 11:56:27    0x4a0858bb    fffff880`02281000    fffff880`02289000        0x00008000                    
HpSAMD.sys    5/18/2009 18:43:49    0x4a11f2b5    fffff880`013e0000    fffff880`013f7000        0x00017000                    
lsi_sas.sys    5/18/2009 19:20:23    0x4a11fb47    fffff880`0122a000    fffff880`01247000        0x0001d000                    
lsi_sas2.sys    5/18/2009 19:31:48    0x4a11fdf4    fffff880`0177a000    fffff880`0178d000        0x00013000                    
megasas.sys    5/18/2009 20:09:46    0x4a1206da    fffff880`017ac000    fffff880`017b8000        0x0000c000                    
ql40xx.sys    5/18/2009 20:18:11    0x4a1208d3    fffff880`01a05000    fffff880`01a64000        0x0005f000                    
MegaSR.sys    5/18/2009 20:25:54    0x4a120aa2    fffff880`01600000    fffff880`016a4000        0x000a4000                    
amdsata.sys    5/19/2009 12:53:21    0x4a12f211    fffff880`01400000    fffff880`0141e000        0x0001e000                    
amdxata.sys    5/19/2009 12:56:59    0x4a12f2eb    fffff880`01465000    fffff880`01470000        0x0000b000                    
nvraid.sys    5/20/2009 1:39:40    0x4a13a5ac    fffff880`01067000    fffff880`01090000        0x00029000                    
nvstor.sys    5/20/2009 1:45:37    0x4a13a711    fffff880`017b8000    fffff880`017e3000        0x0002b000                    
Accelerometer.sys    7/8/2009 13:41:38    0x4a54e862    fffff880`04860000    fffff880`0486c000        0x0000c000                    
hpdskflt.sys    7/8/2009 13:41:38    0x4a54e862    fffff880`022fb000    fffff880`02305000        0x0000a000                    
IntcHdmi.sys    7/10/2009 8:45:10    0x4a5745e6    fffff880`0699b000    fffff880`069c2000        0x00027000
How To Find Drivers:
Quote:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads
My System SpecsSystem Spec
Reply

 BSoD HP Touchsmart tm2-1079cl notebook




Thread Tools



Similar help and support threads for2: BSoD HP Touchsmart tm2-1079cl notebook
Thread Forum
Solved Notebook HP touchsmart tm2-2050ep error driver touchsmart Drivers
I need to find hidusb.sys for HP touchsmart tm2t notebook pc. Hardware & Devices
I need to find hidusb.sys for HP touchsmart tm2t notebook pc. Drivers
BSOD help on HP Touchsmart laptop Win 7 x64 BSOD Help and Support
HP Touchsmart 300 Random BSOD BSOD Help and Support
BSOD - HP TouchSmart 600 BSOD Help and Support
TouchSmart tm2-1079cl Notebook BSOD BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 02:15 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33