Hello. New BSOD event today ;-{
Windows 7 x64 OEM upgrade from VISTA
Lenovo T500 purchased in July 2009
OS installation is original with all current Windows updates applied (to the best of my knowledge
Zip file attached per instructions. Any help would be appreciated very much. Thanks.
Phil
Hi Phil and welcome.
It is really difficult to diagnose from one DMP and yours is no exception. No trends to follow.
The cause is blamed on NETIO.SYS (an OS file dealing with network) but that is not usually the true cause.
More often another app causes netio.sys to crash. Usually a firewall like Zone Alarm or an antivirus app. AVG has been know to cause them and I would remove and replace with Microsoft security essentials just to test.
http://download.zonealarm.com/bin/fr...cpes_clean.exe
AVG - PC TuneUp 2011 | Registry Cleaner, File Recovery, Internet Accelerator
Virus, Spyware & Malware Protection | Microsoft Security Essentials
Old drivers needing updating
Code:
mdmxsdk.sys 6/19/2006 5:27:26 PM fffff880`02de4000 fffff880`02de8280 0x00004280 0x449716be
DLARTL_E.SYS 2/9/2007 12:04:36 AM fffff880`02e4c000 fffff880`02e53e00 0x00007e00 0x45cbf2d4
DLACDBHE.SYS 2/9/2007 12:05:10 AM fffff880`02e39000 fffff880`02e3b300 0x00002300 0x45cbf2f6
psadd.sys 2/19/2007 2:56:37 PM fffff880`06177000 fffff880`06182000 0x0000b000 0x45d9f2e5
DLADResE.SYS 6/18/2007 7:27:48 PM fffff880`08810000 fffff880`08810d80 0x00000d80 0x467714f4
rimspx64.sys 7/26/2007 7:33:52 AM fffff880`043e7000 fffff880`043fe000 0x00017000 0x46a886a0
rixdpx64.sys 7/27/2007 6:45:50 AM fffff880`0604a000 fffff880`060a1000 0x00057000 0x46a9ccde
rimmpx64.sys 2/20/2008 9:24:19 PM fffff880`0580d000 fffff880`05822000 0x00015000 0x47bcd2c3
hugoio64.sys 4/4/2008 10:39:14 AM fffff880`03fcd000 fffff880`03fd3000 0x00006000 0x47f63d92
e1y60x64.sys 8/22/2008 6:09:50 PM fffff880`04a00000 fffff880`04a50000 0x00050000 0x48af392e
dump_iaStor.sys 2/11/2009 9:24:30 PM fffff880`02ebd000 fffff880`02fda000 0x0011d000 0x49937a4e
iaStor.sys 2/11/2009 9:24:30 PM fffff880`0120e000 fffff880`0132b000 0x0011d000 0x49937a4e
xaudio64.sys 4/29/2009 2:21:07 PM fffff880`0739d000 fffff880`073a5000 0x00008000 0x49f89a93
spldr.sys 5/11/2009 12:56:27 PM fffff880`01ae7000 fffff880`01aef000 0x00008000 0x4a0858bb
HECIx64.sys 6/23/2009 3:50:00 PM fffff880`055b2000 fffff880`055c3000 0x00011000 0x4a4131e8
How To Find Drivers:
- search Google for the name of the driver
- compare the Google results with what's installed on your system to figure out which device/program it belongs to
- visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
- if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
- - The most common drivers are listed on this page: Driver Reference Driver Reference
- - Driver manufacturer links are on this page: Drivers and Downloads
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\060211-45209-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061650
Debug session time: Thu Jun 2 16:05:53.353 2011 (GMT-4)
System Uptime: 0 days 2:59:26.945
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 406f8, fffff80002eadcaf}
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff80002eadcaf
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: lsass.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002e9b2a9 to fffff80002e9bd00
STACK_TEXT:
fffff800`00ba4d28 fffff800`02e9b2a9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02e99772 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`02eadcaf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`06deef60 fffff800`02eae3d8 : 00000000`00000001 00000000`00000000 fffff880`06def210 00000000`00000000 : nt!SepAccessCheck+0x4f
fffff880`06def090 fffff800`02e6ab8e : fffffa80`099ed7c8 00000000`00000001 fffffa80`080bc480 00000000`00000000 : nt!SeAccessCheckWithHint+0x178
fffff880`06def190 fffff880`01605a4a : fffff880`06df0530 0053002b`002b0000 00000202`0000002b fffff880`019e7838 : nt!SeAccessCheckFromState+0x102
fffff880`06def880 fffff880`016052af : fffffa80`00000000 fffff880`00000000 00000000`00000000 fffff880`06df5000 : NETIO!CompareSecurityContexts+0x6a
fffff880`06def8f0 fffff880`01605444 : fffff880`01833000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`06def940 fffff880`016058f2 : 00000000`00000000 fffffa80`0a34d110 fffff880`06defb68 fffff880`06df0190 : NETIO!FilterMatch+0x94
fffff880`06def990 fffff880`016066fc : 00000000`00000000 00000000`00000000 fffff880`06df0190 fffff880`06defb50 : NETIO!IndexListClassify+0x69
fffff880`06defa10 fffff880`018b7819 : fffff880`06df0190 fffff880`06defec8 fffff880`06df0ce0 fffffa80`094477d0 : NETIO!KfdClassify+0xa4e
fffff880`06defd80 fffff880`0187f6f8 : fffffa80`09461360 fffff880`06df0c08 fffff880`0197d7a0 fffff880`06df0ce0 : tcpip!WfpAleClassify+0x49
fffff880`06defdd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeReceive+0x818
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01605a4a 448b442470 mov r8d,dword ptr [rsp+70h]
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: NETIO!CompareSecurityContexts+6a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a
BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a
Followup: MachineOwner
---------