New
#1
BSOD help needed
We have a computer with tv tuners installed which is connected to our television. Initially it was crashing often when we ran Media Center. Our operating system is Windows 7 64 bit. Now it crashes every few minutes whether we are playing video or not. Here is the description of the problem that we received when it crashed last time. and the dump file.
____________________________________________________________________
Code:Problem signature: Problem Event Name: BlueScreen OS Version: 6.1.7600.2.0.0.768.3 Locale ID: 1033 Additional information about the problem: BCCode: 7f BCP1: 0000000000000008 BCP2: 0000000080050031 BCP3: 00000000000006F8 BCP4: FFFFF80002E9505F OS Version: 6_1_7600 Service Pack: 0_0 Product: 768_1 Files that help describe the problem: C:\Windows\Minidump\072111-36343-01.dmp C:\Users\franckel\AppData\Local\Temp\WER-43734-0.sysdata.xml Read our privacy statement online: Windows 7 Privacy Statement - Microsoft Windows If the online privacy statement is not available, please read our privacy statement offline: C:\Windows\system32\en-US\erofflps.txt Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\072111-36359-02.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16792.amd64fre.win7_gdr.110408-1633 Machine Name: Kernel base = 0xfffff800`02e5f000 PsLoadedModuleList = 0xfffff800`0309ce50 Debug session time: Thu Jul 21 21:54:44.483 2011 (UTC - 4:00) System Uptime: 0 days 0:53:10.702 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7F, {8, 80050031, 6f8, fffff80002ed4da2} Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050031 Arg3: 00000000000006f8 Arg4: fffff80002ed4da2 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80002ecec69 to fffff80002ecf700 STACK_TEXT: fffff880`02f69ce8 fffff800`02ecec69 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx fffff880`02f69cf0 fffff800`02ecd132 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`02f69e30 fffff800`02ed4da2 : 00700020`004c004c 0074006e`0069006f 00720020`00720065 00690065`00630065 : nt!KiDoubleFaultAbort+0xb2 fffff880`03953000 fffff800`02e97f32 : fffffa80`0710a080 00000000`00000001 00000000`00000000 fffffa80`04b547c8 : nt!SeAccessCheckWithHint+0x312 fffff880`039530e0 fffff880`01580c5a : 00640065`006c0069 0020006f`00740020 00200064`00640061 00200077`0065006e : nt!SeAccessCheckFromState+0x102 fffff880`039537d0 fffff880`0157e94f : 00650063`c0000022 006e0045`00000000 006f0043`006d0075 00630065`006e006e : NETIO!CompareSecurityContexts+0x6a fffff880`03953840 fffff880`015809b5 : 00640065`00760069 00000000`00000000 00740065`004e0043 006b0072`006f0077 : NETIO!MatchValues+0xef fffff880`03953890 fffff880`01580845 : fffffa80`06cc51e0 fffffa80`06ed89c0 fffff880`03953ab8 fffff880`039541f0 : NETIO!FilterMatch+0x95 fffff880`039538e0 fffff880`01581ccb : 00000000`00000000 00000000`00000000 fffff880`039541f0 fffff880`03953aa0 : NETIO!IndexListClassify+0x69 fffff880`03953960 fffff880`016403a7 : fffff880`03953e38 fffff880`03953e38 fffff880`03954b70 fffffa80`03fe0d50 : NETIO!KfdClassify+0xa4e fffff880`03953cd0 fffff880`016397ee : fffff880`01748690 00000000`00000000 fffffa80`05c3a6c0 00000000`00000000 : tcpip!WfpAleClassify+0x57 fffff880`03953d10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e STACK_COMMAND: kb FOLLOWUP_IP: NETIO!CompareSecurityContexts+6a fffff880`01580c5a 448b442470 mov r8d,dword ptr [rsp+70h] SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: NETIO!CompareSecurityContexts+6a FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a Followup: MachineOwner
Last edited by Brink; 22 Jul 2011 at 15:42. Reason: code box