Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Random BSOD at any given time

03 Sep 2012   #1

Windows 7 enterprise
 
 
Random BSOD at any given time

Hi All,

I'm experiencing BSOD and freeze up issues at very random times, in fact in some instances I dont even have to be actively doing anything. Laptop could be idle and then it'll crash on it's own and I have to restart it and then I get the "your OS crashed message" etc.
I've had the IT folks at my job re-image the OS, update the BIOS, yet still no luck. Hoping someone can help me here.
I'm attaching the zip file from running the utility tool to grab system data.

My System SpecsSystem Spec
.

03 Sep 2012   #2

Windows 7 enterprise
 
 

Anyone Please?
My System SpecsSystem Spec
18 Oct 2012   #3

Windows 7 enterprise
 
 

Pasted below is the analysis I ran using windbg to analyze my minidump file, lots of references to netio.sys

Can anyone take a look please?



Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\101812-64912-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02c64000 PsLoadedModuleList = 0xfffff800`02ea8670
Debug session time: Thu Oct 18 13:40:20.778 2012 (UTC - 4:00)
System Uptime: 3 days 20:28:09.983
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {28, 2, 0, fffff880015986fd}

Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880015986fd, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'tdtcp' and 'tdtcp.sys' overlap

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f12100
GetUlongFromAddress: unable to read from fffff80002f121c0
0000000000000028 Nonpaged pool

CURRENT_IRQL: 2

FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: System

TRAP_FRAME: fffff880031ca6f0 -- (.trap 0xfffff880031ca6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880031ca910 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880015986fd rsp=fffff880031ca880 rbp=fffff880031ca9b0
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa8004b775b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002ce2769 to fffff80002ce31c0

STACK_TEXT:
fffff880`031ca5a8 fffff800`02ce2769 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031ca5b0 fffff800`02ce13e0 : fffffa80`0504ad60 00000000`00000001 00000000`00000001 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`031ca6f0 fffff880`015986fd : 00000000`0000011e fffff880`016141ac 00000000`0000000c fffffa80`0836f1b8 : nt!KiPageFault+0x260
fffff880`031ca880 fffff880`016a1c1c : 00000000`00000000 fffff880`016702e6 00000000`00000000 00000000`00000000 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`031ca8e0 fffff880`0166de18 : fffffa80`04b775b0 00000000`00000000 fffffa80`03f08a20 00000000`188eff19 : tcpip! ?? ::FNODOBFM::`string'+0x1d16f
fffff880`031ca950 fffff880`0165f1c4 : fffff880`031cae08 fffff880`00000029 fffffa80`03f08a20 00000000`00000001 : tcpip!TcpTcbCarefulDatagram+0x1a98
fffff880`031cab00 fffff880`0165e65a : fffffa80`049ba490 fffff880`01657544 fffffa80`0467b268 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`031cacb0 fffff880`0165fbfb : fffff880`068570f4 fffffa80`049a7000 00000000`00000000 fffff880`031cb000 : tcpip!TcpMatchReceive+0x1fa
fffff880`031cae00 fffff880`01657bd7 : fffffa80`049ba490 fffffa80`046e5ec7 fffffa80`000063be 00000000`000063be : tcpip!TcpPreValidatedReceive+0x36b
fffff880`031caed0 fffff880`0165774a : 00000000`00000000 fffff880`01769800 fffff880`031cb090 fffffa80`06754970 : tcpip!IppDeliverListToProtocol+0x97
fffff880`031caf90 fffff880`01656d49 : fffffa80`07c5f100 00000000`00000002 fffffa80`064d7cb0 fffff880`031cb080 : tcpip!IppProcessDeliverList+0x5a
fffff880`031cb030 fffff880`01654abf : 00000000`00000000 00000000`052c7000 fffff880`01769800 fffff880`01769800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`031cb110 fffff880`016540b2 : fffffa80`052b83e0 00000000`00000000 fffffa80`052c7000 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`031cb310 fffff880`016cac9a : fffffa80`00000000 fffffa80`052f1030 fffffa80`052c7010 fffff880`031cb400 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`031cb3f0 fffff800`02ceee48 : fffffa80`0959e1c0 fffffa80`046cf90c fffffa80`039a4660 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x50b52
fffff880`031cb440 fffff880`01653c12 : fffff880`01653470 00000000`00000014 00000000`00000000 fffffa80`05312a01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`031cb520 fffff880`014be0eb : fffffa80`053028d0 00000000`00000000 fffffa80`04e3e1a0 fffffa80`046cf858 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`031cb590 fffff880`01487ad6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`031cb600 fffff880`01401ac1 : fffffa80`04e3e1a0 fffff800`02e802d8 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`031cba80 fffff880`044f966c : 00000000`00000001 fffff800`02e802d8 fffffa80`039a4660 fffffa80`07b1b290 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`031cbad0 fffff880`044f3c17 : fffff880`04509648 fffffa80`039a4660 fffffa80`039a4660 00000000`00000000 : tunnel!TeredoWfpIndicationWorker+0xb4
fffff880`031cbb10 fffff800`02fd5633 : fffffa80`052c4060 00000000`00000001 fffffa80`07b1b290 fffffa80`039a4660 : tunnel!LwWorker+0x1b
fffff880`031cbb40 fffff800`02cec841 : fffff800`02e80200 fffff800`02fd5601 fffffa80`039a4600 fffffa80`00000299 : nt!IopProcessWorkItem+0x23
fffff880`031cbb70 fffff800`02f79e6a : 490012b2`e9258d4c fffffa80`039a4660 00000000`00000080 fffffa80`0390d890 : nt!ExpWorkerThread+0x111
fffff880`031cbc00 fffff800`02cd3ec6 : fffff880`02fd5180 fffffa80`039a4660 fffff880`02fdffc0 5d8948ff`ffff138c : nt!PspSystemThreadStartup+0x5a
fffff880`031cbc40 00000000`00000000 : fffff880`031cc000 fffff880`031c6000 fffff880`031cb8a0 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0

FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880015986fd, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'tdtcp' and 'tdtcp.sys' overlap

READ_ADDRESS: 0000000000000028 Nonpaged pool

CURRENT_IRQL: 2

FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: System

TRAP_FRAME: fffff880031ca6f0 -- (.trap 0xfffff880031ca6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880031ca910 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880015986fd rsp=fffff880031ca880 rbp=fffff880031ca9b0
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa8004b775b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002ce2769 to fffff80002ce31c0

STACK_TEXT:
fffff880`031ca5a8 fffff800`02ce2769 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031ca5b0 fffff800`02ce13e0 : fffffa80`0504ad60 00000000`00000001 00000000`00000001 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`031ca6f0 fffff880`015986fd : 00000000`0000011e fffff880`016141ac 00000000`0000000c fffffa80`0836f1b8 : nt!KiPageFault+0x260
fffff880`031ca880 fffff880`016a1c1c : 00000000`00000000 fffff880`016702e6 00000000`00000000 00000000`00000000 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`031ca8e0 fffff880`0166de18 : fffffa80`04b775b0 00000000`00000000 fffffa80`03f08a20 00000000`188eff19 : tcpip! ?? ::FNODOBFM::`string'+0x1d16f
fffff880`031ca950 fffff880`0165f1c4 : fffff880`031cae08 fffff880`00000029 fffffa80`03f08a20 00000000`00000001 : tcpip!TcpTcbCarefulDatagram+0x1a98
fffff880`031cab00 fffff880`0165e65a : fffffa80`049ba490 fffff880`01657544 fffffa80`0467b268 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`031cacb0 fffff880`0165fbfb : fffff880`068570f4 fffffa80`049a7000 00000000`00000000 fffff880`031cb000 : tcpip!TcpMatchReceive+0x1fa
fffff880`031cae00 fffff880`01657bd7 : fffffa80`049ba490 fffffa80`046e5ec7 fffffa80`000063be 00000000`000063be : tcpip!TcpPreValidatedReceive+0x36b
fffff880`031caed0 fffff880`0165774a : 00000000`00000000 fffff880`01769800 fffff880`031cb090 fffffa80`06754970 : tcpip!IppDeliverListToProtocol+0x97
fffff880`031caf90 fffff880`01656d49 : fffffa80`07c5f100 00000000`00000002 fffffa80`064d7cb0 fffff880`031cb080 : tcpip!IppProcessDeliverList+0x5a
fffff880`031cb030 fffff880`01654abf : 00000000`00000000 00000000`052c7000 fffff880`01769800 fffff880`01769800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`031cb110 fffff880`016540b2 : fffffa80`052b83e0 00000000`00000000 fffffa80`052c7000 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`031cb310 fffff880`016cac9a : fffffa80`00000000 fffffa80`052f1030 fffffa80`052c7010 fffff880`031cb400 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`031cb3f0 fffff800`02ceee48 : fffffa80`0959e1c0 fffffa80`046cf90c fffffa80`039a4660 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x50b52
fffff880`031cb440 fffff880`01653c12 : fffff880`01653470 00000000`00000014 00000000`00000000 fffffa80`05312a01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`031cb520 fffff880`014be0eb : fffffa80`053028d0 00000000`00000000 fffffa80`04e3e1a0 fffffa80`046cf858 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`031cb590 fffff880`01487ad6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`031cb600 fffff880`01401ac1 : fffffa80`04e3e1a0 fffff800`02e802d8 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`031cba80 fffff880`044f966c : 00000000`00000001 fffff800`02e802d8 fffffa80`039a4660 fffffa80`07b1b290 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`031cbad0 fffff880`044f3c17 : fffff880`04509648 fffffa80`039a4660 fffffa80`039a4660 00000000`00000000 : tunnel!TeredoWfpIndicationWorker+0xb4
fffff880`031cbb10 fffff800`02fd5633 : fffffa80`052c4060 00000000`00000001 fffffa80`07b1b290 fffffa80`039a4660 : tunnel!LwWorker+0x1b
fffff880`031cbb40 fffff800`02cec841 : fffff800`02e80200 fffff800`02fd5601 fffffa80`039a4600 fffffa80`00000299 : nt!IopProcessWorkItem+0x23
fffff880`031cbb70 fffff800`02f79e6a : 490012b2`e9258d4c fffffa80`039a4660 00000000`00000080 fffffa80`0390d890 : nt!ExpWorkerThread+0x111
fffff880`031cbc00 fffff800`02cd3ec6 : fffff880`02fd5180 fffffa80`039a4660 fffff880`02fdffc0 5d8948ff`ffff138c : nt!PspSystemThreadStartup+0x5a
fffff880`031cbc40 00000000`00000000 : fffff880`031cc000 fffff880`031c6000 fffff880`031cb8a0 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0

FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

Followup: MachineOwner
---------
My System SpecsSystem Spec
.


18 Oct 2012   #4

Microsoft Community Contributor Award Recipient

Windows 7 Home Premium 64Bit
 
 

Sorry for the late reply.

The attached zip on your first post does not have any .dmp files. Please make sure you're following the instructions correctly and post all the dumps you got.

Information that I've gathered from the msinfo file,
Code:
Start Menu\Programs\Symantec Endpoint Protection	Public:Start Menu\Programs\Symantec Endpoint Protection	Public
Norton/Symantec are known to cause BSoDs. Please uninstall it and all its components using the Norton Removal Tool. Download and install free Microsoft Security Essentials make a full scan once installed and updated.

Run the system file checker and disk check.
My System SpecsSystem Spec
25 Oct 2012   #5

Windows 7 enterprise
 
 

Thanks for the response koolkat, I actually pasted the contents of the dump file that I retrieved using winDBG directly in the message prior to yours'.
Symantec cannot be removed, it's actually my work laptop and this is a standard piece of software installed on everyone's machine. Other folks have it and are not experiencing my issue.

2 things I've done

1. We had the system board replaced and since then I have not experienced any freeze and hangs, been about a month
2. For BSOD issue, we had the latest network drivers installed both for my LAN and wireless per the netio.sys message from the dump, this was just done a couple of days ago, so keeping an eye out to see how things go
My System SpecsSystem Spec
25 Oct 2012   #6

Microsoft Community Contributor Award Recipient

Windows 7 Home Premium 64Bit
 
 

Thanks for the update ..let us know how it goes.
My System SpecsSystem Spec
Reply

 Random BSOD at any given time




Thread Tools



Similar help and support threads for2: Random BSOD at any given time
Thread Forum
BSOD at Random Time BSOD Help and Support
Random BSoD at Any Time? BSOD Help and Support
A lot of different BSOD at random time. BSOD Help and Support
Random BSOD , from time to time , during normal daily activity! BSOD Help and Support
Random BSOD's all the time BSOD Help and Support
Having Random BSOD all the time BSOD Help and Support
BSOD in random time BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 09:26 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33