Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD Frequently

25 Apr 2010   #1

Windows 7
 
 
BSOD Frequently

Hey, I recently built a new computer and installed Windows 7 on it. I am frequently getting BSOD's. Im thinking its the video card. Any help would be appreciated!


My System SpecsSystem Spec
.

29 Apr 2010   #2

Windows 7
 
 

Anyone got any ideas?
My System SpecsSystem Spec
29 Apr 2010   #3

Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
 
 

Quote   Quote: Originally Posted by Mourdsoe View Post
Hey, I recently built a new computer and installed Windows 7 on it. I am frequently getting BSOD's. Im thinking its the video card. Any help would be appreciated!
Hello !! Welcome to SF !!

The Dump files pointing to NETIO.sys which i would say is a Network bug. Please follow the below steps.

1, Dowload a fresh copy of drivers for your Network card from Vendor's webiste
2, Disconnect from Internet
3, Remove your Network card drivers completely and reinstall it.

Quote:
Run the Memory Diagnostic & HD Diagnostic
Start > CMD > Right Click and Run as Administrator > SFC /SCANNOW
If you have an Antivirus / Firewall try uninstalling it and see whether it makes any difference. Update your BIOS Firmware.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff8000288d609}
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )
Followup: MachineOwner
---------
3: kd> !thread;!analyze -v;r;kv;lmtn;lmtsmn;.bugcheck;
GetPointerFromAddress: unable to read from fffff80002abd000
THREAD fffff88002ddffc0  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 3
Not impersonating
GetUlongFromAddress: unable to read from fffff800029fbb74
Owning Process            fffff80002a0e140       Image:         <Unknown>
Attached Process          fffffa80069ab9e0       Image:         System
fffff78000000000: Unable to get shared data
Wait Start TickCount      147908       
Context Switch Count      838669             
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime                  00:00:00.000
KernelTime                00:00:00.000
Win32 Start Address nt!KiIdleLoop (0xfffff8000288f6a0)
Stack Init fffff88002dfddb0 Current fffff88002dfdd40
Base fffff88002dfe000 Limit fffff88002df8000 Call 0
Priority 16 BasePriority 0 UnusualBoost 0 ForegroundBoost 0 IoPriority 0 PagePriority 0
Child-SP          RetAddr           : Args to Child                                                           : Call Site
fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 (TrapFrame @ fffff880`02ddbe30)
fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29
fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4
fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180
fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102
fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef
fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95
fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69
fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e
fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`02df8e80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff8000288d609
Debugging Details:
------------------
 
BUGCHECK_STR:  0x7f_8
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
PROCESS_NAME:  System
CURRENT_IRQL:  2
LAST_CONTROL_TRANSFER:  from fffff80002886469 to fffff80002886f00
STACK_TEXT:  
fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29
fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4
fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180
fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102
fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef
fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95
fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69
fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e
fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`02df8e80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
 
STACK_COMMAND:  kb
FOLLOWUP_IP: 
NETIO!CompareSecurityContexts+6a
fffff880`01578c5a 448b442470      mov     r8d,dword ptr [rsp+70h]
SYMBOL_STACK_INDEX:  7
SYMBOL_NAME:  NETIO!CompareSecurityContexts+6a
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME:  NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a
FAILURE_BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
Followup: MachineOwner
---------
rax=fffff88002ddbdf0 rbx=fffffa80082642c4 rcx=000000000000007f
rdx=0000000000000008 rsi=fffff88002df80e8 rdi=0000000000000000
rip=fffff80002886f00 rsp=fffff88002ddbce8 rbp=fffff88002ddbeb0
 r8=0000000080050031  r9=00000000000006f8 r10=fffff8000288d609
r11=fffff88002df82d0 r12=fffff88002df80e8 r13=fffff88002df82d0
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000286
nt!KeBugCheckEx:
fffff800`02886f00 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff880`02ddbcf0=000000000000007f
Child-SP          RetAddr           : Args to Child                                                           : Call Site
fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 (TrapFrame @ fffff880`02ddbe30)
fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29
fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4
fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180
fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102
fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef
fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95
fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69
fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e
fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`02df8e80 0000
0000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
Hope this helps,
Captain
My System SpecsSystem Spec
.


29 Apr 2010   #4

win7 ultimate / virtual box
 
 

Quote   Quote: Originally Posted by Mourdsoe View Post
Anyone got any ideas?
yes, windows debugger for all the six .dmp files came up with a BugCheck 7F, which is an UNEXPECTED_KERNEL_MODE_TRAP Probably caused by : NETIO.SYS which in itself won't be the cause but it suggest's your issue is in your networking subsystem ?

your realtek driver is a year out of date
Quote:
Rt64win7.sys fffff880`0418c000 fffff880`041be000 0x00032000 0x49a65b0d 26/02/2009 10:04:13
so i suggest you update that and your chipset drivers by going to Realtek's and your motherboard manufacturers website respectively ?

The other most common cause for bluescreen crashes with the networking subsystem would be your antivirus and or third party firewall ?

please fill out your system details and your antivirus version etc so we can help you further ?


N.B. hehe sorry cap'n jack i was editing while you posted , but hey it's good we agree on the cause and cure
My System SpecsSystem Spec
29 Apr 2010   #5

Windows 7
 
 

Thanks guys, Ill try tonight or tomorrow and get back to you.

I wonder if this is also what is causing the computer to freeze when logging in locally after a remote session (I remote in from work and then when I get home and try to log in locally it just continuously says welcome...
My System SpecsSystem Spec
Reply

 BSOD Frequently




Thread Tools



Similar help and support threads for2: BSOD Frequently
Thread Forum
BSOD Very Frequently While Using PC BSOD Help and Support
BSOD Frequently Occuring BSOD Help and Support
BSOD Frequently BSOD Help and Support
BSoD very frequently plz help BSOD Help and Support
BSOD too frequently BSOD Help and Support
BSOD frequently BSOD Help and Support
BSOD Frequently BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 06:31 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33