BSOD Frequently


  1. Posts : 3
    Windows 7
       #1

    BSOD Frequently


    Hey, I recently built a new computer and installed Windows 7 on it. I am frequently getting BSOD's. Im thinking its the video card. Any help would be appreciated!
      My Computer


  2. Posts : 3
    Windows 7
    Thread Starter
       #2

    Anyone got any ideas?
      My Computer


  3. Posts : 4,772
    Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
       #3

    Mourdsoe said:
    Hey, I recently built a new computer and installed Windows 7 on it. I am frequently getting BSOD's. Im thinking its the video card. Any help would be appreciated!
    Hello !! Welcome to SF !!

    The Dump files pointing to NETIO.sys which i would say is a Network bug. Please follow the below steps.

    1, Dowload a fresh copy of drivers for your Network card from Vendor's webiste
    2, Disconnect from Internet
    3, Remove your Network card drivers completely and reinstall it.

    Run the Memory Diagnostic & HD Diagnostic
    Start > CMD > Right Click and Run as Administrator > SFC /SCANNOW
    If you have an Antivirus / Firewall try uninstalling it and see whether it makes any difference. Update your BIOS Firmware.

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    Use !analyze -v to get detailed debugging information.
    BugCheck 7F, {8, 80050031, 6f8, fffff8000288d609}
    Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )
    Followup: MachineOwner
    ---------
    3: kd> !thread;!analyze -v;r;kv;lmtn;lmtsmn;.bugcheck;
    GetPointerFromAddress: unable to read from fffff80002abd000
    THREAD fffff88002ddffc0  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 3
    Not impersonating
    GetUlongFromAddress: unable to read from fffff800029fbb74
    Owning Process            fffff80002a0e140       Image:         <Unknown>
    Attached Process          fffffa80069ab9e0       Image:         System
    fffff78000000000: Unable to get shared data
    Wait Start TickCount      147908       
    Context Switch Count      838669             
    ReadMemory error: Cannot get nt!KeMaximumIncrement value.
    UserTime                  00:00:00.000
    KernelTime                00:00:00.000
    Win32 Start Address nt!KiIdleLoop (0xfffff8000288f6a0)
    Stack Init fffff88002dfddb0 Current fffff88002dfdd40
    Base fffff88002dfe000 Limit fffff88002df8000 Call 0
    Priority 16 BasePriority 0 UnusualBoost 0 ForegroundBoost 0 IoPriority 0 PagePriority 0
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 (TrapFrame @ fffff880`02ddbe30)
    fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29
    fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4
    fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180
    fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102
    fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a
    fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef
    fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95
    fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69
    fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e
    fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50
    fffff880`02df8e80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000006f8
    Arg4: fffff8000288d609
    Debugging Details:
    ------------------
     
    BUGCHECK_STR:  0x7f_8
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    PROCESS_NAME:  System
    CURRENT_IRQL:  2
    LAST_CONTROL_TRANSFER:  from fffff80002886469 to fffff80002886f00
    STACK_TEXT:  
    fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29
    fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4
    fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180
    fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102
    fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a
    fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef
    fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95
    fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69
    fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e
    fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50
    fffff880`02df8e80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
     
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    NETIO!CompareSecurityContexts+6a
    fffff880`01578c5a 448b442470      mov     r8d,dword ptr [rsp+70h]
    SYMBOL_STACK_INDEX:  7
    SYMBOL_NAME:  NETIO!CompareSecurityContexts+6a
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: NETIO
    IMAGE_NAME:  NETIO.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc18a
    FAILURE_BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
    BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
    Followup: MachineOwner
    ---------
    rax=fffff88002ddbdf0 rbx=fffffa80082642c4 rcx=000000000000007f
    rdx=0000000000000008 rsi=fffff88002df80e8 rdi=0000000000000000
    rip=fffff80002886f00 rsp=fffff88002ddbce8 rbp=fffff88002ddbeb0
     r8=0000000080050031  r9=00000000000006f8 r10=fffff8000288d609
    r11=fffff88002df82d0 r12=fffff88002df80e8 r13=fffff88002df82d0
    r14=0000000000000000 r15=0000000000000001
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000286
    nt!KeBugCheckEx:
    fffff800`02886f00 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff880`02ddbcf0=000000000000007f
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
    fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 (TrapFrame @ fffff880`02ddbe30)
    fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29
    fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4
    fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180
    fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102
    fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a
    fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef
    fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95
    fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69
    fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e
    fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50
    fffff880`02df8e80 0000
    0000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
    Hope this helps,
    Captain
      My Computer


  4. Posts : 1,360
    win7 ultimate / virtual box
       #4

    Mourdsoe said:
    Anyone got any ideas?
    yes, windows debugger for all the six .dmp files came up with a BugCheck 7F, which is an UNEXPECTED_KERNEL_MODE_TRAP Probably caused by : NETIO.SYS which in itself won't be the cause but it suggest's your issue is in your networking subsystem ?

    your realtek driver is a year out of date
    Rt64win7.sys fffff880`0418c000 fffff880`041be000 0x00032000 0x49a65b0d 26/02/2009 10:04:13
    so i suggest you update that and your chipset drivers by going to Realtek's and your motherboard manufacturers website respectively ?

    The other most common cause for bluescreen crashes with the networking subsystem would be your antivirus and or third party firewall ?

    please fill out your system details and your antivirus version etc so we can help you further ?


    N.B. hehe sorry cap'n jack i was editing while you posted , but hey it's good we agree on the cause and cure
      My Computer


  5. Posts : 3
    Windows 7
    Thread Starter
       #5

    Thanks guys, Ill try tonight or tomorrow and get back to you.

    I wonder if this is also what is causing the computer to freeze when logging in locally after a remote session (I remote in from work and then when I get home and try to log in locally it just continuously says welcome...
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 18:55.
Find Us