New
#1
BSOD Frequently
Hey, I recently built a new computer and installed Windows 7 on it. I am frequently getting BSOD's. Im thinking its the video card. Any help would be appreciated!
Hey, I recently built a new computer and installed Windows 7 on it. I am frequently getting BSOD's. Im thinking its the video card. Any help would be appreciated!
Hello !! Welcome to SF !!
The Dump files pointing to NETIO.sys which i would say is a Network bug. Please follow the below steps.
1, Dowload a fresh copy of drivers for your Network card from Vendor's webiste
2, Disconnect from Internet
3, Remove your Network card drivers completely and reinstall it.
If you have an Antivirus / Firewall try uninstalling it and see whether it makes any difference. Update your BIOS Firmware.Run the Memory Diagnostic & HD Diagnostic
Start > CMD > Right Click and Run as Administrator > SFC /SCANNOW
Hope this helps,Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7F, {8, 80050031, 6f8, fffff8000288d609} Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a ) Followup: MachineOwner --------- 3: kd> !thread;!analyze -v;r;kv;lmtn;lmtsmn;.bugcheck; GetPointerFromAddress: unable to read from fffff80002abd000 THREAD fffff88002ddffc0 Cid 0000.0000 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 3 Not impersonating GetUlongFromAddress: unable to read from fffff800029fbb74 Owning Process fffff80002a0e140 Image: <Unknown> Attached Process fffffa80069ab9e0 Image: System fffff78000000000: Unable to get shared data Wait Start TickCount 147908 Context Switch Count 838669 ReadMemory error: Cannot get nt!KeMaximumIncrement value. UserTime 00:00:00.000 KernelTime 00:00:00.000 Win32 Start Address nt!KiIdleLoop (0xfffff8000288f6a0) Stack Init fffff88002dfddb0 Current fffff88002dfdd40 Base fffff88002dfe000 Limit fffff88002df8000 Call 0 Priority 16 BasePriority 0 UnusualBoost 0 ForegroundBoost 0 IoPriority 0 PagePriority 0 Child-SP RetAddr : Args to Child : Call Site fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 (TrapFrame @ fffff880`02ddbe30) fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29 fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4 fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180 fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102 fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95 fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69 fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50 fffff880`02df8e80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050031 Arg3: 00000000000006f8 Arg4: fffff8000288d609 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80002886469 to fffff80002886f00 STACK_TEXT: fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29 fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4 fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180 fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102 fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95 fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69 fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50 fffff880`02df8e80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e STACK_COMMAND: kb FOLLOWUP_IP: NETIO!CompareSecurityContexts+6a fffff880`01578c5a 448b442470 mov r8d,dword ptr [rsp+70h] SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: NETIO!CompareSecurityContexts+6a FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a Followup: MachineOwner --------- rax=fffff88002ddbdf0 rbx=fffffa80082642c4 rcx=000000000000007f rdx=0000000000000008 rsi=fffff88002df80e8 rdi=0000000000000000 rip=fffff80002886f00 rsp=fffff88002ddbce8 rbp=fffff88002ddbeb0 r8=0000000080050031 r9=00000000000006f8 r10=fffff8000288d609 r11=fffff88002df82d0 r12=fffff88002df80e8 r13=fffff88002df82d0 r14=0000000000000000 r15=0000000000000001 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000286 nt!KeBugCheckEx: fffff800`02886f00 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`02ddbcf0=000000000000007f Child-SP RetAddr : Args to Child : Call Site fffff880`02ddbce8 fffff800`02886469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx fffff880`02ddbcf0 fffff800`02884932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`02ddbe30 fffff800`0288d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 (TrapFrame @ fffff880`02ddbe30) fffff880`02df7fb0 fffff800`0288c9e4 : 000004d8`00000000 fffff880`02df82d0 fffff880`02df82d0 000004d8`00000000 : nt!SepNormalAccessCheck+0x29 fffff880`02df8040 fffff800`0288c410 : fffff880`02df82b0 00000000`00000000 fffff880`02df82b0 fffff880`02df82d0 : nt!SepAccessCheck+0x1d4 fffff880`02df8170 fffff800`0284f842 : fffffa80`082642b0 00000000`00000001 00000000`00000000 fffffa80`07a227c8 : nt!SeAccessCheckWithHint+0x180 fffff880`02df8250 fffff880`01578c5a : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : nt!SeAccessCheckFromState+0x102 fffff880`02df8940 fffff880`0157694f : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!CompareSecurityContexts+0x6a fffff880`02df89b0 fffff880`015789b5 : 000004d8`00000000 000004d8`00000000 000004d8`00000000 000004d8`00000000 : NETIO!MatchValues+0xef fffff880`02df8a00 fffff880`01578845 : fffffa80`096a61c0 fffffa80`086e1c30 fffff880`02df8c28 fffff880`02df9360 : NETIO!FilterMatch+0x95 fffff880`02df8a50 fffff880`01579ccb : 00000000`00000000 00000000`00000000 fffff880`02df9360 fffff880`02df8c10 : NETIO!IndexListClassify+0x69 fffff880`02df8ad0 fffff880`0163f4d0 : fffff880`02df9360 fffff880`02df8fa8 fffff880`02df9ce0 fffffa80`07084030 : NETIO!KfdClassify+0xa4e fffff880`02df8e40 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`0902b010 00000000`00000000 : tcpip!WfpAleClassify+0x50 fffff880`02df8e80 0000 0000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
Captain
yes, windows debugger for all the six .dmp files came up with a BugCheck 7F, which is an UNEXPECTED_KERNEL_MODE_TRAP Probably caused by : NETIO.SYS which in itself won't be the cause but it suggest's your issue is in your networking subsystem ?
your realtek driver is a year out of dateso i suggest you update that and your chipset drivers by going to Realtek's and your motherboard manufacturers website respectively ?Rt64win7.sys fffff880`0418c000 fffff880`041be000 0x00032000 0x49a65b0d 26/02/2009 10:04:13
The other most common cause for bluescreen crashes with the networking subsystem would be your antivirus and or third party firewall ?
please fill out your system details and your antivirus version etc so we can help you further ?
N.B. hehe sorry cap'n jack i was editing while you posted , but hey it's good we agree on the cause and cure
Thanks guys, Ill try tonight or tomorrow and get back to you.
I wonder if this is also what is causing the computer to freeze when logging in locally after a remote session (I remote in from work and then when I get home and try to log in locally it just continuously says welcome...