BSoD HP Touchsmart tm2-1079cl notebook


  1. Posts : 12
    WIndows 7 Home Premium
       #1

    BSoD HP Touchsmart tm2-1079cl notebook


    Hi,

    I've included all the files you have asked for to diagnose the problem.

    The laptop had Windows 7 Home, but then I upgraded to Windows 7 Ultimate (x64) three days ago (through Windows Anytime Upgrade) thinking it would eliminate the BsOD. It hasn't. This began happening recently, but now it happens frequently. I have not installed any new programs when this problem began. My version of Windows Ultimate is a full retail version I purchased.

    I purchased this laptop from my brother, but it shouldn't be more than a year old.

    Thank you for your help,
    Myers
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    vmhatup said:
    Hi,

    I've included all the files you have asked for to diagnose the problem.

    The laptop had Windows 7 Home, but then I upgraded to Windows 7 Ultimate (x64) three days ago (through Windows Anytime Upgrade) thinking it would eliminate the BsOD. It hasn't. This began happening recently, but now it happens frequently. I have not installed any new programs when this problem began. My version of Windows Ultimate is a full retail version I purchased.

    I purchased this laptop from my brother, but it shouldn't be more than a year old.

    Thank you for your help,
    Myers

    You have three glaring problems

    Your Avast , old drivers, and Zone Alarm (NETIO.sys).
    I would remove avast and replace with Microsoft security essentials and the win 7 firewall. Remove Zone alarm.

    The most recent crash was probably caused by an interaction between ZAP and Avast.

    http://files.avast.com/files/eng/aswclear5.exe

    http://www.microsoft.com/security_essentials/

    http://download.zonealarm.com/bin/fr...cpes_clean.exe

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\021011-30825-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
    *http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e45e50
    Debug session time: Thu Feb 10 10:40:47.378 2011 (GMT-5)
    System Uptime: 0 days 19:25:16.718
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ................................................................
    ...
    Loading User Symbols
    Loading unloaded module list
    ............................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {8, 80050033, 406f8, fffff80002c40ec0}
    
    Unable to load image aswTdi.SYS, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for aswTdi.SYS
    *** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
    Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050033
    Arg3: 00000000000406f8
    Arg4: fffff80002c40ec0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff80002c77ca9 to fffff80002c78740
    
    STACK_TEXT:  
    fffff800`04964d28 fffff800`02c77ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000406f8 : nt!KeBugCheckEx
    fffff800`04964d30 fffff800`02c76172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`04964e70 fffff800`02c40ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`092c7b40 fffff880`01f72c5a : 00730074`0072006f 076be4f2`00000000 005f0067`00000012 00690074`0070006f : nt!SeAccessCheckFromState+0x58
    fffff880`092c8230 fffff880`01f7094f : 00610072`0054006c 006f0070`0073006e 00410073`00740072 00610068`0070006c : NETIO!CompareSecurityContexts+0x6a
    fffff880`092c82a0 fffff880`01f729b5 : 005f0067`00000028 00610072`00540066 006f0070`0073006e 00530073`00740072 : NETIO!MatchValues+0xef
    fffff880`092c82f0 fffff880`01f72845 : fffffa80`07c5c1d0 fffffa80`073ff110 fffff880`092c8518 fffff880`092c8c50 : NETIO!FilterMatch+0x95
    fffff880`092c8340 fffff880`01f73ccb : 00000000`00000000 00000000`00000000 fffff880`092c8c50 fffff880`092c8500 : NETIO!IndexListClassify+0x69
    fffff880`092c83c0 fffff880`0203f417 : fffff880`092c8898 fffff880`092c8898 fffff880`092c95d0 fffffa80`0845fd50 : NETIO!KfdClassify+0xa4e
    fffff880`092c8730 fffff880`0203883e : fffff880`02147690 00000000`00000000 fffffa80`064e0410 00000000`00000000 : tcpip!WfpAleClassify+0x57
    fffff880`092c8770 fffff880`02037cd5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
    fffff880`092c8e80 fffff880`0203b886 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
    fffff880`092c9150 fffff880`0203e5e4 : 00000000`00000000 fffff880`092c9588 fffff880`092c9590 00000000`00000001 : tcpip!WfpAleConnectAcceptIndicate+0x106
    fffff880`092c9240 fffff880`02037019 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
    fffff880`092c94b0 fffff880`02065ef6 : 00000000`00000000 fffff800`02d30002 fffffa80`03f48900 fffffa80`05d614c1 : tcpip!WfpProcessOutTransportStackIndication+0x329
    fffff880`092c9680 fffff880`0206b1ee : fffffa80`03f4c900 fffff880`01f6e804 fffff880`0216d9a0 fffffa80`064e0410 : tcpip!IppSendDatagramsCommon+0x526
    fffff880`092c9950 fffff880`02035db8 : fffffa80`064e0410 fffffa80`0845fd50 fffffa80`0845fd50 fffffa80`03f4c900 : tcpip!IpNlpSendDatagrams+0x3e
    fffff880`092c9990 fffff880`0203632d : fffffa80`0435f680 fffffa80`0421f740 fffff880`092ca2e0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
    fffff880`092c9d10 fffff880`02035fb5 : fffff880`092ca240 00000000`000014c1 00000000`00000001 00000000`00000000 : tcpip!UdpSendMessages+0x35d
    fffff880`092ca100 fffff800`02c87e5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
    fffff880`092ca130 fffff880`02036578 : fffff880`02035fa0 fffff880`092ca240 fffff880`092ca402 fffffa80`040cddc0 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`092ca210 fffff880`03615f45 : fffffa80`05721120 fffffa80`0697c350 fffffa80`043d6cd0 fffffa80`064858de : tcpip!UdpTlProviderSendMessages+0x78
    fffff880`092ca290 fffff880`03615ff2 : 00000000`00000002 fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`064858a8 : tdx!TdxSendDatagramTransportAddress+0x2f5
    fffff880`092ca370 fffff880`023641a8 : fffffa80`074bd980 ffffffff`ffffffff fffffa80`05d3e7c0 fffffa80`074bd980 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
    fffff880`092ca3a0 fffffa80`074bd980 : ffffffff`ffffffff fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`05758900 : aswTdi+0x11a8
    fffff880`092ca3a8 ffffffff`ffffffff : fffffa80`05d3e7c0 fffffa80`074bd980 fffffa80`05758900 fffffa80`064e14c1 : 0xfffffa80`074bd980
    fffff880`092ca3b0 fffffa80`05d3e7c0 : fffffa80`074bd980 fffffa80`05758900 fffffa80`064e14c1 ffffc114`ac10130b : 0xffffffff`ffffffff
    fffff880`092ca3b8 fffffa80`074bd980 : fffffa80`05758900 fffffa80`064e14c1 ffffc114`ac10130b ffff0000`0b1a4025 : 0xfffffa80`05d3e7c0
    fffff880`092ca3c0 fffffa80`05758900 : fffffa80`064e14c1 ffffc114`ac10130b ffff0000`0b1a4025 00000000`0000003e : 0xfffffa80`074bd980
    fffff880`092ca3c8 fffffa80`064e14c1 : ffffc114`ac10130b ffff0000`0b1a4025 00000000`0000003e fffffa80`043b01a0 : 0xfffffa80`05758900
    fffff880`092ca3d0 ffffc114`ac10130b : ffff0000`0b1a4025 00000000`0000003e fffffa80`043b01a0 fffffa80`05d3e7c0 : 0xfffffa80`064e14c1
    fffff880`092ca3d8 ffff0000`0b1a4025 : 00000000`0000003e fffffa80`043b01a0 fffffa80`05d3e7c0 fffffa80`074bd820 : 0xffffc114`ac10130b
    fffff880`092ca3e0 00000000`0000003e : fffffa80`043b01a0 fffffa80`05d3e7c0 fffffa80`074bd820 fffffa80`05cdfbc0 : 0xffff0000`0b1a4025
    fffff880`092ca3e8 fffffa80`043b01a0 : fffffa80`05d3e7c0 fffffa80`074bd820 fffffa80`05cdfbc0 fffff880`02364647 : 0x3e
    fffff880`092ca3f0 fffffa80`05d3e7c0 : fffffa80`074bd820 fffffa80`05cdfbc0 fffff880`02364647 fffff880`092ca4e0 : 0xfffffa80`043b01a0
    fffff880`092ca3f8 fffffa80`074bd820 : fffffa80`05cdfbc0 fffff880`02364647 fffff880`092ca4e0 fffff880`014a671a : 0xfffffa80`05d3e7c0
    fffff880`092ca400 fffffa80`05cdfbc0 : fffff880`02364647 fffff880`092ca4e0 fffff880`014a671a fffffa80`05cdfa70 : 0xfffffa80`074bd820
    fffff880`092ca408 fffff880`02364647 : fffff880`092ca4e0 fffff880`014a671a fffffa80`05cdfa70 00000000`00000000 : 0xfffffa80`05cdfbc0
    fffff880`092ca410 fffff880`092ca4e0 : fffff880`014a671a fffffa80`05cdfa70 00000000`00000000 fffffa80`043b01a0 : aswTdi+0x1647
    fffff880`092ca418 fffff880`014a671a : fffffa80`05cdfa70 00000000`00000000 fffffa80`043b01a0 fffffa80`064dd710 : 0xfffff880`092ca4e0
    fffff880`092ca420 fffff880`014a6542 : 00000000`00000000 fffff880`092ca500 fffffa80`064dd710 fffffa80`074bd820 : netbt!GetIrp+0x52
    fffff880`092ca450 fffff880`014a6f61 : fffffa80`064858a8 fffffa80`064858a8 fffffa80`040063f0 fffff880`092ca550 : netbt!TdiSendDatagram+0x187
    fffff880`092ca4c0 fffff880`014b3329 : fffffa80`04a17e50 fffffa80`064856f0 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1
    fffff880`092ca550 fffff880`014b30e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`014dc114 : netbt!UdpSendResponse+0x4e0
    fffff880`092ca5d0 fffff880`014a7be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
    fffff880`092ca700 fffff880`014a5b47 : 00000000`00000032 fffffa80`065fc90c 00000000`00000032 fffff880`092ca902 : netbt!NameSrvHndlrNotOs+0xca
    fffff880`092ca740 fffff880`02369443 : fffffa80`03dfa680 00000000`00000032 fffff880`0236e820 fffffa80`03dfa680 : netbt!TdiRcvNameSrvHandler+0x367
    fffff880`092ca7e0 fffffa80`03dfa680 : 00000000`00000032 fffff880`0236e820 fffffa80`03dfa680 00000000`00000000 : aswTdi+0x6443
    fffff880`092ca7e8 00000000`00000032 : fffff880`0236e820 fffffa80`03dfa680 00000000`00000000 00000000`00000004 : 0xfffffa80`03dfa680
    fffff880`092ca7f0 fffff880`0236e820 : fffffa80`03dfa680 00000000`00000000 00000000`00000004 00000000`00000032 : 0x32
    fffff880`092ca7f8 fffffa80`03dfa680 : 00000000`00000000 00000000`00000004 00000000`00000032 00000000`00000032 : aswTdi+0xb820
    fffff880`092ca800 00000000`00000000 : 00000000`00000004 00000000`00000032 00000000`00000032 fffff880`092ca928 : 0xfffffa80`03dfa680
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!CompareSecurityContexts+6a
    fffff880`01f72c5a 448b442470      mov     r8d,dword ptr [rsp+70h]
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  NETIO!CompareSecurityContexts+6a
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f
    
    FAILURE_BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
    
    BUCKET_ID:  X64_0x7f_8_NETIO!CompareSecurityContexts+6a
    
    Followup: MachineOwner
    ---------


    Old drivers needing update
    Code:
    iirsp.sys    12/13/2005 16:47:54    0x439f418a    fffff880`0174a000    fffff880`0175b000        0x00011000                    
    nfrd960.sys    6/6/2006 16:11:48    0x4485ef94    fffff880`016a4000    fffff880`016b4000        0x00010000                    
    adpu320.sys    2/27/2007 19:04:15    0x45e4c6ff    fffff880`015bb000    fffff880`015ea000        0x0002f000                    
    adpahci.sys    5/1/2007 12:30:09    0x46377921    fffff880`01565000    fffff880`015bb000        0x00056000                    
    arc.sys    5/24/2007 16:27:55    0x4656035b    fffff880`01470000    fffff880`01489000        0x00019000                    
    SiSRaid2.sys    9/24/2008 13:28:20    0x48da86c4    fffff880`01a64000    fffff880`01a72000        0x0000e000                    
    000.fcl    9/26/2008 8:11:22    0x48dcdf7a    fffff880`08399000    fffff880`083c4000        0x0002b000                    
    sisraid4.sys    10/1/2008 16:56:04    0x48e3f1f4    fffff880`01a72000    fffff880`01a8a000        0x00018000                    
    adp94xx.sys    12/5/2008 18:54:42    0x4939bf42    fffff880`014ea000    fffff880`01565000        0x0007b000                    
    lsi_fc.sys    12/9/2008 17:46:09    0x493ef531    fffff880`0175b000    fffff880`0177a000        0x0001f000                    
    arcsas.sys    1/14/2009 14:27:37    0x496e3ca9    fffff880`01489000    fffff880`014a4000        0x0001b000                    
    ql2300.sys    1/22/2009 18:05:06    0x4978fba2    fffff880`01824000    fffff880`019c8000        0x001a4000                    
    vsmraid.sys    1/30/2009 20:18:57    0x4983a701    fffff880`01a94000    fffff880`01abe000        0x0002a000                    
    elxstor.sys    2/3/2009 17:52:11    0x4988ca9b    fffff880`016c3000    fffff880`0174a000        0x00087000                    
    stexstor.sys    2/17/2009 18:03:36    0x499b4248    fffff880`01a8a000    fffff880`01a94000        0x0000a000                    
    amdsbs.sys    3/20/2009 13:36:03    0x49c3e213    fffff880`0141e000    fffff880`01465000        0x00047000                    
    iaStorV.sys    4/8/2009 11:57:17    0x49dcd76d    fffff880`010cf000    fffff880`011ed000        0x0011e000                    
    lsi_scsi.sys    4/16/2009 17:13:50    0x49e7ad9e    fffff880`0178d000    fffff880`017ac000        0x0001f000                    
    HpqKbFiltr.sys    4/29/2009 8:48:30    0x49f85aae    fffff880`04bd9000    fffff080`04be5000        0xfffff8000000c000                    
    spldr.sys    5/11/2009 11:56:27    0x4a0858bb    fffff880`02281000    fffff880`02289000        0x00008000                    
    HpSAMD.sys    5/18/2009 18:43:49    0x4a11f2b5    fffff880`013e0000    fffff880`013f7000        0x00017000                    
    lsi_sas.sys    5/18/2009 19:20:23    0x4a11fb47    fffff880`0122a000    fffff880`01247000        0x0001d000                    
    lsi_sas2.sys    5/18/2009 19:31:48    0x4a11fdf4    fffff880`0177a000    fffff880`0178d000        0x00013000                    
    megasas.sys    5/18/2009 20:09:46    0x4a1206da    fffff880`017ac000    fffff880`017b8000        0x0000c000                    
    ql40xx.sys    5/18/2009 20:18:11    0x4a1208d3    fffff880`01a05000    fffff880`01a64000        0x0005f000                    
    MegaSR.sys    5/18/2009 20:25:54    0x4a120aa2    fffff880`01600000    fffff880`016a4000        0x000a4000                    
    amdsata.sys    5/19/2009 12:53:21    0x4a12f211    fffff880`01400000    fffff880`0141e000        0x0001e000                    
    amdxata.sys    5/19/2009 12:56:59    0x4a12f2eb    fffff880`01465000    fffff880`01470000        0x0000b000                    
    nvraid.sys    5/20/2009 1:39:40    0x4a13a5ac    fffff880`01067000    fffff880`01090000        0x00029000                    
    nvstor.sys    5/20/2009 1:45:37    0x4a13a711    fffff880`017b8000    fffff880`017e3000        0x0002b000                    
    Accelerometer.sys    7/8/2009 13:41:38    0x4a54e862    fffff880`04860000    fffff880`0486c000        0x0000c000                    
    hpdskflt.sys    7/8/2009 13:41:38    0x4a54e862    fffff880`022fb000    fffff880`02305000        0x0000a000                    
    IntcHdmi.sys    7/10/2009 8:45:10    0x4a5745e6    fffff880`0699b000    fffff880`069c2000        0x00027000
    How To Find Drivers:
    - search Google for the name of the driver
    - compare the Google results with what's installed on your system to figure out which device/program it belongs to
    - visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
    - if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
    - - The most common drivers are listed on this page: Driver Reference Driver Reference
    - - Driver manufacturer links are on this page: Drivers and Downloads
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:00.
Find Us