Random BSOD at any given time


  1. Posts : 4
    Windows 7 enterprise
       #1

    Random BSOD at any given time


    Hi All,

    I'm experiencing BSOD and freeze up issues at very random times, in fact in some instances I dont even have to be actively doing anything. Laptop could be idle and then it'll crash on it's own and I have to restart it and then I get the "your OS crashed message" etc.
    I've had the IT folks at my job re-image the OS, update the BIOS, yet still no luck. Hoping someone can help me here.
    I'm attaching the zip file from running the utility tool to grab system data.
      My Computer


  2. Posts : 4
    Windows 7 enterprise
    Thread Starter
       #2

    Anyone Please?
      My Computer


  3. Posts : 4
    Windows 7 enterprise
    Thread Starter
       #3

    Pasted below is the analysis I ran using windbg to analyze my minidump file, lots of references to netio.sys

    Can anyone take a look please?



    Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\101812-64912-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
    Machine Name:
    Kernel base = 0xfffff800`02c64000 PsLoadedModuleList = 0xfffff800`02ea8670
    Debug session time: Thu Oct 18 13:40:20.778 2012 (UTC - 4:00)
    System Uptime: 3 days 20:28:09.983
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .....
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {28, 2, 0, fffff880015986fd}

    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )

    Followup: MachineOwner
    ---------

    2: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880015986fd, address which referenced memory

    Debugging Details:
    ------------------


    OVERLAPPED_MODULE: Address regions for 'tdtcp' and 'tdtcp.sys' overlap

    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f12100
    GetUlongFromAddress: unable to read from fffff80002f121c0
    0000000000000028 Nonpaged pool

    CURRENT_IRQL: 2

    FAULTING_IP:
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

    BUGCHECK_STR: 0xD1

    PROCESS_NAME: System

    TRAP_FRAME: fffff880031ca6f0 -- (.trap 0xfffff880031ca6f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880031ca910 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880015986fd rsp=fffff880031ca880 rbp=fffff880031ca9b0
    r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
    r11=fffffa8004b775b0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80002ce2769 to fffff80002ce31c0

    STACK_TEXT:
    fffff880`031ca5a8 fffff800`02ce2769 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031ca5b0 fffff800`02ce13e0 : fffffa80`0504ad60 00000000`00000001 00000000`00000001 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`031ca6f0 fffff880`015986fd : 00000000`0000011e fffff880`016141ac 00000000`0000000c fffffa80`0836f1b8 : nt!KiPageFault+0x260
    fffff880`031ca880 fffff880`016a1c1c : 00000000`00000000 fffff880`016702e6 00000000`00000000 00000000`00000000 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`031ca8e0 fffff880`0166de18 : fffffa80`04b775b0 00000000`00000000 fffffa80`03f08a20 00000000`188eff19 : tcpip! ?? ::FNODOBFM::`string'+0x1d16f
    fffff880`031ca950 fffff880`0165f1c4 : fffff880`031cae08 fffff880`00000029 fffffa80`03f08a20 00000000`00000001 : tcpip!TcpTcbCarefulDatagram+0x1a98
    fffff880`031cab00 fffff880`0165e65a : fffffa80`049ba490 fffff880`01657544 fffffa80`0467b268 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`031cacb0 fffff880`0165fbfb : fffff880`068570f4 fffffa80`049a7000 00000000`00000000 fffff880`031cb000 : tcpip!TcpMatchReceive+0x1fa
    fffff880`031cae00 fffff880`01657bd7 : fffffa80`049ba490 fffffa80`046e5ec7 fffffa80`000063be 00000000`000063be : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`031caed0 fffff880`0165774a : 00000000`00000000 fffff880`01769800 fffff880`031cb090 fffffa80`06754970 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`031caf90 fffff880`01656d49 : fffffa80`07c5f100 00000000`00000002 fffffa80`064d7cb0 fffff880`031cb080 : tcpip!IppProcessDeliverList+0x5a
    fffff880`031cb030 fffff880`01654abf : 00000000`00000000 00000000`052c7000 fffff880`01769800 fffff880`01769800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`031cb110 fffff880`016540b2 : fffffa80`052b83e0 00000000`00000000 fffffa80`052c7000 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`031cb310 fffff880`016cac9a : fffffa80`00000000 fffffa80`052f1030 fffffa80`052c7010 fffff880`031cb400 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`031cb3f0 fffff800`02ceee48 : fffffa80`0959e1c0 fffffa80`046cf90c fffffa80`039a4660 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x50b52
    fffff880`031cb440 fffff880`01653c12 : fffff880`01653470 00000000`00000014 00000000`00000000 fffffa80`05312a01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`031cb520 fffff880`014be0eb : fffffa80`053028d0 00000000`00000000 fffffa80`04e3e1a0 fffffa80`046cf858 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`031cb590 fffff880`01487ad6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`031cb600 fffff880`01401ac1 : fffffa80`04e3e1a0 fffff800`02e802d8 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`031cba80 fffff880`044f966c : 00000000`00000001 fffff800`02e802d8 fffffa80`039a4660 fffffa80`07b1b290 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`031cbad0 fffff880`044f3c17 : fffff880`04509648 fffffa80`039a4660 fffffa80`039a4660 00000000`00000000 : tunnel!TeredoWfpIndicationWorker+0xb4
    fffff880`031cbb10 fffff800`02fd5633 : fffffa80`052c4060 00000000`00000001 fffffa80`07b1b290 fffffa80`039a4660 : tunnel!LwWorker+0x1b
    fffff880`031cbb40 fffff800`02cec841 : fffff800`02e80200 fffff800`02fd5601 fffffa80`039a4600 fffffa80`00000299 : nt!IopProcessWorkItem+0x23
    fffff880`031cbb70 fffff800`02f79e6a : 490012b2`e9258d4c fffffa80`039a4660 00000000`00000080 fffffa80`0390d890 : nt!ExpWorkerThread+0x111
    fffff880`031cbc00 fffff800`02cd3ec6 : fffff880`02fd5180 fffffa80`039a4660 fffff880`02fdffc0 5d8948ff`ffff138c : nt!PspSystemThreadStartup+0x5a
    fffff880`031cbc40 00000000`00000000 : fffff880`031cc000 fffff880`031c6000 fffff880`031cb8a0 00000000`00000000 : nt!KiStartSystemThread+0x16


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME: NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0

    FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

    BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

    Followup: MachineOwner
    ---------

    2: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880015986fd, address which referenced memory

    Debugging Details:
    ------------------


    OVERLAPPED_MODULE: Address regions for 'tdtcp' and 'tdtcp.sys' overlap

    READ_ADDRESS: 0000000000000028 Nonpaged pool

    CURRENT_IRQL: 2

    FAULTING_IP:
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

    BUGCHECK_STR: 0xD1

    PROCESS_NAME: System

    TRAP_FRAME: fffff880031ca6f0 -- (.trap 0xfffff880031ca6f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880031ca910 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880015986fd rsp=fffff880031ca880 rbp=fffff880031ca9b0
    r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
    r11=fffffa8004b775b0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80002ce2769 to fffff80002ce31c0

    STACK_TEXT:
    fffff880`031ca5a8 fffff800`02ce2769 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031ca5b0 fffff800`02ce13e0 : fffffa80`0504ad60 00000000`00000001 00000000`00000001 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`031ca6f0 fffff880`015986fd : 00000000`0000011e fffff880`016141ac 00000000`0000000c fffffa80`0836f1b8 : nt!KiPageFault+0x260
    fffff880`031ca880 fffff880`016a1c1c : 00000000`00000000 fffff880`016702e6 00000000`00000000 00000000`00000000 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`031ca8e0 fffff880`0166de18 : fffffa80`04b775b0 00000000`00000000 fffffa80`03f08a20 00000000`188eff19 : tcpip! ?? ::FNODOBFM::`string'+0x1d16f
    fffff880`031ca950 fffff880`0165f1c4 : fffff880`031cae08 fffff880`00000029 fffffa80`03f08a20 00000000`00000001 : tcpip!TcpTcbCarefulDatagram+0x1a98
    fffff880`031cab00 fffff880`0165e65a : fffffa80`049ba490 fffff880`01657544 fffffa80`0467b268 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`031cacb0 fffff880`0165fbfb : fffff880`068570f4 fffffa80`049a7000 00000000`00000000 fffff880`031cb000 : tcpip!TcpMatchReceive+0x1fa
    fffff880`031cae00 fffff880`01657bd7 : fffffa80`049ba490 fffffa80`046e5ec7 fffffa80`000063be 00000000`000063be : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`031caed0 fffff880`0165774a : 00000000`00000000 fffff880`01769800 fffff880`031cb090 fffffa80`06754970 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`031caf90 fffff880`01656d49 : fffffa80`07c5f100 00000000`00000002 fffffa80`064d7cb0 fffff880`031cb080 : tcpip!IppProcessDeliverList+0x5a
    fffff880`031cb030 fffff880`01654abf : 00000000`00000000 00000000`052c7000 fffff880`01769800 fffff880`01769800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`031cb110 fffff880`016540b2 : fffffa80`052b83e0 00000000`00000000 fffffa80`052c7000 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`031cb310 fffff880`016cac9a : fffffa80`00000000 fffffa80`052f1030 fffffa80`052c7010 fffff880`031cb400 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`031cb3f0 fffff800`02ceee48 : fffffa80`0959e1c0 fffffa80`046cf90c fffffa80`039a4660 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x50b52
    fffff880`031cb440 fffff880`01653c12 : fffff880`01653470 00000000`00000014 00000000`00000000 fffffa80`05312a01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`031cb520 fffff880`014be0eb : fffffa80`053028d0 00000000`00000000 fffffa80`04e3e1a0 fffffa80`046cf858 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`031cb590 fffff880`01487ad6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`031cb600 fffff880`01401ac1 : fffffa80`04e3e1a0 fffff800`02e802d8 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`031cba80 fffff880`044f966c : 00000000`00000001 fffff800`02e802d8 fffffa80`039a4660 fffffa80`07b1b290 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff880`031cbad0 fffff880`044f3c17 : fffff880`04509648 fffffa80`039a4660 fffffa80`039a4660 00000000`00000000 : tunnel!TeredoWfpIndicationWorker+0xb4
    fffff880`031cbb10 fffff800`02fd5633 : fffffa80`052c4060 00000000`00000001 fffffa80`07b1b290 fffffa80`039a4660 : tunnel!LwWorker+0x1b
    fffff880`031cbb40 fffff800`02cec841 : fffff800`02e80200 fffff800`02fd5601 fffffa80`039a4600 fffffa80`00000299 : nt!IopProcessWorkItem+0x23
    fffff880`031cbb70 fffff800`02f79e6a : 490012b2`e9258d4c fffffa80`039a4660 00000000`00000080 fffffa80`0390d890 : nt!ExpWorkerThread+0x111
    fffff880`031cbc00 fffff800`02cd3ec6 : fffff880`02fd5180 fffffa80`039a4660 fffff880`02fdffc0 5d8948ff`ffff138c : nt!PspSystemThreadStartup+0x5a
    fffff880`031cbc40 00000000`00000000 : fffff880`031cc000 fffff880`031c6000 fffff880`031cb8a0 00000000`00000000 : nt!KiStartSystemThread+0x16


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`015986fd 448b5228 mov r10d,dword ptr [rdx+28h]

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME: NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0

    FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

    BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

    Followup: MachineOwner
    ---------
      My Computer


  4. Posts : 15,026
    Windows 10 Home 64Bit
       #4

    Sorry for the late reply.

    The attached zip on your first post does not have any .dmp files. Please make sure you're following the instructions correctly and post all the dumps you got.

    Information that I've gathered from the msinfo file,
    Code:
    Start Menu\Programs\Symantec Endpoint Protection	Public:Start Menu\Programs\Symantec Endpoint Protection	Public
    Norton/Symantec are known to cause BSoDs. Please uninstall it and all its components using the Norton Removal Tool. Download and install free Microsoft Security Essentials make a full scan once installed and updated.

    Run the system file checker and disk check.
      My Computer


  5. Posts : 4
    Windows 7 enterprise
    Thread Starter
       #5

    Thanks for the response koolkat, I actually pasted the contents of the dump file that I retrieved using winDBG directly in the message prior to yours'.
    Symantec cannot be removed, it's actually my work laptop and this is a standard piece of software installed on everyone's machine. Other folks have it and are not experiencing my issue.

    2 things I've done

    1. We had the system board replaced and since then I have not experienced any freeze and hangs, been about a month
    2. For BSOD issue, we had the latest network drivers installed both for my LAN and wireless per the netio.sys message from the dump, this was just done a couple of days ago, so keeping an eye out to see how things go
      My Computer


  6. Posts : 15,026
    Windows 10 Home 64Bit
       #6

    Thanks for the update :) ..let us know how it goes.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 21:33.
Find Us