Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win7 BSOD


  • Please log in to reply
5 replies to this topic

#1 cyberdyne

cyberdyne

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:30 PM

Posted 27 April 2011 - 03:12 AM

HP dm3-1030ea laptop
Win 7 64-bit
6 GB RAM

BSOD experienced while watching an online video clip - occurred twice with two separate clips on different web sites.

Memory dump analysis below.
Many thanks in advance

===BEGIN===

Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64
Copyright © Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e64000 PsLoadedModuleList = 0xfffff800`030a9e90
Debug session time: Tue Apr 26 17:22:07.725 2011 (UTC + 1:00)
System Uptime: 1 days 2:16:15.926
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 6f8, fffff80002eff0d2}

*** ERROR: Module load completed but symbols could not be loaded for avgfwd6a.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002eff0d2

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002ee3be9 to fffff80002ee4640

STACK_TEXT:
fffff880`009eec68 fffff800`02ee3be9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`009eec70 fffff800`02ee20b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009eedb0 fffff800`02eff0d2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0371cff0 fffff800`02ef706b : 00000000`00000001 00000000`00000000 fffff880`0371d1e0 00000000`00000000 : nt!SepMandatoryIntegrityCheck+0xf2
fffff880`0371d060 fffff800`02eb348e : fffffa80`084f37c8 00000000`00000001 fffffa80`0988d148 fffff880`0371d460 : nt!SeAccessCheckWithHint+0x3fb
fffff880`0371d160 fffff880`01d4ba4a : 00000000`0000006a fffff880`02122600 00000000`00000006 fffffa80`084f3a18 : nt!SeAccessCheckFromState+0x102
fffff880`0371d850 fffff880`01d4b2af : 00000000`c0000022 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0371d8c0 fffff880`01d4b444 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`01c55999 : NETIO!MatchValues+0xef
fffff880`0371d910 fffff880`01d4b7c1 : fffffa80`09a82550 fffffa80`072afbe0 fffff880`0371e190 fffff880`0371db50 : NETIO!FilterMatch+0x94
fffff880`0371d960 fffff880`01d4c6fc : fffff880`03710003 00000000`00000000 fffff880`0371e190 fffff880`0371db50 : NETIO!IndexHashClassify+0x151
fffff880`0371da10 fffff880`01f73819 : fffff880`0371e190 fffff880`0371dec8 fffff880`0371ece0 fffffa80`0953f720 : NETIO!KfdClassify+0xa4e
fffff880`0371dd80 fffff880`01f3b6f8 : fffffa80`052dcdb0 fffff880`0371ec08 fffff880`020397a0 fffff880`0371ece0 : tcpip!WfpAleClassify+0x49
fffff880`0371ddd0 fffff880`01f3ad24 : 00000000`00000004 fffffa80`065d6868 fffffa80`052dcdb0 fffff880`0490baff : tcpip!WfpAlepAuthorizeReceive+0x818
fffff880`0371e400 fffff880`01f39a2c : 00000000`00000000 fffffa80`0000002c 00000000`00000000 fffffa80`07069010 : tcpip!WfpAleAuthorizeReceive+0x584
fffff880`0371e6e0 fffff880`01f7345e : 00000000`00000000 fffff880`0371ebc0 fffff880`0371eb58 00000000`00000006 : tcpip!WfpAleConnectAcceptIndicate+0x29c
fffff880`0371e7d0 fffff880`01f74087 : 00000000`00000000 00000000`00000001 00000000`00008f07 00000000`00000000 : tcpip!ProcessALEForTransportPacket+0x5fe
fffff880`0371ea40 fffff880`01f517d1 : 00000000`00000000 fffff880`0486b052 fffffa80`06467620 fffffa80`07ac8ed0 : tcpip!WfpProcessInTransportStackIndication+0x7b7
fffff880`0371ef30 fffff880`01f26df9 : fffffa80`097a0bc0 fffffa80`05714e80 00000000`00000000 00000000`00000002 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0371eff0 fffff880`01f26ac4 : fffffa80`09bdd250 fffffa80`097a0bc0 fffffa80`0844e800 fffffa80`07083020 : tcpip!RawBeginMessageIndication+0x69
fffff880`0371f0c0 fffff880`01f2edf2 : fffffa80`00000000 fffffa80`09bdd250 fffffa80`00000006 fffff880`0371f388 : tcpip!RawDeliverDatagrams+0x124
fffff880`0371f280 fffff880`01f4c197 : 00000000`00000000 00000000`00000000 fffffa80`05714dd0 fffffa80`05714e80 : tcpip!RawReceiveDatagrams+0x142
fffff880`0371f380 fffff880`01f4bcaa : 00000000`00000000 fffff880`020609a0 fffff880`0371f530 fffff880`01cb7110 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0371f440 fffff880`01f4b4a4 : 00000000`00000000 00000000`00000000 fffffa80`07095800 00000000`00000000 : tcpip!IppProcessDeliverList+0x5a
fffff880`0371f4e0 fffff880`01f2e17f : fffff880`020609a0 fffff880`00000000 00000000`00000000 fffff880`0371f678 : tcpip!IppReceiveHeaderBatch+0x435
fffff880`0371f5c0 fffff880`01f2e7e4 : 00000000`00000001 fffffa80`097a0bc0 fffffa80`05707c38 00000000`00000000 : tcpip!IppLoopbackTransmit+0x38f
fffff880`0371f670 fffff880`01f505d6 : 00000000`00000000 fffffa80`07069010 fffffa80`065d6500 00000000`00000000 : tcpip!IppLoopbackEnqueue+0x1f5
fffff880`0371f710 fffff880`01f4d3b7 : fffff880`020609a0 00000000`00000000 fffffa80`084f0000 00000000`02060800 : tcpip!IppFragmentPackets+0x796
fffff880`0371f830 fffff880`01f4f805 : 00020000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x87
fffff880`0371f8f0 fffff880`01f4df43 : fffffa80`07926906 00000000`00008f00 fffffa80`00000014 fffffa80`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff880`0371fa10 fffff880`01f513ae : fffff880`03720220 00000000`00000007 fffff880`020609a0 fffffa80`079269a0 : tcpip!IppSendDatagramsCommon+0x753
fffff880`0371fce0 fffff880`01f2ad55 : 00000000`00000000 00000000`00000000 00000000`0000002c fffffa80`06519e20 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0371fd20 fffff880`01f533ce : fffffa80`07082130 fffffa80`052dcdb0 fffff880`020397a0 fffff880`03720d30 : tcpip!IppSlowSendDatagram+0x75
fffff880`0371fe20 fffff880`01f5904b : fffffa80`057098c0 00000000`00000001 00000000`0000cc00 fffff880`0371ff70 : tcpip!IpNlpFastSendDatagram+0xd5e
fffff880`037201d0 fffff880`01f5a1de : 00000000`00004e20 00000000`00000000 fffff880`03720302 fffffa80`00000000 : tcpip!TcpTcbHeaderSend+0x47b
fffff880`03720380 fffff880`01f7a7e6 : 00000000`00000000 00000000`00000001 fffff880`0205a128 00000000`a0000003 : tcpip!TcpTcbSend+0x88e
fffff880`03720600 fffff880`01f4123d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpFlushDelay+0x316
fffff880`037206e0 fffff880`01f4103c : fffff880`037208e0 fffffa80`08a12cf0 fffffa80`06ed42c0 fffffa80`08aa4d80 : tcpip!TcpDeliverInput+0x18d
fffff880`037207e0 fffff880`01615d15 : fffffa80`08aa4d80 00000000`00000000 fffffa80`08aa4d80 fffffa80`09369f50 : tcpip!TcpRequestReceive+0x18c
fffff880`037208a0 fffff880`0160a294 : fffffa80`08aa4d80 fffffa80`08aa4d80 fffff880`03720c38 00000000`c0000016 : tdx!TdxReceiveConnection+0x1f5
fffff880`03720940 fffff880`01f58494 : 00000000`00000001 00000000`00000001 fffffa80`08a12cf0 00000000`00000000 : tdx! ?? ::FNODOBFM::`string'+0x1e8a
fffff880`03720a80 fffff880`01f57bf7 : 00000000`00000564 fffffa80`08a12cf0 fffffa80`08a12cf0 00000000`00000000 : tcpip!TcpIndicateData+0x104
fffff880`03720b80 fffff880`01f56839 : fffffa80`08a12cf0 00000000`00000308 00000000`00000001 fffffa80`09b01030 : tcpip!TcpDeliverDataToClient+0x2b7
fffff880`03720d00 fffff880`01f53cc8 : 00000000`00000000 fffffa80`08a12cf0 00000000`00000000 00000000`00000000 : tcpip!TcpDeliverReceive+0xa9
fffff880`03720e00 fffff880`01f54818 : fffffa80`079269a0 00000000`00008f07 fffff880`03721308 fffffa80`0571f3c0 : tcpip!TcpTcbFastDatagram+0x208
fffff880`03720fc0 fffff880`01f535ea : fffffa80`05728490 fffff880`01f4ba00 fffffa80`056d3218 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`037211b0 fffff880`01f552ab : fffff880`039e1040 fffffa80`0571f3c0 00000000`00000000 fffff880`03721500 : tcpip!TcpMatchReceive+0x1fa
fffff880`03721300 fffff880`01f4c137 : fffffa80`05728490 fffffa80`05708f07 fffffa80`00001ee8 00000000`00001ee8 : tcpip!TcpPreValidatedReceive+0x36b
fffff880`037213d0 fffff880`01f4bcaa : 00000000`00000000 fffff880`020609a0 fffff880`03721590 00000000`00000014 : tcpip!IppDeliverListToProtocol+0x97
fffff880`03721490 fffff880`01f4b2a9 : fffffa80`0571f3c0 fffff880`020609a0 00000000`00000006 fffff880`03721580 : tcpip!IppProcessDeliverList+0x5a
fffff880`03721530 fffff880`01f48fff : fffffa80`065f92d0 fffffa80`0571f3c0 fffff880`020609a0 00000000`065d6501 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`03721610 fffff880`01f485f2 : fffffa80`07082130 00000000`00000000 fffffa80`065d6501 00000000`00000004 : tcpip!IpFlcReceivePackets+0x64f
fffff880`03721810 fffff880`01f47a8a : fffffa80`065d6510 fffff880`03721940 fffffa80`065d6510 fffff880`04860000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`037218f0 fffff800`02ef1078 : fffffa80`082c9590 00000000`00004800 fffffa80`064d9b60 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`03721940 fffff880`01f48152 : fffff880`01f479b0 fffff880`00000001 a0e43d3e`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`03721a20 fffff880`01d120eb : fffffa80`070958d0 00000000`00000000 fffffa80`061541a0 fffffa80`061541a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`03721a90 fffff880`01cdbad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`03721b00 fffff880`01c5d9c4 : fffffa80`061541a0 00000000`00000002 00000000`00000004 4e677641`0670a000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`03721f80 fffff880`01c5d939 : 00000000`80000000 00000000`00000000 fffffa80`05f732c8 fffffa80`05f7e668 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`03721fc0 fffff880`01c5d8d0 : 00000000`00000000 fffffa80`07eae4b0 fffffa80`065e21c8 fffffa80`065e2150 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`03722000 fffff880`01df0583 : 00000000`00000000 fffffa80`065e2150 00000000`00000004 fffffa80`082c9590 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`03722040 fffff880`01df0338 : fffff880`03722250 00000000`00000000 00000000`00000000 fffffa80`082c9590 : avgfwd6a+0x3583
fffff880`03722090 fffff880`01def084 : 00000000`00000001 fffffa80`065e2150 00000000`00000000 00000000`00000000 : avgfwd6a+0x3338
fffff880`03722220 fffff880`01c5d939 : fffffa80`0707e010 00000000`00000000 00000000`00000004 00000000`00000001 : avgfwd6a+0x2084
fffff880`03722290 fffff880`01c5d8d0 : fffff880`064765c0 fffffa80`07076010 fffffa80`07083020 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`037222d0 fffff880`0643f7ee : fffffa80`07076010 00000000`00000000 fffffa80`082c9590 fffff880`064765c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`03722310 fffff880`01c5d939 : fffffa80`067b5460 00000000`00000000 00000000`00000004 fffff880`0494d000 : nwifi!Pt6Receive+0x296
fffff880`03722370 fffff880`01c5d8d0 : 00000000`00000001 fffff880`042300bc fffffa80`067ba028 fffff880`045e7498 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`037223b0 fffff880`0422c9c0 : fffff880`04233110 00000000`00000001 00000000`00000004 fffffa80`067baa78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`037223f0 fffff880`01c764f7 : fffffa80`061541a0 fffffa80`067ad550 fffffa80`067ad550 00000000`00000004 : vwififlt!FilterReceiveNetBufferLists+0x158
fffff880`03722450 fffff880`04868f46 : fffffa80`061541a0 00000000`00000000 00000000`00000000 00000000`00000000 : ndis! ?? ::FNODOBFM::`string'+0xcf1f
fffff880`037224a0 fffff880`048686b3 : fffffa80`06467620 fffff880`0490f7d0 00000000`00000000 fffff880`0490fbd6 : athrx+0x18f46
fffff880`03722520 fffff880`048eabfb : fffffa80`06467620 fffffa80`065b9030 fffffa80`067b6ca0 00000000`00000000 : athrx+0x186b3
fffff880`03722560 fffff880`048f1b51 : fffffa80`065b9030 00000000`00000000 fffffa80`067b6ca0 fffffa80`061541a0 : athrx+0x9abfb
fffff880`03722590 fffff880`04873ef7 : fffffa80`065b9030 fffffa80`056dbe18 00000000`00000001 00000000`009263a9 : athrx+0xa1b51
fffff880`037225f0 fffff880`048519fa : fffffa80`065b6030 00000000`00000000 fffffa80`065b9030 fffff880`01cdee6c : athrx+0x23ef7


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01d4ba4a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 6

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

BC AdBot (Login to Remove)

 


#2 Beel

Beel

  • Members
  • 416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:11:30 PM

Posted 27 April 2011 - 03:41 AM

First of all I am not a security expert. However I do know of others who have had similar problems and it was due to Zone Alarm. If you have ZA uninstall and see what happens it may hopefuuly fix the problem.

#3 cyberdyne

cyberdyne
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:30 PM

Posted 27 April 2011 - 03:43 AM

I do not, but thanks all the same.


Additional info:
I have just update the Audio drivers and Realtek PCIe drivers from HP. Video driver and BIOS is up to date.

Debugging Details:
------------------

BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: audiodg.exe

CURRENT_IRQL: 2


Edited by cyberdyne, 27 April 2011 - 03:46 AM.

O/S: Win10Pro

Backup: SpiderOakONE
Security: SAS Pro, MB Premium, VoodooShield Pro


#4 hamluis

hamluis

    Moderator


  • Moderator
  • 56,270 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:09:30 AM

Posted 27 April 2011 - 09:30 AM

Did you actually uninstall the drivers installed...then install new ones?

If the drivers are damaged, they may prevent proper updating otherwise.

Louis

#5 cyberdyne

cyberdyne
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:30 PM

Posted 27 April 2011 - 09:32 AM

Did you actually uninstall the drivers installed...then install new ones?


No I did not. The installation went fine. I'm just hoping their installation has resolved the issue but only time will tell. Initial testing results (3+ hours) were good.

If however anyone has any other suggestions relating to the analysis of the above dump file, I'd be grateful.
Thank you.

Edited by cyberdyne, 27 April 2011 - 09:33 AM.

O/S: Win10Pro

Backup: SpiderOakONE
Security: SAS Pro, MB Premium, VoodooShield Pro


#6 hamluis

hamluis

    Moderator


  • Moderator
  • 56,270 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:09:30 AM

Posted 27 April 2011 - 09:39 AM

Your dump files point squarely at audiodg.exe, a Windows process that has a history of trouble, IMO.

Google Results

You can always...

Download/install BlueScreenView, http://www.nirsoft.net/utils/blue_screen_view.html .

Double-click BlueScreenView.exe file.

When scanning is done, Edit/Select All...then File/Save Selected Items.Save the report as BSOD.txt.

Open BSOD.txt in Notepad, copy all content and paste it into your next reply.

More results are better than 1 .dmp file.

Louis




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users