Random BSODs after coming out of sleep.

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by applezarcowy, Apr 30, 2012.

  1. applezarcowy

    applezarcowy New Member

    Joined:
    Apr 30, 2012
    Messages:
    10
    Likes Received:
    0
    I've been having problems with random BSOD's when i'm coming out of sleep mode on my laptop. Most of the time I can bring the computer out of sleep with no issues but every month or so it will crash with a BSOD within 5 seconds of waking up. I can't seem to reproduce the issue, it just happens at random. I attached two dmp files that may be relevant to the issue as well as screenshots from CPUz and the HTML report from RAMMon. Hopefully someone on the forums can help me find a solution. Thanks.
     

    Attached Files:

  2. Trouble

    Trouble Noob Whisperer

    Joined:
    Nov 30, 2009
    Messages:
    13,845
    Likes Received:
    833
    Hello and welcome to the forum.
    Your two dumps seem to be blaming the same driver
    kl1.sys normally associated with Kaspersky Labs products (AntiVirus / Security Suite).
    And since both seem to be trapping tdx, tcpip and kl1, I'm going to bet the issue is likely with one of your network adapter drivers.
    Most likely bcmwl664.sys 5/7/2010 Broadcom 802.11g Network Adapter - Dell Wireless 1390 WLAN Mini-Card
    But it may be Rt64win7.sys 5/30/2010 Realtek Network adapter
    Consider updating both and see if Blue Screens persist.
    Code:
    BugCheck A, {10, 2, 0, fffff80002ea840f}
    Unable to load image \SystemRoot\system32\DRIVERS\[COLOR=#ff0000][U][B]kl1.sys[/B][/U][/COLOR], Win32 error 0n2
    *** WARNING: Unable to verify timestamp for [COLOR=#ff0000][U][B]kl1.sys[/B][/U][/COLOR]
    *** ERROR: Module load completed but symbols could not be loaded for kl1.sys
    Probably caused by : [COLOR=#ff0000][U][B]tdx.sys[/B][/U][/COLOR] ( tdx! ?? ::FNODOBFM::`string'+384c )
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000010, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ea840f, address which referenced memory
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f9100
     0000000000000010 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    nt!RtlInsertEntryHashTable+73
    fffff800`02ea840f 488b4810        mov     rcx,qword ptr [rax+10h]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  avp.exe
    TRAP_FRAME:  fffff8800722f4c0 -- (.trap 0xfffff8800722f4c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffffa8000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ea840f rsp=fffff8800722f650 rbp=000000000000e1c7
     r8=fffffa8004f5c6f0  r9=000000000000007f r10=00000000000148ee
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe cy
    nt!RtlInsertEntryHashTable+0x73:
    fffff800`02ea840f 488b4810        mov     rcx,qword ptr [rax+10h] ds:00000000`00000010=????????????????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80002ec7229 to fffff80002ec7c80
    STACK_TEXT:  
    fffff880`0722f378 fffff800`02ec7229 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0722f380 fffff800`02ec5ea0 : fffffa80`00000000 fffffa80`0872b620 00000000`00000000 fffffa80`0940a6c0 : nt!KiBugCheckDispatch+0x69
    fffff880`0722f4c0 fffff800`02ea840f : 00000000`00000000 00000000`00000000 00000000`00000000 00000002`0002e1c7 : nt!KiPageFault+0x260
    fffff880`0722f650 fffff880`0208ab1c : fffffa80`0940a6c0 fffffa80`0940a6c0 00000000`00000017 fffff880`0722f720 : nt!RtlInsertEntryHashTable+0x73
    fffff880`0722f6a0 fffff880`020914d5 : fffffa80`0940a6c0 fffffa80`0940a6c0 00000000`0000e1c7 fffffa80`0940a6c0 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!WfpHashtableInsert+0x1c
    fffff880`0722f6d0 fffff880`0209e8e8 : 00000000`00020004 00000000`0000e1c7 00000000`00000000 00000000`0000c700 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!WfpAleInsertEndpoint+0x75
    fffff880`0722f720 fffff880`0206d1d0 : fffffa80`088c3500 00000000`00000002 00000000`0000e1c7 00000000`00000000 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!WfpAleAuthorizePort+0xb8
    fffff880`0722f7a0 fffff880`0206cf31 : fffffa80`04c883a0 fffffa80`04c88420 fffffa80`088c3500 00000000`00000000 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!InetInspectBindEndpoint+0x70
    fffff880`0722f7f0 fffff880`0206d12f : fffffa80`04c883a0 fffff880`00000000 fffffa80`088c3550 fffffa80`088c3500 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpBindEndpointRequestInspectComplete+0x271
    fffff880`0722f910 fffff880`0206d07b : fffffa80`0a009d90 fffff880`049d8530 fffff880`0722fab8 fffff880`0722fab8 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpBindEndpointWorkQueueRoutine+0x8f
    fffff880`0722f960 fffff880`0206c464 : fffff880`0722fcb0 fffffa80`07322b50 00000000`00000000 00000000`00000001 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpBindEndpoint+0x8b
    fffff880`0722f990 fffff880`049dbc0d : fffffa80`0a009cd0 fffff8a0`0d4441a0 fffff880`0722fbd0 00000000`00000000 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpIoControlEndpoint+0x84
    fffff880`0722fa80 fffff880`049d77cc : fffffa80`08931001 fffff8a0`0d4441a0 00000000`00000000 00000000`00000000 :[COLOR=#ff0000][U][B] tdx[/B][/U][/COLOR]! ?? ::FNODOBFM::`string'+0x384c
    fffff880`0722fdd0 fffff880`049d7d56 : fffffa80`089310a0 fffffa80`047bc670 fffff8a0`000971d0 fffffa80`0ad68f00 : [COLOR=#ff0000][U][B]tdx[/B][/U][/COLOR]!TdxCreateTransportAddress+0x3ac
    fffff880`0722fe60 fffff880`01260a9a : fffffa80`00000000 fffff8a0`0d4441a0 fffffa80`0ad68ea0 fffffa80`0754af50 : [COLOR=#ff0000][U][B]tdx[/B][/U][/COLOR]!TdxTdiDispatchCreate+0x496
    fffff880`0722ff00 fffffa80`00000000 : fffff8a0`0d4441a0 fffffa80`0ad68ea0 fffffa80`0754af50 fffffa80`0745a550 :[COLOR=#ff0000][U][B] kl1[/B][/U][/COLOR]+0x201a9a
    fffff880`0722ff08 fffff8a0`0d4441a0 : fffffa80`0ad68ea0 fffffa80`0754af50 fffffa80`0745a550 fffff880`01065249 : 0xfffffa80`00000000
    fffff880`0722ff10 fffffa80`0ad68ea0 : fffffa80`0754af50 fffffa80`0745a550 fffff880`01065249 fffffa80`00000000 : 0xfffff8a0`0d4441a0
    fffff880`0722ff18 fffffa80`0754af50 : fffffa80`0745a550 fffff880`01065249 fffffa80`00000000 fffffa80`04167c90 : 0xfffffa80`0ad68ea0
    fffff880`0722ff20 fffffa80`0745a550 : fffff880`01065249 fffffa80`00000000 fffffa80`04167c90 00000000`00000000 : 0xfffffa80`0754af50
    fffff880`0722ff28 fffff880`01065249 : fffffa80`00000000 fffffa80`04167c90 00000000`00000000 00455845`2e505641 : 0xfffffa80`0745a550
    fffff880`0722ff30 fffffa80`00000000 : fffffa80`04167c90 00000000`00000000 00455845`2e505641 00000000`00000000 :[COLOR=#ff0000][U][B] kl1[/B][/U][/COLOR]+0x6249
    fffff880`0722ff38 fffffa80`04167c90 : 00000000`00000000 00455845`2e505641 00000000`00000000 fffffa80`0754af50 : 0xfffffa80`00000000
    fffff880`0722ff40 00000000`00000000 : 00455845`2e505641 00000000`00000000 fffffa80`0754af50 fffffa80`089310a0 : 0xfffffa80`04167c90
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    tdx! ?? ::FNODOBFM::`string'+384c
    fffff880`049dbc0d 3d03010000      cmp     eax,103h
    SYMBOL_STACK_INDEX:  c
    SYMBOL_NAME:  tdx! ?? ::FNODOBFM::`string'+384c
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: [COLOR=#ff0000][U][B]tdx[/B][/U][/COLOR]
    [COLOR=#ff0000][/COLOR]IMAGE_NAME:  [COLOR=#ff0000][U][B]tdx.sys[/B][/U][/COLOR]
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79332
    FAILURE_BUCKET_ID:  X64_0xA_tdx!_??_::FNODOBFM::_string_+384c
    BUCKET_ID:  X64_0xA_tdx!_??_::FNODOBFM::_string_+384c
    If still no joy, uninstall Kaspersky temporarily for testing and replace it with Microsoft Security Essentials.
    Good luck
    Randy
     
  3. applezarcowy

    applezarcowy New Member

    Joined:
    Apr 30, 2012
    Messages:
    10
    Likes Received:
    0
    Ok i updated my Broadcom network adapter but there were no updates for the Realtek adapter. Hopefully this fixed the issue, but i have no way of knowing as the BSOD's are random and infrequent. Thank you for your fast reply.
     
  4. Trouble

    Trouble Noob Whisperer

    Joined:
    Nov 30, 2009
    Messages:
    13,845
    Likes Received:
    833

Share This Page

Loading...