Windows 7 Random BSODs after coming out of sleep.

applezarcowy

New Member
Joined
Apr 30, 2012
I've been having problems with random BSOD's when i'm coming out of sleep mode on my laptop. Most of the time I can bring the computer out of sleep with no issues but every month or so it will crash with a BSOD within 5 seconds of waking up. I can't seem to reproduce the issue, it just happens at random. I attached two dmp files that may be relevant to the issue as well as screenshots from CPUz and the HTML report from RAMMon. Hopefully someone on the forums can help me find a solution. Thanks.
 

Attachments

  • Files.zip
    288.5 KB · Views: 218
Hello and welcome to the forum.
Your two dumps seem to be blaming the same driver
kl1.sys normally associated with Kaspersky Labs products (AntiVirus / Security Suite).
And since both seem to be trapping tdx, tcpip and kl1, I'm going to bet the issue is likely with one of your network adapter drivers.
Most likely bcmwl664.sys 5/7/2010 Broadcom 802.11g Network Adapter - Dell Wireless 1390 WLAN Mini-Card
But it may be Rt64win7.sys 5/30/2010 Realtek Network adapter
Consider updating both and see if Blue Screens persist.
Code:
BugCheck A, {10, 2, 0, fffff80002ea840f}
Unable to load image \SystemRoot\system32\DRIVERS\[COLOR=#ff0000][U][B]kl1.sys[/B][/U][/COLOR], Win32 error 0n2
*** WARNING: Unable to verify timestamp for [COLOR=#ff0000][U][B]kl1.sys[/B][/U][/COLOR]
*** ERROR: Module load completed but symbols could not be loaded for kl1.sys
Probably caused by : [COLOR=#ff0000][U][B]tdx.sys[/B][/U][/COLOR] ( tdx! ?? ::FNODOBFM::`string'+384c )
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ea840f, address which referenced memory
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f9100
 0000000000000010 
CURRENT_IRQL:  2
FAULTING_IP: 
nt!RtlInsertEntryHashTable+73
fffff800`02ea840f 488b4810        mov     rcx,qword ptr [rax+10h]
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
BUGCHECK_STR:  0xA
PROCESS_NAME:  avp.exe
TRAP_FRAME:  fffff8800722f4c0 -- (.trap 0xfffff8800722f4c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ea840f rsp=fffff8800722f650 rbp=000000000000e1c7
 r8=fffffa8004f5c6f0  r9=000000000000007f r10=00000000000148ee
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
nt!RtlInsertEntryHashTable+0x73:
fffff800`02ea840f 488b4810        mov     rcx,qword ptr [rax+10h] ds:00000000`00000010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff80002ec7229 to fffff80002ec7c80
STACK_TEXT:  
fffff880`0722f378 fffff800`02ec7229 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0722f380 fffff800`02ec5ea0 : fffffa80`00000000 fffffa80`0872b620 00000000`00000000 fffffa80`0940a6c0 : nt!KiBugCheckDispatch+0x69
fffff880`0722f4c0 fffff800`02ea840f : 00000000`00000000 00000000`00000000 00000000`00000000 00000002`0002e1c7 : nt!KiPageFault+0x260
fffff880`0722f650 fffff880`0208ab1c : fffffa80`0940a6c0 fffffa80`0940a6c0 00000000`00000017 fffff880`0722f720 : nt!RtlInsertEntryHashTable+0x73
fffff880`0722f6a0 fffff880`020914d5 : fffffa80`0940a6c0 fffffa80`0940a6c0 00000000`0000e1c7 fffffa80`0940a6c0 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!WfpHashtableInsert+0x1c
fffff880`0722f6d0 fffff880`0209e8e8 : 00000000`00020004 00000000`0000e1c7 00000000`00000000 00000000`0000c700 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!WfpAleInsertEndpoint+0x75
fffff880`0722f720 fffff880`0206d1d0 : fffffa80`088c3500 00000000`00000002 00000000`0000e1c7 00000000`00000000 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!WfpAleAuthorizePort+0xb8
fffff880`0722f7a0 fffff880`0206cf31 : fffffa80`04c883a0 fffffa80`04c88420 fffffa80`088c3500 00000000`00000000 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!InetInspectBindEndpoint+0x70
fffff880`0722f7f0 fffff880`0206d12f : fffffa80`04c883a0 fffff880`00000000 fffffa80`088c3550 fffffa80`088c3500 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpBindEndpointRequestInspectComplete+0x271
fffff880`0722f910 fffff880`0206d07b : fffffa80`0a009d90 fffff880`049d8530 fffff880`0722fab8 fffff880`0722fab8 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpBindEndpointWorkQueueRoutine+0x8f
fffff880`0722f960 fffff880`0206c464 : fffff880`0722fcb0 fffffa80`07322b50 00000000`00000000 00000000`00000001 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpBindEndpoint+0x8b
fffff880`0722f990 fffff880`049dbc0d : fffffa80`0a009cd0 fffff8a0`0d4441a0 fffff880`0722fbd0 00000000`00000000 : [COLOR=#ff0000][U][B]tcpip[/B][/U][/COLOR]!UdpIoControlEndpoint+0x84
fffff880`0722fa80 fffff880`049d77cc : fffffa80`08931001 fffff8a0`0d4441a0 00000000`00000000 00000000`00000000 :[COLOR=#ff0000][U][B] tdx[/B][/U][/COLOR]! ?? ::FNODOBFM::`string'+0x384c
fffff880`0722fdd0 fffff880`049d7d56 : fffffa80`089310a0 fffffa80`047bc670 fffff8a0`000971d0 fffffa80`0ad68f00 : [COLOR=#ff0000][U][B]tdx[/B][/U][/COLOR]!TdxCreateTransportAddress+0x3ac
fffff880`0722fe60 fffff880`01260a9a : fffffa80`00000000 fffff8a0`0d4441a0 fffffa80`0ad68ea0 fffffa80`0754af50 : [COLOR=#ff0000][U][B]tdx[/B][/U][/COLOR]!TdxTdiDispatchCreate+0x496
fffff880`0722ff00 fffffa80`00000000 : fffff8a0`0d4441a0 fffffa80`0ad68ea0 fffffa80`0754af50 fffffa80`0745a550 :[COLOR=#ff0000][U][B] kl1[/B][/U][/COLOR]+0x201a9a
fffff880`0722ff08 fffff8a0`0d4441a0 : fffffa80`0ad68ea0 fffffa80`0754af50 fffffa80`0745a550 fffff880`01065249 : 0xfffffa80`00000000
fffff880`0722ff10 fffffa80`0ad68ea0 : fffffa80`0754af50 fffffa80`0745a550 fffff880`01065249 fffffa80`00000000 : 0xfffff8a0`0d4441a0
fffff880`0722ff18 fffffa80`0754af50 : fffffa80`0745a550 fffff880`01065249 fffffa80`00000000 fffffa80`04167c90 : 0xfffffa80`0ad68ea0
fffff880`0722ff20 fffffa80`0745a550 : fffff880`01065249 fffffa80`00000000 fffffa80`04167c90 00000000`00000000 : 0xfffffa80`0754af50
fffff880`0722ff28 fffff880`01065249 : fffffa80`00000000 fffffa80`04167c90 00000000`00000000 00455845`2e505641 : 0xfffffa80`0745a550
fffff880`0722ff30 fffffa80`00000000 : fffffa80`04167c90 00000000`00000000 00455845`2e505641 00000000`00000000 :[COLOR=#ff0000][U][B] kl1[/B][/U][/COLOR]+0x6249
fffff880`0722ff38 fffffa80`04167c90 : 00000000`00000000 00455845`2e505641 00000000`00000000 fffffa80`0754af50 : 0xfffffa80`00000000
fffff880`0722ff40 00000000`00000000 : 00455845`2e505641 00000000`00000000 fffffa80`0754af50 fffffa80`089310a0 : 0xfffffa80`04167c90
STACK_COMMAND:  kb
FOLLOWUP_IP: 
tdx! ?? ::FNODOBFM::`string'+384c
fffff880`049dbc0d 3d03010000      cmp     eax,103h
SYMBOL_STACK_INDEX:  c
SYMBOL_NAME:  tdx! ?? ::FNODOBFM::`string'+384c
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: [COLOR=#ff0000][U][B]tdx[/B][/U][/COLOR]
[COLOR=#ff0000][/COLOR]IMAGE_NAME:  [COLOR=#ff0000][U][B]tdx.sys[/B][/U][/COLOR]
DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79332
FAILURE_BUCKET_ID:  X64_0xA_tdx!_??_::FNODOBFM::_string_+384c
BUCKET_ID:  X64_0xA_tdx!_??_::FNODOBFM::_string_+384c
If still no joy, uninstall Kaspersky temporarily for testing and replace it with Link Removed due to 404 Error.
Good luck
Randy
 
Ok i updated my Broadcom network adapter but there were no updates for the Realtek adapter. Hopefully this fixed the issue, but i have no way of knowing as the BSOD's are random and infrequent. Thank you for your fast reply.
 
Back
Top Bottom