BSOD related to uTorrent


  1. Posts : 9
    OEM Windows 7 Home Premium 64bit
       #1

    BSOD related to uTorrent


    Hi all,
    I'm new here so excuse any errors i followed the posting instructions as closely as possible...
    I've been started to have frequent BSOD's after uTorrent starts running. Not sure if that's the exact cause but it seems like it. The BSOD points to netio.sys and it also says DRIVER_IRQL_NOT_LESS_OR_EQUAL at the top.
    To me, it looks like a network card error of some sort?
    System is pretty new, bought it in March this year...

    Any help would be greatly appreciated and thanks in advance :)
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    laxman7 said:
    Hi all,
    I'm new here so excuse any errors i followed the posting instructions as closely as possible...
    I've been started to have frequent BSOD's after uTorrent starts running. Not sure if that's the exact cause but it seems like it. The BSOD points to netio.sys and it also says DRIVER_IRQL_NOT_LESS_OR_EQUAL at the top.
    To me, it looks like a network card error of some sort?
    System is pretty new, bought it in March this year...

    Any help would be greatly appreciated and thanks in advance :)
    Virtually identical and related to netio.sys. When it is netio.sys there are several possible causes and cures.

    1-Zone Alarm. If you have it remove it and replace with Microsoft security essentials

    http://download.zonealarm.com/bin/fr...cpes_clean.exe

    http://www.microsoft.com/security_essentials/

    2- if not there is a Microsoft hotfix for this problem.

    3- remove utorrent (you are using it legally right?) and replace with another client.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\051511-20779-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
    *http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
    Machine Name:
    Kernel base = 0xfffff800`0344a000 PsLoadedModuleList = 0xfffff800`0368f650
    Debug session time: Sun May 15 03:04:19.489 2011 (GMT-4)
    System Uptime: 1 days 11:20:22.363
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................
    Loading User Symbols
    Loading unloaded module list
    ......................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff88001754b2d}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001754b2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036f9100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01754b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880033ca4e0 -- (.trap 0xfffff880033ca4e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880033ca700 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001754b2d rsp=fffff880033ca670 rbp=fffff880033ca7a0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa800c4f1cd0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`01754b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:0010:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800034c92a9 to fffff800034c9d00
    
    STACK_TEXT:  
    fffff880`033ca398 fffff800`034c92a9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`033ca3a0 fffff800`034c7f20 : fffffa80`0e2a7000 fffff880`0190bdd2 fffff6fb`7ea00388 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`033ca4e0 fffff880`01754b2d : fffffa80`0d4f1540 fffff880`084ac418 fffffa80`0d4f1540 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`033ca670 fffff880`0194f5ec : fffffa80`09525310 fffff880`0191e376 00000000`00000001 00000000`00000000 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`033ca6d0 fffff880`0191b963 : fffffa80`0c4f1cd0 00000000`00000001 fffffa80`0d7b7990 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d6ef
    fffff880`033ca740 fffff880`01909d54 : fffffa80`0b6d45c0 00000000`00006eed fffff880`033cac38 fffffa80`07da9000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`033ca8f0 fffff880`019085ea : fffffa80`07c98b80 fffff880`01900a00 fffffa80`063b13d0 00000000`00000000 : tcpip!TcpTcbReceive+0x724
    fffff880`033caae0 fffff880`0190a2ab : fffff880`047d8134 fffffa80`07da9000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`033cac30 fffff880`01901137 : fffffa80`07c98b80 fffffa80`07c96eed fffffa80`0000988d 00000000`0000988d : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`033cad00 fffff880`01900caa : 00000000`00000000 fffff880`01a10800 fffff880`033caec0 fffffa80`0b112010 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`033cadc0 fffff880`019002a9 : 00000000`00000000 fffffa80`0b103010 fffffa80`0b0e1dc0 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`033cae60 fffff880`018fdfff : 00000000`00000000 00000000`0882c600 fffff880`01a10800 fffff880`01a10800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`033caf40 fffff880`018fd5f2 : fffffa80`0882e7c0 00000000`00000000 fffffa80`0882c600 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`033cb140 fffff880`0197175a : 00000000`00000000 fffffa80`0e63ce20 fffffa80`0882c690 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`033cb220 fffff800`034d6668 : 00000000`00000000 fffff880`01789390 fffffa80`05514040 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x56e52
    fffff880`033cb270 fffff880`018fd152 : fffff880`018fc9b0 fffffa80`0ba2b190 fffff880`01a15900 fffff880`01902301 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`033cb350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01754b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 9
    OEM Windows 7 Home Premium 64bit
    Thread Starter
       #3

    Thanks for the quick reply!
    I don't have zonealarm, but I do have McAfee preinstalled... what is microsoft hotfix?
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:12.
Find Us