1-2 week old laptop with BSOD

Page 1 of 2 12 LastLast

  1. Posts : 8
    windows 7 home premium 64bit
       #1

    1-2 week old laptop with BSOD


    Ok then, this is my first thead.
    So my laptop is like 1-2 week old. I have The blue screen of death (BSOD), when ever it comes up, up the top it sais "DRIVER_IRQL_NOT_LESS_OR_EQUEL"
    Lower at the "***** STOP:" point it sais "0x000000D1" and under that it sais "NETIO.SYS"
    I think the BSOD only or usualy comes up when im using uTorrent, im not shour if it comes up any other time, but please help me, its a band new laptop, its a "hp probook 4520s" with an "i3"
    Last edited by foti; 04 Jun 2011 at 08:35. Reason: have to add perfmon and dump files
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

    https://www.sevenforums.com/crashes-d...tructions.html
    0x000000D1" and under that it sais "NETIO.SYS"
    Zone Alarm software usually cause this, remove any such software
      My Computer


  3. Posts : 8
    windows 7 home premium 64bit
    Thread Starter
       #3

    is zone alarm a firewall??? if it is a have mcafee
      My Computer


  4. Posts : 8
    windows 7 home premium 64bit
    Thread Starter
       #4

    yowanvista said:
    https://www.sevenforums.com/crashes-d...tructions.html
    0x000000D1" and under that it sais "NETIO.SYS"
    Zone Alarm software usually cause this, remove any such software
    i don't have a zone alarm. and here is the pefrom and dump files
      My Computer


  5. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #5

    Remove any McAfee software and use MSE
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001784b2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'btmusb' and 'btmusb.sys' overlap
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003117100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01784b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880031947f0 -- (.trap 0xfffff880031947f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88003194a10 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001784b2d rsp=fffff88003194980 rbp=fffff88003194ab0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa8002b93bb0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`01784b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ee72a9 to fffff80002ee7d00
    
    STACK_TEXT:  
    fffff880`031946a8 fffff800`02ee72a9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031946b0 fffff800`02ee5f20 : fffff8a0`02e19010 fffff880`00000001 fffff880`030200ff 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`031947f0 fffff880`01784b2d : fffff880`03194aa8 fffffa80`056b5180 fffffa80`06a25c20 00000000`0000000b : nt!KiPageFault+0x260
    fffff880`03194980 fffff880`042ac5ec : fffff8a0`02e19140 fffff880`0427b376 00000000`00000001 fffffa80`056b5180 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`031949e0 fffff880`04278963 : fffffa80`02b93bb0 00000000`00000001 fffffa80`02bd8cf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d6ef
    fffff880`03194a50 fffff880`04266d54 : fffffa80`059c1530 00000000`000068e7 fffff880`03194f48 fffffa80`057f4000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`03194c00 fffff880`042655ea : fffffa80`05807490 fffff880`0425da00 fffffa80`056844c0 00000000`00000000 : tcpip!TcpTcbReceive+0x724
    fffff880`03194df0 fffff880`042672ab : fffffa80`0594e564 fffffa80`057f4000 00000000`00000000 fffff880`03195100 : tcpip!TcpMatchReceive+0x1fa
    fffff880`03194f40 fffff880`0425e137 : fffffa80`05807490 fffffa80`058068e7 fffffa80`0000a38e 00000000`0000a38e : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`03195010 fffff880`0425dcaa : 00000000`00000000 fffff880`0436d800 fffff880`031951d0 fffffa80`05223120 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`031950d0 fffff880`0425d2a9 : fffff880`03195288 fffff880`012b4d86 00000000`00000003 fffff880`031951c0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`03195170 fffff880`0425afff : 00000000`00000000 00000000`05bd1400 fffff880`0436d800 fffff880`0436d800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`03195250 fffff880`0425a5f2 : fffffa80`05a34bb0 00000000`00000000 fffffa80`05bd1400 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`03195450 fffff880`042ce75a : fffff800`031ef620 00000000`00000000 fffffa80`05bd1430 fffffa80`051366a0 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`03195530 fffff800`02ef4668 : fffffa80`00000240 fffff880`031956d0 fffffa80`0243c680 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x56e52
    fffff880`03195580 fffff880`0425a152 : fffff880`042599b0 fffffa80`0243af30 fffffa80`05abb300 fffffa80`06a3db01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`03195660 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01784b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
      My Computer


  6. Posts : 8
    windows 7 home premium 64bit
    Thread Starter
       #6

    yowanvista said:
    Remove any McAfee software and use MSE
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001784b2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'btmusb' and 'btmusb.sys' overlap
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003117100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01784b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880031947f0 -- (.trap 0xfffff880031947f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88003194a10 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001784b2d rsp=fffff88003194980 rbp=fffff88003194ab0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa8002b93bb0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`01784b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ee72a9 to fffff80002ee7d00
    
    STACK_TEXT:  
    fffff880`031946a8 fffff800`02ee72a9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031946b0 fffff800`02ee5f20 : fffff8a0`02e19010 fffff880`00000001 fffff880`030200ff 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`031947f0 fffff880`01784b2d : fffff880`03194aa8 fffffa80`056b5180 fffffa80`06a25c20 00000000`0000000b : nt!KiPageFault+0x260
    fffff880`03194980 fffff880`042ac5ec : fffff8a0`02e19140 fffff880`0427b376 00000000`00000001 fffffa80`056b5180 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`031949e0 fffff880`04278963 : fffffa80`02b93bb0 00000000`00000001 fffffa80`02bd8cf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d6ef
    fffff880`03194a50 fffff880`04266d54 : fffffa80`059c1530 00000000`000068e7 fffff880`03194f48 fffffa80`057f4000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`03194c00 fffff880`042655ea : fffffa80`05807490 fffff880`0425da00 fffffa80`056844c0 00000000`00000000 : tcpip!TcpTcbReceive+0x724
    fffff880`03194df0 fffff880`042672ab : fffffa80`0594e564 fffffa80`057f4000 00000000`00000000 fffff880`03195100 : tcpip!TcpMatchReceive+0x1fa
    fffff880`03194f40 fffff880`0425e137 : fffffa80`05807490 fffffa80`058068e7 fffffa80`0000a38e 00000000`0000a38e : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`03195010 fffff880`0425dcaa : 00000000`00000000 fffff880`0436d800 fffff880`031951d0 fffffa80`05223120 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`031950d0 fffff880`0425d2a9 : fffff880`03195288 fffff880`012b4d86 00000000`00000003 fffff880`031951c0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`03195170 fffff880`0425afff : 00000000`00000000 00000000`05bd1400 fffff880`0436d800 fffff880`0436d800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`03195250 fffff880`0425a5f2 : fffffa80`05a34bb0 00000000`00000000 fffffa80`05bd1400 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`03195450 fffff880`042ce75a : fffff800`031ef620 00000000`00000000 fffffa80`05bd1430 fffffa80`051366a0 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`03195530 fffff800`02ef4668 : fffffa80`00000240 fffff880`031956d0 fffffa80`0243c680 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x56e52
    fffff880`03195580 fffff880`0425a152 : fffff880`042599b0 fffffa80`0243af30 fffffa80`05abb300 fffffa80`06a3db01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`03195660 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01784b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    sorry i don't know much about this stuff, do i have to do anything with all that that you replyed with?
      My Computer


  7. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #7

    Go to Programs and Features - Uninstall or Change a Program
    Locate McAfee and uninstall(remove) it
    Go to this website: http://www.microsoft.com/security_essentials/
    Download the installer and run it
      My Computer


  8. Posts : 8
    windows 7 home premium 64bit
    Thread Starter
       #8

    yowanvista said:
    Go to Programs and Features - Uninstall or Change a Program
    Locate McAfee and uninstall(remove) it
    i got that part
      My Computer


  9. Posts : 8
    windows 7 home premium 64bit
    Thread Starter
       #9

    yowanvista said:
    Go to Programs and Features - Uninstall or Change a Program
    Locate McAfee and uninstall(remove) it
    Go to this website: Virus, Spyware & Malware Protection | Microsoft Security Essentials
    Download the installer and run it
    ok so i instaled it and it automaticly did a quick scan, now what should i do?
      My Computer


  10. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #10

    foti said:
    yowanvista said:
    Go to Programs and Features - Uninstall or Change a Program
    Locate McAfee and uninstall(remove) it
    Go to this website: Virus, Spyware & Malware Protection | Microsoft Security Essentials
    Download the installer and run it
    ok so i instaled it and it automaticly did a quick scan, now what should i do?
    Post back with latest .zip file if BSOD occurs again :)
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 02:07.
Find Us