The Realtek NIC driver is the cause, update it
Realtek
ASACPI.sys the 2005 version is a huge cause of BSODs
Information
The 2005 version of this driver is a known BSOD cause.
Please visit this link: ASUSTeK Computer Inc. -Support- Drivers and Download P7P55D LE
Scroll down to the Utilities category, then scroll down to the "ATK0110 driver for WindowsXP/Vista/Windows 7 32&64-bit" (it's about the 12th item down).
Download and install it.
Go to C:\Windows\System32\drivers to check and make sure that the ASACPI.sys file is date stamped from 2009 or 2010 (NOT 2005)
Code:
ASACPI.sys fffff880`044a5000 fffff880`044ad000 0x00008000 0x42476c4c 28/03/2005 06:30:36
Other dumps blame the AMD Radeon driver atikmdag.sys
Reinstall the AMD driver and stop any overclocking if any
Code:
BugCheck D1, {0, 2, 1, fffff880045a1358}
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessCompletedQueuePacketInternal+430 )
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff880016c14c0}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+16108 )
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880016c14c0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0c100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpTimerUpdateNextExpirationTick+0
fffff880`016c14c0 48895c2410 mov qword ptr [rsp+10h],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88008234a40 -- (.trap 0xfffff88008234a40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800532ca60
rdx=000000000060e198 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880016c14c0 rsp=fffff88008234bd8 rbp=0000000000008c0e
r8=0000000000010300 r9=000000000060e18e r10=0000000000000000
r11=fffff88008234690 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
tcpip!TcpTimerUpdateNextExpirationTick:
fffff880`016c14c0 48895c2410 mov qword ptr [rsp+10h],rbx ss:0018:fffff880`08234be8=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002adc2a9 to fffff80002adcd00
STACK_TEXT:
fffff880`082348f8 fffff800`02adc2a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08234900 fffff800`02adaf20 : fffff800`02ae78a5 fffffa80`05364fb8 00000000`ad4022d5 fffff880`06adeb22 : nt!KiBugCheckDispatch+0x69
fffff880`08234a40 fffff880`016c14c0 : fffff880`016bdeab fffff880`06adeb22 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`08234bd8 fffff880`016bdeab : fffff880`06adeb22 00000000`00000000 00000000`00000000 fffff8a0`01d52000 : tcpip!TcpTimerUpdateNextExpirationTick
fffff880`08234be0 fffff880`016b4b97 : fffffa80`0547f3a0 fffffa80`054813a0 fffffa80`00003cd4 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x59b
fffff880`08234cb0 fffff880`016b470a : 00000000`00000000 fffff880`017d59a0 fffff880`08234e70 fffff880`08235050 : tcpip!IppDeliverListToProtocol+0x97
fffff880`08234d70 fffff880`016b3d09 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`08234e60 : tcpip!IppProcessDeliverList+0x5a
fffff880`08234e10 fffff880`016b1a7f : fffff8a0`1045b000 fffffa80`0546c000 fffff880`017d59a0 00000000`05df2001 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`08234ef0 fffff880`016b1072 : fffffa80`060bc870 00000000`00000000 fffffa80`05df2001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`082350f0 fffff880`016b050a : fffffa80`05df2010 fffff880`08235220 fffffa80`05df2010 fffff880`016b0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`082351d0 fffff800`02ae9668 : fffffa80`05fb0d50 00000000`00004800 fffffa80`07357a60 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`08235220 fffff880`016b0bd2 : fffff880`016b0430 00000000`00000000 00000000`00000002 00000001`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`08235300 fffff880`015bf0eb : fffffa80`05df28d0 00000000`00000000 fffffa80`05dc91a0 00000000`00000282 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`08235370 fffff880`01588ad6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`082353e0 fffff880`01501cc1 : fffffa80`05dc91a0 00000000`00000002 00000000`00000001 00000000`00003402 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`08235860 fffff880`05187108 : fffffa80`05d39000 fffffa80`05fac140 fffffa80`05d39610 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`082358b0 fffffa80`05d39000 : fffffa80`05fac140 fffffa80`05d39610 00000000`00000000 00000000`00000001 : Rt64win7+0x16108
fffff880`082358b8 fffffa80`05fac140 : fffffa80`05d39610 00000000`00000000 00000000`00000001 fffffa80`05d39610 : 0xfffffa80`05d39000
fffff880`082358c0 fffffa80`05d39610 : 00000000`00000000 00000000`00000001 fffffa80`05d39610 00000000`02ae0000 : 0xfffffa80`05fac140
fffff880`082358c8 00000000`00000000 : 00000000`00000001 fffffa80`05d39610 00000000`02ae0000 00000001`00000001 : 0xfffffa80`05d39610
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+16108
fffff880`05187108 ?? ???
SYMBOL_STACK_INDEX: 10
SYMBOL_NAME: Rt64win7+16108
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8750a0
FAILURE_BUCKET_ID: X64_0xD1_VRF_Rt64win7+16108
BUCKET_ID: X64_0xD1_VRF_Rt64win7+16108
Followup: MachineOwner
---------