Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD 0x000000d1 IRQL NOT LESS OR EQUAL


08 Jan 2012   #1

Windows 7 Home Premium 64 bit
 
 
BSOD 0x000000d1 IRQL NOT LESS OR EQUAL

My laptop is about 1 and a half months and my first BSOD occured 1 week after I bought it and has been happening ever since.
I noticed that it happens when i download torrents or watch youtube videos.

All of the minidumps blame ntoskrnl.exe and NETIO.sys but some of the BSODs seem to have also been cause by athrx.sys, tcpip.sys and tdx.sys.

My laptop is a Lenovo ideapad z470.
Windows 7 Home Premium 64bit.
Intel Core i5-2430M CPU @ 2.40GHZ
2GB DDR3 RAM + additional 2 GB installed.

Attatched are the minidump files.
Thanks.

My System SpecsSystem Spec
.

08 Jan 2012   #2

Windows 7 Ultimate x86 SP1
 
 

Hello gabby02,
I have checked your dump files and most of the crash related to Network I/O Subsystem.

Bugcheck code = 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL
It seems caused by 3rd driver (Network driver or Antivirus Driver)

Start with remove/uninstall completely McAfee Antivirus, just use MSE and MBAM for virus protection.

Then update your LAN driver (Realtek NIC driver) → click here

After that we'll see how things go.


LOG
Code:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`0305b670
Debug session time: Tue Dec 20 23:53:19.574 2011 (GMT-8)
System Uptime: 0 days 3:51:22.838
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {28, 2, 0, fffff8800171bb2d}

Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800171bb2d, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c5100
 0000000000000028 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1d
fffff880`0171bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880033ca520 -- (.trap 0xfffff880033ca520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800171bb2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
r11=fffffa800421d170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`0171bb2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:0011:00000000`00000028=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e921e9 to fffff80002e92c40

STACK_TEXT:  
fffff880`033ca3d8 fffff800`02e921e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033ca3e0 fffff800`02e90e60 : 00000000`00000001 fffff880`01943dd2 fffff880`01a53800 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`033ca520 fffff880`0171bb2d : ffff0000`0299870f 00000000`00000001 00000000`00000016 fffffa80`079c4f58 : nt!KiPageFault+0x260
fffff880`033ca6b0 fffff880`01982bac : 00000000`00000000 fffff880`01951906 00000000`00000001 fffffa80`097577c0 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`033ca710 fffff880`0194eef3 : fffffa80`0421d170 00000000`00000001 fffffa80`09238220 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
fffff880`033ca780 fffff880`01941d54 : fffff880`033cac38 00000000`00000029 fffffa80`09238220 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
fffff880`033ca930 fffff880`0194067a : fffffa80`064c43a0 fffff880`01938b34 fffffa80`06355178 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`033caae0 fffff880`019422ab : fffffa80`08de2a3e fffffa80`064b1000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
fffff880`033cac30 fffff880`019391c7 : fffffa80`064c43a0 fffffa80`063998f9 fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
fffff880`033cad00 fffff880`01938d3a : 00000000`00000000 fffff880`01a53800 fffff880`033caec0 fffffa80`0471de20 : tcpip!IppDeliverListToProtocol+0x97
fffff880`033cadc0 fffff880`01938339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
fffff880`033cae60 fffff880`019360af : 00000000`00000000 00000000`07410800 fffff880`01a53800 fffff880`01a53800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033caf40 fffff880`019356a2 : fffffa80`0740f6e0 00000000`00000000 fffffa80`07410800 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033cb140 fffff880`019b434a : fffff880`033cb6c0 fffff880`033cb248 fffffa80`07410810 fffff880`01619569 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`033cb220 fffff800`02e9f618 : fffffa80`06fc81a0 00000000`00000000 fffffa80`03b4bb60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
fffff880`033cb270 fffff880`01935202 : fffff880`01934a60 00000000`00000002 fffff880`033cb300 fffff880`033cb301 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033cb350 fffff880`016d60eb : fffffa80`07424240 00000000`00000000 fffffa80`06ec31a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1d
fffff880`0171bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

Followup: MachineOwner
---------

2: kd> lmvm NETIO
start             end                 module name
fffff880`0170a000 fffff880`0176a000   NETIO      (pdb symbols)          c:\symbols\netio.pdb\DD06DDC1DE2F426D85400E127C2DF49A2\netio.pdb
    Loaded symbol image file: NETIO.SYS
    Mapped memory image file: C:\Symbols\NETIO.SYS\4CE7938160000\NETIO.SYS
    Image path: \SystemRoot\system32\drivers\NETIO.SYS
    Image name: NETIO.SYS
    Timestamp:        Sat Nov 20 01:23:13 2010 (4CE79381)
    CheckSum:         00066D17
    ImageSize:        00060000
    File version:     6.1.7601.17514
    Product version:  6.1.7601.17514
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.6 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     netio.sys
    OriginalFilename: netio.sys
    ProductVersion:   6.1.7601.17514
    FileVersion:      6.1.7601.17514 (win7sp1_rtm.101119-1850)
    FileDescription:  Network I/O Subsystem
    LegalCopyright:   © Microsoft Corporation. All rights reserved.
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`03056670
Debug session time: Tue Dec 20 07:29:06.875 2011 (GMT-8)
System Uptime: 0 days 7:40:12.765
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {28, 2, 0, fffff88001611b2d}

Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001611b2d, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c0100
 0000000000000028 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1d
fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880033ca520 -- (.trap 0xfffff880033ca520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001611b2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
r11=fffffa80095f0110 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:5e02:00000000`00000028=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e8d1e9 to fffff80002e8dc40

STACK_TEXT:  
fffff880`033ca3d8 fffff800`02e8d1e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033ca3e0 fffff800`02e8be60 : fffffa80`078f9948 fffff800`03018348 00000000`00000002 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`033ca520 fffff880`01611b2d : 00000000`0000001a fffff880`018ecfec 00000000`0000000d fffffa80`095071b8 : nt!KiPageFault+0x260
fffff880`033ca6b0 fffff880`01974bac : 00000000`00000000 fffff880`01943906 00000000`00000001 fffffa80`09f75e40 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`033ca710 fffff880`01940ef3 : fffffa80`095f0110 00000000`00000001 fffffa80`09fc9cf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
fffff880`033ca780 fffff880`01933d54 : fffff880`033cac38 00000000`00000029 fffffa80`09fc9cf0 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
fffff880`033ca930 fffff880`0193267a : fffffa80`06388f00 fffff880`0192ab34 fffffa80`06346808 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`033caae0 fffff880`019342ab : fffffa80`07635a3e fffffa80`064a1000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
fffff880`033cac30 fffff880`0192b1c7 : fffffa80`06388f00 fffffa80`0638aef7 fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
fffff880`033cad00 fffff880`0192ad3a : 00000000`00000000 fffff880`01a45800 fffff880`033caec0 fffffa80`09faca10 : tcpip!IppDeliverListToProtocol+0x97
fffff880`033cadc0 fffff880`0192a339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
fffff880`033cae60 fffff880`019280af : 00000000`00000000 00000000`07227000 fffff880`01a45800 fffff880`01a45800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033caf40 fffff880`019276a2 : fffffa80`072210b0 00000000`00000000 fffffa80`07227000 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033cb140 fffff880`019a634a : fffff880`033cb490 00000000`00000000 fffffa80`07227010 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`033cb220 fffff800`02e9a618 : fffffa80`00000001 fffffa80`07736030 fffffa80`03b4bb60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
fffff880`033cb270 fffff880`01927202 : fffff880`01926a60 00000000`00000002 00000000`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033cb350 fffff880`017750eb : fffffa80`07229010 00000000`00000000 fffffa80`06eea1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1d
fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

Followup: MachineOwner
---------
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e66000 PsLoadedModuleList = 0xfffff800`030ab670
Debug session time: Sat Jan  7 19:34:03.145 2012 (GMT-8)
System Uptime: 0 days 3:47:02.035
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {28, 2, 0, fffff8800172bb2d}

Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800172bb2d, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003115100
 0000000000000028 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1d
fffff880`0172bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880033ca520 -- (.trap 0xfffff880033ca520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800172bb2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
r11=fffffa800427c7d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffff880`0172bb2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:7f02:00000000`00000028=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ee21e9 to fffff80002ee2c40

STACK_TEXT:  
fffff880`033ca3d8 fffff800`02ee21e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033ca3e0 fffff800`02ee0e60 : 00000000`00000000 fffff880`018c0dd2 ffffffff`ffffff02 00000000`00000044 : nt!KiBugCheckDispatch+0x69
fffff880`033ca520 fffff880`0172bb2d : 00000000`000000ca fffff880`01877fec 00000000`0000000d fffffa80`076dfad8 : nt!KiPageFault+0x260
fffff880`033ca6b0 fffff880`018ffbac : 00000000`00000000 fffff880`018ce906 00000000`00000001 fffffa80`04357f40 : NETIO!RtlCopyBufferToMdl+0x1d
fffff880`033ca710 fffff880`018cbef3 : fffffa80`0427c7d0 00000000`00000001 fffffa80`0736b250 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
fffff880`033ca780 fffff880`018bed54 : fffff880`033cac38 00000000`00000029 fffffa80`0736b250 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
fffff880`033ca930 fffff880`018bd67a : fffffa80`06374950 fffff880`018b5b34 fffffa80`04a84a60 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`033caae0 fffff880`018bf2ab : fffff880`08d066d2 fffffa80`06491000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
fffff880`033cac30 fffff880`018b61c7 : fffffa80`06374950 fffffa80`06379cff fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
fffff880`033cad00 fffff880`018b5d3a : 00000000`00000000 fffff880`019d0800 fffff880`033caec0 fffffa80`0489de20 : tcpip!IppDeliverListToProtocol+0x97
fffff880`033cadc0 fffff880`018b5339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
fffff880`033cae60 fffff880`018b30af : 00000000`00000000 00000000`07215000 fffff880`019d0800 fffff880`019d0800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033caf40 fffff880`018b26a2 : fffffa80`07219010 00000000`00000000 fffffa80`07215000 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033cb140 fffff880`0193134a : fffff880`033cb490 00000000`00000000 fffffa80`07215010 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`033cb220 fffff800`02eef618 : 00000000`00000000 fffffa80`06d1d1a0 fffffa80`03b5b040 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
fffff880`033cb270 fffff880`018b2202 : fffff880`018b1a60 00000000`00000002 00000000`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033cb350 fffff880`016e60eb : fffffa80`07216780 00000000`00000000 fffffa80`06d1d1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1d
fffff880`0172bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381

FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d

Followup: MachineOwner
---------

2: kd> lmvm NETIO
start             end                 module name
fffff880`0171a000 fffff880`0177a000   NETIO      (pdb symbols)          c:\symbols\netio.pdb\DD06DDC1DE2F426D85400E127C2DF49A2\netio.pdb
    Loaded symbol image file: NETIO.SYS
    Mapped memory image file: C:\Symbols\NETIO.SYS\4CE7938160000\NETIO.SYS
    Image path: \SystemRoot\system32\drivers\NETIO.SYS
    Image name: NETIO.SYS
    Timestamp:        Sat Nov 20 01:23:13 2010 (4CE79381)
    CheckSum:         00066D17
    ImageSize:        00060000
    File version:     6.1.7601.17514
    Product version:  6.1.7601.17514
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.6 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     netio.sys
    OriginalFilename: netio.sys
    ProductVersion:   6.1.7601.17514
    FileVersion:      6.1.7601.17514 (win7sp1_rtm.101119-1850)
    FileDescription:  Network I/O Subsystem
    LegalCopyright:   © Microsoft Corporation. All rights reserved.
My System SpecsSystem Spec
08 Jan 2012   #3

Windows 7 Home Premium 64 bit
 
 

Thanks for your reply.
I have uninstalled mcafee a long time ago.

I just have a question. What exactly am I supposed to download? A lot of choices are coming up and I don't know which ones to choose. Sorry, I'm a dumbass when it comes to stuff like this.
My System SpecsSystem Spec
.


08 Jan 2012   #4

Windows 7 Ultimate x86 SP1
 
 

Quote   Quote: Originally Posted by gabby02 View Post
Thanks for your reply.
I have uninstalled mcafee a long time ago.

I just have a question. What exactly am I supposed to download? A lot of choices are coming up and I don't know which ones to choose. Sorry, I'm a dumbass when it comes to stuff like this.
Please follow this instruction, so we can assist you better.
We need more files beside the minidump file.
http://www.sevenforums.com/crashes-d...tructions.html
My System SpecsSystem Spec
08 Jan 2012   #5

Windows 7 Home Premium 64 bit
 
 

Have attached the additional files.
My System SpecsSystem Spec
09 Jan 2012   #6

Windows 7 Ultimate x86 SP1
 
 

For your Realtek NIC driveropen the web page here
Then navigate to 10/100M Fast Ethernet > PCI Express > Software
After that choose → Windows 7 and WinServer 2008 R2 Auto Installation Program

Also do you installed SUNBELT SOFTWARE(related to firewall/antirootkit)?
If that's true, then try removing it for a while.
navigate to folder:
C:\windows\system32\drivers\SBREdrv.sys
then rename SBREdrv.sys toSBREdrv.bak
Reboot Windows to take effect
My System SpecsSystem Spec
09 Jan 2012   #7

Windows 7 Home Premium 64 bit
 
 

Okay. I have downloaded and installed the NIC driver. Thanks for that.

Yes, I used to have Vipre Antivirus from Sunbelt and I have uninstalled that ever since I got multiple BSODs. I have read somewhere that some antivirus products can cause BSODs so I uninstalled everything and got MSE.

I have also renamed the file, like you said.

I will wait and see what happens. Thanks for your help!
My System SpecsSystem Spec
13 Jan 2012   #8

Windows 7 Home Premium 64 bit
 
 

Hey, so bad news. After installing the driver and renaming the file, I was able to run my laptop for about 3, maybe 4 days without a BSOD but I just got one right now. It's the same with the other ones. What do I do?
My System SpecsSystem Spec
14 Jan 2012   #9

Windows 7 Ultimate x86 SP1
 
 

Attach the new files here
My System SpecsSystem Spec
14 Jan 2012   #10

Windows 7 Home Premium 64 bit
 
 

Sorry, but what new files? Just the new mini dump or do I have to post everything again?
My System SpecsSystem Spec
Reply

 BSOD 0x000000d1 IRQL NOT LESS OR EQUAL




Thread Tools



Similar help and support threads for2: BSOD 0x000000d1 IRQL NOT LESS OR EQUAL
Thread Forum
Driver IRQL not less or equal - 0x000000D1 BSOD Help and Support
Solved Windows 7 - BSOD 0x000000d1 IRQL NOT LESS OR EQUAL at Random moments BSOD Help and Support
IRQL Less than or not equal BSOD BSOD Help and Support
Solved IRQL Not less or equal BSOD BSOD Help and Support
BSOD IRQL not equal or less tcpip.sys error 0x000000d1 BSOD Help and Support
Solved BSOD - Driver IRQL Not Less Or Equal - error 0x000000d1 BSOD Help and Support
BSOD = Driver IRQ not less or equal. STOP: 0x000000D1. e1q62x64.sys BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 10:35 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33