Bsod irql_not_less_or_equal


  1. Posts : 4
    Windows 7 Home Premium 64 bit
       #1

    Bsod irql_not_less_or_equal


    Hey guys,

    Been having this issue for a little while now. Occasionally when I close my laptop the things decides to not actually go to sleep/hibernate like it is set to do, and so it overheats if I put it in my backpack while changing classes (where I don't want to actually completely turn it off). Then It'll shutdown from being overheated, and when it comes back on i get a BSOD of IRQL_NOT_LESS_OR_EQUAL . I'm 90% sure it has something to do with my wireless card/driver because the only way I can get it to stop the BSOD cycle is by disabling the internet switch on startup, and then after about a minute or two I can re-enable it and everything works fine until the next startup.

    I've already downloaded Intel Driver Update Utility and installed the latest drivers (including for my wireless) which I thought would solve the issue but it's still occuring. I've even been through the dell website to check all of my driver's with their system detect and still haven't had any luck.

    I just need this puppy to last me through another 3 semesters and then she can be trashed. I have a desktop that I built that I use most of the time anyways so I really only need this one for notes for class.

    Anyways, I'll be editing this post with the report from DM Log Collector as soon as it finishes in a couple of minutes and I appreciate any and all help in advanced.

    EDIT: Attaching the zipped folder as per instructions? If I can figure out which file to upload it I'll code it to the post.
      My Computer


  2. Posts : 15,026
    Windows 10 Home 64Bit
       #2

    Looks like your BSOD's were caused by Norton. Please uninstall to test.

    Code:
    Microsoft (R) Windows Debugger Version 6.3.9600.16384 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\YUSRA\Downloads\Compressed\DAVIDS-PC-Wed_01_28_2015_232743_21\012715-50840-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.18700.amd64fre.win7sp1_gdr.141211-1742
    Machine Name:
    Kernel base = 0xfffff800`0320e000 PsLoadedModuleList = 0xfffff800`03451890
    Debug session time: Tue Jan 27 12:47:20.013 2015 (UTC + 6:00)
    System Uptime: 0 days 0:03:13.888
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ..............................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 1, fffff8000328df3f}
    
    *** WARNING: Unable to verify timestamp for SYMNETS.SYS
    *** ERROR: Module load completed but symbols could not be loaded for SYMNETS.SYS
    Probably caused by : NETIO.SYS ( NETIO!WfpExpireEntryLru+17 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff8000328df3f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800034bb100
    GetUlongFromAddress: unable to read from fffff800034bb1c0
     0000000000000000 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+4f
    fffff800`0328df3f 488713          xchg    rdx,qword ptr [rbx]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) x86fre
    
    TRAP_FRAME:  fffff88003562230 -- (.trap 0xfffff88003562230)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8006a2e660 rbx=0000000000000000 rcx=0000000000000000
    rdx=fffff88003562430 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000328df3f rsp=fffff880035623c0 rbp=0000000000000008
     r8=fffff88003562430  r9=fffff88001b8ac90 r10=0000000000000000
    r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f:
    fffff800`0328df3f 488713          xchg    rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003284429 to fffff80003284e80
    
    STACK_TEXT:  
    fffff880`035620e8 fffff800`03284429 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`035620f0 fffff800`032830a0 : 00000000`00000010 fffff880`03562420 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`03562230 fffff800`0328df3f : 00000000`00000003 00000000`00000001 00000000`00000003 00000000`00000001 : nt!KiPageFault+0x260
    fffff880`035623c0 fffff880`019399c7 : 00000000`00000008 fffff880`035626a0 00000000`00008900 fffffa80`0771a7c8 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f
    fffff880`03562410 fffff880`01ae608d : fffffa80`0d87a4c0 fffffa80`0e140a70 fffff880`035626a0 00000000`00008900 : NETIO!WfpExpireEntryLru+0x17
    fffff880`03562460 fffff880`01aad7b7 : 00000000`00000004 fffff880`01910030 fffffa80`0e3ed060 00000000`00000001 : tcpip!WfpAleCloseRemoteEndpointConnection+0x2d
    fffff880`03562490 fffff880`01b25e5b : fffffa80`0d87a4c0 fffffa80`0d85853a 00000000`00000001 fffffa80`0d87a4c0 : tcpip! ?? ::FNODOBFM::`string'+0x20f72
    fffff880`035625e0 fffff880`01b261e2 : fffff800`033fee80 fffffa80`0d858470 fffffa80`09e56410 00000000`00000001 : tcpip!WfpAleHandleSendCompletion+0xeb
    fffff880`03562700 fffff880`01b306b2 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`09e5ceb8 : tcpip!WfpAlepAuthorizeSendCompletion+0x32
    fffff880`03562750 fffff880`0199faf2 : fffffa80`00000089 fffff800`00000089 fffffa80`0d81ad50 00000000`00000001 : tcpip!WfpAleCompleteOperation+0x162
    fffff880`035627f0 fffff880`040907bb : 00000000`00000000 00000000`00000000 fffffa80`0d338460 00000000`00000030 : fwpkclnt!FwpsCompleteOperation0+0x1e
    fffff880`03562820 00000000`00000000 : 00000000`00000000 fffffa80`0d338460 00000000`00000030 00000000`00000089 : SYMNETS+0x1e7bb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!WfpExpireEntryLru+17
    fffff880`019399c7 488b4310        mov     rax,qword ptr [rbx+10h]
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  NETIO!WfpExpireEntryLru+17
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5294760d
    
    IMAGE_VERSION:  6.1.7601.18327
    
    FAILURE_BUCKET_ID:  X64_0xA_NETIO!WfpExpireEntryLru+17
    
    BUCKET_ID:  X64_0xA_NETIO!WfpExpireEntryLru+17
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0xa_netio!wfpexpireentrylru+17
    
    FAILURE_ID_HASH:  {fcdee258-ad7b-b100-5f3a-ac9544c5fd1f}
    
    Followup: MachineOwner
    ---------
    Code:
    Microsoft (R) Windows Debugger Version 6.3.9600.16384 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\YUSRA\Downloads\Compressed\DAVIDS-PC-Wed_01_28_2015_232743_21\012815-30139-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.18700.amd64fre.win7sp1_gdr.141211-1742
    Machine Name:
    Kernel base = 0xfffff800`0321e000 PsLoadedModuleList = 0xfffff800`03461890
    Debug session time: Thu Jan 29 10:18:44.312 2015 (UTC + 6:00)
    System Uptime: 0 days 0:01:48.202
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ..............................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {8, 2, 1, fffff88001900713}
    
    Probably caused by : NETIO.SYS ( NETIO!WfppIncrementIndexAndPurgeEntries+93 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff88001900713, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800034cb100
    GetUlongFromAddress: unable to read from fffff800034cb1c0
     0000000000000008 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!WfppIncrementIndexAndPurgeEntries+93
    fffff880`01900713 48897008        mov     qword ptr [rax+8],rsi
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) x86fre
    
    DPC_STACK_BASE:  FFFFF80000BA0FB0
    
    TRAP_FRAME:  fffff80000b9a130 -- (.trap 0xfffff80000b9a130)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80078f8940
    rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001900713 rsp=fffff80000b9a2c0 rbp=fffffa80078f8938
     r8=fffff80000b9a308  r9=fffff88001b8ac90 r10=0000000000000000
    r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    NETIO!WfppIncrementIndexAndPurgeEntries+0x93:
    fffff880`01900713 48897008        mov     qword ptr [rax+8],rsi ds:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003294429 to fffff80003294e80
    
    STACK_TEXT:  
    fffff800`00b99fe8 fffff800`03294429 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff800`00b99ff0 fffff800`032930a0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`01b7c140 : nt!KiBugCheckDispatch+0x69
    fffff800`00b9a130 fffff880`01900713 : fffff880`01b7c140 fffff880`01b7c8d0 fffff880`01b7c140 fffff880`01b7c140 : nt!KiPageFault+0x260
    fffff800`00b9a2c0 fffff880`01900839 : 00000000`00020004 fffff880`01b7c180 fffff880`01b7c8d0 fffff880`01b7c140 : NETIO!WfppIncrementIndexAndPurgeEntries+0x93
    fffff800`00b9a330 fffff880`0190041f : fffff880`01b7c590 fffff880`01b7c8d0 00000000`00000000 fffff880`01b7c884 : NETIO!WfppLeastRecentlyUsedTimerRoutine+0x19
    fffff800`00b9a380 fffff880`019002ff : fffffa80`070200ff 00000000`00000000 fffff880`01b7c5a8 00000000`00000002 : NETIO!WfpTimerWheelTimeoutHandler+0xff
    fffff800`00b9a400 fffff800`0329fb5c : fffff800`00b9a520 fffff800`00b9a4c0 fffffa80`40242a88 00000000`00000000 : NETIO!WfpSysTimerCallback+0x4f
    fffff800`00b9a430 fffff800`0329f9f6 : fffff880`01b7b4f0 00000000`00001b18 00000000`00000000 00000000`ffffffff : nt!KiProcessTimerDpcTable+0x6c
    fffff800`00b9a4a0 fffff800`0329f8de : 00000000`407e7738 fffff800`00b9ab18 00000000`00001b18 fffff800`03411588 : nt!KiProcessExpiredTimerList+0xc6
    fffff800`00b9aaf0 fffff800`0329f6c7 : 00000000`0de6f7c6 00000000`00001b18 00000000`0de6f7d0 00000000`00000018 : nt!KiTimerExpiration+0x1be
    fffff800`00b9ab90 fffff800`0328cb8a : fffff800`0340ee80 fffff800`0341ccc0 00000000`00000002 fffff880`00000000 : nt!KiRetireDpcList+0x277
    fffff800`00b9ac40 00000000`00000000 : fffff800`00b9b000 fffff800`00b95000 fffff800`00b9ac00 00000000`00000000 : nt!KiIdleLoop+0x5a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!WfppIncrementIndexAndPurgeEntries+93
    fffff880`01900713 48897008        mov     qword ptr [rax+8],rsi
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!WfppIncrementIndexAndPurgeEntries+93
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5294760d
    
    IMAGE_VERSION:  6.1.7601.18327
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!WfppIncrementIndexAndPurgeEntries+93
    
    BUCKET_ID:  X64_0xD1_NETIO!WfppIncrementIndexAndPurgeEntries+93
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0xd1_netio!wfppincrementindexandpurgeentries+93
    
    FAILURE_ID_HASH:  {57264696-559e-b8f0-6d97-e2633c3337e9}
    
    Followup: MachineOwner
    ---------
    Revo Uninstaller:

    Use Revo Uninstaller to uninstall stubborn software.


    Microsoft Security Essentials is recommended from a strict BSOD perspective, compatibility & stability compared to other internet security software. Malwarebytes is a great combo to MSE. They are free and lightweight.

    Also uninstall your existing Antivirus software before you install MSE.

    Good and Free system security combination.

       Warning
    Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.


     Clean boot


    Reduce items at start-up. No software except anti-virus is required plus doing this improves the time for logging into windows:

    Run the System File Checker that scans the of all protected Windows 7 system files and replaces incorrect corrupted, changed/modified, or damaged versions with the correct versions if possible:
    • Click on the
    • Type CMD on Search
    • Left click and Run as Administrator
    • Type SFC /scannow

    Full tutorial here:
      My Computer


  3. Posts : 4
    Windows 7 Home Premium 64 bit
    Thread Starter
       #3

    I have uninstalled Norton and the startup seems to run fine now. Thank you!

    Just out of curiosity, is there something that went bad in the registry that was causing norton to be difficult? Because I've had it installed for about 3 years now and never had a problem until now so I'm just wondering why it all the sudden stopped working.

    Thanks again though!
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 11:27.
Find Us