BSOD Win7 x62 Dell Sleep mode ?


  1. Posts : 4
    Windows 7 Home Basic sp1 64bit
       #1

    BSOD Win7 x64 Dell Sleep mode ?


    Hello,

    You guys seem to have a good record of solving these BSODs. I have had several Laptops in the last few years and have only experience the rare BSOD. My new Dell however has had 6 in the last couple days. The last two seemed to occur while in sleep mode.

    System Specs:
    Dell Inspiron 1545 GP8J2N1
    Windows 7 Home Basic sp1 64bit
    Pentium3 Dual-Core T4500 2.3Ghz
    RAM 2GB
    Mobile Intel(R) 4 Series Express Chipset
    SAMSUNG HM321HI 320GB

    All info is attached as requested.

    Hope you can find something in all this.

    Thanks in advance!

    Freedlun
    Last edited by Freedlun; 13 Jul 2011 at 10:04. Reason: typo :)
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

    Update your Realtek USB Mass Storage Driver and your Wireless card driver
    Drivers & Downloads
    Run a RAM test
    RAM - Test with Memtest86+

    Dumps also blame NETIO.sys and a McAfee software is the cause
    Remove such software and use MSE
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_POWER_STATE_FAILURE (9f)
    A driver is causing an inconsistent power state.
    Arguments:
    Arg1: 0000000000000004, The power transition timed out waiting to synchronize with the Pnp
        subsystem.
    Arg2: 0000000000000258, Timeout in seconds.
    Arg3: fffffa8001869680, The thread currently holding on to the Pnp lock.
    Arg4: fffff80000b9c4d0
    
    Debugging Details:
    ------------------
    
    
    DRVPOWERSTATE_SUBCODE:  4
    
    FAULTING_THREAD:  fffffa8001869680
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    BUGCHECK_STR:  0x9F
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff800030e2f92 to fffff800030e04da
    
    STACK_TEXT:  
    fffff880`031dc500 fffff800`030e2f92 : fffffa80`01869680 fffffa80`01869680 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x7a
    fffff880`031dc640 fffff800`030e57af : 00000000`00000000 00000000`00000000 fffff8a0`00000000 00000000`00000030 : nt!KiCommitThreadWait+0x1d2
    fffff880`031dc6d0 fffff800`033379c2 : fffff8a0`05214600 00000000`00000000 fffffa80`02400800 fffffa80`04c6db00 : nt!KeWaitForSingleObject+0x19f
    fffff880`031dc770 fffff800`034c4161 : fffffa80`03731a00 00000000`00000000 fffffa80`039c41f0 00000000`00000801 : nt! ?? ::NNGAKEGL::`string'+0x183fc
    fffff880`031dc7e0 fffff800`031d7173 : fffff8a0`032a7a80 fffff8a0`032a7a80 00000000`00000000 00000000`00000000 : nt!IopRemoveDevice+0x101
    fffff880`031dc8a0 fffff800`034c3cb4 : fffffa80`039c41f0 00000000`00000000 00000000`00000002 00000000`00000000 : nt!PnpRemoveLockedDeviceNode+0x1a3
    fffff880`031dc8f0 fffff800`034c3dc0 : 00000000`00000000 fffffa80`01fb3400 fffff8a0`0ac880f0 fffff800`032d9a60 : nt!PnpDeleteLockedDeviceNode+0x44
    fffff880`031dc920 fffff800`034c3eb9 : fffffa80`0294e002 fffffa80`0294e0e0 00000000`00000001 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xa0
    fffff880`031dc990 fffff800`034c4031 : fffffa80`0294e0e0 00000000`00000000 fffffa80`0294e0e0 00000000`00000009 : nt!PnpDelayedRemoveWorker+0x79
    fffff880`031dc9e0 fffff800`031d7399 : 00000000`00000008 fffffa80`024124e0 00000000`00000001 00000000`00000001 : nt!PnpChainDereferenceComplete+0x131
    fffff880`031dca20 fffff800`03554ff0 : 00000000`00000000 fffffa80`052b3d00 fffff8a0`0c09dbf0 00000000`00000001 : nt!PnpIsChainDereferenced+0xc9
    fffff880`031dcaa0 fffff800`0355528c : fffff880`031dcc78 00000000`00000000 fffff8a0`0505d100 fffffa80`00000000 : nt!PnpProcessQueryRemoveAndEject+0xff0
    fffff880`031dcbe0 fffff800`0343e54e : 00000000`00000000 fffffa80`05078e20 fffff8a0`0a871f20 00000000`00000001 : nt!PnpProcessTargetDeviceEvent+0x4c
    fffff880`031dcc10 fffff800`030e8021 : fffff800`033483c8 fffff8a0`0c09dbf0 fffff800`0327b2b8 fffffa80`01869680 : nt! ?? ::NNGAKEGL::`string'+0x5bf2b
    fffff880`031dcc70 fffff800`0337a32e : 00000000`00000000 fffffa80`01869680 00000000`00000080 fffffa80`01858040 : nt!ExpWorkerThread+0x111
    fffff880`031dcd00 fffff800`030cf666 : fffff880`009e7180 fffffa80`01869680 fffff880`009f1f40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`031dcd40 00000000`00000000 : fffff880`031dd000 fffff880`031d7000 fffff880`031dbb70 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    STACK_COMMAND:  .thread 0xfffffa8001869680 ; kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
        fffff800030e0803 - nt!SwapContext_PatchXSave+2
        [ 01:21 ]
        fffff800030e08e4 - nt!SwapContext_PatchXRstor+2 (+0xe1)
        [ 09:29 ]
        fffff800030e0aa3 - nt!EnlightenedSwapContext_PatchXSave+2 (+0x1bf)
        [ 01:21 ]
        fffff800030e0b86 - nt!EnlightenedSwapContext_PatchXRstor+2 (+0xe3)
        [ 09:29 ]
    4 errors : !nt (fffff800030e0803-fffff800030e0b86)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  ONE_BIT_LARGE
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
    
    Followup: memory_corruption
    ---------
    Code:
    PROCESS_NAME:  McSvHost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800030a1bc0
    
    STACK_TEXT:  
    fffff880`062387f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x50
      My Computer


  3. Posts : 4
    Windows 7 Home Basic sp1 64bit
    Thread Starter
       #3

    Thanks I am working on your suggestions. I'll let you know what happens.

    Thanks for the quick response!

    Scott
      My Computer


  4. Posts : 4
    Windows 7 Home Basic sp1 64bit
    Thread Starter
       #4

    So I have updated the two drivers and run the mem test (8-9 passes) with no errors.

    But there have been a few more BSODs, but these did not occur in conjunction with Sleep Mode. Last one was right in front of me!

    I am attaching the BSOD info.

    There were 6-7 more driver/program updates available from Dell and also Windows wants to update. Should I go ahead with all these or wait till this is figured out?
      My Computer


  5. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #5

    Still McAfee, it will still cause issues unless your remove(uninstall) it from your system
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001611b2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003313100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880031d4620 -- (.trap 0xfffff880031d4620)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880031d4840 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001611b2d rsp=fffff880031d47b0 rbp=fffff880031d48e0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa8002aa9060 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:0011:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800030e32a9 to fffff800030e3d00
    
    STACK_TEXT:  
    fffff880`031d44d8 fffff800`030e32a9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`031d44e0 fffff800`030e1f20 : fffff880`031d4678 fffff880`019117a2 00000000`00000000 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`031d4620 fffff880`01611b2d : ffff0000`02bf56fe 00000000`00000001 00000000`00000031 fffffa80`019f2b98 : nt!KiPageFault+0x260
    fffff880`031d47b0 fffff880`0195066c : 00000000`00000000 fffff880`0191f2d6 00000000`00000001 fffff880`018f7847 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`031d4810 fffff880`0191c8c3 : fffffa80`02aa9060 00000000`00000001 fffffa80`05487cf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d74f
    fffff880`031d4880 fffff880`0190f724 : fffff880`031d4d38 fffffa80`00000029 fffffa80`05487cf0 00000000`00000001 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`031d4a30 fffff880`0190e04a : fffffa80`02338630 fffff880`01906504 fffffa80`023382a0 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`031d4be0 fffff880`0190fc7b : fffffa80`02a0c8b2 fffffa80`02382000 00000000`00000000 fffff880`031d4f00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`031d4d30 fffff880`01906b97 : fffffa80`02338630 fffffa80`0233a5f0 fffffa80`0000826a 00000000`0000826a : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`031d4e00 fffff880`0190670a : 00000000`00000000 fffff880`01a22800 fffff880`031d4fc0 fffff880`03efc90c : tcpip!IppDeliverListToProtocol+0x97
    fffff880`031d4ec0 fffff880`01905d09 : fffffa80`00000001 00000000`00000000 fffffa80`01f87700 fffff880`031d4fb0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`031d4f60 fffff880`01903a7f : fffff880`01a22800 fffffa80`02a0c8a2 fffff880`01a22800 fffff880`01a22800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`031d5040 fffff880`01903072 : fffffa80`03a17170 00000000`00000000 fffffa80`03b48600 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`031d5240 fffff880`019833da : fffffa80`027e5050 fffffa80`01cc1298 fffffa80`03b486a0 fffffa80`01f9fca0 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`031d5320 fffff800`030f0668 : 00000000`c000000d fffffa80`01cc1298 fffffa80`01869b60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x568e2
    fffff880`031d5370 fffff880`01902bd2 : fffff880`01902430 fffffa80`03ea0009 fffffa80`03aa2300 fffffa80`01cc1201 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`031d5450 fffff880`017960eb : fffffa80`03b49010 00000000`00000000 fffffa80`027241a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`031d54c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
      My Computer


  6. Posts : 4
    Windows 7 Home Basic sp1 64bit
    Thread Starter
       #6

    So it is McAfee all together, not just a portion of it? Do you think reinstalling will help? Or are you saying that McAfee is just bad? I have been running it for years on several machines without ever having problems.
      My Computer


  7. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #7

    Freedlun said:
    So it is McAfee all together, not just a portion of it? Do you think reinstalling will help? Or are you saying that McAfee is just bad? I have been running it for years on several machines without ever having problems.
    Its not bad but it tends to cause issue, remove it completely and reinstall it. :)
    If your system still BSODs then you'll have to remove it permanently
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 23:42.
Find Us