Problem Event Name: BlueScreen on a new system


  1. Posts : 2
    Windows 7 Ultimate x64
       #1

    Problem Event Name: BlueScreen on a new system


    Hi,

    I bought a new system with windows 7 home premium 64 bit operating system. Every now and then i am having this error,

    Problem Event Name: BlueScreen
    OS Version: 6.1.7601.2.1.0.768.3
    Locale ID: 1033

    Additional information about the problem:
    BCCode: d1
    BCP1: 0000000000000028
    BCP2: 0000000000000002
    BCP3: 0000000000000000
    BCP4: FFFFF8800173EB2D
    OS Version: 6_1_7601
    Service Pack: 1_0
    Product: 768_1

    Can anyone help me out ? I am attaching the minidump files with this message.

    Thanks
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

    Your McAfee antivirus caused these BSODs, remove it and use MSE

    Update any Logitech Mouse software http://www.logitech.com/en-us/support-downloads
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff8800173eb2d}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800173eb2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034cc100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0173eb2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880033c3520 -- (.trap 0xfffff880033c3520)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880033c3740 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800173eb2d rsp=fffff880033c36b0 rbp=fffff880033c37e0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa800b84b160 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`0173eb2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:0010:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800032991e9 to fffff80003299c40
    
    STACK_TEXT:  
    fffff880`033c33d8 fffff800`032991e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`033c33e0 fffff800`03297e60 : 00000000`00000000 fffff880`018b8872 00000000`00000000 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`033c3520 fffff880`0173eb2d : 00000000`00003fbc fffff880`01870fec 00000000`00000033 fffffa80`0c95b1b8 : nt!KiPageFault+0x260
    fffff880`033c36b0 fffff880`018f774c : 00000000`00000000 fffff880`018c63a6 00000000`00000001 fffff880`01a90240 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`033c3710 fffff880`018c3993 : fffffa80`0b84b160 00000000`00000001 fffffa80`0b585570 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d72f
    fffff880`033c3780 fffff880`018b67f4 : fffff880`033c3c38 00000000`00000029 fffffa80`0b585570 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`033c3930 fffff880`018b511a : fffffa80`04537a80 fffff880`018ad5d4 fffffa80`044e5790 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`033c3ae0 fffff880`018b6d4b : fffffa80`0b46c8b2 fffffa80`0464b140 00000000`00000000 fffff880`033c3e00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`033c3c30 fffff880`018adc67 : fffffa80`04537a80 fffffa80`0453bfee fffffa80`000043b9 00000000`000043b9 : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`033c3d00 fffff880`018ad7da : 00000000`00000000 fffff880`019c9800 fffff880`033c3ec0 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`033c3dc0 fffff880`018acdd9 : fffffa80`0773f4f0 fffff880`07e320e2 00000000`00000001 fffff880`033c3eb0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`033c3e60 fffff880`018aab4f : fffff880`019c9800 fffffa80`0b46c8a2 fffff880`019c9800 fffff880`019c9800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`033c3f40 fffff880`018aa142 : fffffa80`06cc07d0 00000000`00000000 fffffa80`06cbf400 00000000`00000002 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`033c4140 fffff880`0192a3ea : 00000000`00000000 00000000`00000000 fffffa80`06cbf400 fffffa80`0aa13a80 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`033c4220 fffff800`032a6618 : 00000000`00000000 00000000`00000000 fffffa80`039d9b60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x567f2
    fffff880`033c4270 fffff880`018a9ca2 : fffff880`018a9500 fffffa80`0af61b20 fffff880`019ce900 fffff880`018aee01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`033c4350 fffff880`016f90eb : fffffa80`06cc0010 00000000`00000000 fffffa80`04a961a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`033c43c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0173eb2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 2
    Windows 7 Ultimate x64
    Thread Starter
       #3

    Thank you for your reply. I'll check and respond back.

    Arvind
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 12:54.
Find Us