BSOD 0x000000d1 IRQL NOT LESS OR EQUAL

Page 1 of 3 123 LastLast

  1. Posts : 53
    Windows 7 Home Premium 64 bit
       #1

    BSOD 0x000000d1 IRQL NOT LESS OR EQUAL


    My laptop is about 1 and a half months and my first BSOD occured 1 week after I bought it and has been happening ever since.
    I noticed that it happens when i download torrents or watch youtube videos.

    All of the minidumps blame ntoskrnl.exe and NETIO.sys but some of the BSODs seem to have also been cause by athrx.sys, tcpip.sys and tdx.sys.

    My laptop is a Lenovo ideapad z470.
    Win7 Home Premium 64bit.
    Intel Core i5-2430M CPU @ 2.40GHZ
    2GB DDR3 RAM + additional 2 GB installed.

    Attatched are the minidump files.
    Thanks.
      My Computer


  2. Posts : 507
    Windows 7 Ultimate x64 SP1
       #2

    Hello gabby02,
    I have checked your dump files and most of the crash related to Network I/O Subsystem.

    Bugcheck code = 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL
    It seems caused by 3rd driver (Network driver or Antivirus Driver)

    Start with remove/uninstall completely McAfee Antivirus, just use MSE and MBAM for virus protection.

    Then update your LAN driver (Realtek NIC driver) → click here

    After that we'll see how things go.


    LOG
    Code:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`0305b670
    Debug session time: Tue Dec 20 23:53:19.574 2011 (GMT-8)
    System Uptime: 0 days 3:51:22.838
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff8800171bb2d}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800171bb2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c5100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0171bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880033ca520 -- (.trap 0xfffff880033ca520)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800171bb2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa800421d170 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`0171bb2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:0011:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002e921e9 to fffff80002e92c40
    
    STACK_TEXT:  
    fffff880`033ca3d8 fffff800`02e921e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`033ca3e0 fffff800`02e90e60 : 00000000`00000001 fffff880`01943dd2 fffff880`01a53800 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`033ca520 fffff880`0171bb2d : ffff0000`0299870f 00000000`00000001 00000000`00000016 fffffa80`079c4f58 : nt!KiPageFault+0x260
    fffff880`033ca6b0 fffff880`01982bac : 00000000`00000000 fffff880`01951906 00000000`00000001 fffffa80`097577c0 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`033ca710 fffff880`0194eef3 : fffffa80`0421d170 00000000`00000001 fffffa80`09238220 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
    fffff880`033ca780 fffff880`01941d54 : fffff880`033cac38 00000000`00000029 fffffa80`09238220 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`033ca930 fffff880`0194067a : fffffa80`064c43a0 fffff880`01938b34 fffffa80`06355178 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`033caae0 fffff880`019422ab : fffffa80`08de2a3e fffffa80`064b1000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`033cac30 fffff880`019391c7 : fffffa80`064c43a0 fffffa80`063998f9 fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`033cad00 fffff880`01938d3a : 00000000`00000000 fffff880`01a53800 fffff880`033caec0 fffffa80`0471de20 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`033cadc0 fffff880`01938339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`033cae60 fffff880`019360af : 00000000`00000000 00000000`07410800 fffff880`01a53800 fffff880`01a53800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`033caf40 fffff880`019356a2 : fffffa80`0740f6e0 00000000`00000000 fffffa80`07410800 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`033cb140 fffff880`019b434a : fffff880`033cb6c0 fffff880`033cb248 fffffa80`07410810 fffff880`01619569 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`033cb220 fffff800`02e9f618 : fffffa80`06fc81a0 00000000`00000000 fffffa80`03b4bb60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
    fffff880`033cb270 fffff880`01935202 : fffff880`01934a60 00000000`00000002 fffff880`033cb300 fffff880`033cb301 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`033cb350 fffff880`016d60eb : fffffa80`07424240 00000000`00000000 fffffa80`06ec31a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0171bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmvm NETIO
    start             end                 module name
    fffff880`0170a000 fffff880`0176a000   NETIO      (pdb symbols)          c:\symbols\netio.pdb\DD06DDC1DE2F426D85400E127C2DF49A2\netio.pdb
        Loaded symbol image file: NETIO.SYS
        Mapped memory image file: C:\Symbols\NETIO.SYS\4CE7938160000\NETIO.SYS
        Image path: \SystemRoot\system32\drivers\NETIO.SYS
        Image name: NETIO.SYS
        Timestamp:        Sat Nov 20 01:23:13 2010 (4CE79381)
        CheckSum:         00066D17
        ImageSize:        00060000
        File version:     6.1.7601.17514
        Product version:  6.1.7601.17514
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        3.6 Driver
        File date:        00000000.00000000
        Translations:     0409.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     netio.sys
        OriginalFilename: netio.sys
        ProductVersion:   6.1.7601.17514
        FileVersion:      6.1.7601.17514 (win7sp1_rtm.101119-1850)
        FileDescription:  Network I/O Subsystem
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`03056670
    Debug session time: Tue Dec 20 07:29:06.875 2011 (GMT-8)
    System Uptime: 0 days 7:40:12.765
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff88001611b2d}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001611b2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c0100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880033ca520 -- (.trap 0xfffff880033ca520)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001611b2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa80095f0110 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:5e02:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002e8d1e9 to fffff80002e8dc40
    
    STACK_TEXT:  
    fffff880`033ca3d8 fffff800`02e8d1e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`033ca3e0 fffff800`02e8be60 : fffffa80`078f9948 fffff800`03018348 00000000`00000002 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`033ca520 fffff880`01611b2d : 00000000`0000001a fffff880`018ecfec 00000000`0000000d fffffa80`095071b8 : nt!KiPageFault+0x260
    fffff880`033ca6b0 fffff880`01974bac : 00000000`00000000 fffff880`01943906 00000000`00000001 fffffa80`09f75e40 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`033ca710 fffff880`01940ef3 : fffffa80`095f0110 00000000`00000001 fffffa80`09fc9cf0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
    fffff880`033ca780 fffff880`01933d54 : fffff880`033cac38 00000000`00000029 fffffa80`09fc9cf0 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`033ca930 fffff880`0193267a : fffffa80`06388f00 fffff880`0192ab34 fffffa80`06346808 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`033caae0 fffff880`019342ab : fffffa80`07635a3e fffffa80`064a1000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`033cac30 fffff880`0192b1c7 : fffffa80`06388f00 fffffa80`0638aef7 fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`033cad00 fffff880`0192ad3a : 00000000`00000000 fffff880`01a45800 fffff880`033caec0 fffffa80`09faca10 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`033cadc0 fffff880`0192a339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`033cae60 fffff880`019280af : 00000000`00000000 00000000`07227000 fffff880`01a45800 fffff880`01a45800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`033caf40 fffff880`019276a2 : fffffa80`072210b0 00000000`00000000 fffffa80`07227000 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`033cb140 fffff880`019a634a : fffff880`033cb490 00000000`00000000 fffffa80`07227010 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`033cb220 fffff800`02e9a618 : fffffa80`00000001 fffffa80`07736030 fffffa80`03b4bb60 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
    fffff880`033cb270 fffff880`01927202 : fffff880`01926a60 00000000`00000002 00000000`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`033cb350 fffff880`017750eb : fffffa80`07229010 00000000`00000000 fffffa80`06eea1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01611b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`02e66000 PsLoadedModuleList = 0xfffff800`030ab670
    Debug session time: Sat Jan  7 19:34:03.145 2012 (GMT-8)
    System Uptime: 0 days 3:47:02.035
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff8800172bb2d}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800172bb2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003115100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0172bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880033ca520 -- (.trap 0xfffff880033ca520)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880033ca740 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800172bb2d rsp=fffff880033ca6b0 rbp=fffff880033ca7e0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa800427c7d0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`0172bb2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:7f02:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ee21e9 to fffff80002ee2c40
    
    STACK_TEXT:  
    fffff880`033ca3d8 fffff800`02ee21e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`033ca3e0 fffff800`02ee0e60 : 00000000`00000000 fffff880`018c0dd2 ffffffff`ffffff02 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`033ca520 fffff880`0172bb2d : 00000000`000000ca fffff880`01877fec 00000000`0000000d fffffa80`076dfad8 : nt!KiPageFault+0x260
    fffff880`033ca6b0 fffff880`018ffbac : 00000000`00000000 fffff880`018ce906 00000000`00000001 fffffa80`04357f40 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`033ca710 fffff880`018cbef3 : fffffa80`0427c7d0 00000000`00000001 fffffa80`0736b250 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d5cf
    fffff880`033ca780 fffff880`018bed54 : fffff880`033cac38 00000000`00000029 fffffa80`0736b250 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`033ca930 fffff880`018bd67a : fffffa80`06374950 fffff880`018b5b34 fffffa80`04a84a60 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`033caae0 fffff880`018bf2ab : fffff880`08d066d2 fffffa80`06491000 00000000`00000000 fffff880`033cae00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`033cac30 fffff880`018b61c7 : fffffa80`06374950 fffffa80`06379cff fffffa80`0000cffc 00000000`0000cffc : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`033cad00 fffff880`018b5d3a : 00000000`00000000 fffff880`019d0800 fffff880`033caec0 fffffa80`0489de20 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`033cadc0 fffff880`018b5339 : 00000000`00000001 00000000`00000011 00000000`00000003 fffff880`033caeb0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`033cae60 fffff880`018b30af : 00000000`00000000 00000000`07215000 fffff880`019d0800 fffff880`019d0800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`033caf40 fffff880`018b26a2 : fffffa80`07219010 00000000`00000000 fffffa80`07215000 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`033cb140 fffff880`0193134a : fffff880`033cb490 00000000`00000000 fffffa80`07215010 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`033cb220 fffff800`02eef618 : 00000000`00000000 fffffa80`06d1d1a0 fffffa80`03b5b040 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x55122
    fffff880`033cb270 fffff880`018b2202 : fffff880`018b1a60 00000000`00000002 00000000`00000000 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`033cb350 fffff880`016e60eb : fffffa80`07216780 00000000`00000000 fffffa80`06d1d1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`033cb3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`0172bb2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmvm NETIO
    start             end                 module name
    fffff880`0171a000 fffff880`0177a000   NETIO      (pdb symbols)          c:\symbols\netio.pdb\DD06DDC1DE2F426D85400E127C2DF49A2\netio.pdb
        Loaded symbol image file: NETIO.SYS
        Mapped memory image file: C:\Symbols\NETIO.SYS\4CE7938160000\NETIO.SYS
        Image path: \SystemRoot\system32\drivers\NETIO.SYS
        Image name: NETIO.SYS
        Timestamp:        Sat Nov 20 01:23:13 2010 (4CE79381)
        CheckSum:         00066D17
        ImageSize:        00060000
        File version:     6.1.7601.17514
        Product version:  6.1.7601.17514
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        3.6 Driver
        File date:        00000000.00000000
        Translations:     0409.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     netio.sys
        OriginalFilename: netio.sys
        ProductVersion:   6.1.7601.17514
        FileVersion:      6.1.7601.17514 (win7sp1_rtm.101119-1850)
        FileDescription:  Network I/O Subsystem
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
      My Computer


  3. Posts : 53
    Windows 7 Home Premium 64 bit
    Thread Starter
       #3

    Thanks for your reply.
    I have uninstalled mcafee a long time ago.

    I just have a question. What exactly am I supposed to download? A lot of choices are coming up and I don't know which ones to choose. Sorry, I'm a dumbass when it comes to stuff like this.
      My Computer


  4. Posts : 507
    Windows 7 Ultimate x64 SP1
       #4

    gabby02 said:
    Thanks for your reply.
    I have uninstalled mcafee a long time ago.

    I just have a question. What exactly am I supposed to download? A lot of choices are coming up and I don't know which ones to choose. Sorry, I'm a dumbass when it comes to stuff like this.
    Please follow this instruction, so we can assist you better.
    We need more files beside the minidump file.
    https://www.sevenforums.com/crashes-d...tructions.html
      My Computer


  5. Posts : 53
    Windows 7 Home Premium 64 bit
    Thread Starter
       #5

    Have attached the additional files.
      My Computer


  6. Posts : 507
    Windows 7 Ultimate x64 SP1
       #6

    For your Realtek NIC driver → open the web page here
    Then navigate to 10/100M Fast Ethernet > PCI Express > Software
    After that choose → Win7 and WinServer 2008 R2 Auto Installation Program

    Also do you installed SUNBELT SOFTWARE(related to firewall/antirootkit)?
    If that's true, then try removing it for a while.
    navigate to folder:
    C:\windows\system32\drivers\SBREdrv.sys
    then rename SBREdrv.sys toSBREdrv.bak
    Reboot Windows to take effect
      My Computer


  7. Posts : 53
    Windows 7 Home Premium 64 bit
    Thread Starter
       #7

    Okay. I have downloaded and installed the NIC driver. Thanks for that.

    Yes, I used to have Vipre Antivirus from Sunbelt and I have uninstalled that ever since I got multiple BSODs. I have read somewhere that some antivirus products can cause BSODs so I uninstalled everything and got MSE.

    I have also renamed the file, like you said.

    I will wait and see what happens. Thanks for your help!
      My Computer


  8. Posts : 53
    Windows 7 Home Premium 64 bit
    Thread Starter
       #8

    Hey, so bad news. After installing the driver and renaming the file, I was able to run my laptop for about 3, maybe 4 days without a BSOD but I just got one right now. It's the same with the other ones. What do I do?
      My Computer


  9. Posts : 507
    Windows 7 Ultimate x64 SP1
       #9

    Attach the new files here
      My Computer


  10. Posts : 53
    Windows 7 Home Premium 64 bit
    Thread Starter
       #10

    Sorry, but what new files? Just the new mini dump or do I have to post everything again?
      My Computer


 
Page 1 of 3 123 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:24.
Find Us