BSOD (with utorrent I think), error 0x000000d1

Page 2 of 3 FirstFirst 123 LastLast

  1. Posts : 14
    Windows 7 Home Premium 64bit
    Thread Starter
       #11

    koolkat77 said:
    Hmm,
    Enable Driver Verifier:
    Driver Verifier - Enable and Disable
    I enabled driver verifier as the instructions in the thread. The blue screen still occurs.

    Btw, the first time I enabled driver verifier, the blue screen occurred during the startup of windows due to dtsoftbus01.sys. I uninstalled daemon tools lite then.
      My Computer


  2. Posts : 14
    Windows 7 Home Premium 64bit
    Thread Starter
       #12

    I tried running 4 torrents at the same time and no BS for about 6 hours. I usually have 8 torrents running at the same moment.
      My Computer


  3. Posts : 15,026
    Windows 10 Home 64Bit
       #13

    OK.
    Upload any dumps you get with verifier enabled
      My Computer


  4. Posts : 14
    Windows 7 Home Premium 64bit
    Thread Starter
       #14

    Here is the dump. Thanks.
    Does it matter that I didn't grab the information after the first reboot after the BS?
      My Computer


  5. Posts : 15,026
    Windows 10 Home 64Bit
       #15

    Since you removed daemon tools, from the verifier bsods I think I'd just say you to see how your computer performs now. If there are more BSoDs, upload them here. (Upload newest only)
      My Computer


  6. Posts : 14
    Windows 7 Home Premium 64bit
    Thread Starter
       #16

    There was a BSOD after I removed daemon tools. But I didn't grab the dump right after the reboot. I will upload new one if another BSOD occurs. Thank you.
      My Computer


  7. Posts : 14
    Windows 7 Home Premium 64bit
    Thread Starter
       #17

    BSOD again...
      My Computer


  8. Posts : 15,026
    Windows 10 Home 64Bit
       #18

    Caused by the same thing.. NETIO.sys.
    You kept verifier enabled all this while?
      My Computer


  9. Posts : 14
    Windows 7 Home Premium 64bit
    Thread Starter
       #19

    Yes. But NETIO.sys was not in the list.
      My Computer


  10. Posts : 15,026
    Windows 10 Home 64Bit
       #20

    It is:

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff880019256fd}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    Followup: MachineOwner
    ---------
    
    7: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880019256fd, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb2100
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`019256fd 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff8800378b6f0 -- (.trap 0xfffff8800378b6f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8800378b910 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880019256fd rsp=fffff8800378b880 rbp=fffff8800378b9b0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa8007015bb0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`019256fd 448b5228        mov     r10d,dword ptr [rdx+28h] ds:07c5:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c82569 to fffff80002c82fc0
    
    STACK_TEXT:  
    fffff880`0378b5a8 fffff800`02c82569 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0378b5b0 fffff800`02c811e0 : fffff6fc`c00cef10 00000000`00000000 fffff980`19de2e90 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`0378b6f0 fffff880`019256fd : 00000000`000000d2 fffff880`01a141ac 00000000`00000011 fffffa80`0e2439a8 : nt!KiPageFault+0x260
    fffff880`0378b880 fffff880`01aa1c1c : 00000000`00000000 fffff880`01a702e6 00000000`00000000 fffff880`0467500f : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`0378b8e0 fffff880`01a6de18 : fffffa80`07015bb0 00000000`00000000 fffffa80`0e631410 00000000`038c527b : tcpip! ?? ::FNODOBFM::`string'+0x1d16f
    fffff880`0378b950 fffff880`01a5f1c4 : fffff880`0378be08 fffff880`00000029 fffffa80`0e631410 00000000`00000001 : tcpip!TcpTcbCarefulDatagram+0x1a98
    fffff880`0378bb00 fffff880`01a5e65a : fffffa80`078d6a00 fffff880`01a57544 fffffa80`0785ac40 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`0378bcb0 fffff880`01a5fbfb : fffff880`031960f8 fffffa80`08c5a000 00000000`00000000 fffff880`0378c000 : tcpip!TcpMatchReceive+0x1fa
    fffff880`0378be00 fffff880`01a57bd7 : fffffa80`078d6a00 fffffa80`078d1fec fffffa80`0000c3fc 00000000`0000c3fc : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`0378bed0 fffff880`01a5774a : 00000000`00000000 fffff880`01b69800 fffff880`0378c090 00000030`00000008 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`0378bf90 fffff880`01a56d49 : 00000000`00000003 fffff880`0378c9d8 fffff880`0378c1c8 fffff880`0378c080 : tcpip!IppProcessDeliverList+0x5a
    fffff880`0378c030 fffff880`01a54abf : 00000000`00000000 00000000`0a760000 fffff880`01b69800 fffff880`01b69800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`0378c110 fffff880`01a540b2 : fffffa80`0a7622d0 00000000`00000000 fffffa80`0a760000 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`0378c310 fffff880`01acac9a : 00000000`00000000 fffff880`01964444 fffffa80`0a760010 fffff880`01915000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`0378c3f0 fffff800`02c8ec48 : 00000000`00000003 00000000`00000000 fffffa80`05b32b50 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x50b52
    fffff880`0378c440 fffff880`01a53c12 : fffff880`01a53470 0053002b`002b0010 00000202`00180000 fffffa80`0db42201 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`0378c520 fffff880`018e10eb : fffff980`043cc8d0 00000000`00000000 fffffa80`0a0821a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`0378c590 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`019256fd 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5034f6a0
    
    FAILURE_BUCKET_ID:  X64_0xD1_VRF_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_VRF_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    I'd suggest you to do a Clean Install Windows 7
    I'm sure this should eliminate all the problems
      My Computer


 
Page 2 of 3 FirstFirst 123 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:32.
Find Us