BSOD: Driver IRQL Not less than or Equal Error


  1. Posts : 3
    Microsoft Windows 7 Home Premium 64-bit SP1
       #1

    BSOD: Driver IRQL Not less than or Equal Error


    Hi,
    I am getting random BSOD: Driver IRQL Not less than or Equal Error that I can't seem to rectify.

    It started occuring after using driver pack solution which has since been uninstalled.

    System specs and requested diagnostics tool info attached.

    Any help will be greatly appreciated.
    Last edited by RipperWSF; 23 Feb 2013 at 01:44.
      My Computer


  2. Posts : 3
    Microsoft Windows 7 Home Premium 64-bit SP1
    Thread Starter
       #2

    *update: Just did a windows repair and so far all good, fingers crossed.
      My Computer


  3. Posts : 15,026
    Windows 10 Home 64Bit
       #3

    Welcome to SF.
    Code:
    Start Menu\Programs\PC Tools Security	Public:Start Menu\Programs\PC Tools Security	Public
    Your BSOD was caused by Pc tools internet security so hopefully uninstalling this av should solve the problem.

    Code:
    fffff880`039c3f48  fffff880`03480d97*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
    *** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
     PctWfpFilter64+0x1dd97
    
    fffff880`039c3d38  fffff880`0343ee1aUnable to load image \??\C:\Windows\System32\drivers\pctgntdi64.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for pctgntdi64.sys
    *** ERROR: Module load completed but symbols could not be loaded for pctgntdi64.sys
     pctgntdi64+0x35e1a
       Tip
    Uninstall using Revo Uninstaller Free. Use Advanced Mode to uninstall so you can remove registry leftover of the software.
    Microsoft Security Essentials.

    Recommended from a strict BSOD perspective, compatibility & stability compared to other antiviruses/internet security software. It is free and lightweight:

       Warning
    Do not start the free trial of Malware Bytes; remember to deselect that option when prompted.

    Run a full scan with both (separately) once downloaded, installed and updated.

    Perform a System File Check to check the integrity of all protected Windows 7 :
    1. Click on the start
    2. Type CMD on Search
    3. Left click and Run as Administrator
    4. Type
      Code:
      SFC /scannow

    Full tutorial here:

    Disk Check on your hard drive for file system errors and bad sectors on it.

    Number down items at start-up. Keep only your anti-virus, this also improves the time for logging into windows.

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff88001c106fd}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001c106fd, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    OVERLAPPED_MODULE: Address regions for 'nvlddmkm' and 'nvlddmkm.sys' overlap
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310e100
    GetUlongFromAddress: unable to read from fffff8000310e1c0
     0000000000000028 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01c106fd 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880039c36f0 -- (.trap 0xfffff880039c36f0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880039c3910 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001c106fd rsp=fffff880039c3880 rbp=fffff880039c39b0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa800eb042c0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`01c106fd 448b5228        mov     r10d,dword ptr [rdx+28h] ds:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ed51e9 to fffff80002ed5c40
    
    STACK_TEXT:  
    fffff880`039c35a8 fffff800`02ed51e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`039c35b0 fffff800`02ed3e60 : 00000000`00007539 fffff880`039c31e2 00000000`00000000 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`039c36f0 fffff880`01c106fd : 00000000`00000000 00000000`000038d6 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`039c3880 fffff880`01ea591c : 00000000`00000002 fffff880`01e73f06 00000000`00000000 fffff880`0400600f : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`039c38e0 fffff880`01e71a23 : fffffa80`0eb042c0 00000000`00000000 fffffa80`16502500 00000000`59ba23ed : tcpip! ?? ::FNODOBFM::`string'+0x1ceef
    fffff880`039c3950 fffff880`01e62b44 : fffffa80`00000006 00000000`00000017 00000000`00007539 00000000`000031e2 : tcpip!TcpTcbCarefulDatagram+0x1aa3
    fffff880`039c3b00 fffff880`01e61fda : fffffa80`0a4d4900 fffff880`01e5aeb4 fffffa80`0a4b7538 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff880`039c3cb0 fffff880`01e6357b : fffffa80`0f2880a6 fffffa80`0a616000 00000000`00000000 fffff880`039c4000 : tcpip!TcpMatchReceive+0x1fa
    fffff880`039c3e00 fffff880`01e5b547 : fffffa80`0a4d4900 fffffa80`0a4931e2 fffffa80`00007539 00000000`00007539 : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`039c3ed0 fffff880`01e5b0ba : 00000000`00000000 fffff880`01f69800 fffff880`039c4090 fffff880`03485aa4 : tcpip!IppDeliverListToProtocol+0x97
    fffff880`039c3f90 fffff880`01e5a6b9 : fffff880`039c4158 00000000`00000000 fffff880`039c4058 fffff880`039c4080 : tcpip!IppProcessDeliverList+0x5a
    fffff880`039c4030 fffff880`01e5835f : 00000000`00000000 00000000`0d183b00 fffff880`01f69800 fffff880`01f69800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`039c4110 fffff880`01e57952 : fffffa80`0d1856b0 00000000`00000000 fffffa80`0d183b00 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`039c4310 fffff880`01ecad8a : fffffa80`00000000 fffffa80`14d21880 fffffa80`0d183b10 fffff880`039c4400 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`039c43f0 fffff800`02ee1968 : fffffa80`14d21880 fffffa80`0a4ebcec fffffa80`09d57b50 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x4f472
    fffff880`039c4440 fffff880`01e574b2 : fffff880`01e56d10 00000000`0000afd0 00000000`00000000 80000004`00000001 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`039c4520 fffff880`01d740eb : fffffa80`0d1858d0 00000000`00000000 fffffa80`0caf61a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`039c4590 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`01c106fd 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5034f6a0
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    Let us know the results.
      My Computer


  4. Posts : 3
    Microsoft Windows 7 Home Premium 64-bit SP1
    Thread Starter
       #4

    Thanks heaps, no BSOD's since uninstalling PC tools security.

    I was so close to doing a fresh install.
      My Computer


  5. Posts : 15,026
    Windows 10 Home 64Bit
       #5

    Be sure to post if you have any problems again :)
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 14:06.
Find Us