- Joined
- Jun 27, 2011
- Messages
- 2
- Reaction score
- 0
hi im new to the forums, but ive been experiencing this problem for about a week now, ive read many forums but im still not sure on what to do, to the extend of my knowledge ive updated all the audio,network drivers, my pc is a Aspire x3400 here is the dump file from the minidum, i was able to figure out when i run a torrent aplication like Utorrent, Bit Torrent, its when the BSOD pops, so i think it must be network related. THnx in advance.
Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\062611-17316-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17592.x86fre.win7sp1_gdr.110408-1631
Kernel base = 0x82e4a000 PsLoadedModuleList = 0x82f934d0
Debug session time: Sun Jun 26 19:03:21.757 2011 (GMT-5)
System Uptime: 2 days 10:16:07.146
Loading Kernel Symbols
................................................................................................................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {14, 2, 0, 8af5cbf2}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8af5cbf2, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb3848
Unable to read MiSystemVaType memory at 82f92e20
00000014
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1c
8af5cbf2 394614 cmp dword ptr [esi+14h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 8cf2754c -- (.trap 0xffffffff8cf2754c)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000044 edx=ffffffbc esi=00000000 edi=ffffffbc
eip=8af5cbf2 esp=8cf275c0 ebp=8cf275d0 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
NETIO!RtlCopyBufferToMdl+0x1c:
8af5cbf2 394614 cmp dword ptr [esi+14h],eax ds:0023:00000014=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8af5cbf2 to 82e8b5cb
STACK_TEXT:
8cf2754c 8af5cbf2 badb0d00 ffffffbc 00000002 nt!KiTrap0E+0x2cf
8cf275d0 8b07daf6 88332990 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
8cf27600 8b0cc6da 85b334c8 8cf27650 8cf2764c tcpip!TcpTcbReassemblyRetrieveSegments+0xad
8cf27694 8b0cad26 862a7c40 85b334c8 8cf276bc tcpip!TcpTcbCarefulDatagram+0x168a
8cf27700 8b0ae398 862a7c40 85b334c8 00f27774 tcpip!TcpTcbReceive+0x228
8cf27768 8b0aebca 85d26ee0 862ad000 00000000 tcpip!TcpMatchReceive+0x237
8cf277b8 8b0aec0b 862a7c40 862ad000 0000d8e2 tcpip!TcpPreValidatedReceive+0x293
8cf277d4 8b0a8f37 862a7c40 862ad000 8cf27810 tcpip!TcpReceive+0x2d
8cf277e4 8b0b116b 8cf277f8 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
8cf27810 8b0b0ab6 8b12c198 8cf27864 c000023e tcpip!IppDeliverListToProtocol+0x49
8cf27830 8b0aee78 8b12bfa8 00000006 8cf27864 tcpip!IppProcessDeliverList+0x2a
8cf27888 8b0b095f 8b12bfa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
8cf2791c 8b0bed8c 86992368 00000000 862b0d00 tcpip!IpFlcReceivePackets+0xbe5
8cf27998 8b0b93be 86996cf8 85a4c358 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
8cf279cc 82ed3644 85a4c358 a1493595 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
8cf27a34 8b0b952c 8b0b92a0 8cf27a5c 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
8cf27a70 8af0718d 86996c00 85a4c301 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
8cf27aa8 8aef55be 869a3aa8 85a4c358 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
8cf27ad0 8aef54b2 00000000 85a4c358 85d890e0 ndis!ndisIndicateSortedNetBufferLists+0x4a
8cf27c4c 8aea0c1d 85d890e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
8cf27c68 8aef5553 85d890e0 85a4c358 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
8cf27c90 8aea0c78 85d890e0 85a4c358 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
8cf27cb8 905356b7 85d890e0 85a4c358 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
8cf27cd8 90530730 86993e18 85a4c358 86993e18 tunnel!TeredoWfpIndicationWorker+0xa9
8cf27cec 8305e466 86993e18 90541c60 854204c0 tunnel!LwWorker+0x12
8cf27d00 82ec7aab 881743f0 00000000 854204c0 nt!IopProcessWorkItem+0x23
8cf27d50 83052f64 00000001 a1493231 00000000 nt!ExpWorkerThread+0x10d
8cf27d90 82efb219 82ec799e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1c
8af5cbf2 394614 cmp dword ptr [esi+14h],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78963
FAILURE_BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\062611-17316-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17592.x86fre.win7sp1_gdr.110408-1631
Kernel base = 0x82e4a000 PsLoadedModuleList = 0x82f934d0
Debug session time: Sun Jun 26 19:03:21.757 2011 (GMT-5)
System Uptime: 2 days 10:16:07.146
Loading Kernel Symbols
................................................................................................................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {14, 2, 0, 8af5cbf2}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8af5cbf2, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82fb3848
Unable to read MiSystemVaType memory at 82f92e20
00000014
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1c
8af5cbf2 394614 cmp dword ptr [esi+14h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 8cf2754c -- (.trap 0xffffffff8cf2754c)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000044 edx=ffffffbc esi=00000000 edi=ffffffbc
eip=8af5cbf2 esp=8cf275c0 ebp=8cf275d0 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
NETIO!RtlCopyBufferToMdl+0x1c:
8af5cbf2 394614 cmp dword ptr [esi+14h],eax ds:0023:00000014=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8af5cbf2 to 82e8b5cb
STACK_TEXT:
8cf2754c 8af5cbf2 badb0d00 ffffffbc 00000002 nt!KiTrap0E+0x2cf
8cf275d0 8b07daf6 88332990 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
8cf27600 8b0cc6da 85b334c8 8cf27650 8cf2764c tcpip!TcpTcbReassemblyRetrieveSegments+0xad
8cf27694 8b0cad26 862a7c40 85b334c8 8cf276bc tcpip!TcpTcbCarefulDatagram+0x168a
8cf27700 8b0ae398 862a7c40 85b334c8 00f27774 tcpip!TcpTcbReceive+0x228
8cf27768 8b0aebca 85d26ee0 862ad000 00000000 tcpip!TcpMatchReceive+0x237
8cf277b8 8b0aec0b 862a7c40 862ad000 0000d8e2 tcpip!TcpPreValidatedReceive+0x293
8cf277d4 8b0a8f37 862a7c40 862ad000 8cf27810 tcpip!TcpReceive+0x2d
8cf277e4 8b0b116b 8cf277f8 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
8cf27810 8b0b0ab6 8b12c198 8cf27864 c000023e tcpip!IppDeliverListToProtocol+0x49
8cf27830 8b0aee78 8b12bfa8 00000006 8cf27864 tcpip!IppProcessDeliverList+0x2a
8cf27888 8b0b095f 8b12bfa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
8cf2791c 8b0bed8c 86992368 00000000 862b0d00 tcpip!IpFlcReceivePackets+0xbe5
8cf27998 8b0b93be 86996cf8 85a4c358 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
8cf279cc 82ed3644 85a4c358 a1493595 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
8cf27a34 8b0b952c 8b0b92a0 8cf27a5c 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
8cf27a70 8af0718d 86996c00 85a4c301 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
8cf27aa8 8aef55be 869a3aa8 85a4c358 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
8cf27ad0 8aef54b2 00000000 85a4c358 85d890e0 ndis!ndisIndicateSortedNetBufferLists+0x4a
8cf27c4c 8aea0c1d 85d890e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
8cf27c68 8aef5553 85d890e0 85a4c358 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
8cf27c90 8aea0c78 85d890e0 85a4c358 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
8cf27cb8 905356b7 85d890e0 85a4c358 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
8cf27cd8 90530730 86993e18 85a4c358 86993e18 tunnel!TeredoWfpIndicationWorker+0xa9
8cf27cec 8305e466 86993e18 90541c60 854204c0 tunnel!LwWorker+0x12
8cf27d00 82ec7aab 881743f0 00000000 854204c0 nt!IopProcessWorkItem+0x23
8cf27d50 83052f64 00000001 a1493231 00000000 nt!ExpWorkerThread+0x10d
8cf27d90 82efb219 82ec799e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1c
8af5cbf2 394614 cmp dword ptr [esi+14h],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78963
FAILURE_BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
Followup: MachineOwner