locked
regarding blue screen in windows 7 RRS feed

  • Question

  • here i'm attaching my dump file please give a fix for this problem

    Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Windows\Minidump\051411-34367-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: C:\Users\dheeraj\Desktop;C:\Program Files\Debugging Tools for Windows (x86)
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17592.x86fre.win7sp1_gdr.110408-1631
    Machine Name:
    Kernel base = 0x83c38000 PsLoadedModuleList = 0x83d814d0
    Debug session time: Sat May 14 06:56:50.460 2011 (UTC + 5:30)
    System Uptime: 0 days 0:08:01.380
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                       *
    *            Bugcheck Analysis                  *
    *                                       *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {14, 2, 0, 89f65bf2}
    
    Unable to load image \SystemRoot\system32\DRIVERS\mfenlfk.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for mfenlfk.sys
    *** ERROR: Module load completed but symbols could not be loaded for mfenlfk.sys
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1c )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                       *
    *            Bugcheck Analysis                  *
    *                                       *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000014, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 89f65bf2, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 83da1848
    Unable to read MiSystemVaType memory at 83d80e20
     00000014 
    
    CURRENT_IRQL: 2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax
    
    CUSTOMER_CRASH_COUNT: 1
    
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    
    BUGCHECK_STR: 0xD1
    
    PROCESS_NAME: System
    
    TRAP_FRAME: 8bf17488 -- (.trap 0xffffffff8bf17488)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=00000044 edx=ffffffbc esi=00000000 edi=ffffffbc
    eip=89f65bf2 esp=8bf174fc ebp=8bf1750c iopl=0     nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000       efl=00010246
    NETIO!RtlCopyBufferToMdl+0x1c:
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax ds:0023:00000014=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER: from 89f65bf2 to 83c795cb
    
    STACK_TEXT: 
    8bf17488 89f65bf2 badb0d00 ffffffbc 00000001 nt!KiTrap0E+0x2cf
    8bf1750c 8a056aea 861f6db0 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
    8bf1753c 8a0a5652 86526df8 8bf1758c 8bf17588 tcpip!TcpTcbReassemblyRetrieveSegments+0xad
    8bf175d0 8a0a3c9e 86bf5eb8 86526df8 8bf175f8 tcpip!TcpTcbCarefulDatagram+0x168a
    8bf1763c 8a0872d8 86bf5eb8 86526df8 00f176b0 tcpip!TcpTcbReceive+0x228
    8bf176a4 8a087b0a 86bc83c0 86be8000 00000000 tcpip!TcpMatchReceive+0x237
    8bf176f4 8a087b4b 86bf5eb8 86be8000 0000cac5 tcpip!TcpPreValidatedReceive+0x293
    8bf17710 8a081e77 86bf5eb8 86be8000 8bf1774c tcpip!TcpReceive+0x2d
    8bf17720 8a08a0ab 8bf17734 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    8bf1774c 8a0899f6 8a105198 8bf177a0 c000023e tcpip!IppDeliverListToProtocol+0x49
    8bf1776c 8a087db8 8a104fa8 00000006 8bf177a0 tcpip!IppProcessDeliverList+0x2a
    8bf177c4 8a08989f 8a104fa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
    8bf17858 8a097ccc 86f956b8 00000000 00000000 tcpip!IpFlcReceivePackets+0xbe5
    8bf178d4 8a0922fe 86f98500 862b10b0 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
    8bf17908 83cc1644 862b10b0 a90289ef 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
    8bf17970 8a09246c 8a0921e0 8bf17998 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    8bf179ac 89f1018d 86f98500 862b1001 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
    8bf179e4 89efe5be 86f91aa8 862b10b0 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
    8bf17a0c 89efe4b2 00000000 86f96438 00000001 ndis!ndisIndicateSortedNetBufferLists+0x4a
    8bf17b88 89ea9c1d 86e660e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
    8bf17ba4 89eda56a 86e660e0 862b10b0 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    8bf17bc0 89eda504 86f95928 862b10b0 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
    8bf17bdc 8eeb3ed2 86f95928 862b10b0 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8bf17c68 89efe553 86f96438 862b10b0 00000000 mfenlfk+0xed2
    8bf17c90 89ea9c78 86e660e0 862b10b0 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
    8bf17cb8 8ee166b7 86e660e0 862b10b0 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
    8bf17cd8 8ee11730 86f9b518 862b10b0 86f9b518 tunnel!TeredoWfpIndicationWorker+0xa9
    8bf17cec 83e4c466 86f9b518 8ee22838 85eafa70 tunnel!LwWorker+0x12
    8bf17d00 83cb5aab 88765de8 00000000 85eafa70 nt!IopProcessWorkItem+0x23
    8bf17d50 83e40f64 00000001 a9028d0f 00000000 nt!ExpWorkerThread+0x10d
    8bf17d90 83ce9219 83cb599e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND: kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax
    
    SYMBOL_STACK_INDEX: 1
    
    SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1c
    
    FOLLOWUP_NAME: MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME: NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78963
    
    FAILURE_BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
    
    BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                       *
    *            Bugcheck Analysis                  *
    *                                       *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000014, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 89f65bf2, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 83da1848
    Unable to read MiSystemVaType memory at 83d80e20
     00000014 
    
    CURRENT_IRQL: 2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax
    
    CUSTOMER_CRASH_COUNT: 1
    
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    
    BUGCHECK_STR: 0xD1
    
    PROCESS_NAME: System
    
    TRAP_FRAME: 8bf17488 -- (.trap 0xffffffff8bf17488)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=00000044 edx=ffffffbc esi=00000000 edi=ffffffbc
    eip=89f65bf2 esp=8bf174fc ebp=8bf1750c iopl=0     nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000       efl=00010246
    NETIO!RtlCopyBufferToMdl+0x1c:
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax ds:0023:00000014=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER: from 89f65bf2 to 83c795cb
    
    STACK_TEXT: 
    8bf17488 89f65bf2 badb0d00 ffffffbc 00000001 nt!KiTrap0E+0x2cf
    8bf1750c 8a056aea 861f6db0 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
    8bf1753c 8a0a5652 86526df8 8bf1758c 8bf17588 tcpip!TcpTcbReassemblyRetrieveSegments+0xad
    8bf175d0 8a0a3c9e 86bf5eb8 86526df8 8bf175f8 tcpip!TcpTcbCarefulDatagram+0x168a
    8bf1763c 8a0872d8 86bf5eb8 86526df8 00f176b0 tcpip!TcpTcbReceive+0x228
    8bf176a4 8a087b0a 86bc83c0 86be8000 00000000 tcpip!TcpMatchReceive+0x237
    8bf176f4 8a087b4b 86bf5eb8 86be8000 0000cac5 tcpip!TcpPreValidatedReceive+0x293
    8bf17710 8a081e77 86bf5eb8 86be8000 8bf1774c tcpip!TcpReceive+0x2d
    8bf17720 8a08a0ab 8bf17734 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    8bf1774c 8a0899f6 8a105198 8bf177a0 c000023e tcpip!IppDeliverListToProtocol+0x49
    8bf1776c 8a087db8 8a104fa8 00000006 8bf177a0 tcpip!IppProcessDeliverList+0x2a
    8bf177c4 8a08989f 8a104fa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
    8bf17858 8a097ccc 86f956b8 00000000 00000000 tcpip!IpFlcReceivePackets+0xbe5
    8bf178d4 8a0922fe 86f98500 862b10b0 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
    8bf17908 83cc1644 862b10b0 a90289ef 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
    8bf17970 8a09246c 8a0921e0 8bf17998 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    8bf179ac 89f1018d 86f98500 862b1001 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
    8bf179e4 89efe5be 86f91aa8 862b10b0 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
    8bf17a0c 89efe4b2 00000000 86f96438 00000001 ndis!ndisIndicateSortedNetBufferLists+0x4a
    8bf17b88 89ea9c1d 86e660e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
    8bf17ba4 89eda56a 86e660e0 862b10b0 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    8bf17bc0 89eda504 86f95928 862b10b0 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
    8bf17bdc 8eeb3ed2 86f95928 862b10b0 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8bf17c68 89efe553 86f96438 862b10b0 00000000 mfenlfk+0xed2
    8bf17c90 89ea9c78 86e660e0 862b10b0 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
    8bf17cb8 8ee166b7 86e660e0 862b10b0 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
    8bf17cd8 8ee11730 86f9b518 862b10b0 86f9b518 tunnel!TeredoWfpIndicationWorker+0xa9
    8bf17cec 83e4c466 86f9b518 8ee22838 85eafa70 tunnel!LwWorker+0x12
    8bf17d00 83cb5aab 88765de8 00000000 85eafa70 nt!IopProcessWorkItem+0x23
    8bf17d50 83e40f64 00000001 a9028d0f 00000000 nt!ExpWorkerThread+0x10d
    8bf17d90 83ce9219 83cb599e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND: kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax
    
    SYMBOL_STACK_INDEX: 1
    
    SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1c
    
    FOLLOWUP_NAME: MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME: NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78963
    
    FAILURE_BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
    
    BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                       *
    *            Bugcheck Analysis                  *
    *                                       *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000014, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 89f65bf2, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 83da1848
    Unable to read MiSystemVaType memory at 83d80e20
     00000014 
    
    CURRENT_IRQL: 2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax
    
    CUSTOMER_CRASH_COUNT: 1
    
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    
    BUGCHECK_STR: 0xD1
    
    PROCESS_NAME: System
    
    TRAP_FRAME: 8bf17488 -- (.trap 0xffffffff8bf17488)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=00000044 edx=ffffffbc esi=00000000 edi=ffffffbc
    eip=89f65bf2 esp=8bf174fc ebp=8bf1750c iopl=0     nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000       efl=00010246
    NETIO!RtlCopyBufferToMdl+0x1c:
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax ds:0023:00000014=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER: from 89f65bf2 to 83c795cb
    
    STACK_TEXT: 
    8bf17488 89f65bf2 badb0d00 ffffffbc 00000001 nt!KiTrap0E+0x2cf
    8bf1750c 8a056aea 861f6db0 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
    8bf1753c 8a0a5652 86526df8 8bf1758c 8bf17588 tcpip!TcpTcbReassemblyRetrieveSegments+0xad
    8bf175d0 8a0a3c9e 86bf5eb8 86526df8 8bf175f8 tcpip!TcpTcbCarefulDatagram+0x168a
    8bf1763c 8a0872d8 86bf5eb8 86526df8 00f176b0 tcpip!TcpTcbReceive+0x228
    8bf176a4 8a087b0a 86bc83c0 86be8000 00000000 tcpip!TcpMatchReceive+0x237
    8bf176f4 8a087b4b 86bf5eb8 86be8000 0000cac5 tcpip!TcpPreValidatedReceive+0x293
    8bf17710 8a081e77 86bf5eb8 86be8000 8bf1774c tcpip!TcpReceive+0x2d
    8bf17720 8a08a0ab 8bf17734 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    8bf1774c 8a0899f6 8a105198 8bf177a0 c000023e tcpip!IppDeliverListToProtocol+0x49
    8bf1776c 8a087db8 8a104fa8 00000006 8bf177a0 tcpip!IppProcessDeliverList+0x2a
    8bf177c4 8a08989f 8a104fa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
    8bf17858 8a097ccc 86f956b8 00000000 00000000 tcpip!IpFlcReceivePackets+0xbe5
    8bf178d4 8a0922fe 86f98500 862b10b0 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
    8bf17908 83cc1644 862b10b0 a90289ef 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
    8bf17970 8a09246c 8a0921e0 8bf17998 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    8bf179ac 89f1018d 86f98500 862b1001 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
    8bf179e4 89efe5be 86f91aa8 862b10b0 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
    8bf17a0c 89efe4b2 00000000 86f96438 00000001 ndis!ndisIndicateSortedNetBufferLists+0x4a
    8bf17b88 89ea9c1d 86e660e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
    8bf17ba4 89eda56a 86e660e0 862b10b0 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    8bf17bc0 89eda504 86f95928 862b10b0 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
    8bf17bdc 8eeb3ed2 86f95928 862b10b0 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8bf17c68 89efe553 86f96438 862b10b0 00000000 mfenlfk+0xed2
    8bf17c90 89ea9c78 86e660e0 862b10b0 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
    8bf17cb8 8ee166b7 86e660e0 862b10b0 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
    8bf17cd8 8ee11730 86f9b518 862b10b0 86f9b518 tunnel!TeredoWfpIndicationWorker+0xa9
    8bf17cec 83e4c466 86f9b518 8ee22838 85eafa70 tunnel!LwWorker+0x12
    8bf17d00 83cb5aab 88765de8 00000000 85eafa70 nt!IopProcessWorkItem+0x23
    8bf17d50 83e40f64 00000001 a9028d0f 00000000 nt!ExpWorkerThread+0x10d
    8bf17d90 83ce9219 83cb599e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND: kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    89f65bf2 394614     cmp   dword ptr [esi+14h],eax
    
    SYMBOL_STACK_INDEX: 1
    
    SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1c
    
    FOLLOWUP_NAME: MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME: NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78963
    
    FAILURE_BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
    
    BUCKET_ID: 0xD1_NETIO!RtlCopyBufferToMdl+1c
    
    Followup: MachineOwner
    ---------
    

    Saturday, May 14, 2011 3:18 AM

Answers

  • 0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000014, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 8a147bf2, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from 84183848
    Unable to read MiSystemVaType memory at 84162e20
     00000014 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    8a147bf2 394614          cmp     dword ptr [esi+14h],eax
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xD1
    PROCESS_NAME:  System
    TRAP_FRAME:  8c12b488 -- (.trap 0xffffffff8c12b488)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=00000044 edx=ffffffbc esi=00000000 edi=ffffffbc
    eip=8a147bf2 esp=8c12b4fc ebp=8c12b50c iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    NETIO!RtlCopyBufferToMdl+0x1c:
    8a147bf2 394614          cmp     dword ptr [esi+14h],eax ds:0023:00000014=????????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from 8a147bf2 to 8405b5cb
    STACK_TEXT:  
    8c12b488 8a147bf2 badb0d00 ffffffbc 00000001 nt!KiTrap0E+0x2cf
    8c12b50c 8a273aea 88e45960 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
    8c12b53c 8a2c2652 8654e540 8c12b58c 8c12b588 tcpip!TcpTcbReassemblyRetrieveSegments+0xad
    8c12b5d0 8a2c0c9e 86df3e00 8654e540 8c12b5f8 tcpip!TcpTcbCarefulDatagram+0x168a
    8c12b63c 8a2a42d8 86df3e00 8654e540 0012b6b0 tcpip!TcpTcbReceive+0x228
    8c12b6a4 8a2a4b0a 86dc5fb8 86de5000 00000000 tcpip!TcpMatchReceive+0x237
    8c12b6f4 8a2a4b4b 86df3e00 86de5000 00006ff2 tcpip!TcpPreValidatedReceive+0x293
    8c12b710 8a29ee77 86df3e00 86de5000 8c12b74c tcpip!TcpReceive+0x2d
    8c12b720 8a2a70ab 8c12b734 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    8c12b74c 8a2a69f6 8a322198 8c12b7a0 c000023e tcpip!IppDeliverListToProtocol+0x49
    8c12b76c 8a2a4db8 8a321fa8 00000006 8c12b7a0 tcpip!IppProcessDeliverList+0x2a
    8c12b7c4 8a2a689f 8a321fa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
    8c12b858 8a2b4ccc 8722cfb0 00000000 00000000 tcpip!IpFlcReceivePackets+0xbe5
    8c12b8d4 8a2af2fe 8722a410 873fdab0 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
    8c12b908 840a3644 873fdab0 aef035df 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
    8c12b970 8a2af46c 8a2af1e0 8c12b998 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    8c12b9ac 8a0f218d 8722a400 873fda01 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
    8c12b9e4 8a0e05be 8722b008 873fdab0 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
    8c12ba0c 8a0e04b2 00000000 87229758 00000001 ndis!ndisIndicateSortedNetBufferLists+0x4a
    8c12bb88 8a08bc1d 870590e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
    8c12bba4 8a0bc56a 870590e0 873fdab0 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    8c12bbc0 8a0bc504 87227688 873fdab0 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
    8c12bbdc 8f2b5ed2 87227688 873fdab0 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8c12bc68 8a0e0553 87229758 873fdab0 00000000 mfenlfk+0xed2
    8c12bc90 8a08bc78 870590e0 873fdab0 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
    8c12bcb8 8f2166b7 870590e0 873fdab0 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
    8c12bcd8 8f211730 87227030 873fdab0 87227030 tunnel!TeredoWfpIndicationWorker+0xa9
    8c12bcec 8422e466 87227030 8f222de8 860ae020 tunnel!LwWorker+0x12
    8c12bd00 84097aab 88bc4ad8 00000000 860ae020 nt!IopProcessWorkItem+0x23
    8c12bd50 84222f64 00000001 aef0313f 00000000 nt!ExpWorkerThread+0x10d
    8c12bd90 840cb219 8409799e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    8a147bf2 394614          cmp     dword ptr [esi+14h],eax
    SYMBOL_STACK_INDEX:  1
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1c
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: NETIO
    IMAGE_NAME:  NETIO.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78963
    FAILURE_BUCKET_ID:  0xD1_NETIO!RtlCopyBufferToMdl+1c
    BUCKET_ID:  0xD1_NETIO!RtlCopyBufferToMdl+1c
    Followup: MachineOwner
    ---------
    _____________________________________________________________
    Hello,
    I see that McCafee (mfenlfk.sys) is running and I suspect that it is the cause.
    Please uninstall it and use MSE and check again.

    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration

    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration

    • Marked as answer by Leo Huang Thursday, May 26, 2011 8:37 AM
    Monday, May 23, 2011 7:12 AM

All replies

  • Bug Check Code 0xD1: http://msdn.microsoft.com/en-us/library/ff560244(VS.85).aspx

    Update NIC drivers and check again.

    You can also contact Microsoft CSS for that.

     


    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration

    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration

    Saturday, May 14, 2011 3:09 PM
  • i have done everything but still the problem is there. and i am getting this problem only in the mornings

     

    Monday, May 16, 2011 3:45 PM
  • Please configure your Windows to generate a full dump. Once done, use Microsoft Skydrive to upload MEMORY.DMP at the next crash (You can use 7ZIP to compress it).

    You can also contact Microsoft CSS.

     


    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration

    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration

    Monday, May 16, 2011 6:18 PM
  • here i am giving my latest dump file

    please check this and provide a solution

    http://cid-d2ca622287f2676e.office.live.com/self.aspx/.Public/052211-22651-01.dmp

    Monday, May 23, 2011 2:42 AM
  • 0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000014, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 8a147bf2, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from 84183848
    Unable to read MiSystemVaType memory at 84162e20
     00000014 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    8a147bf2 394614          cmp     dword ptr [esi+14h],eax
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xD1
    PROCESS_NAME:  System
    TRAP_FRAME:  8c12b488 -- (.trap 0xffffffff8c12b488)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=00000044 edx=ffffffbc esi=00000000 edi=ffffffbc
    eip=8a147bf2 esp=8c12b4fc ebp=8c12b50c iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    NETIO!RtlCopyBufferToMdl+0x1c:
    8a147bf2 394614          cmp     dword ptr [esi+14h],eax ds:0023:00000014=????????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from 8a147bf2 to 8405b5cb
    STACK_TEXT:  
    8c12b488 8a147bf2 badb0d00 ffffffbc 00000001 nt!KiTrap0E+0x2cf
    8c12b50c 8a273aea 88e45960 00000000 ffffffbc NETIO!RtlCopyBufferToMdl+0x1c
    8c12b53c 8a2c2652 8654e540 8c12b58c 8c12b588 tcpip!TcpTcbReassemblyRetrieveSegments+0xad
    8c12b5d0 8a2c0c9e 86df3e00 8654e540 8c12b5f8 tcpip!TcpTcbCarefulDatagram+0x168a
    8c12b63c 8a2a42d8 86df3e00 8654e540 0012b6b0 tcpip!TcpTcbReceive+0x228
    8c12b6a4 8a2a4b0a 86dc5fb8 86de5000 00000000 tcpip!TcpMatchReceive+0x237
    8c12b6f4 8a2a4b4b 86df3e00 86de5000 00006ff2 tcpip!TcpPreValidatedReceive+0x293
    8c12b710 8a29ee77 86df3e00 86de5000 8c12b74c tcpip!TcpReceive+0x2d
    8c12b720 8a2a70ab 8c12b734 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    8c12b74c 8a2a69f6 8a322198 8c12b7a0 c000023e tcpip!IppDeliverListToProtocol+0x49
    8c12b76c 8a2a4db8 8a321fa8 00000006 8c12b7a0 tcpip!IppProcessDeliverList+0x2a
    8c12b7c4 8a2a689f 8a321fa8 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1fb
    8c12b858 8a2b4ccc 8722cfb0 00000000 00000000 tcpip!IpFlcReceivePackets+0xbe5
    8c12b8d4 8a2af2fe 8722a410 873fdab0 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
    8c12b908 840a3644 873fdab0 aef035df 00000000 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
    8c12b970 8a2af46c 8a2af1e0 8c12b998 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    8c12b9ac 8a0f218d 8722a400 873fda01 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
    8c12b9e4 8a0e05be 8722b008 873fdab0 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
    8c12ba0c 8a0e04b2 00000000 87229758 00000001 ndis!ndisIndicateSortedNetBufferLists+0x4a
    8c12bb88 8a08bc1d 870590e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
    8c12bba4 8a0bc56a 870590e0 873fdab0 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    8c12bbc0 8a0bc504 87227688 873fdab0 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
    8c12bbdc 8f2b5ed2 87227688 873fdab0 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8c12bc68 8a0e0553 87229758 873fdab0 00000000 mfenlfk+0xed2
    8c12bc90 8a08bc78 870590e0 873fdab0 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
    8c12bcb8 8f2166b7 870590e0 873fdab0 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
    8c12bcd8 8f211730 87227030 873fdab0 87227030 tunnel!TeredoWfpIndicationWorker+0xa9
    8c12bcec 8422e466 87227030 8f222de8 860ae020 tunnel!LwWorker+0x12
    8c12bd00 84097aab 88bc4ad8 00000000 860ae020 nt!IopProcessWorkItem+0x23
    8c12bd50 84222f64 00000001 aef0313f 00000000 nt!ExpWorkerThread+0x10d
    8c12bd90 840cb219 8409799e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1c
    8a147bf2 394614          cmp     dword ptr [esi+14h],eax
    SYMBOL_STACK_INDEX:  1
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1c
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: NETIO
    IMAGE_NAME:  NETIO.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce78963
    FAILURE_BUCKET_ID:  0xD1_NETIO!RtlCopyBufferToMdl+1c
    BUCKET_ID:  0xD1_NETIO!RtlCopyBufferToMdl+1c
    Followup: MachineOwner
    ---------
    _____________________________________________________________
    Hello,
    I see that McCafee (mfenlfk.sys) is running and I suspect that it is the cause.
    Please uninstall it and use MSE and check again.

    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration

    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration

    • Marked as answer by Leo Huang Thursday, May 26, 2011 8:37 AM
    Monday, May 23, 2011 7:12 AM
  • thanks for ur reply sir.

    i have uninstalled mcafee and checked the issue. now the has got intensified

    this blue screen is appearing more number of times then earlier.

    today for 4 times have got this problem. below i giving the link for the dump files.

    http://cid-d2ca622287f2676e.office.live.com/browse.aspx/.Public?uc=4

    please give a necessary solution for this.

    Friday, May 27, 2011 5:29 AM
  • Please update all possible drivers and check again.

     


    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration

    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration

    Friday, May 27, 2011 6:41 AM