Random BSOD, Driver_IRQL_Not_less_or_equal tcpip.sys

dtdsora

New Member
Messages
1
My laptop keeps crashing with the error in the title, and looking through it with blue screen view, I've noticed that each one has something different for the primary reason, could someone look through the dmps to find the reason and hopefully a fix. I have attatched all of the crashes through the beginning of the month
 

My Computer

System One

  • OS
    Windows 8 64-bit

Ensure that you have ALL Windows Updates. Most Windows 8.1 system have around 55 or more updates on average). Please also install the windows 8.1 update 1. (KB 2919355 ). This Windows 8.1 Update and Windows RT 8.1Update also include security and performance updates, and they must be installed for your PC to receive any future security updates for Windows 8.1 or Windows RT 8.1.

Most of your dumpfiles are DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1), Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+121 ).This points to network related problems .

It is known that many network devices with windows 7/8 driver have problems with windows 8.1
You have a Ralink Bluetooth device with drivers from july 2012. Please update this to the latest windows 8.1 compatible drivers, also update your wireless/Audio drivers from here
ASUSTeK Computer Inc. -Support- Drivers and Download X200CA



One dumpfile names dtsoftbus01.sys. This is the driver from Daemon tools

Daemon Tools (and Alcohol % software)are known to cause BSOD's on some Windows systems (mostly due to the sptd.sysdriver, although I have seen dtsoftbus01.sys blamed on several occasions).

Please un-install the program, then use the following freetool to ensure that the troublesome sptd.sys driver is removed from your system(pick the 32 or 64 bit system depending on your system's configuration): Newlink (15 Aug 2012): DuplexSecure - Downloads (pick the appropriate version foryour system and select "Un-install" when you run it).
Alternate link: Disk-Tools.com
Manual procedure here: Registry and SPTD problems | DAEMON Pro Help

(from canned speech of John Carrona)




Code:
[FONT=Arial]Use !analyze -v to get detailed debugging information.[/FONT]
[FONT=Arial]BugCheck D1, {0, 2, 0, fffff88001dd8c20}[/FONT]
[FONT=Arial]Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+121 )[/FONT]
[FONT=Arial]Followup: MachineOwner
---------[/FONT]
[FONT=Arial]1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************[/FONT]
[FONT=Arial]DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001dd8c20, address which referenced memory[/FONT]
[FONT=Arial]Debugging Details:
------------------[/FONT]
[FONT=Arial]
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800c7972168
GetUlongFromAddress: unable to read from fffff800c79721f8
 0000000000000000 Nonpaged pool[/FONT]
[FONT=Arial]CURRENT_IRQL:  2[/FONT]
[FONT=Arial]FAULTING_IP: 
tcpip!FlpReturnNetBufferListChain+e1a50
fffff880`01dd8c20 488b01          mov     rax,qword ptr [rcx][/FONT]
[FONT=Arial]CUSTOMER_CRASH_COUNT:  1[/FONT]
[FONT=Arial]DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT[/FONT]
[FONT=Arial]BUGCHECK_STR:  AV[/FONT]
[FONT=Arial]PROCESS_NAME:  System[/FONT]
[FONT=Arial]ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre[/FONT]
[FONT=Arial]TRAP_FRAME:  fffff880034454b0 -- (.trap 0xfffff880034454b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80098ef2c0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80098ef2c1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001dd8c20 rsp=fffff88003445640 rbp=0000000000000000
 r8=fffffa80098ef2c0  r9=0000000000000000 r10=fffff8800098fe80
r11=fffffa8006fa46e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!FlpReturnNetBufferListChain+0xe1a50:
fffff880`01dd8c20 488b01          mov     rax,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope[/FONT]
[FONT=Arial]LAST_CONTROL_TRANSFER:  from fffff800c7673769 to fffff800c7674440[/FONT]
[FONT=Arial]STACK_TEXT:  
fffff880`03445368 fffff800`c7673769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03445370 fffff800`c7671fe0 : 00000000`00000000 fffffa80`06fa4620 fffffa80`03fdca00 fffff880`034454b0 : nt!KiBugCheckDispatch+0x69
fffff880`034454b0 fffff880`01dd8c20 : fffffa80`09b12d02 fffffa80`42526354 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`03445640 fffff880`01801291 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000001 : tcpip!FlpReturnNetBufferListChain+0xe1a50
fffff880`03445690 fffff880`01cf0ece : fffffa80`03d29d38 00000000`bbce1501 00000000`00002cd3 0624dd2f`1a9fbe77 : NETIO!NetioDereferenceNetBufferListChain+0x121
fffff880`03445760 fffff880`01ce3cf3 : fffff880`07657048 00000000`00008e50 00000000`00000000 fffffa80`04582000 : tcpip!TcpFlushDelay+0x8e
fffff880`03445810 fffff880`01cf5b13 : fffffa80`036694c0 00000000`000013d3 fffffa80`04585000 fffffa80`036694c0 : tcpip!TcpPreValidatedReceive+0x403
fffff880`034458f0 fffff880`01cf5e28 : fffff880`03445b19 00000000`00164d16 00000000`00000000 00000000`0007df5c : tcpip!IppDeliverListToProtocol+0x93
fffff880`034459a0 fffff880`01cf9eab : fffff880`01e08b90 00000000`00000000 00000000`00000000 fffff880`03445ab8 : tcpip!IppProcessDeliverList+0x68
fffff880`03445a50 fffff880`01cf7901 : 00000000`00000000 fffffa80`04577b30 00000000`00000000 fffff880`01e08b90 : tcpip!IppReceiveHeaderBatch+0x21b
fffff880`03445b80 fffff880`01cf8d43 : fffffa80`08f19ef0 00000000`00000000 00000000`00000001 fffffa80`06c4da02 : tcpip!IpFlcReceivePackets+0x641
fffff880`03445db0 fffff880`01d03df9 : fffffa80`08f1bb00 00000000`00000000 fffff880`01cf71d0 000bc4be`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2ce
fffff880`03445e80 fffff800`c766eb67 : 00000000`00000000 00000000`00000000 fffff880`18fa2780 00000020`00030300 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
fffff880`03445f80 fffff800`c766eb2d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`18fa2780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue[/FONT]
[FONT=Arial]
STACK_COMMAND:  kb[/FONT]
[FONT=Arial]FOLLOWUP_IP: 
NETIO!NetioDereferenceNetBufferListChain+121
fffff880`01801291 418bc7          mov     eax,r15d[/FONT]
[FONT=Arial]SYMBOL_STACK_INDEX:  4[/FONT]
[FONT=Arial]SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferListChain+121[/FONT]
[FONT=Arial]FOLLOWUP_NAME:  MachineOwner[/FONT]
[FONT=Arial]MODULE_NAME: NETIO[/FONT]
[FONT=Arial]IMAGE_NAME:  NETIO.SYS[/FONT]
[FONT=Arial]DEBUG_FLR_IMAGE_TIMESTAMP:  50765624[/FONT]
[FONT=Arial]IMAGE_VERSION:  6.2.9200.16433[/FONT]
[FONT=Arial]BUCKET_ID_FUNC_OFFSET:  121[/FONT]
[FONT=Arial]FAILURE_BUCKET_ID:  AV_NETIO!NetioDereferenceNetBufferListChain[/FONT]
[FONT=Arial]BUCKET_ID:  AV_NETIO!NetioDereferenceNetBufferListChain[/FONT]
[FONT=Arial]ANALYSIS_SOURCE:  KM[/FONT]
[FONT=Arial]FAILURE_ID_HASH_STRING:  km:av_netio!netiodereferencenetbufferlistchain[/FONT]
[FONT=Arial]FAILURE_ID_HASH:  {b14cf127-5933-4e45-71a8-f23e2243d43b}[/FONT]
[FONT=Arial]Followup: MachineOwner

Use !analyze -v to get detailed debugging information.[/FONT]
[SIZE=3][COLOR=black][FONT=Arial]BugCheck C9, {23e, fffff88003d94360, fffff98009dccea0, 0}[/FONT][/COLOR][/SIZE]
[SIZE=3][COLOR=black][FONT=Arial]Unable to load image \SystemRoot\System32\drivers\dtsoftbus01.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dtsoftbus01.sys
*** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
Probably caused by : dtsoftbus01.sys ( dtsoftbus01+1360 )[/FONT][/COLOR][/SIZE]
[SIZE=3][COLOR=black][FONT=Arial]Followup: MachineOwner[/FONT][/COLOR][/SIZE]

If this does not stop the bsods.
Please couldyou post your dumpfiles according to these instructions here http://www.eightforums.com/bsod-crashes-debugging/10685-blue-screen-death-bsod-posting-instructions.html .
Please use option one and use Grab all.











 

My Computer

System One

  • OS
    windows 8.1
    Computer type
    PC/Desktop
    System Manufacturer/Model
    self build
    CPU
    Intel(R) Core(TM) i5 CPU 750 @ 2.67GHz
    Motherboard
    Asrock P55 Pro
    Memory
    DDR3 Team--Elite-1333 8 gb
    Graphics Card(s)
    Sapphire R9 280x
    Sound Card
    Realtek Alc 855
    Monitor(s) Displays
    Acer V233H
    Screen Resolution
    1920 x 1020
    Hard Drives
    Samsung evo 850 SSd
    Seagate ST 320 gb
    Samsung HD 750 gb
    Seagate ST 3000gb
    PSU
    OCZ Stealth 600 watt
    Case
    Antec 300
    Mouse
    Speedlink Ledos and Nexus
Back
Top