Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

BSOD tcpip.sys Plz Help !


  • Please log in to reply

#1
WolF88Killler

WolF88Killler

    New Member

  • Member
  • Pip
  • 2 posts
hi i have problems with the last week BSOD tcpip.sys I have no antivirus my PC is a clean install I understand nothing of it is my gaming pc so plz help me out of trouble
the zip is also
greetings
Giani.V.W

Attached Files


  • 0

Advertisements


#2
tom982

tom982

    Member 1K

  • Member
  • PipPipPipPip
  • 1,183 posts
Hello Giani, welcome to GeeksToGo!

Your minidump is saying that e1q62x64.sys is the culprit. This is an Intel Gigabit driver, so can you update your Intel Gigabit driver to the latest version please?

https://downloadcent...om/default.aspx

Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Tom\AppData\Local\Temp\7zO4D9BB68D\090813-14788-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18113.amd64fre.win7sp1_gdr.130318-1533
Machine Name:
Kernel base = 0xfffff800`02c5f000 PsLoadedModuleList = 0xfffff800`02ea2670
Debug session time: Sun Sep  8 22:19:24.978 2013 (UTC + 1:00)
System Uptime: 0 days 0:03:24.991
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {8, 2, 0, fffff880016446a3}

*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+239e9 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880016446a3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0c100
GetUlongFromAddress: unable to read from fffff80002f0c1c0
 0000000000000008 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!IpFlcReceivePreValidatedPackets+2d3
fffff880`016446a3 440fb62c01      movzx   r13d,byte ptr [rcx+rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  TrustedInstall

TRAP_FRAME:  fffff80000ba1a50 -- (.trap 0xfffff80000ba1a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff880016446a3 rsp=fffff80000ba1be0 rbp=fffffa800eeed140
 r8=0000000000000006  r9=0000000000000003 r10=0000000000000003
r11=0000000000000014 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
tcpip!IpFlcReceivePreValidatedPackets+0x2d3:
fffff880`016446a3 440fb62c01      movzx   r13d,byte ptr [rcx+rax] ds:00000000`00000008=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cd41a9 to fffff80002cd4c00

STACK_TEXT:  
fffff800`00ba1908 fffff800`02cd41a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1910 fffff800`02cd2e20 : 00000000`000003b8 fffffa80`0de58101 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1a50 fffff880`016446a3 : 00000000`00000000 fffffa80`0c966950 fffff800`00ba1dc8 fffff800`00ba1f00 : nt!KiPageFault+0x260
fffff800`00ba1be0 fffff880`016554a2 : fffffa80`0e329e50 fffffa80`0e316010 00000000`00000006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x2d3
fffff800`00ba1d40 fffff800`02ce0878 : 00000000`00000000 00000000`00004800 fffffa80`0ca42060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff800`00ba1d90 fffff880`01655bd2 : fffff880`01655400 fffffa80`0e2c5030 00000000`00000002 fffff880`01663600 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff800`00ba1e70 fffff880`015350eb : fffffa80`0e328010 00000000`00000000 fffffa80`0de581a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff800`00ba1ee0 fffff880`014fead6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff800`00ba1f50 fffff880`01477cc1 : fffffa80`0de581a0 00000000`00000002 00000000`00000004 fffff880`0164498c : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff800`00ba23d0 fffff880`03c499e9 : fffffa80`0e1bd000 fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff800`00ba2420 fffffa80`0e1bd000 : fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 : e1q62x64+0x239e9
fffff800`00ba2428 fffffa80`0e2c0030 : fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 00000000`00000004 : 0xfffffa80`0e1bd000
fffff800`00ba2430 fffffa80`0e2bf9e0 : 00000000`00000004 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 : 0xfffffa80`0e2c0030
fffff800`00ba2438 00000000`00000004 : 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 : 0xfffffa80`0e2bf9e0
fffff800`00ba2440 00000000`00000801 : 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 : 0x4
fffff800`00ba2448 00000000`00000004 : fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 : 0x801
fffff800`00ba2450 fffffa80`0e1bfb00 : fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 : 0x4
fffff800`00ba2458 fffff880`03c49b84 : 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 : 0xfffffa80`0e1bfb00
fffff800`00ba2460 00000000`00000001 : fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 : e1q62x64+0x23b84
fffff800`00ba2468 fffffa80`0e2c0030 : fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 00000000`00000000 : 0x1
fffff800`00ba2470 fffffa80`0e2dd470 : 00000000`00000004 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 : 0xfffffa80`0e2c0030
fffff800`00ba2478 00000000`00000004 : 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 : 0xfffffa80`0e2dd470
fffff800`00ba2480 0000000a`00000001 : 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 : 0x4
fffff800`00ba2488 00000000`00000000 : fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 fffffa80`0de5a820 : 0x0000000a`00000001


STACK_COMMAND:  kb

FOLLOWUP_IP: 
e1q62x64+239e9
fffff880`03c499e9 ??              ???

SYMBOL_STACK_INDEX:  a

SYMBOL_NAME:  e1q62x64+239e9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: e1q62x64

IMAGE_NAME:  e1q62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c364c04

FAILURE_BUCKET_ID:  X64_0xD1_e1q62x64+239e9

BUCKET_ID:  X64_0xD1_e1q62x64+239e9

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880016446a3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000008 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!IpFlcReceivePreValidatedPackets+2d3
fffff880`016446a3 440fb62c01      movzx   r13d,byte ptr [rcx+rax]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  TrustedInstall

TRAP_FRAME:  fffff80000ba1a50 -- (.trap 0xfffff80000ba1a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff880016446a3 rsp=fffff80000ba1be0 rbp=fffffa800eeed140
 r8=0000000000000006  r9=0000000000000003 r10=0000000000000003
r11=0000000000000014 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
tcpip!IpFlcReceivePreValidatedPackets+0x2d3:
fffff880`016446a3 440fb62c01      movzx   r13d,byte ptr [rcx+rax] ds:00000000`00000008=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002cd41a9 to fffff80002cd4c00

STACK_TEXT:  
fffff800`00ba1908 fffff800`02cd41a9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba1910 fffff800`02cd2e20 : 00000000`000003b8 fffffa80`0de58101 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba1a50 fffff880`016446a3 : 00000000`00000000 fffffa80`0c966950 fffff800`00ba1dc8 fffff800`00ba1f00 : nt!KiPageFault+0x260
fffff800`00ba1be0 fffff880`016554a2 : fffffa80`0e329e50 fffffa80`0e316010 00000000`00000006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x2d3
fffff800`00ba1d40 fffff800`02ce0878 : 00000000`00000000 00000000`00004800 fffffa80`0ca42060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff800`00ba1d90 fffff880`01655bd2 : fffff880`01655400 fffffa80`0e2c5030 00000000`00000002 fffff880`01663600 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff800`00ba1e70 fffff880`015350eb : fffffa80`0e328010 00000000`00000000 fffffa80`0de581a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff800`00ba1ee0 fffff880`014fead6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff800`00ba1f50 fffff880`01477cc1 : fffffa80`0de581a0 00000000`00000002 00000000`00000004 fffff880`0164498c : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff800`00ba23d0 fffff880`03c499e9 : fffffa80`0e1bd000 fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff800`00ba2420 fffffa80`0e1bd000 : fffffa80`0e2c0030 fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 : e1q62x64+0x239e9
fffff800`00ba2428 fffffa80`0e2c0030 : fffffa80`0e2bf9e0 00000000`00000004 00000000`00000801 00000000`00000004 : 0xfffffa80`0e1bd000
fffff800`00ba2430 fffffa80`0e2bf9e0 : 00000000`00000004 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 : 0xfffffa80`0e2c0030
fffff800`00ba2438 00000000`00000004 : 00000000`00000801 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 : 0xfffffa80`0e2bf9e0
fffff800`00ba2440 00000000`00000801 : 00000000`00000004 fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 : 0x4
fffff800`00ba2448 00000000`00000004 : fffffa80`0e1bfb00 fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 : 0x801
fffff800`00ba2450 fffffa80`0e1bfb00 : fffff880`03c49b84 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 : 0x4
fffff800`00ba2458 fffff880`03c49b84 : 00000000`00000001 fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 : 0xfffffa80`0e1bfb00
fffff800`00ba2460 00000000`00000001 : fffffa80`0e2c0030 fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 : e1q62x64+0x23b84
fffff800`00ba2468 fffffa80`0e2c0030 : fffffa80`0e2dd470 00000000`00000004 0000000a`00000001 00000000`00000000 : 0x1
fffff800`00ba2470 fffffa80`0e2dd470 : 00000000`00000004 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 : 0xfffffa80`0e2c0030
fffff800`00ba2478 00000000`00000004 : 0000000a`00000001 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 : 0xfffffa80`0e2dd470
fffff800`00ba2480 0000000a`00000001 : 00000000`00000000 fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 : 0x4
fffff800`00ba2488 00000000`00000000 : fffff880`03c3c6d0 fffff800`00ba26d8 00000000`00000000 fffffa80`0de5a820 : 0x0000000a`00000001


STACK_COMMAND:  kb

FOLLOWUP_IP: 
e1q62x64+239e9
fffff880`03c499e9 ??              ???

SYMBOL_STACK_INDEX:  a

SYMBOL_NAME:  e1q62x64+239e9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: e1q62x64

IMAGE_NAME:  e1q62x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4c364c04

FAILURE_BUCKET_ID:  X64_0xD1_e1q62x64+239e9

BUCKET_ID:  X64_0xD1_e1q62x64+239e9

Followup: MachineOwner
---------

Tom
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP