Det är Vista-drivaren L1E62x64.sys som buggar. Se till att köra Windows update och inkludera Valfria Drivare för ditt ATHEROS L1E inbyggda NIC/LAN eller tanka hem från http://dlcdnet.asus.com/pub/ASUS/lan/AR81FamilyWinSetup_V1004...
Funkar det fortfarande inte, köp ett rtl8139 (100 Mbit) eller rtl8169 (1 Gigabit) LAN-kort från t.ex. kjell.com för 100 spänn.
ps. du glömde berätta vilket operativ du kör med, att det är 64-bitars är uppenbart, men inte om det är vista eller w7. ds.
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\bnr\102910-15646-01\102910-15646-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*F::\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a02000 PsLoadedModuleList = 0xfffff800`02c3fe50
Debug session time: Fri Oct 29 12:51:23.903 2010 (GMT+2)
System Uptime: 0 days 0:20:53.978
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff8800165b5ca}
Unable to load image \SystemRoot\system32\DRIVERS\L1E62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for L1E62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for L1E62x64.sys
Probably caused by : L1E62x64.sys ( L1E62x64+74c4 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800165b5ca, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002caa0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!FlpReceiveNonPreValidatedNetBufferListChain+2ea
fffff880`0165b5ca 488b8c2490000000 mov rcx,qword ptr [rsp+90h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88007c70190 -- (.trap 0xfffff88007c70190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800165b5ca rsp=fffff88007c70320 rbp=fffffa8005757010
r8=fffff88001766800 r9=fffff8800176b9a0 r10=000000000000080c
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2ea:
fffff880`0165b5ca 488b8c2490000000 mov rcx,qword ptr [rsp+90h] ss:0018:fffff880`07c703b0=ffff000006b15308
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a71ca9 to fffff80002a72740
STACK_TEXT:
fffff880`07c70048 fffff800`02a71ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07c70050 fffff800`02a70920 : 00000000`00000000 fffffa80`05757010 00000000`00002711 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`07c70190 fffff880`0165b5ca : fffffa80`055d20a0 00000000`00000000 fffffa80`05757001 00000000`00000002 : nt!KiPageFault+0x260
fffff880`07c70320 fffff880`01674e5a : fffffa80`05757010 fffff880`07c70450 fffffa80`05757010 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2ea
fffff880`07c70400 fffff800`02a81e5a : fffffa80`0578c860 fffff880`07c6b000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`07c70450 fffff880`01674882 : fffff880`01674d80 fffff880`07c70560 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`07c70530 fffff880`015810eb : fffffa80`05758420 00000000`00000000 fffffa80`04f0a1a0 fffffa80`03cbf1b8 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`07c705a0 fffff880`0154afc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`07c70610 fffff880`014c4ef1 : fffffa80`04f0a1a0 00000000`00000002 00000000`00000002 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`07c70a90 fffff880`041ee4c4 : fffffa80`0574b000 fffff880`04bde000 fffffa80`050d2000 fffffa80`050d2490 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`07c70ae0 fffffa80`0574b000 : fffff880`04bde000 fffffa80`050d2000 fffffa80`050d2490 00000000`00000001 : L1E62x64+0x74c4
fffff880`07c70ae8 fffff880`04bde000 : fffffa80`050d2000 fffffa80`050d2490 00000000`00000001 00000000`00000000 : 0xfffffa80`0574b000
fffff880`07c70af0 fffffa80`050d2000 : fffffa80`050d2490 00000000`00000001 00000000`00000000 00018200`00000000 : 0xfffff880`04bde000
fffff880`07c70af8 fffffa80`050d2490 : 00000000`00000001 00000000`00000000 00018200`00000000 00000000`00000028 : 0xfffffa80`050d2000
fffff880`07c70b00 00000000`00000001 : 00000000`00000000 00018200`00000000 00000000`00000028 fffffa80`0578d860 : 0xfffffa80`050d2490
fffff880`07c70b08 00000000`00000000 : 00018200`00000000 00000000`00000028 fffffa80`0578d860 fffffa80`050d24e8 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+74c4
fffff880`041ee4c4 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: L1E62x64+74c4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a90ceb9
FAILURE_BUCKET_ID: X64_0xD1_L1E62x64+74c4
BUCKET_ID: X64_0xD1_L1E62x64+74c4
Dold text