I use Lg a510-uae12t
i5 m460
4gb ram
nvidia 425gt graphic card
Uninstall win 7 home, I install Ultimate and I play game then BLUE SCREEN...
BCCode: d1
BCP1: FFFFF88003D49000
BCP2: 0000000000000002
BCP3: 0000000000000000
BCP4: FFFFF88002E18DF6
OS Version: 6_1_7601
Service Pack: 1_0
Product: 256_1
I attach dmp files please help me...
This one was caused by Netr28x.sys, Ralink 802.11 Wireless Adapter Driver. I would re-install it with the newest version as yours is pre win 7.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\032811-15256-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e08000 PsLoadedModuleList = 0xfffff800`0304de90
Debug session time: Mon Mar 28 14:44:31.010 2011 (GMT-4)
System Uptime: 0 days 1:18:20.462
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff88003d49000, 2, 0, fffff88002e18df6}
Unable to load image \SystemRoot\system32\DRIVERS\netr28x.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netr28x.sys
*** ERROR: Module load completed but symbols could not be loaded for netr28x.sys
Probably caused by : netr28x.sys ( netr28x+18df6 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88003d49000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88002e18df6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b90e8
fffff88003d49000
CURRENT_IRQL: 2
FAULTING_IP:
netr28x+18df6
fffff880`02e18df6 32043b xor al,byte ptr [rbx+rdi]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800514f8c0 -- (.trap 0xfffff8800514f8c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000001da rbx=0000000000000000 rcx=00000000000000a0
rdx=00000000000000f1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002e18df6 rsp=fffff8800514fa58 rbp=00000000ffffe028
r8=00000000000000af r9=00000000000000d5 r10=fffffa8003fbbdb0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
netr28x+0x18df6:
fffff880`02e18df6 32043b xor al,byte ptr [rbx+rdi] ds:0001:00000000`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e87be9 to fffff80002e88640
STACK_TEXT:
fffff880`0514f778 fffff800`02e87be9 : 00000000`0000000a fffff880`03d49000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0514f780 fffff800`02e86860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff880`0514f8c0 fffff880`02e18df6 : fffff880`02e18cc8 fffffa80`03d53000 fffffa80`03fd8000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0514fa58 fffff880`02e18cc8 : fffffa80`03d53000 fffffa80`03fd8000 00000000`00000000 fffff880`03d47028 : netr28x+0x18df6
fffff880`0514fa60 fffffa80`03d53000 : fffffa80`03fd8000 00000000`00000000 fffff880`03d47028 fffff880`03d47010 : netr28x+0x18cc8
fffff880`0514fa68 fffffa80`03fd8000 : 00000000`00000000 fffff880`03d47028 fffff880`03d47010 fffff880`02e1390a : 0xfffffa80`03d53000
fffff880`0514fa70 00000000`00000000 : fffff880`03d47028 fffff880`03d47010 fffff880`02e1390a 00000000`03c30018 : 0xfffffa80`03fd8000
STACK_COMMAND: kb
FOLLOWUP_IP:
netr28x+18df6
fffff880`02e18df6 32043b xor al,byte ptr [rbx+rdi]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: netr28x+18df6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49a60631
FAILURE_BUCKET_ID: X64_0xD1_netr28x+18df6
BUCKET_ID: X64_0xD1_netr28x+18df6
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88003d49000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88002e18df6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: fffff88003d49000
CURRENT_IRQL: 2
FAULTING_IP:
netr28x+18df6
fffff880`02e18df6 32043b xor al,byte ptr [rbx+rdi]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800514f8c0 -- (.trap 0xfffff8800514f8c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000001da rbx=0000000000000000 rcx=00000000000000a0
rdx=00000000000000f1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002e18df6 rsp=fffff8800514fa58 rbp=00000000ffffe028
r8=00000000000000af r9=00000000000000d5 r10=fffffa8003fbbdb0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
netr28x+0x18df6:
fffff880`02e18df6 32043b xor al,byte ptr [rbx+rdi] ds:0001:00000000`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e87be9 to fffff80002e88640
STACK_TEXT:
fffff880`0514f778 fffff800`02e87be9 : 00000000`0000000a fffff880`03d49000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0514f780 fffff800`02e86860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff880`0514f8c0 fffff880`02e18df6 : fffff880`02e18cc8 fffffa80`03d53000 fffffa80`03fd8000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0514fa58 fffff880`02e18cc8 : fffffa80`03d53000 fffffa80`03fd8000 00000000`00000000 fffff880`03d47028 : netr28x+0x18df6
fffff880`0514fa60 fffffa80`03d53000 : fffffa80`03fd8000 00000000`00000000 fffff880`03d47028 fffff880`03d47010 : netr28x+0x18cc8
fffff880`0514fa68 fffffa80`03fd8000 : 00000000`00000000 fffff880`03d47028 fffff880`03d47010 fffff880`02e1390a : 0xfffffa80`03d53000
fffff880`0514fa70 00000000`00000000 : fffff880`03d47028 fffff880`03d47010 fffff880`02e1390a 00000000`03c30018 : 0xfffffa80`03fd8000
STACK_COMMAND: kb
FOLLOWUP_IP:
netr28x+18df6
fffff880`02e18df6 32043b xor al,byte ptr [rbx+rdi]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: netr28x+18df6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49a60631
FAILURE_BUCKET_ID: X64_0xD1_netr28x+18df6
BUCKET_ID: X64_0xD1_netr28x+18df6
Followup: MachineOwner
---------