View Single Post
16 Mar 2011  
zigzag3143

Win 8 Release candidate 8400
 
 

Quote   Quote: Originally Posted by the514 View Post
I have this recurring bsod, it is becoming so frustrating. Someone help, I've ran a memtest with 8 passes and no problems. What's next?
Your athrx.sys driver. Your atheros WLan driver re-install it. You also have 3+ year old drivers that need updating.


Code:
ASMMAP64.sys    2/4/2007 15:52:56    fffff880`02bf0000    fffff880`02bf7000    0x00007000    0x45c63998                            
sncduvc.SYS    12/29/2008 5:14:26    fffff880`029d4000    fffff880`029dca80    0x00008a80    0x495894f2                            
AsDsm.sys    2/13/2009 2:14:26    fffff880`01309000    fffff880`01316000    0x0000d000    0x49950fc2                            
btwl2cap.sys    4/3/2009 20:28:45    fffff880`02b13000    fffff880`02b1f000    0x0000c000    0x49d6a9bd                            
spldr.sys    5/11/2009 12:56:27    fffff880`01b76000    fffff880`01b7e000    0x00008000    0x4a0858bb                            
spsys.sys    5/11/2009 13:20:58    fffff880`07517000    fffff880`07588000    0x00071000    0x4a085e7a                            
ATK64AMD.sys    5/12/2009 21:04:54    fffff880`04f3b000    fffff880`04f43000    0x00008000    0x4a0a1cb6                            
snp2uvc.sys    5/20/2009 4:11:05    fffff880`0280b000    fffff880`029c2600    0x001b7600    0x4a13bb19                            
btwavdt.sys    6/25/2009 1:50:13    fffff880`02a12000    fffff880`02a8d000    0x0007b000    0x4a431015                            
btwrchid.sys    6/25/2009 1:51:37    fffff880`02b1f000    fffff880`02b22880    0x00003880    0x4a431069                            
L1C62x64.sys    6/28/2009 23:53:43    fffff880`04bea000    fffff880`04bfd000    0x00013000    0x4a483ac7                            
btwaudio.sys    7/1/2009 9:54:56    fffff880`02a8d000    fffff880`02b13000    0x00086000    0x4a4b6ab0                            
rimspe64.sys    7/1/2009 19:54:49    fffff880`04bd1000    fffff880`04bea000    0x00019000    0x4a4bf749                            
rixdpe64.sys    7/4/2009 6:27:00    fffff880`06326000    fffff880`0637c000    0x00056000    0x4a4f2e74
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\K\Desktop\031611-19624-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0301c000 PsLoadedModuleList = 0xfffff800`03261e90
Debug session time: Wed Mar 16 17:27:41.593 2011 (GMT-4)
System Uptime: 0 days 0:05:38.076
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : athrx.sys ( athrx+1f668 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+6519952f01f2de0c
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000b9c6e8 -- (.exr 0xfffff80000b9c6e8)
ExceptionAddress: fffff88004a46668 (athrx+0x000000000001f668)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000b9c790 -- (.trap 0xfffff80000b9c790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8009d8b608 rbx=0000000000000000 rcx=ffb7fa8009d8b5b0
rdx=000000000000060c rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004a46668 rsp=fffff80000b9c920 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffff88004aeee80
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
athrx+0x1f668:
fffff880`04a46668 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80003093ffe to fffff8000309c610

STACK_TEXT:  
fffff800`00b9b7c8 fffff800`03093ffe : 00000000`00009669 fffffa80`075b6a60 fffff800`00b9bf40 fffff800`030c82a0 : nt!KeBugCheck
fffff800`00b9b7d0 fffff800`030c7f6d : fffff800`032a3a10 fffff800`031dfc78 fffff800`0301c000 fffff800`00b9c6e8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b9b800 fffff800`030c6d45 : fffff800`031e30fc fffff800`00b9b878 fffff800`00b9c6e8 fffff800`0301c000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b830 fffff800`030d7dc1 : fffff800`00b9c6e8 fffff800`00b9bf40 fffff800`00000000 fffff800`00b9ca10 : nt!RtlDispatchException+0x415
fffff800`00b9bf10 fffff800`0309bcc2 : fffff800`00b9c6e8 fffffa80`09dcc470 fffff800`00b9c790 fffffa80`07bb31a0 : nt!KiDispatchException+0x135
fffff800`00b9c5b0 fffff800`0309a5ca : fffffa80`0a5fd820 fffffa80`0a5fd820 fffffa80`0a5fd820 fffff880`044731c8 : nt!KiExceptionDispatch+0xc2
fffff800`00b9c790 fffff880`04a46668 : ffb7fa80`09d8b5b0 00000000`00000008 fffffa80`00000004 fffff880`04aacee3 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9c920 ffb7fa80`09d8b5b0 : 00000000`00000008 fffffa80`00000004 fffff880`04aacee3 fffffa80`09d8b608 : athrx+0x1f668
fffff800`00b9c928 00000000`00000008 : fffffa80`00000004 fffff880`04aacee3 fffffa80`09d8b608 fffff880`04ad060c : 0xffb7fa80`09d8b5b0
fffff800`00b9c930 fffffa80`00000004 : fffff880`04aacee3 fffffa80`09d8b608 fffff880`04ad060c fffffa80`09bd9030 : 0x8
fffff800`00b9c938 fffff880`04aacee3 : fffffa80`09d8b608 fffff880`04ad060c fffffa80`09bd9030 fffff880`052d1720 : 0xfffffa80`00000004
fffff800`00b9c940 fffffa80`09d8b608 : fffff880`04ad060c fffffa80`09bd9030 fffff880`052d1720 fffffa80`00000f0c : athrx+0x85ee3
fffff800`00b9c948 fffff880`04ad060c : fffffa80`09bd9030 fffff880`052d1720 fffffa80`00000f0c fffff880`04a6584d : 0xfffffa80`09d8b608
fffff800`00b9c950 fffffa80`09bd9030 : fffff880`052d1720 fffffa80`00000f0c fffff880`04a6584d fffffa80`09d8b608 : athrx+0xa960c
fffff800`00b9c958 fffff880`052d1720 : fffffa80`00000f0c fffff880`04a6584d fffffa80`09d8b608 fffffa80`0000060c : 0xfffffa80`09bd9030
fffff800`00b9c960 fffffa80`00000f0c : fffff880`04a6584d fffffa80`09d8b608 fffffa80`0000060c fffffa80`09d8bac8 : 0xfffff880`052d1720
fffff800`00b9c968 fffff880`04a6584d : fffffa80`09d8b608 fffffa80`0000060c fffffa80`09d8bac8 fffff800`00b9ca10 : 0xfffffa80`00000f0c
fffff800`00b9c970 fffffa80`09d8b608 : fffffa80`0000060c fffffa80`09d8bac8 fffff800`00b9ca10 fffffa80`07bb31a0 : athrx+0x3e84d
fffff800`00b9c978 fffffa80`0000060c : fffffa80`09d8bac8 fffff800`00b9ca10 fffffa80`07bb31a0 fffff880`04ae0aa7 : 0xfffffa80`09d8b608
fffff800`00b9c980 fffffa80`09d8bac8 : fffff800`00b9ca10 fffffa80`07bb31a0 fffff880`04ae0aa7 fffffa80`09d8b608 : 0xfffffa80`0000060c
fffff800`00b9c988 fffff800`00b9ca10 : fffffa80`07bb31a0 fffff880`04ae0aa7 fffffa80`09d8b608 fffff800`00b9060c : 0xfffffa80`09d8bac8
fffff800`00b9c990 fffffa80`07bb31a0 : fffff880`04ae0aa7 fffffa80`09d8b608 fffff800`00b9060c fffffa80`00000000 : 0xfffff800`00b9ca10
fffff800`00b9c998 fffff880`04ae0aa7 : fffffa80`09d8b608 fffff800`00b9060c fffffa80`00000000 fffff880`052d1814 : 0xfffffa80`07bb31a0
fffff800`00b9c9a0 fffffa80`09d8b608 : fffff800`00b9060c fffffa80`00000000 fffff880`052d1814 00000000`00000000 : athrx+0xb9aa7
fffff800`00b9c9a8 fffff800`00b9060c : fffffa80`00000000 fffff880`052d1814 00000000`00000000 fffffa80`070e36b0 : 0xfffffa80`09d8b608
fffff800`00b9c9b0 fffffa80`00000000 : fffff880`052d1814 00000000`00000000 fffffa80`070e36b0 fffffa80`09bb46d0 : 0xfffff800`00b9060c
fffff800`00b9c9b8 fffff880`052d1814 : 00000000`00000000 fffffa80`070e36b0 fffffa80`09bb46d0 fffff880`035df000 : 0xfffffa80`00000000
fffff800`00b9c9c0 00000000`00000000 : fffffa80`070e36b0 fffffa80`09bb46d0 fffff880`035df000 fffffa80`09d77a70 : 0xfffff880`052d1814


STACK_COMMAND:  kb

FOLLOWUP_IP: 
athrx+1f668
fffff880`04a46668 ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  athrx+1f668

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: athrx

IMAGE_NAME:  athrx.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4aca1ff5

FAILURE_BUCKET_ID:  X64_0x1E_athrx+1f668

BUCKET_ID:  X64_0x1E_athrx+1f668

Followup: MachineOwner
---------

0: kd> lmvm athrx
start             end                 module name
fffff880`04a27000 fffff880`04ba4000   athrx    T (no symbols)           
    Loaded symbol image file: athrx.sys
    Image path: \SystemRoot\system32\DRIVERS\athrx.sys
    Image name: athrx.sys
    Timestamp:        Mon Oct 05 12:33:57 2009 (4ACA1FF5)
    CheckSum:         0017C3B2
    ImageSize:        0017D000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
My System SpecsSystem Spec