Hello, people.
So, I encountered one of the best errors in World ever: BSOD.
I'm running Asus K52J with win7 ultimate 64bit, geforce 310m, i5-430m.
I encounter error when I try to put my computer into sleep mode.
I added rar file with dumb foldier.
If you need anything else to help solving this problem, just ask it. Thanks.
Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.256.1
Locale ID: 1063
Additional information about the problem:
BCCode: d1
BCP1: 0000000000000040
BCP2: 0000000000000002
BCP3: 0000000000000000
BCP4: FFFFF880048FECAE
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1
Files that help describe the problem:
C:\Windows\Minidump\053011-34944-01.dmp
C:\Users\ASUS\AppData\Local\Temp\WER-527595-0.sysdata.xml
Read our privacy statement online:
Windows 7 Privacy Statement - Microsoft Windows
If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\erofflps.txt
These were Related to athrx.sys Extensible Wireless LAN device driver from Atheros Communications, Inc. I would re-install it with the newest driver available
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Minidump\053011-34944-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030a4e50
Debug session time: Sun May 29 19:48:47.184 2011 (GMT-4)
System Uptime: 0 days 17:10:54.715
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {40, 2, 0, fffff880048fecae}
Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : athrx.sys ( athrx+a4cae )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880048fecae, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310f0e0
0000000000000040
CURRENT_IRQL: 2
FAULTING_IP:
athrx+a4cae
fffff880`048fecae 488b4040 mov rax,qword ptr [rax+40h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880009e4180 -- (.trap 0xfffff880009e4180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80075f22b0
rdx=fffffa80075f2290 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880048fecae rsp=fffff880009e4310 rbp=0000000000000002
r8=0000000000000000 r9=0000000000000000 r10=fffff80003052b20
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
athrx+0xa4cae:
fffff880`048fecae 488b4040 mov rax,qword ptr [rax+40h] ds:00000000`00000040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ed6ca9 to fffff80002ed7740
STACK_TEXT:
fffff880`009e4038 fffff800`02ed6ca9 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009e4040 fffff800`02ed5920 : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009e4180 fffff880`048fecae : 00000000`00000000 fffffa80`075f2208 fffffa80`0714d1a0 00000000`00000006 : nt!KiPageFault+0x260
fffff880`009e4310 00000000`00000000 : fffffa80`075f2208 fffffa80`0714d1a0 00000000`00000006 fffffa80`075611e0 : athrx+0xa4cae
STACK_COMMAND: kb
FOLLOWUP_IP:
athrx+a4cae
fffff880`048fecae 488b4040 mov rax,qword ptr [rax+40h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athrx+a4cae
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrx
IMAGE_NAME: athrx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a2ea4b9
FAILURE_BUCKET_ID: X64_0xD1_athrx+a4cae
BUCKET_ID: X64_0xD1_athrx+a4cae
Followup: MachineOwner
---------
3: kd> lmvm athrx
start end module name
fffff880`0485a000 fffff880`049b2000 athrx T (no symbols)
Loaded symbol image file: athrx.sys
Image path: \SystemRoot\system32\DRIVERS\athrx.sys
Image name: athrx.sys
Timestamp: Tue Jun 09 14:06:49 2009 (4A2EA4B9)
CheckSum: 0015FE99
ImageSize: 00158000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Minidump\053011-34944-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030a4e50
Debug session time: Sun May 29 19:48:47.184 2011 (GMT-4)
System Uptime: 0 days 17:10:54.715
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {40, 2, 0, fffff880048fecae}
Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : athrx.sys ( athrx+a4cae )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880048fecae, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310f0e0
0000000000000040
CURRENT_IRQL: 2
FAULTING_IP:
athrx+a4cae
fffff880`048fecae 488b4040 mov rax,qword ptr [rax+40h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880009e4180 -- (.trap 0xfffff880009e4180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80075f22b0
rdx=fffffa80075f2290 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880048fecae rsp=fffff880009e4310 rbp=0000000000000002
r8=0000000000000000 r9=0000000000000000 r10=fffff80003052b20
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
athrx+0xa4cae:
fffff880`048fecae 488b4040 mov rax,qword ptr [rax+40h] ds:00000000`00000040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ed6ca9 to fffff80002ed7740
STACK_TEXT:
fffff880`009e4038 fffff800`02ed6ca9 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009e4040 fffff800`02ed5920 : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009e4180 fffff880`048fecae : 00000000`00000000 fffffa80`075f2208 fffffa80`0714d1a0 00000000`00000006 : nt!KiPageFault+0x260
fffff880`009e4310 00000000`00000000 : fffffa80`075f2208 fffffa80`0714d1a0 00000000`00000006 fffffa80`075611e0 : athrx+0xa4cae
STACK_COMMAND: kb
FOLLOWUP_IP:
athrx+a4cae
fffff880`048fecae 488b4040 mov rax,qword ptr [rax+40h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athrx+a4cae
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrx
IMAGE_NAME: athrx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a2ea4b9
FAILURE_BUCKET_ID: X64_0xD1_athrx+a4cae
BUCKET_ID: X64_0xD1_athrx+a4cae
Followup: MachineOwner
---------
3: kd> lmvm athrx
start end module name
fffff880`0485a000 fffff880`049b2000 athrx T (no symbols)
Loaded symbol image file: athrx.sys
Image path: \SystemRoot\system32\DRIVERS\athrx.sys
Image name: athrx.sys
Timestamp: Tue Jun 09 14:06:49 2009 (4A2EA4B9)
CheckSum: 0015FE99
ImageSize: 00158000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4