New
#1
BSOD Returns after 3 months, then twice today
I appreciate any assistance you can offer me. Thank you for your time and your skills
Last edited by 99Lufte; 29 Apr 2016 at 18:04.
I appreciate any assistance you can offer me. Thank you for your time and your skills
Last edited by 99Lufte; 29 Apr 2016 at 18:04.
Hi @99Lufte.
The WiFi adapter RTL8188CE does not support Windows 10. Neither form Realtek's stie nor From Toshiba's site.
And, Satellite L770 seems that not recommended to be upgraded to windows 10 by Toshiba. Toshiba : Model List
So as the network driver is not compatible with windows 10; issues like BSODs are almost obvious there.
I am sorry to say you that you should either get back to your previous OS or disable this Realtek WiFi card, get a USB WiFi adapter with latest driver support and see it it runs windows 10 there.
_____________________________________________________________________________
Code:BugCheck 139, {8, ffffd000590ce850, ffffd000590ce7a8, 0} *** WARNING: Unable to verify timestamp for rtwlane_13.sys *** ERROR: Module load completed but symbols could not be loaded for rtwlane_13.sys Probably caused by : rtwlane_13.sys ( rtwlane_13+2164dd ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000008, A compiler-inserted array bounds check detected an illegal array indexing operation. Arg2: ffffd000590ce850, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffd000590ce7a8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10586.212.amd64fre.th2_release_sec.160328-1908 SYSTEM_MANUFACTURER: TOSHIBA SYSTEM_PRODUCT_NAME: Satellite L770 SYSTEM_SKU: PSK3WC-06801D SYSTEM_VERSION: PSK3WC-06801D BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 2.30 BIOS_DATE: 07/18/2012 BASEBOARD_MANUFACTURER: Intel Corporation BASEBOARD_PRODUCT: Oneonta Falls BASEBOARD_VERSION: To be filled by O.E.M. DUMP_TYPE: 2 BUGCHECK_P1: 8 BUGCHECK_P2: ffffd000590ce850 BUGCHECK_P3: ffffd000590ce7a8 BUGCHECK_P4: 0 TRAP_FRAME: ffffd000590ce850 -- (.trap 0xffffd000590ce850) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000008 rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80032c764dd rsp=ffffd000590ce9e8 rbp=0000000000000001 r8=fffffffffffffffe r9=0000000000000046 r10=0000000000000002 r11=ffffd000590ce9c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc rtwlane_13+0x2164dd: fffff800`32c764dd cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffd000590ce7a8 -- (.exr 0xffffd000590ce7a8) ExceptionAddress: fffff80032c764dd (rtwlane_13+0x00000000002164dd) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000008 Subcode: 0x8 FAST_FAIL_RANGE_CHECK_FAILURE CPU_COUNT: 4 CPU_MHZ: 9be CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 2a CPU_STEPPING: 7 CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 29'00000000 (cache) 29'00000000 (init) CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000008 DEFAULT_BUCKET_ID: ARRAY_ACCESS_OUT_OF_RANGE ANALYSIS_SESSION_HOST: DESKTOP-6AMUR58 ANALYSIS_SESSION_TIME: 04-28-2016 18:12:01.0552 ANALYSIS_VERSION: 10.0.10586.567 amd64fre LAST_CONTROL_TRANSFER: from fffff800dc3512e9 to fffff800dc346760 STACK_TEXT: ffffd000`590ce528 fffff800`dc3512e9 : 00000000`00000139 00000000`00000008 ffffd000`590ce850 ffffd000`590ce7a8 : nt!KeBugCheckEx ffffd000`590ce530 fffff800`dc351610 : ffffe000`8a400000 fffff800`dc349c2a ffffd000`53c80180 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffd000`590ce670 fffff800`dc3507f3 : 00000000`00000000 fffff800`2dbb55c2 ffffe000`89f59010 ffffffff`ff1b1e40 : nt!KiFastFailDispatch+0xd0 ffffd000`590ce850 fffff800`32c764dd : fffff800`32bb9115 ffffe000`8a400000 ffffe000`8b26a3d0 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0xf3 ffffd000`590ce9e8 fffff800`32bb9115 : ffffe000`8a400000 ffffe000`8b26a3d0 00000000`00000001 ffffe000`8a400000 : rtwlane_13+0x2164dd ffffd000`590ce9f0 ffffe000`8a400000 : ffffe000`8b26a3d0 00000000`00000001 ffffe000`8a400000 00000000`00000000 : rtwlane_13+0x159115 ffffd000`590ce9f8 ffffe000`8b26a3d0 : 00000000`00000001 ffffe000`8a400000 00000000`00000000 01000001`00000100 : 0xffffe000`8a400000 ffffd000`590cea00 00000000`00000001 : ffffe000`8a400000 00000000`00000000 01000001`00000100 ffffe000`00000000 : 0xffffe000`8b26a3d0 ffffd000`590cea08 ffffe000`8a400000 : 00000000`00000000 01000001`00000100 ffffe000`00000000 ffffd805`e9f77917 : 0x1 ffffd000`590cea10 00000000`00000000 : 01000001`00000100 ffffe000`00000000 ffffd805`e9f77917 fffff800`dc597200 : 0xffffe000`8a400000 STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 620baf7063dc05622ed4bc19136372420c8d7cb8 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3bad98edf0afcd47ef853f4fba390520a26f9bc8 THREAD_SHA1_HASH_MOD: de4246c224c95e5b2d825e701ceb36117948c57f FOLLOWUP_IP: rtwlane_13+2164dd fffff800`32c764dd cd29 int 29h FAULT_INSTR_CODE: ffcc29cd SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: rtwlane_13+2164dd FOLLOWUP_NAME: MachineOwner MODULE_NAME: rtwlane_13 IMAGE_NAME: rtwlane_13.sys DEBUG_FLR_IMAGE_TIMESTAMP: 559fb278 BUCKET_ID_FUNC_OFFSET: 2164dd FAILURE_BUCKET_ID: 0x139_8_rtwlane_13!Unknown_Function BUCKET_ID: 0x139_8_rtwlane_13!Unknown_Function PRIMARY_PROBLEM_CLASS: 0x139_8_rtwlane_13!Unknown_Function TARGET_TIME: 2016-04-27T22:45:32.000Z OSBUILD: 10586 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2016-03-29 11:49:02 BUILDDATESTAMP_STR: 160328-1908 BUILDLAB_STR: th2_release_sec BUILDOSVER_STR: 10.0.10586.212.amd64fre.th2_release_sec.160328-1908 ANALYSIS_SESSION_ELAPSED_TIME: b1bc ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_8_rtwlane_13!unknown_function FAILURE_ID_HASH: {3aa7710a-752a-a7f5-7791-af9c9fa80c49} Followup: MachineOwner --------- 3: kd> lmvm rtwlane_13 Browse full module list start end module name fffff800`32a60000 fffff800`32e10000 rtwlane_13 T (no symbols) Loaded symbol image file: rtwlane_13.sys Image path: \SystemRoot\System32\drivers\rtwlane_13.sys Image name: rtwlane_13.sys Browse all global symbols functions data Timestamp: Fri Jul 10 17:24:32 2015 (559FB278) CheckSum: 0039F035 ImageSize: 003B0000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4