Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD


23 Dec 2010   #1

Windows 7 Home Premium
 
 
BSOD

I restarted my computer the other day after uninstalling Trend micro to install the newer one. But when it did i got the BSOD.i ran the BSOD Dump & System File Collection app in safe mode and tried to do the system health report but it did not work.

It is a 64bit with the original installed OS on the system. Windows 7 came preinstalled on the system. i got it from bestbuy.


Thanks in advanced to who ever can help out.


My System SpecsSystem Spec
.

23 Dec 2010   #2

Win 8 Release candidate 8400
 
 

Quote   Quote: Originally Posted by polarskid View Post
I restarted my computer the other day after uninstalling Trend micro to install the newer one. But when it did i got the BSOD.i ran the BSOD Dump & System File Collection app in safe mode and tried to do the system health report but it did not work.

It is a 64bit with the original installed OS on the system. Windows 7 came preinstalled on the system. i got it from bestbuy.


Thanks in advanced to who ever can help out.

Your atrx.sys (atheros driver) caused these. re-install with the newest version avail..

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\122310-23634-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`0304ee50
Debug session time: Thu Dec 23 15:03:34.614 2010 (GMT-5)
System Uptime: 0 days 0:00:27.580
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {10, 2, 0, fffff8800143b5d6}

Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : athrx.sys ( athrx+2e297 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800143b5d6, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b90e0
 0000000000000010 

CURRENT_IRQL:  2

FAULTING_IP: 
ndis!NdisFreeTimerObject+16
fffff880`0143b5d6 488b5310        mov     rdx,qword ptr [rbx+10h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002fb0870 -- (.trap 0xfffff88002fb0870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88001472908
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800143b5d6 rsp=fffff88002fb0a00 rbp=fffff800030265a0
 r8=0000000000011120  r9=0000000000000000 r10=fffff80002e11000
r11=fffffa8007b58030 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ndis!NdisFreeTimerObject+0x16:
fffff880`0143b5d6 488b5310        mov     rdx,qword ptr [rbx+10h] ds:c040:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e80ca9 to fffff80002e81740

STACK_TEXT:  
fffff880`02fb0728 fffff800`02e80ca9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fb0730 fffff800`02e7f920 : fffffa80`04778600 00000000`00000000 00000000`000007ff fffff800`02f8b194 : nt!KiBugCheckDispatch+0x69
fffff880`02fb0870 fffff880`0143b5d6 : fffffa80`05210680 fffff880`042cb5e0 fffffa80`07b59440 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02fb0a00 fffff880`0423b297 : fffffa80`07b59440 fffff880`0425132f fffff880`04350100 fffff880`043500f0 : ndis!NdisFreeTimerObject+0x16
fffff880`02fb0a30 fffffa80`07b59440 : fffff880`0425132f fffff880`04350100 fffff880`043500f0 00000000`00011120 : athrx+0x2e297
fffff880`02fb0a38 fffff880`0425132f : fffff880`04350100 fffff880`043500f0 00000000`00011120 fffff880`0423b4f3 : 0xfffffa80`07b59440
fffff880`02fb0a40 fffff880`04350100 : fffff880`043500f0 00000000`00011120 fffff880`0423b4f3 fffffa80`07b582c0 : athrx+0x4432f
fffff880`02fb0a48 fffff880`043500f0 : 00000000`00011120 fffff880`0423b4f3 fffffa80`07b582c0 fffffa80`06a50000 : athrx+0x143100
fffff880`02fb0a50 00000000`00011120 : fffff880`0423b4f3 fffffa80`07b582c0 fffffa80`06a50000 fffffa80`069eb050 : athrx+0x1430f0
fffff880`02fb0a58 fffff880`0423b4f3 : fffffa80`07b582c0 fffffa80`06a50000 fffffa80`069eb050 fffff880`0423e878 : 0x11120
fffff880`02fb0a60 fffffa80`07b582c0 : fffffa80`06a50000 fffffa80`069eb050 fffff880`0423e878 fffffa80`06a5e030 : athrx+0x2e4f3
fffff880`02fb0a68 fffffa80`06a50000 : fffffa80`069eb050 fffff880`0423e878 fffffa80`06a5e030 fffff880`0423e0c9 : 0xfffffa80`07b582c0
fffff880`02fb0a70 fffffa80`069eb050 : fffff880`0423e878 fffffa80`06a5e030 fffff880`0423e0c9 fffffa80`07b58030 : 0xfffffa80`06a50000
fffff880`02fb0a78 fffff880`0423e878 : fffffa80`06a5e030 fffff880`0423e0c9 fffffa80`07b58030 00000000`00000000 : 0xfffffa80`069eb050
fffff880`02fb0a80 fffffa80`06a5e030 : fffff880`0423e0c9 fffffa80`07b58030 00000000`00000000 00000000`00000000 : athrx+0x31878
fffff880`02fb0a88 fffff880`0423e0c9 : fffffa80`07b58030 00000000`00000000 00000000`00000000 fffffa80`07b58000 : 0xfffffa80`06a5e030
fffff880`02fb0a90 fffffa80`07b58030 : 00000000`00000000 00000000`00000000 fffffa80`07b58000 fffffa80`06aa3740 : athrx+0x310c9
fffff880`02fb0a98 00000000`00000000 : 00000000`00000000 fffffa80`07b58000 fffffa80`06aa3740 fffff880`0423e069 : 0xfffffa80`07b58030


STACK_COMMAND:  kb

FOLLOWUP_IP: 
athrx+2e297
fffff880`0423b297 ??              ???

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  athrx+2e297

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: athrx

IMAGE_NAME:  athrx.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a2997be

FAILURE_BUCKET_ID:  X64_0xD1_athrx+2e297

BUCKET_ID:  X64_0xD1_athrx+2e297

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800143b5d6, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000010 

CURRENT_IRQL:  2

FAULTING_IP: 
ndis!NdisFreeTimerObject+16
fffff880`0143b5d6 488b5310        mov     rdx,qword ptr [rbx+10h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002fb0870 -- (.trap 0xfffff88002fb0870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88001472908
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800143b5d6 rsp=fffff88002fb0a00 rbp=fffff800030265a0
 r8=0000000000011120  r9=0000000000000000 r10=fffff80002e11000
r11=fffffa8007b58030 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ndis!NdisFreeTimerObject+0x16:
fffff880`0143b5d6 488b5310        mov     rdx,qword ptr [rbx+10h] ds:c040:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002e80ca9 to fffff80002e81740

STACK_TEXT:  
fffff880`02fb0728 fffff800`02e80ca9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fb0730 fffff800`02e7f920 : fffffa80`04778600 00000000`00000000 00000000`000007ff fffff800`02f8b194 : nt!KiBugCheckDispatch+0x69
fffff880`02fb0870 fffff880`0143b5d6 : fffffa80`05210680 fffff880`042cb5e0 fffffa80`07b59440 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02fb0a00 fffff880`0423b297 : fffffa80`07b59440 fffff880`0425132f fffff880`04350100 fffff880`043500f0 : ndis!NdisFreeTimerObject+0x16
fffff880`02fb0a30 fffffa80`07b59440 : fffff880`0425132f fffff880`04350100 fffff880`043500f0 00000000`00011120 : athrx+0x2e297
fffff880`02fb0a38 fffff880`0425132f : fffff880`04350100 fffff880`043500f0 00000000`00011120 fffff880`0423b4f3 : 0xfffffa80`07b59440
fffff880`02fb0a40 fffff880`04350100 : fffff880`043500f0 00000000`00011120 fffff880`0423b4f3 fffffa80`07b582c0 : athrx+0x4432f
fffff880`02fb0a48 fffff880`043500f0 : 00000000`00011120 fffff880`0423b4f3 fffffa80`07b582c0 fffffa80`06a50000 : athrx+0x143100
fffff880`02fb0a50 00000000`00011120 : fffff880`0423b4f3 fffffa80`07b582c0 fffffa80`06a50000 fffffa80`069eb050 : athrx+0x1430f0
fffff880`02fb0a58 fffff880`0423b4f3 : fffffa80`07b582c0 fffffa80`06a50000 fffffa80`069eb050 fffff880`0423e878 : 0x11120
fffff880`02fb0a60 fffffa80`07b582c0 : fffffa80`06a50000 fffffa80`069eb050 fffff880`0423e878 fffffa80`06a5e030 : athrx+0x2e4f3
fffff880`02fb0a68 fffffa80`06a50000 : fffffa80`069eb050 fffff880`0423e878 fffffa80`06a5e030 fffff880`0423e0c9 : 0xfffffa80`07b582c0
fffff880`02fb0a70 fffffa80`069eb050 : fffff880`0423e878 fffffa80`06a5e030 fffff880`0423e0c9 fffffa80`07b58030 : 0xfffffa80`06a50000
fffff880`02fb0a78 fffff880`0423e878 : fffffa80`06a5e030 fffff880`0423e0c9 fffffa80`07b58030 00000000`00000000 : 0xfffffa80`069eb050
fffff880`02fb0a80 fffffa80`06a5e030 : fffff880`0423e0c9 fffffa80`07b58030 00000000`00000000 00000000`00000000 : athrx+0x31878
fffff880`02fb0a88 fffff880`0423e0c9 : fffffa80`07b58030 00000000`00000000 00000000`00000000 fffffa80`07b58000 : 0xfffffa80`06a5e030
fffff880`02fb0a90 fffffa80`07b58030 : 00000000`00000000 00000000`00000000 fffffa80`07b58000 fffffa80`06aa3740 : athrx+0x310c9
fffff880`02fb0a98 00000000`00000000 : 00000000`00000000 fffffa80`07b58000 fffffa80`06aa3740 fffff880`0423e069 : 0xfffffa80`07b58030


STACK_COMMAND:  kb

FOLLOWUP_IP: 
athrx+2e297
fffff880`0423b297 ??              ???

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  athrx+2e297

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: athrx

IMAGE_NAME:  athrx.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a2997be

FAILURE_BUCKET_ID:  X64_0xD1_athrx+2e297

BUCKET_ID:  X64_0xD1_athrx+2e297

Followup: MachineOwner
---------
My System SpecsSystem Spec
23 Dec 2010   #3

Windows 7 Home Premium
 
 

I am not sure how i should do this. Could you help me get started?
My System SpecsSystem Spec
.


Reply

 BSOD




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 08:25 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33