Any thoughts anyone? Is there any additional info that I can provide to help?
-Kevin
Hi Kevin
the majority of these crashes were caused by your atheros wifi driver ( athr.sys). You also have drivers that are over 2 years old
I would dl a fresh copy of the wifi driver and install it
update all the drivers listed below
run a system file check
(type cmd in search>right click and run as admin>sfc /scannow
If you are overclocking stop
:et us know if you need help
Ken J+
Code:
021510-15459-01.dmp 2/15/2010 2:42:34 PM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x8e07e73a athr.sys athr.sys+4473a 32-bit
021410-17596-01.dmp 2/14/2010 4:48:00 PM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x9187173a athr.sys athr.sys+4473a 32-bit
021410-16317-01.dmp 2/14/2010 10:37:10 PM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x8e44673a athr.sys athr.sys+4473a 32-bit
021210-17877-01.dmp 2/12/2010 7:13:44 PM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x8d27773a USBPORT.SYS USBPORT.SYS+114d 32-bit
013110-20155-01.dmp 1/31/2010 5:21:24 PM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x8f26c73a athr.sys athr.sys+4473a 32-bit
013010-19671-01.dmp 1/30/2010 4:08:08 PM PAGE_FAULT_IN_NONPAGED_AREA 0x00000050 0x8866f900 0x00000000 0x828e7757 0x00000000 ntkrnlpa.exe ntkrnlpa.exe+858e3 32-bit
013010-16723-01.dmp 1/30/2010 5:49:38 PM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x8f06a73a athr.sys athr.sys+4473a 32-bit
012710-21902-01.dmp 1/27/2010 5:21:30 AM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x9227873a ndis.sys ndis.sys+56670 32-bit
012410-22152-01.dmp 1/24/2010 11:21:06 PM DRIVER_IRQL_NOT_LESS_OR_EQUAL 0x000000d1 0x00000054 0x00000002 0x00000000 0x8dc5273a athr.sys athr.sys+4473a 32-bit
OLD DRIVERS THAT NEED TO BE UPDATED
Code:
mdmxsdk.sys 0x8c1f5000 0x8c1f8180 0x00003180 0x449716a3 6/19/2006 4:26:59 PM
secdrv.SYS 0x946b9000 0x946c3000 0x0000a000 0x45080528 9/13/2006 8:18:32 AM
rixdptsk.sys 0x8dd92000 0x8dde3000 0x00051000 0x455a6ed7 11/14/2006 8:35:19 PM
xaudio.sys 0x946f1000 0x946f9000 0x00008000 0x456cd802 11/28/2006 7:44:50 PM
HSX_CNXT.sys 0x92b0e000 0x92bc2000 0x000b4000 0x458c36a4 12/22/2006 2:48:52 PM
HSXHWAZL.sys 0x8f189000 0x8f1c6000 0x0003d000 0x458c36ae 12/22/2006 2:49:02 PM
HSX_DPV.sys 0x92a0b000 0x92b0e000 0x00103000 0x458c36fd 12/22/2006 2:50:21 PM
ibmpmdrv.sys 0x825f8000 0x825fb880 0x00003880 0x465e9ae7 5/31/2007 4:52:39 AM
SynTP.sys 0x8d74e000 0x8d778980 0x0002a980 0x468d8cee 7/5/2007 7:29:34 PM
rimsptsk.sys 0x8dd7e000 0x8dd92000 0x00014000 0x46ad4220 7/29/2007 8:42:56 PM
rimmptsk.sys 0x8dd6d000 0x8dd7e000 0x00011000 0x46b9ac0f 8/8/2007 6:42:07 AM
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\New folder\012710-21902-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x8280e000 PsLoadedModuleList = 0x82956810
Debug session time: Wed Jan 27 07:20:07.235 2010 (GMT-5)
System Uptime: 0 days 1:57:21.937
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {54, 2, 0, 9227873a}
Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+4473a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000054, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 9227873a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82976718
Unable to read MiSystemVaType memory at 82956160
00000054
CURRENT_IRQL: 2
FAULTING_IP:
athr+4473a
9227873a 8b4254 mov eax,dword ptr [edx+54h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 807e28b0 -- (.trap 0xffffffff807e28b0)
ErrCode = 00000000
eax=86774cbc ebx=8615c6a8 ecx=85ed8828 edx=00000000 esi=00000000 edi=00000000
eip=9227873a esp=807e2924 ebp=807e2944 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
athr+0x4473a:
9227873a 8b4254 mov eax,dword ptr [edx+54h] ds:0023:00000054=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 9227873a to 828547eb
STACK_TEXT:
807e28b0 9227873a badb0d00 00000000 85e40023 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
807e2944 92275c52 84ae53a0 85ed8828 00000000 athr+0x4473a
807e296c 9229cfc0 84ae52c0 85ed8828 00000018 athr+0x41c52
807e29c0 9229d8c7 8591e020 85ed8828 00000000 athr+0x68fc0
807e2b14 9224ecfe 85ed8828 807e2b30 9224bd2f athr+0x698c7
807e2b20 9224bd2f 85ed8828 85eb6d60 807e2b40 athr+0x1acfe
807e2b30 922939c7 85eb6d60 85ed8828 807e2b68 athr+0x17d2f
807e2b40 922936b7 85eb6360 85ed8828 00000000 athr+0x5f9c7
807e2b68 9224762a 85eb6360 85ed8828 00000000 athr+0x5f6b7
807e2b94 92247414 85e466e8 85ed87a0 8615c6a8 athr+0x1362a
807e2bac 92248499 85e466e8 86c95a10 84ad90f0 athr+0x13414
807e2bc4 92248525 85e466e8 807e2bdc 922a5514 athr+0x14499
807e2bd0 922a5514 85e466e8 807e2bf8 922aa1bf athr+0x14525
807e2bdc 922aa1bf 85e66020 86150022 807c7a54 athr+0x71514
807e2bf8 9224eabd 85e66020 807e2c14 92235761 athr+0x761bf
807e2c04 92235761 8591e020 85e466e8 807e2c50 athr+0x1aabd
807e2c14 888d5309 85e466e8 00000000 807e2c40 athr+0x1761
807e2c50 888809f4 8615c6bc 0015c6a8 00000000 ndis!ndisMiniportDpc+0xe2
807e2c78 828763b5 8615c6bc 8615c6a8 00000000 ndis!ndisInterruptDpc+0xaf
807e2cd4 82876218 807c6120 807cb800 00000000 nt!KiExecuteAllDpcs+0xf9
807e2d20 82876038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xd5
807e2d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
athr+4473a
9227873a 8b4254 mov eax,dword ptr [edx+54h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: athr+4473a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athr
IMAGE_NAME: athr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4acea1f4
FAILURE_BUCKET_ID: 0xD1_athr+4473a
BUCKET_ID: 0xD1_athr+4473a
Followup: MachineOwner
---------