Dell Studio 1558 Windows 7 Premium Blue Screen
I have a Dell Studio 1558 running Windows 7 Premium, it is about 5 months old. I had received a few blue screen errors over the last month or so, so i decided to reinstall to factory spec using the recovery partition. all went well, but i am still receiving blue screen every now and then. i have the minidump file available here http://www.orgaranix.com/minidump.zip I have also added the 'recovered from serious error' message below. Could someone please help me to understand what is causing the error as it is becoming very frustrating, and sending back to dell does NOT sound like something i want to do as last time i had them deliver something it took forever. Thanks in advance for any help, much appreciated. Luke Problem signature: Problem Event Name: BlueScreen OS Version: 6.1.7600.2.0.0.768.3 Locale ID: 2057 Additional information about the problem: BCCode: a BCP1: 0000000000000028 BCP2: 0000000000000002 BCP3: 0000000000000000 BCP4: FFFFF80002B74B42 OS Version: 6_1_7600 Service Pack: 0_0 Product: 768_1 Files that help describe the problem: C:\WINDOWS\Minidump\081910-20280-01.dmp C:\Users\Luke\AppData\Local\Temp\WER-123880-0.sysdata.xml Read our privacy statement online: http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0409 If the online privacy statement is not available, please read our privacy statement offline: C:\Windows\system32\en-US\erofflps.txt
August 19th, 2010 11:19am

IRQL_NOT_LESS_OR_EQUAL is usually thrown when there are older or buggier drivers in use, but since the faulting module is the kernel itself and it is accompanied by the first dump (KMODE_EXCEPTION_NOT_HANDLED) indicating a memory access violation, I would recommend starting by testing the RAM on the system using Windows Memory Diagnostic and memtest86+ (perform a longer test, possibly 5-8 hours) http://oca.microsoft.com/en/windiag.asp http://www.memtest.org Otherwise, have you installed any new hardware recently and is everything (drivers/BIOS/Firmware) up to date? 0: kd> !analyze -v ERROR: FindPlugIns 80070005 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002a826e0, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!ObfReferenceObject+20 fffff800`02a826e0 f0480fc11f lock xadd qword ptr [rdi],rbx EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cae0e0 ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. BUGCHECK_STR: 0x1E_c0000005 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff8800248a9a8 -- (.exr 0xfffff8800248a9a8) ExceptionAddress: fffff80002a826e0 (nt!ObfReferenceObject+0x0000000000000020) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff TRAP_FRAME: fffff8800248aa50 -- (.trap 0xfffff8800248aa50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=00740066006f0073 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002a826e0 rsp=fffff8800248abe0 rbp=0000000000000001 r8=0000000000000036 r9=0000000000000000 r10=fffffffffffffffe r11=0000000000007531 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!ObfReferenceObject+0x20: fffff800`02a826e0 f0480fc11f lock xadd qword ptr [rdi],rbx ds:ab98:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ab0a39 to fffff80002a76740 STACK_TEXT: fffff880`0248a1d8 fffff800`02ab0a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a826e0 00000000`00000000 : nt!KeBugCheckEx fffff880`0248a1e0 fffff800`02a75d82 : fffff880`0248a9a8 00000000`00000001 fffff880`0248aa50 fffffa80`064e9c30 : nt!KiDispatchException+0x1b9 fffff880`0248a870 fffff800`02a7468a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`0248aa50 fffff800`02a826e0 : 00000000`00000077 00000000`00000286 00000000`00000030 00000000`0000000b : nt!KiGeneralProtectionFault+0x10a fffff880`0248abe0 fffff800`02b60afc : fffffa80`04f0ef48 fffffa80`04f0ef48 00000000`00000001 00000000`00000000 : nt!ObfReferenceObject+0x20 fffff880`0248ac10 fffff800`02cdfdaf : fffffa80`04f0ef48 00000000`00000001 00000000`00000000 00000000`00007532 : nt!IopDisassociateThreadIrp+0x9c fffff880`0248ac40 fffff800`02d5ba2b : 00000000`00000000 ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x1e7aa fffff880`0248ac70 fffff800`02d5f72d : 00000000`00000000 fffff800`02d1ac00 fffffa80`04f0eb00 00000000`00000000 : nt!PspExitThread+0x58b fffff880`0248ad30 fffff800`02a54c26 : fffff800`02bf0e80 00000000`00000080 fffffa80`04f0eb60 fffff880`0124e534 : nt!PspTerminateThreadByPointer+0x4d fffff880`0248ad80 00000000`00000000 : fffff880`0248b000 fffff880`02485000 fffff880`0248a9c0 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiDispatchException+1b9 fffff800`02ab0a39 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiDispatchException+1b9 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9 BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9 Followup: MachineOwner --------- 2: kd> !analyze -v ERROR: FindPlugIns 80070005 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: ffffffffffffffd0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002a846e0, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb00e0 ffffffffffffffd0 CURRENT_IRQL: 2 FAULTING_IP: nt!ObfReferenceObject+20 fffff800`02a846e0 f0480fc11f lock xadd qword ptr [rdi],rbx CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff88006f6da50 -- (.trap 0xfffff88006f6da50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002a846e0 rsp=fffff88006f6dbe0 rbp=0000000000000001 r8=0000000000000002 r9=0000000000000000 r10=fffff80002a08000 r11=00000000000171ac r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!ObfReferenceObject+0x20: fffff800`02a846e0 f0480fc11f lock xadd qword ptr [rdi],rbx ds:9b78:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002a77ca9 to fffff80002a78740 STACK_TEXT: fffff880`06f6d908 fffff800`02a77ca9 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`06f6d910 fffff800`02a76920 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`06f6da50 fffff800`02a846e0 : fffffa80`00000017 00000000`00000030 00000000`00000030 00000000`0000000b : nt!KiPageFault+0x260 fffff880`06f6dbe0 fffff800`02b62afc : fffffa80`04d19b78 fffffa80`04d19b78 00000000`00000001 00000000`00000000 : nt!ObfReferenceObject+0x20 fffff880`06f6dc10 fffff800`02ce1daf : fffffa80`04d19b78 00000000`00000001 00000000`00000000 00000000`000171ad : nt!IopDisassociateThreadIrp+0x9c fffff880`06f6dc40 fffff800`02d5da2b : 00000000`00000000 ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x1e7aa fffff880`06f6dc70 fffff800`02d6172d : 00000000`00000000 fffff800`02d1cc00 fffffa80`04d19700 00000000`00000000 : nt!PspExitThread+0x58b fffff880`06f6dd30 fffff800`02a56c26 : fffff880`02b63180 00000000`00000080 fffffa80`04d19790 33333333`33333333 : nt!PspTerminateThreadByPointer+0x4d fffff880`06f6dd80 00000000`00000000 : fffff880`06f6e000 fffff880`06f68000 fffff880`06f6d9c0 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiPageFault+260 fffff800`02a76920 440f20c0 mov rax,cr8 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiPageFault+260 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260 BUCKET_ID: X64_0xA_nt!KiPageFault+260 Followup: MachineOwner --------- 0: kd> !analyze -v ERROR: FindPlugIns 80070005 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000028, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002b74b42, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc20e0 0000000000000028 CURRENT_IRQL: 2 FAULTING_IP: nt!IopDisassociateThreadIrp+e2 fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff88007910a80 -- (.trap 0xfffff88007910a80) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800627afe0 rdx=fffff80002c8f010 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002b74b42 rsp=fffff88007910c10 rbp=0000000000000001 r8=0000000000000018 r9=0000000000000000 r10=fffff80002a1a000 r11=0000000000007532 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac pe cy nt!IopDisassociateThreadIrp+0xe2: fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h] ds:00000000`00000028=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002a89ca9 to fffff80002a8a740 STACK_TEXT: fffff880`07910938 fffff800`02a89ca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`07910940 fffff800`02a88920 : 00000000`00000000 fffffa80`04751428 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`07910a80 fffff800`02b74b42 : fffffa80`04751428 fffffa80`04751428 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260 fffff880`07910c10 fffff800`02cf3daf : fffffa80`04751428 00000000`00000001 00000000`00000000 00000000`00007533 : nt!IopDisassociateThreadIrp+0xe2 fffff880`07910c40 fffff800`02d6fa2b : 00000000`00000000 ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x1e7aa fffff880`07910c70 fffff800`02d7372d : 00000000`00000000 fffff800`02d2ec00 fffffa80`04751000 00000000`00000000 : nt!PspExitThread+0x58b fffff880`07910d30 fffff800`02a68c26 : fffff800`02c04e80 00000000`00000080 fffffa80`04751040 fffff880`01238534 : nt!PspTerminateThreadByPointer+0x4d fffff880`07910d80 00000000`00000000 : fffff880`07911000 fffff880`0790b000 fffff880`079109c0 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!IopDisassociateThreadIrp+e2 fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!IopDisassociateThreadIrp+e2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0xA_nt!IopDisassociateThreadIrp+e2 BUCKET_ID: X64_0xA_nt!IopDisassociateThreadIrp+e2 Followup: MachineOwner --------- 0: kd> .trap 0xfffff88007910a80 NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800627afe0 rdx=fffff80002c8f010 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002b74b42 rsp=fffff88007910c10 rbp=0000000000000001 r8=0000000000000018 r9=0000000000000000 r10=fffff80002a1a000 r11=0000000000007532 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac pe cy nt!IopDisassociateThreadIrp+0xe2: fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h] ds:00000000`00000028=???????????????? 0: kd> kv *** Stack trace for last set context - .thread/.cxr resets it Child-SP RetAddr : Args to Child : Call Site fffff880`07910c10 fffff800`02cf3daf : fffffa80`04751428 00000000`00000001 00000000`00000000 00000000`00007533 : nt!IopDisassociateThreadIrp+0xe2 fffff880`07910c40 fffff800`02d6fa2b : 00000000`00000000 ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x1e7aa fffff880`07910c70 fffff800`02d7372d : 00000000`00000000 fffff800`02d2ec00 fffffa80`04751000 00000000`00000000 : nt!PspExitThread+0x58b fffff880`07910d30 fffff800`02a68c26 : fffff800`02c04e80 00000000`00000080 fffffa80`04751040 fffff880`01238534 : nt!PspTerminateThreadByPointer+0x4d fffff880`07910d80 00000000`00000000 : fffff880`07911000 fffff880`0790b000 fffff880`079109c0 00000000`00000000 : nt!KxStartSystemThread+0x16 -- Mike Burr
Free Windows Admin Tool Kit Click here and download it now
August 19th, 2010 6:17pm

Hi Mike, thanks for your response. I havent added any other hardware really, i use an external hdd (samsung s2) iphone, and occasionally and external hdd sata dock, but i get blue screen away from hom aswell so i dont thinkit is that. there is a later version of the bios, so i will update that, as well as run the RAM test over night and see what the results are. Thanks again, realy appriciate it Luke
August 19th, 2010 6:29pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics