Dell Studio 1558 Windows 7 Premium Blue Screen
I have a Dell Studio 1558 running Windows 7 Premium, it is about 5 months old. I had received a few blue screen errors over the last month or so, so i decided to reinstall to factory spec using the recovery partition. all went well, but i am still receiving
blue screen every now and then. i have the minidump file available here
http://www.orgaranix.com/minidump.zip
I have also added the 'recovered from serious error' message below.
Could someone please help me to understand what is causing the error as it is becoming very frustrating, and sending back to dell does NOT sound like something i want to do as last time i had them deliver something it took forever.
Thanks in advance for any help, much appreciated.
Luke
Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.768.3
Locale ID: 2057
Additional information about the problem:
BCCode: a
BCP1: 0000000000000028
BCP2: 0000000000000002
BCP3: 0000000000000000
BCP4: FFFFF80002B74B42
OS Version: 6_1_7600
Service Pack: 0_0
Product: 768_1
Files that help describe the problem:
C:\WINDOWS\Minidump\081910-20280-01.dmp
C:\Users\Luke\AppData\Local\Temp\WER-123880-0.sysdata.xml
Read our privacy statement online:
http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0409
If the online privacy statement is not available, please read our privacy statement offline:
C:\Windows\system32\en-US\erofflps.txt
August 19th, 2010 11:19am
IRQL_NOT_LESS_OR_EQUAL is usually thrown when there are older or buggier
drivers in use, but since the faulting module is the kernel itself and
it is accompanied by the first dump (KMODE_EXCEPTION_NOT_HANDLED)
indicating a memory access violation, I would recommend starting by
testing the RAM on the system using Windows Memory Diagnostic and
memtest86+ (perform a longer test, possibly 5-8 hours)
http://oca.microsoft.com/en/windiag.asp
http://www.memtest.org
Otherwise, have you installed any new hardware recently and is
everything (drivers/BIOS/Firmware) up to date?
0: kd> !analyze -v
ERROR: FindPlugIns 80070005
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a826e0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx
referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObfReferenceObject+20
fffff800`02a826e0 f0480fc11f lock xadd qword ptr [rdi],rbx
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cae0e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx
referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff8800248a9a8 -- (.exr 0xfffff8800248a9a8)
ExceptionAddress: fffff80002a826e0
(nt!ObfReferenceObject+0x0000000000000020)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff8800248aa50 -- (.trap 0xfffff8800248aa50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=00740066006f0073
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a826e0 rsp=fffff8800248abe0 rbp=0000000000000001
r8=0000000000000036 r9=0000000000000000 r10=fffffffffffffffe
r11=0000000000007531 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfReferenceObject+0x20:
fffff800`02a826e0 f0480fc11f lock xadd qword ptr [rdi],rbx
ds:ab98:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ab0a39 to fffff80002a76740
STACK_TEXT:
fffff880`0248a1d8 fffff800`02ab0a39 : 00000000`0000001e
ffffffff`c0000005 fffff800`02a826e0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0248a1e0 fffff800`02a75d82 : fffff880`0248a9a8
00000000`00000001 fffff880`0248aa50 fffffa80`064e9c30 :
nt!KiDispatchException+0x1b9
fffff880`0248a870 fffff800`02a7468a : 00000000`00000000
00000000`00000000 00000000`00000000 00000000`00000000 :
nt!KiExceptionDispatch+0xc2
fffff880`0248aa50 fffff800`02a826e0 : 00000000`00000077
00000000`00000286 00000000`00000030 00000000`0000000b :
nt!KiGeneralProtectionFault+0x10a
fffff880`0248abe0 fffff800`02b60afc : fffffa80`04f0ef48
fffffa80`04f0ef48 00000000`00000001 00000000`00000000 :
nt!ObfReferenceObject+0x20
fffff880`0248ac10 fffff800`02cdfdaf : fffffa80`04f0ef48
00000000`00000001 00000000`00000000 00000000`00007532 :
nt!IopDisassociateThreadIrp+0x9c
fffff880`0248ac40 fffff800`02d5ba2b : 00000000`00000000
ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ??
::NNGAKEGL::`string'+0x1e7aa
fffff880`0248ac70 fffff800`02d5f72d : 00000000`00000000
fffff800`02d1ac00 fffffa80`04f0eb00 00000000`00000000 :
nt!PspExitThread+0x58b
fffff880`0248ad30 fffff800`02a54c26 : fffff800`02bf0e80
00000000`00000080 fffffa80`04f0eb60 fffff880`0124e534 :
nt!PspTerminateThreadByPointer+0x4d
fffff880`0248ad80 00000000`00000000 : fffff880`0248b000
fffff880`02485000 fffff880`0248a9c0 00000000`00000000 :
nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDispatchException+1b9
fffff800`02ab0a39 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiDispatchException+1b9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9
BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9
Followup: MachineOwner
---------
2: kd> !analyze -v
ERROR: FindPlugIns 80070005
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address
at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only
on chips which support this level of status)
Arg4: fffff80002a846e0, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb00e0
ffffffffffffffd0
CURRENT_IRQL: 2
FAULTING_IP:
nt!ObfReferenceObject+20
fffff800`02a846e0 f0480fc11f lock xadd qword ptr [rdi],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88006f6da50 -- (.trap 0xfffff88006f6da50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a846e0 rsp=fffff88006f6dbe0 rbp=0000000000000001
r8=0000000000000002 r9=0000000000000000 r10=fffff80002a08000
r11=00000000000171ac r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfReferenceObject+0x20:
fffff800`02a846e0 f0480fc11f lock xadd qword ptr [rdi],rbx
ds:9b78:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a77ca9 to fffff80002a78740
STACK_TEXT:
fffff880`06f6d908 fffff800`02a77ca9 : 00000000`0000000a
ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`06f6d910 fffff800`02a76920 : 00000000`00000000
00000000`00000001 00000000`00000000 00000000`00000000 :
nt!KiBugCheckDispatch+0x69
fffff880`06f6da50 fffff800`02a846e0 : fffffa80`00000017
00000000`00000030 00000000`00000030 00000000`0000000b : nt!KiPageFault+0x260
fffff880`06f6dbe0 fffff800`02b62afc : fffffa80`04d19b78
fffffa80`04d19b78 00000000`00000001 00000000`00000000 :
nt!ObfReferenceObject+0x20
fffff880`06f6dc10 fffff800`02ce1daf : fffffa80`04d19b78
00000000`00000001 00000000`00000000 00000000`000171ad :
nt!IopDisassociateThreadIrp+0x9c
fffff880`06f6dc40 fffff800`02d5da2b : 00000000`00000000
ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ??
::NNGAKEGL::`string'+0x1e7aa
fffff880`06f6dc70 fffff800`02d6172d : 00000000`00000000
fffff800`02d1cc00 fffffa80`04d19700 00000000`00000000 :
nt!PspExitThread+0x58b
fffff880`06f6dd30 fffff800`02a56c26 : fffff880`02b63180
00000000`00000080 fffffa80`04d19790 33333333`33333333 :
nt!PspTerminateThreadByPointer+0x4d
fffff880`06f6dd80 00000000`00000000 : fffff880`06f6e000
fffff880`06f68000 fffff880`06f6d9c0 00000000`00000000 :
nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02a76920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
0: kd> !analyze -v
ERROR: FindPlugIns 80070005
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address
at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only
on chips which support this level of status)
Arg4: fffff80002b74b42, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc20e0
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopDisassociateThreadIrp+e2
fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88007910a80 -- (.trap 0xfffff88007910a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800627afe0
rdx=fffff80002c8f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b74b42 rsp=fffff88007910c10 rbp=0000000000000001
r8=0000000000000018 r9=0000000000000000 r10=fffff80002a1a000
r11=0000000000007532 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!IopDisassociateThreadIrp+0xe2:
fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h]
ds:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a89ca9 to fffff80002a8a740
STACK_TEXT:
fffff880`07910938 fffff800`02a89ca9 : 00000000`0000000a
00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07910940 fffff800`02a88920 : 00000000`00000000
fffffa80`04751428 00000000`00000000 00000000`00000000 :
nt!KiBugCheckDispatch+0x69
fffff880`07910a80 fffff800`02b74b42 : fffffa80`04751428
fffffa80`04751428 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`07910c10 fffff800`02cf3daf : fffffa80`04751428
00000000`00000001 00000000`00000000 00000000`00007533 :
nt!IopDisassociateThreadIrp+0xe2
fffff880`07910c40 fffff800`02d6fa2b : 00000000`00000000
ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ??
::NNGAKEGL::`string'+0x1e7aa
fffff880`07910c70 fffff800`02d7372d : 00000000`00000000
fffff800`02d2ec00 fffffa80`04751000 00000000`00000000 :
nt!PspExitThread+0x58b
fffff880`07910d30 fffff800`02a68c26 : fffff800`02c04e80
00000000`00000080 fffffa80`04751040 fffff880`01238534 :
nt!PspTerminateThreadByPointer+0x4d
fffff880`07910d80 00000000`00000000 : fffff880`07911000
fffff880`0790b000 fffff880`079109c0 00000000`00000000 :
nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IopDisassociateThreadIrp+e2
fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!IopDisassociateThreadIrp+e2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!IopDisassociateThreadIrp+e2
BUCKET_ID: X64_0xA_nt!IopDisassociateThreadIrp+e2
Followup: MachineOwner
---------
0: kd> .trap 0xfffff88007910a80
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800627afe0
rdx=fffff80002c8f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b74b42 rsp=fffff88007910c10 rbp=0000000000000001
r8=0000000000000018 r9=0000000000000000 r10=fffff80002a1a000
r11=0000000000007532 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!IopDisassociateThreadIrp+0xe2:
fffff800`02b74b42 488b5828 mov rbx,qword ptr [rax+28h]
ds:00000000`00000028=????????????????
0: kd> kv
*** Stack trace for last set context - .thread/.cxr resets it
Child-SP RetAddr : Args to Child
: Call Site
fffff880`07910c10 fffff800`02cf3daf : fffffa80`04751428
00000000`00000001 00000000`00000000 00000000`00007533 :
nt!IopDisassociateThreadIrp+0xe2
fffff880`07910c40 fffff800`02d6fa2b : 00000000`00000000
ffffffff`fffe7960 00000000`00000000 00000000`00000000 : nt! ??
::NNGAKEGL::`string'+0x1e7aa
fffff880`07910c70 fffff800`02d7372d : 00000000`00000000
fffff800`02d2ec00 fffffa80`04751000 00000000`00000000 :
nt!PspExitThread+0x58b
fffff880`07910d30 fffff800`02a68c26 : fffff800`02c04e80
00000000`00000080 fffffa80`04751040 fffff880`01238534 :
nt!PspTerminateThreadByPointer+0x4d
fffff880`07910d80 00000000`00000000 : fffff880`07911000
fffff880`0790b000 fffff880`079109c0 00000000`00000000 :
nt!KxStartSystemThread+0x16
-- Mike Burr
Free Windows Admin Tool Kit Click here and download it now
August 19th, 2010 6:17pm
Hi Mike, thanks for your response. I havent added any other hardware really, i use an external hdd (samsung s2) iphone, and occasionally and external hdd sata dock, but i get blue screen away from hom aswell so i dont thinkit is that. there is a later version
of the bios, so i will update that, as well as run the RAM test over night and see what the results are.
Thanks again, realy appriciate it
Luke
August 19th, 2010 6:29pm