New
#1
BSOD error Blue Screen Please Help
Hello, I've just purchased a dell studio xps 1340 and i've been randomly getting a blue screen error from time to time...
here's the error description:
Code:Problem signature Problem Event Name: BlueScreen OS Version: 6.1.7600.2.0.0.256.48 Locale ID: 1033 Files that help describe the problem (some files may no longer be available) 020110-22994-01.dmp sysdata.xml View a temporary copy of these files Warning: If a virus or other security threat caused the problem, opening a copy of the files could harm your computer. Extra information about the problem BCCode: 1e BCP1: FFFFFFFFC0000005 BCP2: FFFFF80002AA6B74 BCP3: 0000000000000000 BCP4: FFFFFFFFFFFFFFFF OS Version: 6_1_7600 Service Pack: 0_0 Product: 256_1 The Laptop is a Dell Studio XPS 1340, Intel Core 2 Duo p9600 2.66, 8GB ram, Nvidia 9500M 256MB Runing on windows 7 x64. The BSOD just happens randomly. It hasn't happened often but I just bought the computer and I'm not sure if it would be adviceable to return it. Thanks a lot, I'm copying the minidump info..... -------------------------------------------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\020110-22994-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\debug_symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c51e50 Debug session time: Mon Feb 1 15:32:09.665 2010 (GMT-3) System Uptime: 0 days 0:21:24.491 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ............................................... Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, fffff80002aa6b74, 0, ffffffffffffffff} Probably caused by : memory_corruption ( nt!MiUnlinkFreeOrZeroedPage+1ca ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002aa6b74, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiUnlinkFreeOrZeroedPage+1ca fffff800`02aa6b74 48893cc2 mov qword ptr [rdx+rax*8],rdi EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbc0e0 ffffffffffffffff CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x1E PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80002ac5a17 to fffff80002a85f00 STACK_TEXT: fffff880`08acced8 fffff800`02ac5a17 : 00000000`0000001e ffffffff`c0000005 fffff800`02aa6b74 00000000`00000000 : nt!KeBugCheckEx fffff880`08accee0 fffff800`02a85542 : fffff880`08acd6b8 fffffa80`048446a0 fffff880`08acd760 fffffa80`07200230 : nt! ?? ::FNODOBFM::`string'+0x460da fffff880`08acd580 fffff800`02a83e4a : fffff8a0`06b2d140 00000000`00000000 fffffa80`00000002 fffff8a0`06adf780 : nt!KiExceptionDispatch+0xc2 fffff880`08acd760 fffff800`02aa6b74 : fffffa80`05cc1f30 00000000`00000000 fa800001`eeb51025 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a fffff880`08acd8f0 fffff800`02aab818 : fffff880`08acd9c0 00000000`001816ce fffffa80`048446a0 00000000`040148b8 : nt!MiUnlinkFreeOrZeroedPage+0x1ca fffff880`08acd960 fffff800`02aa127a : fffff680`0003abc0 00000000`00000002 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveAnyPage+0x1d8 fffff880`08acda80 fffff800`02a83fee : 00000000`00000001 00000000`00000007 fffffa80`07cafb01 fffffa80`0cd47501 : nt!MmAccessFault+0x169a fffff880`08acdbe0 00000000`6e25f12c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e 00000000`0444deb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6e25f12c STACK_COMMAND: kb FOLLOWUP_IP: nt!MiUnlinkFreeOrZeroedPage+1ca fffff800`02aa6b74 48893cc2 mov qword ptr [rdx+rax*8],rdi SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: nt!MiUnlinkFreeOrZeroedPage+1ca FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x1E_nt!MiUnlinkFreeOrZeroedPage+1ca BUCKET_ID: X64_0x1E_nt!MiUnlinkFreeOrZeroedPage+1ca Followup: MachineOwner --------- 1: kd> lmvm nt start end module name fffff800`02a14000 fffff800`02ff1000 nt (pdb symbols) c:\debug_symbols\ntkrnlmp.pdb\F8E2A8B5C9B74BF4A6E4A48F180099942\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\debug_symbols\ntkrnlmp.exe\4A5BC6005dd000\ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Mon Jul 13 20:40:48 2009 (4A5BC600) CheckSum: 0054B487 ImageSize: 005DD000 File version: 6.1.7600.16385 Product version: 6.1.7600.16385 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16385 FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.
hope someone can help me... thanks a lot