Mini Dump File for a Dell Precison workstation T3500

Discussion in 'Hardware' started by abates4, Mar 4, 2011.

  1. abates4

    abates4 Private E-2

    This is for a windows Vista machine. I am not sure if this is hardware or a software related issue. So any help would be great!!!!


    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.



    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830
    Machine Name:
    Kernel base = 0xfffff800`01c0d000 PsLoadedModuleList = 0xfffff800`01dd1dd0
    Debug session time: Fri Mar 4 10:11:59.148 2011 (UTC - 5:00)
    System Uptime: 0 days 3:31:13.929
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.
    BugCheck 3B, {c0000005, fffff80001edcd4b, fffffa600c0181a0, 0}
    Probably caused by : ntkrnlmp.exe ( nt!AlpcpReceiveSynchronousReply+7b )

    Followup: MachineOwner
    ---------

    7: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80001edcd4b, Address of the instruction which caused the bugcheck
    Arg3: fffffa600c0181a0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    FAULTING_IP:
    nt!AlpcpReceiveSynchronousReply+7b
    fffff800`01edcd4b f0480fba6ff800 lock bts qword ptr [rdi-8],0

    CONTEXT: fffffa600c0181a0 -- (.cxr 0xfffffa600c0181a0)
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=fffffa8009e14770 rdi=00000000c1000000
    rip=fffff80001edcd4b rsp=fffffa600c018a00 rbp=0000000000000000
    r8=0000000000000000 r9=0000000000000000 r10=0000000000000007
    r11=fffffa80055020b0 r12=fffffa600c018a98 r13=fffffa8008112410
    r14=000000000561e3c0 r15=0000000000000000
    iopl=0 nv up ei pl nz na po nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
    nt!AlpcpReceiveSynchronousReply+0x7b:
    fffff800`01edcd4b f0480fba6ff800 lock bts qword ptr [rdi-8],0 ds:002b:00000000`c0fffff8=????????????????
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0x3B

    PROCESS_NAME: iexplore.exe

    CURRENT_IRQL: 0

    LAST_CONTROL_TRANSFER: from fffff80001ed97a6 to fffff80001edcd4b

    STACK_TEXT:
    fffffa60`0c018a00 fffff800`01ed97a6 : fffffa80`08112410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpReceiveSynchronousReply+0x7b
    fffffa60`0c018a60 fffff800`01edd9e5 : fffffa80`08112410 00000000`00020000 00000000`0561e3c0 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x24f
    fffffa60`0c018b80 fffff800`01eddaa0 : 00000000`00000000 00000000`00000000 fffffa80`054ef8c0 00000000`00000001 : nt!LpcpRequestWaitReplyPort+0x94
    fffffa60`0c018be0 fffff800`01c66ef3 : fffffa80`09e14770 fffffa60`0c018ca0 00000000`00000001 fffffa80`08112410 : nt!NtRequestWaitReplyPort+0x70
    fffffa60`0c018c20 00000000`778c6f3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0561e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778c6f3a


    FOLLOWUP_IP:
    nt!AlpcpReceiveSynchronousReply+7b
    fffff800`01edcd4b f0480fba6ff800 lock bts qword ptr [rdi-8],0

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!AlpcpReceiveSynchronousReply+7b

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 49e0237f

    STACK_COMMAND: .cxr 0xfffffa600c0181a0 ; kb

    FAILURE_BUCKET_ID: X64_0x3B_nt!AlpcpReceiveSynchronousReply+7b

    BUCKET_ID: X64_0x3B_nt!AlpcpReceiveSynchronousReply+7b

    Followup: MachineOwner
    ---------

    7: kd> .cxr 0xfffffa600c0181a0
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=fffffa8009e14770 rdi=00000000c1000000
    rip=fffff80001edcd4b rsp=fffffa600c018a00 rbp=0000000000000000
    r8=0000000000000000 r9=0000000000000000 r10=0000000000000007
    r11=fffffa80055020b0 r12=fffffa600c018a98 r13=fffffa8008112410
    r14=000000000561e3c0 r15=0000000000000000
    iopl=0 nv up ei pl nz na po nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
    nt!AlpcpReceiveSynchronousReply+0x7b:
    fffff800`01edcd4b f0480fba6ff800 lock bts qword ptr [rdi-8],0 ds:002b:00000000`c0fffff8=????????????????
    7: kd> lmvm nt
    start end module name
    fffff800`01c0d000 fffff800`02125000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\98C6BA00FE174241BA3FDB915995EA9C2\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: c:\symbols\ntkrnlmp.exe\49E0237F518000\ntkrnlmp.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Timestamp: Sat Apr 11 00:58:39 2009 (49E0237F)
    CheckSum: 00487B94
    ImageSize: 00518000
    File version: 6.0.6002.18005
    Product version: 6.0.6002.18005
    File flags: 0 (Mask 3F)
    File OS: 40004 NT Win32
    File type: 1.0 App
    File date: 00000000.00000000
    Translations: 0409.04b0
    CompanyName: Microsoft Corporation
    ProductName: Microsoft® Windows® Operating System
    InternalName: ntkrnlmp.exe
    OriginalFilename: ntkrnlmp.exe
    ProductVersion: 6.0.6002.18005
    FileVersion: 6.0.6002.18005 (lh_sp2rtm.090410-1830)
    FileDescription: NT Kernel & System
    LegalCopyright: © Microsoft Corporation. All rights reserved.


    Thanks
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds