Microsoft (R) Windows Debugger Version 6.4.0007.2 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\MEMORY.DMP] Kernel Complete Dump File: Full address space is available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: C:\WINDOWS\Symbols Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 2600.xpsp_sp2_gdr.050301-1519 Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a420 Debug session time: Wed Apr 20 23:36:52.125 2005 (GMT+2) System Uptime: 0 days 7:14:20.704 WARNING: Process directory table base 37967000 doesn't match CR3 00039000 WARNING: Process directory table base 37967000 doesn't match CR3 00039000 Loading Kernel Symbols .................................................................................................................................. Loading unloaded module list .......................... Loading User Symbols ........................................................... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 9C, {0, 8054d370, c4024000, 136} *** WARNING: Unable to verify checksum for atioglxx.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for atioglxx.dll - *** WARNING: Unable to verify checksum for uo_ui_mp_x86.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for uo_ui_mp_x86.dll - *** WARNING: Unable to verify checksum for CoDUOMP.exe *** ERROR: Module load completed but symbols could not be loaded for CoDUOMP.exe Probably caused by : ntoskrnl.exe ( nt!KdPitchDebugger+ef4 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MACHINE_CHECK_EXCEPTION (9c) A fatal Machine Check Exception has occurred. KeBugCheckEx parameters; x86 Processors If the processor has ONLY MCE feature available (For example Intel Pentium), the parameters are: 1 - Low 32 bits of P5_MC_TYPE MSR 2 - Address of MCA_EXCEPTION structure 3 - High 32 bits of P5_MC_ADDR MSR 4 - Low 32 bits of P5_MC_ADDR MSR If the processor also has MCA feature available (For example Intel Pentium Pro), the parameters are: 1 - Bank number 2 - Address of MCA_EXCEPTION structure 3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error 4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error IA64 Processors 1 - Bugcheck Type 1 - MCA_ASSERT 2 - MCA_GET_STATEINFO SAL returned an error for SAL_GET_STATEINFO while processing MCA. 3 - MCA_CLEAR_STATEINFO SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA. 4 - MCA_FATAL FW reported a fatal MCA. 5 - MCA_NONFATAL SAL reported a recoverable MCA and we don't support currently support recovery or SAL generated an MCA and then couldn't produce an error record. 0xB - INIT_ASSERT 0xC - INIT_GET_STATEINFO SAL returned an error for SAL_GET_STATEINFO while processing INIT event. 0xD - INIT_CLEAR_STATEINFO SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event. 0xE - INIT_FATAL Not used. 2 - Address of log 3 - Size of log 4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO AMD64 Processors 1 - Bank number 2 - Address of MCA_EXCEPTION structure 3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error 4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error Arguments: Arg1: 00000000 Arg2: 8054d370 Arg3: c4024000 Arg4: 00000136 Debugging Details: ------------------ BUGCHECK_STR: 0x9C_IA32_AuthenticAMD DEFAULT_BUCKET_ID: DRIVER_FAULT LAST_CONTROL_TRANSFER: from 806f18df to 8053331e SYMBOL_ON_RAW_STACK: 1 STACK_TEXT: 8054d348 806f18df 0000009c 00000000 8054d370 nt!KeBugCheckEx+0x1b 8054d474 806ecc2e 80042000 00000000 00000000 hal!HalpMcaExceptionHandler+0xdd 8054d474 6915b07d 80042000 00000000 00000000 hal!HalpMcaExceptionHandlerWrapper+0x46 WARNING: Stack unwind information not available. Following frames may be wrong. 3dc8c8ca 17851fd7 fdf10c5e 02170018 f58afe20 atioglxx!atiPPHSN+0xb5dfd 2298216f 000238ff 00013800 0009ca00 ffa2a500 0x17851fd7 2298216f 000238ff 00013800 0009ca00 ffa2a500 0x238ff fff9a800 00000000 00000000 00000000 00000000 0x238ff STACK_COMMAND: dds @$csp ; kb FOLLOWUP_IP: nt!KdPitchDebugger+ef4 8054d370 0100 add [eax],eax FOLLOWUP_NAME: MachineOwner SYMBOL_NAME: nt!KdPitchDebugger+ef4 MODULE_NAME: nt IMAGE_NAME: ntoskrnl.exe DEBUG_FLR_IMAGE_TIMESTAMP: 42250ff9 FAILURE_BUCKET_ID: 0x9C_IA32_AuthenticAMD_nt!KdPitchDebugger+ef4 BUCKET_ID: 0x9C_IA32_AuthenticAMD_nt!KdPitchDebugger+ef4 Followup: MachineOwner ---------