nyankoframe (
nyankoframe) wrote2004-03-04 01:32 pm
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Debugging a blue screen
kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MACHINE_CHECK_EXCEPTION (9c) A fatal Machine Check Exception has occurred. KeBugCheckEx parameters; x86 Processors If the processor has ONLY MCE feature available (For example Intel Pentium), the parameters are: 1 - Low 32 bits of P5_MC_TYPE MSR 2 - Address of MCA_EXCEPTION structure 3 - High 32 bits of P5_MC_ADDR MSR 4 - Low 32 bits of P5_MC_ADDR MSR If the processor also has MCA feature available (For example Intel Pentium Pro), the parameters are: 1 - Bank number 2 - Address of MCA_EXCEPTION structure 3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error 4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error IA64 Processors 1 - Bugcheck Type 1 - MCA_ASSERT 2 - MCA_GET_STATEINFO SAL returned an error for SAL_GET_STATEINFO while processing MCA. 3 - MCA_CLEAR_STATEINFO SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA. 4 - MCA_FATAL FW reported a fatal MCA. 5 - MCA_NONFATAL SAL reported a recoverable MCA and we don't support currently support recovery or SAL generated an MCA and then couldn't produce an error record. 0xB - INIT_ASSERT 0xC - INIT_GET_STATEINFO SAL returned an error for SAL_GET_STATEINFO while processing INIT event. 0xD - INIT_CLEAR_STATEINFO SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event. 0xE - INIT_FATAL Not used. 2 - Address of log 3 - Size of log 4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO Arguments: Arg1: 00000000 Arg2: 805366f0 Arg3: a2000000 Arg4: 84010400 Debugging Details: ------------------ BUGCHECK_STR: 0x9C_IA32_GenuineIntel MODULE_NAME: Machine_Check IMAGE_NAME: Machine_Check DEBUG_FLR_IMAGE_TIMESTAMP: 0 DEFAULT_BUCKET_ID: DRIVER_FAULT LAST_CONTROL_TRANSFER: from 806aed8f to 804f4103 STACK_TEXT: STACK_TEXT: 805366c8 806aed8f 0000009c 00000000 805366f0 nt!KeBugCheckEx+0x19 805367f4 806abc3e 80042000 00000000 00000000 hal!HalpMcaExceptionHandler+0xdb 805367f4 806b0f60 80042000 00000000 00000000 hal!HalpMcaExceptionHandlerWrapper+0x46 f3dbb8dc 806b1552 0000001c 00000030 f3dbb8f0 hal!HalBeginSystemInterrupt+0x64 f3dbb8dc 8060a985 0000001c 00000030 f3dbb8f0 hal!HalpClockInterrupt+0x92 f3dbb978 80602430 0008002c e18b0031 00000031 nt!CmpCompareCompressedName+0x6b f3dbb9c0 80602f7b f3dbb9f0 00000002 f3dbbb70 nt!CmpCacheLookup+0xce f3dbbba4 8059a2c6 00000020 81371040 ff986ae0 nt!CmpParseKey+0x10b f3dbbc2c 80596c27 00000000 f3dbbc6c 00000040 nt!ObpLookupObjectName+0x56a f3dbbc80 805fa08d 00000000 81371040 00020001 nt!ObOpenObjectByName+0xe9 f3dbbd50 8052d571 00d6f204 02000000 00d6ef40 nt!NtOpenKey+0x191 f3dbbd50 7ffe0304 00d6f204 02000000 00d6ef40 nt!KiSystemService+0xc4 00d6ef1c 77f5bbb4 77dd3904 00d6f204 02000000 SharedUserData!SystemCallStub+0x4 00d6ef20 77dd3904 00d6f204 02000000 00d6ef40 ntdll!NtOpenKey+0xc 00d6ef68 77dd3ee4 00d6f120 0000082a 00d6f134 ADVAPI32!BaseRegOpenClassKeyFromLocation+0xb5 00d6f13c 77dd3f12 00000000 0000082a 02000000 ADVAPI32!BaseRegGetUserAndMachineClass+0x83 00d6f20c 77dd1c0d 0000082a 00d6f238 00d6f25c ADVAPI32!LocalBaseRegQueryValue+0x87 00d6f244 70a9f365 00000000 773e7d74 000001d8 ADVAPI32!RegQueryValueExW+0x8e 00d6f694 70a8ffcb 0000082a 773e7d74 00000000 SHLWAPI!RegQueryValueExWrapW+0x2a 00d6f7cc 70a91a9a 0000082a 773e7d74 00000000 SHLWAPI!SHQueryValueExW+0xad 00d6fa08 774de4bc 80000000 00d6fc68 773e7d74 SHLWAPI!SHGetValueW+0x58 00d6fc44 774de4e5 00d6fc68 77dd34f5 774de601 SHELL32!_OpenSystemFileAssociationsKey+0x8a 00d6fc50 774de601 00d6fc68 000b5480 000b5488 SHELL32!_IsSystemFileAssociations+0xa 00d6fe78 774de634 77549b5a 000b5480 026af968 SHELL32!CTaskEnumHKCR::_AddFromHKCR+0x5e 00d6fe7c 77549b5a 000b5480 026af968 000e2638 SHELL32!CTaskEnumHKCR::RunInitRT+0x9 00d6fe90 7150e926 000b5480 7150e8a8 01e3b548 SHELL32!CRunnableTask::Run+0x47 00d6feec 70aba72e 01e3b548 02692df0 70aba715 BROWSEUI!CShellTaskScheduler_ThreadProc+0x10f 00d6ff00 77f96ae2 02692df0 77fc59fc 026c3940 SHLWAPI!ExecuteWorkItem+0x19 00d6ff48 77f9613d 70aba715 02692df0 00084f88 ntdll!RtlpWorkerCallout+0x70 00d6ff64 77f96a6e 00000000 02692df0 026c3940 ntdll!RtlpExecuteWorkerRequest+0x17 00d6ff74 77f95b8b 77f96126 00000000 02692df0 ntdll!RtlpApcCallout+0x10 00d6ffb4 77e7d33b 00000000 00080000 77f944a8 ntdll!RtlpWorkerThread+0x85 00d6ffec 00000000 77f95b06 00000000 00000000 kernel32!BaseThreadStart+0x37 FOLLOWUP_NAME: MachineOwner STACK_COMMAND: kb BUCKET_ID: 0x9C_IA32_GenuineIntel Followup: MachineOwner ---------