Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22000.194 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\011122-4640-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff805`49c00000 PsLoadedModuleList = 0xfffff805`4a82a1b0
- Debug session time: Tue Jan 11 23:02:53.219 2022 (UTC - 5:00)
- System Uptime: 0 days 2:37:29.841
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- Loading User Symbols
- Loading unloaded module list
- .......
- For analysis of this file, run !analyze -v
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- UNEXPECTED_KERNEL_MODE_TRAP (7f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
- Arg2: ffffcb0181743e70
- Arg3: ffffc582d203f5d8
- Arg4: 00000000000001f0
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 3562
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 5666
- Key : Analysis.Init.CPU.mSec
- Value: 1202
- Key : Analysis.Init.Elapsed.mSec
- Value: 7620
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 82
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 7f
- BUGCHECK_P1: 8
- BUGCHECK_P2: ffffcb0181743e70
- BUGCHECK_P3: ffffc582d203f5d8
- BUGCHECK_P4: 1f0
- TRAP_FRAME: ffffcb0181743e70 -- (.trap 0xffffcb0181743e70)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffde83a91af038 rbx=0000000000000000 rcx=0000000000000001
- rdx=ffffde83a91af038 rsi=0000000000000000 rdi=0000000000000000
- rip=00000000000001f0 rsp=ffffc582d203f5d8 rbp=00000000000009d2
- r8=000000000000005e r9=5455555155515515 r10=0000000000000017
- r11=00000000000000e0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- 00000000`000001f0 ?? ???
- Resetting default scope
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: SkyrimSE.exe
- BAD_STACK_POINTER: ffffc582d203f5d8
- STACK_TEXT:
- ffffcb01`81743d28 fffff805`4a009069 : 00000000`0000007f 00000000`00000008 ffffcb01`81743e70 ffffc582`d203f5d8 : nt!KeBugCheckEx
- ffffcb01`81743d30 fffff805`4a003e83 : f88b41c8`458948c0 48d98b48`28458d48 b841a043`8949d18b 9843c749`00000006 : nt!KiBugCheckDispatch+0x69
- ffffcb01`81743e70 00000000`000001f0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
- ffffc582`d203f5d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1f0
- SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.19041.1415
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 2c3
- FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement