Created
October 11, 2022 02:07
-
-
Save chenshaoju/03b5af6da50d50ec091d93cfc777362f to your computer and use it in GitHub Desktop.
BSOD collect
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64 | |
Copyright (c) Microsoft Corporation. All rights reserved. | |
Loading Dump File [D:\101122-9390-01.dmp] | |
Mini Kernel Dump File: Only registers and stack trace are available | |
************* Path validation summary ************** | |
Response Time (ms) Location | |
Deferred srv*D:\symbols*https://msdl.microsoft.com/download/symbols | |
Symbol search path is: srv*D:\symbols*https://msdl.microsoft.com/download/symbols | |
Executable search path is: | |
Windows 10 Kernel Version 19041 MP (12 procs) Free x64 | |
Product: WinNt, suite: TerminalServer SingleUserTS | |
Built by: 19041.1.amd64fre.vb_release.191206-1406 | |
Machine Name: | |
Kernel base = 0xfffff806`4b200000 PsLoadedModuleList = 0xfffff806`4be2a270 | |
Debug session time: Tue Oct 11 09:48:16.807 2022 (UTC + 8:00) | |
System Uptime: 6 days 19:22:46.765 | |
Loading Kernel Symbols | |
............................................................... | |
................................................................ | |
................................................................ | |
..................... | |
Loading User Symbols | |
Loading unloaded module list | |
.................................................. | |
For analysis of this file, run !analyze -v | |
6: kd> !analyze -v | |
******************************************************************************* | |
* * | |
* Bugcheck Analysis * | |
* * | |
******************************************************************************* | |
SYSTEM_SERVICE_EXCEPTION (3b) | |
An exception happened while executing a system service routine. | |
Arguments: | |
Arg1: 00000000c0000005, Exception code that caused the bugcheck | |
Arg2: fffff8064b523f8f, Address of the instruction which caused the bugcheck | |
Arg3: ffff9801f8dbeae0, Address of the context record for the exception that caused the bugcheck | |
Arg4: 0000000000000000, zero. | |
Debugging Details: | |
------------------ | |
KEY_VALUES_STRING: 1 | |
Key : Analysis.CPU.Sec | |
Value: 2 | |
Key : Analysis.DebugAnalysisProvider.CPP | |
Value: Create: 8007007e on SHAOJU-MSI | |
Key : Analysis.DebugData | |
Value: CreateObject | |
Key : Analysis.DebugModel | |
Value: CreateObject | |
Key : Analysis.Elapsed.Sec | |
Value: 99 | |
Key : Analysis.Memory.CommitPeak.Mb | |
Value: 82 | |
Key : Analysis.System | |
Value: CreateObject | |
BUGCHECK_CODE: 3b | |
BUGCHECK_P1: c0000005 | |
BUGCHECK_P2: fffff8064b523f8f | |
BUGCHECK_P3: ffff9801f8dbeae0 | |
BUGCHECK_P4: 0 | |
CONTEXT: ffff9801f8dbeae0 -- (.cxr 0xffff9801f8dbeae0) | |
rax=ffff9801f8dbf518 rbx=0000000000000000 rcx=0000000054445352 | |
rdx=0000000000000000 rsi=0000000000000000 rdi=8180818081808180 | |
rip=fffff8064b523f8f rsp=ffff9801f8dbf4e0 rbp=0000000000000000 | |
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8064b52 | |
r11=ffff897b7ee00000 r12=fffff8064bedb400 r13=ffffce05864faf00 | |
r14=0000000000000000 r15=0000000054445352 | |
iopl=0 nv up ei ng nz na pe cy | |
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050283 | |
nt!HalpAcpiGetCachedTable+0x3b: | |
fffff806`4b523f8f 44397f18 cmp dword ptr [rdi+18h],r15d ds:002b:81808180`81808198=???????? | |
Resetting default scope | |
BLACKBOXBSD: 1 (!blackboxbsd) | |
BLACKBOXNTFS: 1 (!blackboxntfs) | |
BLACKBOXPNP: 1 (!blackboxpnp) | |
BLACKBOXWINLOGON: 1 | |
CUSTOMER_CRASH_COUNT: 1 | |
PROCESS_NAME: svchost.exe | |
STACK_TEXT: | |
ffff9801`f8dbf4e0 fffff806`4b523e7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpAcpiGetCachedTable+0x3b | |
ffff9801`f8dbf520 fffff806`4b523e00 : 00000000`00000000 00000000`54445352 00000000`00000000 00000000`00000000 : nt!HalpAcpiGetTableWork+0x3c | |
ffff9801`f8dbf570 fffff806`4b523db3 : 00000000`00000000 ffff9801`f8dbfb00 00000000`00000000 fffff806`4be19640 : nt!HalpAcpiGetTable+0x40 | |
ffff9801`f8dbf5a0 fffff806`4ff2260f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalAcpiGetTableDispatch+0x13 | |
ffff9801`f8dbf5d0 fffff806`4ff225aa : ffffce05`864faef0 ffff9801`f8dbfb40 ffffce05`864faef0 00000000`00000001 : ACPI!ACPIMapNamedTable+0x3f | |
ffff9801`f8dbf640 fffff806`4b902742 : ffffce05`864faef0 ffffce05`864faef0 ffffce05`864faef0 00000000`00000000 : ACPI!ACPIEnumMapTableHandler+0x2a | |
ffff9801`f8dbf680 fffff806`4b825422 : 00000000`00000103 00000000`00000000 00000000`00000019 ffff9801`f8dbf790 : nt!ExpGetSystemFirmwareTableInformation+0xb6 | |
ffff9801`f8dbf740 fffff806`4b823417 : 00000000`00000001 00000000`80070002 00000000`00000000 000000d9`7927f700 : nt!ExpQuerySystemInformation+0x1ec2 | |
ffff9801`f8dbfa80 fffff806`4b60aab8 : 00000000`00000000 ffff9801`f8dbfb40 ffff9801`f8dbfb40 000000d9`7927f7a0 : nt!NtQuerySystemInformation+0x37 | |
ffff9801`f8dbfac0 00007ffa`0e72d844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 | |
000000d9`7927f588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0e72d844 | |
SYMBOL_NAME: ACPI!ACPIMapNamedTable+3f | |
MODULE_NAME: ACPI | |
IMAGE_NAME: ACPI.sys | |
IMAGE_VERSION: 10.0.19041.2060 | |
STACK_COMMAND: .cxr 0xffff9801f8dbeae0 ; kb | |
BUCKET_ID_FUNC_OFFSET: 3f | |
FAILURE_BUCKET_ID: 0x3B_c0000005_ACPI!ACPIMapNamedTable | |
OS_VERSION: 10.0.19041.1 | |
BUILDLAB_STR: vb_release | |
OSPLATFORM_TYPE: x64 | |
OSNAME: Windows 10 | |
FAILURE_ID_HASH: {4c570c65-acd2-1007-c778-f82a1cba8123} | |
Followup: MachineOwner | |
--------- | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment