Skip to content

Instantly share code, notes, and snippets.

@chenshaoju
Created October 11, 2022 02:07
Show Gist options
  • Save chenshaoju/03b5af6da50d50ec091d93cfc777362f to your computer and use it in GitHub Desktop.
Save chenshaoju/03b5af6da50d50ec091d93cfc777362f to your computer and use it in GitHub Desktop.
BSOD collect
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\101122-9390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*D:\symbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*D:\symbols*https://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`4b200000 PsLoadedModuleList = 0xfffff806`4be2a270
Debug session time: Tue Oct 11 09:48:16.807 2022 (UTC + 8:00)
System Uptime: 6 days 19:22:46.765
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8064b523f8f, Address of the instruction which caused the bugcheck
Arg3: ffff9801f8dbeae0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on SHAOJU-MSI
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 99
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8064b523f8f
BUGCHECK_P3: ffff9801f8dbeae0
BUGCHECK_P4: 0
CONTEXT: ffff9801f8dbeae0 -- (.cxr 0xffff9801f8dbeae0)
rax=ffff9801f8dbf518 rbx=0000000000000000 rcx=0000000054445352
rdx=0000000000000000 rsi=0000000000000000 rdi=8180818081808180
rip=fffff8064b523f8f rsp=ffff9801f8dbf4e0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8064b52
r11=ffff897b7ee00000 r12=fffff8064bedb400 r13=ffffce05864faf00
r14=0000000000000000 r15=0000000054445352
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050283
nt!HalpAcpiGetCachedTable+0x3b:
fffff806`4b523f8f 44397f18 cmp dword ptr [rdi+18h],r15d ds:002b:81808180`81808198=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff9801`f8dbf4e0 fffff806`4b523e7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpAcpiGetCachedTable+0x3b
ffff9801`f8dbf520 fffff806`4b523e00 : 00000000`00000000 00000000`54445352 00000000`00000000 00000000`00000000 : nt!HalpAcpiGetTableWork+0x3c
ffff9801`f8dbf570 fffff806`4b523db3 : 00000000`00000000 ffff9801`f8dbfb00 00000000`00000000 fffff806`4be19640 : nt!HalpAcpiGetTable+0x40
ffff9801`f8dbf5a0 fffff806`4ff2260f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalAcpiGetTableDispatch+0x13
ffff9801`f8dbf5d0 fffff806`4ff225aa : ffffce05`864faef0 ffff9801`f8dbfb40 ffffce05`864faef0 00000000`00000001 : ACPI!ACPIMapNamedTable+0x3f
ffff9801`f8dbf640 fffff806`4b902742 : ffffce05`864faef0 ffffce05`864faef0 ffffce05`864faef0 00000000`00000000 : ACPI!ACPIEnumMapTableHandler+0x2a
ffff9801`f8dbf680 fffff806`4b825422 : 00000000`00000103 00000000`00000000 00000000`00000019 ffff9801`f8dbf790 : nt!ExpGetSystemFirmwareTableInformation+0xb6
ffff9801`f8dbf740 fffff806`4b823417 : 00000000`00000001 00000000`80070002 00000000`00000000 000000d9`7927f700 : nt!ExpQuerySystemInformation+0x1ec2
ffff9801`f8dbfa80 fffff806`4b60aab8 : 00000000`00000000 ffff9801`f8dbfb40 ffff9801`f8dbfb40 000000d9`7927f7a0 : nt!NtQuerySystemInformation+0x37
ffff9801`f8dbfac0 00007ffa`0e72d844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d9`7927f588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0e72d844
SYMBOL_NAME: ACPI!ACPIMapNamedTable+3f
MODULE_NAME: ACPI
IMAGE_NAME: ACPI.sys
IMAGE_VERSION: 10.0.19041.2060
STACK_COMMAND: .cxr 0xffff9801f8dbeae0 ; kb
BUCKET_ID_FUNC_OFFSET: 3f
FAILURE_BUCKET_ID: 0x3B_c0000005_ACPI!ACPIMapNamedTable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4c570c65-acd2-1007-c778-f82a1cba8123}
Followup: MachineOwner
---------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment