GSOD/BSOD UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f) please help

R

Ryath78

im not sure what you would need the actual dump file or the one i copied to .txt

here is the text





Microsoft (R) Windows Debugger Version 10.0.19041.1 X86

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\Minidump\100820-49984-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available



Error: Change all symbol paths attempts to access 'c:\myCache' failed: 0x2 - The system cannot find the file specified.



************* Path validation summary **************

Response Time (ms) Location

Error c:\myCache

Deferred SRV*Symbol information

Symbol search path is: c:\myCache;SRV*Symbol information

Executable search path is:

Windows 10 Kernel Version 20231 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Machine Name:

Kernel base = 0xfffff800`24600000 PsLoadedModuleList = 0xfffff800`25233550

Debug session time: Thu Oct 8 04:16:44.292 2020 (UTC - 5:00)

System Uptime: 0 days 2:56:02.997

Loading Kernel Symbols

...............................................................

................................................................

................................................................

........

Loading User Symbols

Loading unloaded module list

........................

For analysis of this file, run !analyze -v

4: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)

This means a trap occurred in kernel mode, and it's a trap of a kind

that the kernel isn't allowed to have/catch (bound trap) or that

is always instant death (double fault). The first number in the

bugcheck params is the number of the trap (8 = double fault, etc)

Consult an Intel x86 family manual to learn more about what these

traps are. Here is a *portion* of those codes:

If kv shows a taskGate

use .tss on the part before the colon, then kv.

Else if kv shows a trapframe

use .trap on that value

Else

.trap on the appropriate frame will show where the trap was taken

(on x86, this will be the ebp that goes with the procedure KiTrap)

Endif

kb will then show the corrected stack.

Arguments:

Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT

Arg2: ffff9000d398fe70

Arg3: ffffc5081f65bf40

Arg4: fffff800248e5aed



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 5



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-89V5T4I



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 5



Key : Analysis.Memory.CommitPeak.Mb

Value: 102



Key : Analysis.System

Value: CreateObject



Key : Dump.Attributes.InsufficientDumpfileSize

Value: 1





DUMP_FILE_ATTRIBUTES: 0xc

Insufficient Dumpfile Size

Kernel Generated Triage Dump



BUGCHECK_CODE: 7f



BUGCHECK_P1: 8



BUGCHECK_P2: ffff9000d398fe70



BUGCHECK_P3: ffffc5081f65bf40



BUGCHECK_P4: fffff800248e5aed



STACK_OVERFLOW: Stack Limit: ffffc5081f65c000. Use (kF) and (!stackusage) to investigate stack usage.



STACKUSAGE_FUNCTION: The function at address 0xfffff800248e3ba2 was blamed for the stack overflow. It is using 8640 bytes of stack total in 5 instances (likely recursion).



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: NoxVMHandle.ex



STACK_TEXT:

ffffc508`1f65bf40 fffff800`248e3ba2 : ffffc508`1f65c998 ffffc508`1f65c6d0 ffffc508`1f65c998 00000000`00000000 : nt!RtlDispatchException+0x3d

ffffc508`1f65c1a0 fffff800`24a2a60e : ffffc508`1f65cac0 00000000`00001000 ffffc508`1f65ca40 ffff8000`00000000 : nt!KiDispatchException+0x182

ffffc508`1f65c860 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e

ffffc508`1f65ca40 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65cd60 : nt!KiPageFault+0x41a

ffffc508`1f65cbd0 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69

ffffc508`1f65cc60 fffff800`248e5cc7 : ffffc508`1f65d260 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89

ffffc508`1f65ccf0 fffff800`248e3ba2 : ffffc508`1f65dc48 ffffc508`1f65d980 ffffc508`1f65dc48 00000000`00000000 : nt!RtlDispatchException+0x217

ffffc508`1f65d450 fffff800`24a2a60e : ffffc508`1f65dd70 00000000`00001000 ffffc508`1f65dcf0 ffff8000`00000000 : nt!KiDispatchException+0x182

ffffc508`1f65db10 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e

ffffc508`1f65dcf0 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65e010 : nt!KiPageFault+0x41a

ffffc508`1f65de80 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69

ffffc508`1f65df10 fffff800`248e5cc7 : ffffc508`1f65e510 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89

ffffc508`1f65dfa0 fffff800`248e3ba2 : ffffc508`1f65eef8 ffffc508`1f65ec30 ffffc508`1f65eef8 00000000`00000000 : nt!RtlDispatchException+0x217

ffffc508`1f65e700 fffff800`24a2a60e : ffffc508`1f65f020 00000000`00001000 ffffc508`1f65efa0 ffff8000`00000000 : nt!KiDispatchException+0x182

ffffc508`1f65edc0 fffff800`24a2665a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x10e

ffffc508`1f65efa0 fffff800`248e7929 : fffff800`24600000 ffffc508`00000000 ffffc508`1f661500 ffffc508`1f65f2c0 : nt!KiPageFault+0x41a

ffffc508`1f65f130 fffff800`248e88f9 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69

ffffc508`1f65f1c0 fffff800`248e5cc7 : ffffc508`1f65f7c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89

ffffc508`1f65f250 fffff800`248e3ba2 : ffffc508`1f6601a8 ffffc508`1f65fee0 ffffc508`1f6601a8 00000000`00000000 : nt!RtlDispatchException+0x217

ffffc508`1f65f9b0 fffff800`24a2a60e : ffffc508`1f6602d0 00000000`00001000 ffffc508`1f660250 ffff8000`00000000 : nt!KiDispatchException+0x182

ffffc508`1f660070 fffff800`24a2665a : 00000000`00000010 00000000`abee2000 ffffc508`1f660670 8a000000`abee2867 : nt!KiExceptionDispatch+0x10e

ffffc508`1f660250 fffff800`248e7929 : ffffca06`95c9e080 ffffc508`1f660c80 00000000`00000000 fffff800`24cf35cb : nt!KiPageFault+0x41a

ffffc508`1f6603e0 fffff800`248e88f9 : ffffc508`1f6600e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x69

ffffc508`1f660470 fffff800`248e5cc7 : ffffc508`1f660a70 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlVirtualUnwind2+0x89

ffffc508`1f660500 fffff800`248e3ba2 : ffffc508`1f661458 ffffc508`1f661190 ffffc508`1f661458 00000000`00000000 : nt!RtlDispatchException+0x217

ffffc508`1f660c60 fffff800`24a2a60e : ffffc508`1f661580 00000000`00001000 ffffc508`1f661500 ffff8000`00000000 : nt!KiDispatchException+0x182

ffffc508`1f661320 fffff800`24a2665a : ffffca06`9708fc20 00000000`00000000 00000000`00000202 fffff800`248f04c1 : nt!KiExceptionDispatch+0x10e

ffffc508`1f661500 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x41a





SYMBOL_NAME: nt!KiDispatchException+182



MODULE_NAME: nt



IMAGE_NAME: ntkrnlmp.exe



IMAGE_VERSION: 10.0.20231.1000



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 182



FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_nt!KiDispatchException



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {cbb9a1ac-821c-b542-365f-2dd5602e6100}



Followup: MachineOwner

---------

Continue reading...
 

Similar threads

H
Replies
0
Views
359
Hammad_Awan
H
S
Replies
0
Views
401
Simon ElfvingKristensen
S
Replies
0
Views
425
ソンウンホ
Back
Top Bottom