Open JMoVS opened 5 years ago
*** Panic Report *** panic(cpu 0 caller 0xffffff80054daadd): Kernel trap at 0xffffff7f8873f28b, type 14=page fault, registers: CR0: 0x000000008001003b, CR2: 0x0000000000000000, CR3: 0x000000000ac71000, CR4: 0x00000000001626e0 RAX: 0x0000000000000000, RBX: 0xffffff9129da4480, RCX: 0x0000000000000000, RDX: 0x00000000035f0000 RSP: 0xffffff915c0c3f10, RBP: 0xffffff915c0c3fa0, RSI: 0xffffff9129da44a8, RDI: 0x0000000000000000 R8: 0x0000000000000000, R9: 0x0000000000989680, R10: 0x0000000000000000, R11: 0x0000000000000000 R12: 0x00004f9d697ab489, R13: 0xffffff91387db6a0, R14: 0xffffff9129da44b8, R15: 0x0000000000000a71 RFL: 0x0000000000010202, RIP: 0xffffff7f8873f28b, CS: 0x0000000000000008, SS: 0x0000000000000010 Fault CR2: 0x0000000000000000, Error code: 0x0000000000000002, Fault CPU: 0x0, PL: 0, VF: 1 Backtrace (CPU 0), Frame : Return Address 0xffffff915c0c39e0 : 0xffffff80053ad6ed mach_kernel : _handle_debugger_trap + 0x47d 0xffffff915c0c3a30 : 0xffffff80054e9185 mach_kernel : _kdp_i386_trap + 0x155 0xffffff915c0c3a70 : 0xffffff80054da8ba mach_kernel : _kernel_trap + 0x50a 0xffffff915c0c3ae0 : 0xffffff800535ab40 mach_kernel : _return_from_trap + 0xe0 0xffffff915c0c3b00 : 0xffffff80053ad107 mach_kernel : _panic_trap_to_debugger + 0x197 0xffffff915c0c3c20 : 0xffffff80053acf53 mach_kernel : _panic + 0x63 0xffffff915c0c3c90 : 0xffffff80054daadd mach_kernel : _kernel_trap + 0x72d 0xffffff915c0c3e00 : 0xffffff800535ab40 mach_kernel : _return_from_trap + 0xe0 0xffffff915c0c3e20 : 0xffffff7f8873f28b net.lundman.spl : _taskq_thread + 0x17b 0xffffff915c0c3fa0 : 0xffffff800535a0ce mach_kernel : _call_continuation + 0x2e Kernel Extensions in backtrace: net.lundman.spl(1.9.2)[626D2241-6E13-331A-8E57-B29C1BD0280C]@0xffffff7f8872e000->0xffffff7f89927fff BSD process name corresponding to current thread: kernel_task Boot args: keepsyms=1
@lundman Did you see this one?