Contribute
Register

cpu panic

Status
Not open for further replies.
Joined
Feb 17, 2010
Messages
30
Motherboard
ASUS ROG STRIX Z490-I GAMING
CPU
i5 10500
Graphics
hd630
Mac
  1. MacBook
  2. MacBook Air
  3. MacBook Pro
  4. Mac mini
Classic Mac
  1. Classic
  2. Color Classic
  3. iBook
  4. Plus
  5. Portable
  6. Power Mac
  7. PowerBook
  8. SE
Mobile Phone
  1. Android
  2. iOS
Could anyone help me I believe is something simple That's uppen rarely
Thanks in advance

panic(cpu 4 caller 0xffffff801e7198aa): [default.kalloc.16]: element modified after free (off:8, val:0x0000000000000002, sz:16, ptr:0xffffff9069e98460)
8: 0x0000000000000002
Panicked task 0xffffff9535cb1d40: 1 threads: pid 101: xpcproxy
Backtrace (CPU 4), panicked thread: 0xffffff953524faa0, Frame : Return Address
0xffffffeae9e92d80 : 0xffffff801de81c8d mach_kernel : _handle_debugger_trap + 0x41d
0xffffffeae9e92dd0 : 0xffffff801dfe1596 mach_kernel : _kdp_i386_trap + 0x116
0xffffffeae9e92e10 : 0xffffff801dfd0963 mach_kernel : _kernel_trap + 0x4d3
0xffffffeae9e92e60 : 0xffffff801de21a70 mach_kernel : _return_from_trap + 0xe0
0xffffffeae9e92e80 : 0xffffff801de8205d mach_kernel : _DebuggerTrapWithState + 0xad
0xffffffeae9e92fa0 : 0xffffff801de81816 mach_kernel : _panic_trap_to_debugger + 0x2b6
0xffffffeae9e93000 : 0xffffff801e715163 mach_kernel : _panic + 0x84
0xffffffeae9e930f0 : 0xffffff801e7198aa mach_kernel : _panic_with_thread_context + 0x4672
0xffffffeae9e93560 : 0xffffff801deeb8a9 mach_kernel : _work_interval_port_type_render_server + 0x5059
0xffffffeae9e935c0 : 0xffffff801de91785 mach_kernel : _ipc_thread_port_unpin + 0x2f5
0xffffffeae9e93610 : 0xffffff801e44f2fa mach_kernel : __MALLOC + 0x2a
0xffffffeae9e93630 : 0xffffff8021081397 com.apple.security.quarantine : _SBstrdup + 0x27
0xffffffeae9e93660 : 0xffffff802108204a com.apple.security.quarantine : _getpath + 0x50
0xffffffeae9e93690 : 0xffffff8021081f54 com.apple.security.quarantine : _identity_create_from_executable_vnode + 0x1cc
0xffffffeae9e936e0 : 0xffffff8021085e5f com.apple.security.quarantine : _disclaim_responsibility + 0x83
0xffffffeae9e93740 : 0xffffff801e6ecfc7 mach_kernel : _mac_cred_label_update_execve + 0x117
0xffffffeae9e93800 : 0xffffff801e41cd5f mach_kernel : _kauth_proc_label_update_execve + 0x13f
0xffffffeae9e93930 : 0xffffff801e45627f mach_kernel : _proc_exitstatus + 0xef
0xffffffeae9e93980 : 0xffffff801e43cf53 mach_kernel : _kctl_fill_socketinfo + 0x2da3
0xffffffeae9e93ab0 : 0xffffff801e43aa81 mach_kernel : _kctl_fill_socketinfo + 0x8d1
0xffffffeae9e93c10 : 0xffffff801e4433d7 mach_kernel : _posix_spawn + 0x4207
0xffffffeae9e93c90 : 0xffffff801e442559 mach_kernel : _posix_spawn + 0x3389
0xffffffeae9e93f40 : 0xffffff801e588f5b mach_kernel : _unix_syscall64 + 0x1fb
0xffffffeae9e93fa0 : 0xffffff801de22236 mach_kernel : _hndl_unix_scall64 + 0x16
Kernel Extensions in backtrace:
com.apple.security.quarantine(4.0)[0EBE09AF-C329-35B5-98B8-1DDFA9AB68A8]@0xffffff8021080000->0xffffff8021088fff
dependency: com.apple.kext.AppleMatch(1.0.0d1)[9D445DD2-EA87-34FE-A4EE-7BACF1EAEF74]@0xffffff801f59d000->0xffffff801f59ffff
dependency: com.apple.security.sandbox(300.0)[BC139A00-B4DB-37A2-8EF4-C0BA5190F875]@0xffffff802108a000->0xffffff80210d9fff

Process name corresponding to current thread (0xffffff953524faa0): xpcproxy
Boot args: keepsyms=1 debug=0x100 agdpmod=ignore e1000=0 chunklist-security-epoch=0 -chunklist-no-rev2-dev chunklist-security-epoch=0 -chunklist-no-rev2-dev

Mac OS version:
21F79
 
Could anyone help me I believe is something simple That's uppen rarely
Thanks in advance

panic(cpu 4 caller 0xffffff801e7198aa): [default.kalloc.16]: element modified after free (off:8, val:0x0000000000000002, sz:16, ptr:0xffffff9069e98460)
8: 0x0000000000000002
Panicked task 0xffffff9535cb1d40: 1 threads: pid 101: xpcproxy
Backtrace (CPU 4), panicked thread: 0xffffff953524faa0, Frame : Return Address
0xffffffeae9e92d80 : 0xffffff801de81c8d mach_kernel : _handle_debugger_trap + 0x41d
0xffffffeae9e92dd0 : 0xffffff801dfe1596 mach_kernel : _kdp_i386_trap + 0x116
0xffffffeae9e92e10 : 0xffffff801dfd0963 mach_kernel : _kernel_trap + 0x4d3
0xffffffeae9e92e60 : 0xffffff801de21a70 mach_kernel : _return_from_trap + 0xe0
0xffffffeae9e92e80 : 0xffffff801de8205d mach_kernel : _DebuggerTrapWithState + 0xad
0xffffffeae9e92fa0 : 0xffffff801de81816 mach_kernel : _panic_trap_to_debugger + 0x2b6
0xffffffeae9e93000 : 0xffffff801e715163 mach_kernel : _panic + 0x84
0xffffffeae9e930f0 : 0xffffff801e7198aa mach_kernel : _panic_with_thread_context + 0x4672
0xffffffeae9e93560 : 0xffffff801deeb8a9 mach_kernel : _work_interval_port_type_render_server + 0x5059
0xffffffeae9e935c0 : 0xffffff801de91785 mach_kernel : _ipc_thread_port_unpin + 0x2f5
0xffffffeae9e93610 : 0xffffff801e44f2fa mach_kernel : __MALLOC + 0x2a
0xffffffeae9e93630 : 0xffffff8021081397 com.apple.security.quarantine : _SBstrdup + 0x27
0xffffffeae9e93660 : 0xffffff802108204a com.apple.security.quarantine : _getpath + 0x50
0xffffffeae9e93690 : 0xffffff8021081f54 com.apple.security.quarantine : _identity_create_from_executable_vnode + 0x1cc
0xffffffeae9e936e0 : 0xffffff8021085e5f com.apple.security.quarantine : _disclaim_responsibility + 0x83
0xffffffeae9e93740 : 0xffffff801e6ecfc7 mach_kernel : _mac_cred_label_update_execve + 0x117
0xffffffeae9e93800 : 0xffffff801e41cd5f mach_kernel : _kauth_proc_label_update_execve + 0x13f
0xffffffeae9e93930 : 0xffffff801e45627f mach_kernel : _proc_exitstatus + 0xef
0xffffffeae9e93980 : 0xffffff801e43cf53 mach_kernel : _kctl_fill_socketinfo + 0x2da3
0xffffffeae9e93ab0 : 0xffffff801e43aa81 mach_kernel : _kctl_fill_socketinfo + 0x8d1
0xffffffeae9e93c10 : 0xffffff801e4433d7 mach_kernel : _posix_spawn + 0x4207
0xffffffeae9e93c90 : 0xffffff801e442559 mach_kernel : _posix_spawn + 0x3389
0xffffffeae9e93f40 : 0xffffff801e588f5b mach_kernel : _unix_syscall64 + 0x1fb
0xffffffeae9e93fa0 : 0xffffff801de22236 mach_kernel : _hndl_unix_scall64 + 0x16
Kernel Extensions in backtrace:
com.apple.security.quarantine(4.0)[0EBE09AF-C329-35B5-98B8-1DDFA9AB68A8]@0xffffff8021080000->0xffffff8021088fff
dependency: com.apple.kext.AppleMatch(1.0.0d1)[9D445DD2-EA87-34FE-A4EE-7BACF1EAEF74]@0xffffff801f59d000->0xffffff801f59ffff
dependency: com.apple.security.sandbox(300.0)[BC139A00-B4DB-37A2-8EF4-C0BA5190F875]@0xffffff802108a000->0xffffff80210d9fff

Process name corresponding to current thread (0xffffff953524faa0): xpcproxy
Boot args: keepsyms=1 debug=0x100 agdpmod=ignore e1000=0 chunklist-security-epoch=0 -chunklist-no-rev2-dev chunklist-security-epoch=0 -chunklist-no-rev2-dev

Mac OS version:
21F79

I see you have a Nvidia M4000 in your profile on this machine? I believe the issue may be related (if you have been using the system up until now before it started playing up).

This is because Nvidia recently revoked the Webdrivers for pretty much all their retail GPUs like Pascal on macOS due to a security breach at their end.

If you are looking to get it working again, the card will either now only work in Windows or you'll need to find a compatible replacement AMD GPU for macOS.
 
thanks for answering me so fast but I don't use anymore the nvidia m4000 I'm using the hd630 intel
The system are composed of : ASUS ROG STRIX Z490-I GAMING intel 1050 32gb of ram ddr4 and nvme 500gb samsung and Monterey 12.4
That's all
 
Status
Not open for further replies.
Back
Top