取消
显示结果 
搜索替代 
您的意思是: 

最新主题

************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate ... 查看更多...
************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\101123-14593-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Kernel base = 0xfffff807`67000000 PsLoadedModuleList = 0xfffff807`67c130e0 Debug session time: Wed Oct 11 09:03:42.603 2023 (UTC + 8:00) System Uptime: 0 days 1:07:30.529 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .................................... Loading User Symbols Loading unloaded module list ........... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`67432140 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc00`62853230=000000000000000a 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 000000000000002d, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2421 Key : Analysis.Elapsed.mSec Value: 10340 Key : Analysis.IO.Other.Mb Value: 2 Key : Analysis.IO.Read.Mb Value: 16 Key : Analysis.IO.Write.Mb Value: 47 Key : Analysis.Init.CPU.mSec Value: 327 Key : Analysis.Init.Elapsed.mSec Value: 347134 Key : Analysis.Memory.CommitPeak.Mb Value: 99 Key : Bugcheck.Code.LegacyAPI Value: 0xd1 Key : Dump.Attributes.AsUlong Value: 808 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Failure.Bucket Value: DISABLED_INTERRUPT_FAULT_nt!KiPageFault Key : Failure.Hash Value: {4e9c41db-c8e3-cbef-73a7-1b373e8262de} Key : Hypervisor.Enlightenments.ValueHex Value: 1497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 4853999 Key : Hypervisor.Flags.ValueHex Value: 4a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 BUGCHECK_CODE: d1 BUGCHECK_P1: 0 BUGCHECK_P2: ff BUGCHECK_P3: 2d BUGCHECK_P4: 0 FILE_IN_CAB: 101123-14593-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x808 Kernel Generated Triage Dump PROCESS_NAME: System ADDITIONAL_DEBUG_TEXT: The fault occurred while interrupts were disabled on the processor. CUSTOMER_CRASH_COUNT: 1 TRAP_FRAME: fffffc0062853370 -- (.trap 0xfffffc0062853370) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=00000000000100de rdx=0420000000000414 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=fffffc0062853500 rbp=0000000000000002 r8=0000000000000002 r9=fffffc00628535e0 r10=0000fffff8076496 r11=ffff997f90a00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di ng nz ac po nc 00000000`00000000 ?? ??? Resetting default scope IP_IN_FREE_BLOCK: 0 STACK_TEXT: fffffc00`62853228 fffff807`674477a9 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000002d : nt!KeBugCheckEx fffffc00`62853230 fffff807`67442e34 : 00000009`6e501b1a 00000000`00000000 ffffa980`9f791180 00000000`0004ce78 : nt!KiBugCheckDispatch+0x69 fffffc00`62853370 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9b31`fb434d6b : nt!KiPageFault+0x474 SYMBOL_NAME: nt!KiPageFault+474 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.2283 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 474 FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_nt!KiPageFault OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {4e9c41db-c8e3-cbef-73a7-1b373e8262de} Followup: MachineOwner ---------
† 惠普支持社区是一个客户交流平台,便于客户找到有效的解决方法,快速解决问题,充分利用惠普产品。请在发帖之前,阅读社区的使用条款注册须知。