- 惠普社区
- >
- 戈氏猹 的帖子
最新主题
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeU...
查看更多...
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.140 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\111224-20296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff807`d9c00000 PsLoadedModuleList = 0xfffff807`daaf4750
Debug session time: Tue Nov 12 00:29:22.172 2024 (UTC + 8:00)
System Uptime: 0 days 0:01:53.243
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000fd`f1f9b018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
For analysis of this file, run !analyze -vnt!KeBugCheckEx:
fffff807`da0b8790 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8080`3f5988a0=000000000000001e
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807da27ed10, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.Elapsed.mSec
Value: 3640
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 375
Key : Analysis.Init.Elapsed.mSec
Value: 7028
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1e
Key : Bugcheck.Code.TargetModel
Value: 0x1e
Key : Dump.Attributes.AsUlong
Value: 21808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_R_nt!SwapContext
Key : Failure.Hash
Value: {73940a07-e238-0cb7-73a8-c9e01fdee4d3}
Key : Hypervisor.Enlightenments.ValueHex
Value: 7417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 55185662
Key : Hypervisor.Flags.ValueHex
Value: 34a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : Stack.Pointer
Value: PRCBException
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff807da27ed10
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
FILE_IN_CAB: 111224-20296-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x21808
Kernel Generated Triage Dump
FAULTING_THREAD: ffffa98f71eee0c0
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: fffff807dabc34b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
STACK_TEXT:
ffff8080`3f598898 fffff807`d9f93996 : 00000000`0000001e ffffffff`c0000005 fffff807`da27ed10 00000000`00000000 : nt!KeBugCheckEx
ffff8080`3f5988a0 fffff807`da276be2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0xb16
ffff8080`3f598fb0 fffff807`da276bb0 : fffff807`da28ab3e 00000000`00000000 ffff8080`3f520180 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffbb89`bb99e148 fffff807`da28ab3e : 00000000`00000000 ffff8080`3f520180 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffbb89`bb99e150 fffff807`da285825 : 00000000`00000000 00000000`00182012 00000000`00000001 00000000`00000001 : nt!KiExceptionDispatch+0x13e
ffffbb89`bb99e330 fffff807`da27ed10 : ffff8080`3f520180 066fe47f`b19bbdff ffffa98f`71eee0c0 00000000`4a1fbffe : nt!KiGeneralProtectionFault+0x365
ffffbb89`bb99e4c0 fffff807`da27e7c6 : ffffbb89`bb99ed18 ffffbb89`bb99ed78 00000000`00000000 00000000`00000000 : nt!SwapContext+0x4e0
ffffbb89`bb99e500 fffff807`d9edb958 : 00000000`00000047 ffff8080`3f520180 00000000`00000000 fffff807`dabc6c00 : nt!KiSwapContext+0x76
ffffbb89`bb99e640 fffff807`d9eda6a0 : 00000000`00000000 00000000`00000000 ffffbb89`bb99e7e8 00000000`00000000 : nt!KiSwapThread+0x928
ffffbb89`bb99e6d0 fffff807`d9e0e174 : 00000000`00000000 ffffa98f`71eee200 ffffa98f`00000000 ffffa98f`71eee246 : nt!KiCommitThreadWait+0x370
ffffbb89`bb99e780 fffff807`d9e42257 : ffffa98f`71eee5d8 00000000`00000011 ffffbb89`bb99ea01 00000000`00000000 : nt!KeWaitForSingleObject+0x7a4
ffffbb89`bb99e860 fffff807`da4a4418 : ffffd389`181337b0 ffffa98f`71eee5d8 00000000`00000011 00000000`00000000 : nt!AlpcpSignalAndWait+0x297
ffffbb89`bb99e910 fffff807`da4a3f2d : 00000000`00000000 00000000`00000000 ffffa98f`6b3ae080 ffffbb89`bb99eb40 : nt!AlpcpReceiveSynchronousReply+0x58
ffffbb89`bb99e970 fffff807`da61b38a : ffffa98f`6a2c3090 00000000`00020002 ffffbb89`bb99ee60 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x34d
ffffbb89`bb99eaa0 fffff807`da61b287 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!LpcSendWaitReceivePort+0x4a
ffffbb89`bb99eb00 fffff807`da4b1b9a : fffff780`0000037c ffffa98f`6b3ae080 ffffa98f`6b3ae080 ffffa98f`6a2c3090 : nt!DbgkpSendApiMessageLpc+0x7f
ffffbb89`bb99ee20 fffff807`d9f93b2c : ffffbb89`bb99fa01 ffffbb89`bb99f4b0 ffffbb89`bb99f660 ffffbb89`bb99efe0 : nt!DbgkForwardException+0x23a
ffffbb89`bb99efb0 fffff807`da28ab45 : 00000000`c0000005 00000000`00000000 ffffa98f`6b3ae480 fffff807`d9e11fea : nt!KiDispatchException+0xcac
ffffbb89`bb99f840 fffff807`da285c82 : 00000000`4382694e 00006c3c`00c01440 00006c3c`00c7c660 00007ffd`7d425a68 : nt!KiExceptionDispatch+0x145
ffffbb89`bb99fa20 00000001`00000004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x442
000000fd`f27fc900 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`00000004
SYMBOL_NAME: nt!SwapContext+4e0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26100.2161
STACK_COMMAND: .process /r /p 0xffffa98f6b3ae080; .thread 0xffffa98f71eee0c0 ; kb
BUCKET_ID_FUNC_OFFSET: 4e0
FAILURE_BUCKET_ID: AV_R_nt!SwapContext
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73940a07-e238-0cb7-73a8-c9e01fdee4d3}
Followup: MachineOwner
---------
11: kd> lmvm ntBrowse full module liststart end module name
fffff807`d9c00000 fffff807`db04f000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\81D7D1147DB33682668A4F6A4691490D1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\EC211A59144f000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data Symbol Reload Image was built with /Brepro flag.
Timestamp: EC211A59 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00C33B91
ImageSize: 0144F000
File version: 10.0.26100.2161
Product version: 10.0.26100.2161
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.26100.2161
FileVersion: 10.0.26100.2161 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.