Loading Dump File [C:\Users\JinPuLiu\Desktop\011819-12031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Windows 10 Kernel Version 17134 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`97e97000 PsLoadedModuleList = 0xfffff803`98245210
Debug session time: Fri Jan 18 13:54:03.019 2019 (UTC + 8:00)
System Uptime: 0 days 0:10:53.842
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
...........
************* Symbol Loading Error Summary **************
Module name Error
ntoskrnl The system cannot find the file specified
You can troubleshoot most symbol related issues by turning on symbol loading diagnostics (!sym noisy) and repeating the command that caused symbols to be loaded.
You should also verify that your symbol search path (.sympath) is correct.
Unable to add extension DLL: kdexts
Unable to add extension DLL: kext
Unable to add extension DLL: exts
The call to LoadLibrary(ext) failed, Win32 error 0n2
"系统找不到指定的文件。"
Please check your debugger configuration and/or network access.
The call to LoadLibrary(ext) failed, Win32 error 0n2
"系统找不到指定的文件。"
Please check your debugger configuration and/or network access.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Bugcheck code 000000D1
Arguments ffff818c`a843d080 00000000`000000ff 00000000`000000e6 ffff818c`a843d080
RetAddr : Args to Child : Call Site
fffff803`98050f69 : 00000000`0000000a ffff818c`a843d080 00000000`000000ff 00000000`000000e6 : nt+0x1a9380
00000000`0000000a : ffff818c`a843d080 00000000`000000ff 00000000`000000e6 ffff818c`a843d080 : nt+0x1b9f69
ffff818c`a843d080 : 00000000`000000ff 00000000`000000e6 ffff818c`a843d080 fffff803`97f79d00 : 0xa
00000000`000000ff : 00000000`000000e6 ffff818c`a843d080 fffff803`97f79d00 00000000`00000000 : 0xffff818c`a843d080
00000000`000000e6 : ffff818c`a843d080 fffff803`97f79d00 00000000`00000000 00000000`00000000 : 0xff
ffff818c`a843d080 : fffff803`97f79d00 00000000`00000000 00000000`00000000 00000000`00000000 : 0xe6
fffff803`97f79d00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff818c`a843d080
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt+0xe2d00
|
|
|
|
评论
直达楼层