************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.062 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\120924-18156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff803`04e00000 PsLoadedModuleList = 0xfffff803`05a2a7c0
Debug session time: Mon Dec 9 17:22:41.434 2024 (UTC + 8:00)
System Uptime: 0 days 1:10:46.152
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`003d4018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`051fe310 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff887`e71e6cc0=000000000000001a
0: kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff8a00000de000
Arg3: 80000002379c5867
Arg4: ffff8a00000de008
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1250
Key : Analysis.Elapsed.mSec
Value: 2237
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 453
Key : Analysis.Init.Elapsed.mSec
Value: 1781
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Bugcheck.Code.TargetModel
Value: 0x1a
Key : Failure.Bucket
Value: 0x1a_403_360Hvm64!unknown_function
Key : Failure.Hash
Value: {1026e33b-1f0f-54db-6c88-d297ffb0d2c5}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff8a00000de000
BUGCHECK_P3: 80000002379c5867
BUGCHECK_P4: ffff8a00000de008
FILE_IN_CAB: 120924-18156-01.dmp
FAULTING_THREAD: ffffa1075a0f3080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ½£ÏɳÁĬ(ÔÆ).exe
STACK_TEXT:
fffff887`e71e6cb8 fffff803`050aac69 : 00000000`0000001a 00000000`00000403 ffff8a00`000de000 80000002`379c5867 : nt!KeBugCheckEx
fffff887`e71e6cc0 fffff803`050a374e : 00000000`00000000 fffff887`e71e73d0 ffff8a00`000df000 fffff887`e71e7320 : nt!MiDeletePteRun+0x17b9
fffff887`e71e6ed0 fffff803`05038d0d : 00000000`00000000 ffffa107`56b76700 fffff887`e71e7320 ffff8a00`000deff8 : nt!MiDeleteVaTail+0x6e
fffff887`e71e6f00 fffff803`0503892b : ffff8a45`00000000 ffffa107`56b76700 fffff887`00000000 fffff887`e71e7370 : nt!MiWalkPageTablesRecursively+0xc6d
fffff887`e71e6fa0 fffff803`0503892b : ffff8a45`22800000 ffffa107`56b76700 fffff887`00000001 fffff887`e71e7380 : nt!MiWalkPageTablesRecursively+0x88b
fffff887`e71e7040 fffff803`0503892b : ffff8a45`22800000 ffffa107`56b76700 fffff887`00000002 fffff887`e71e7390 : nt!MiWalkPageTablesRecursively+0x88b
fffff887`e71e70e0 fffff803`0503592b : 00000000`00000000 ffffa107`56b76700 00000000`00000003 fffff887`e71e73a0 : nt!MiWalkPageTablesRecursively+0x88b
fffff887`e71e7180 fffff803`0509ed61 : fffff887`e71e7320 ffffa107`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
fffff887`e71e7280 fffff803`05048a68 : 00000000`00000001 ffffa107`00000000 ffffa107`56b76550 ffffa107`5a0f3080 : nt!MiDeletePagablePteRange+0x4f1
fffff887`e71e7590 fffff803`05080797 : 00000000`00000000 00000000`00000000 ffffa107`00000000 ffffa107`56b76080 : nt!MiDeleteVad+0x378
fffff887`e71e7690 fffff803`054440ec : fffff887`00000000 00000000`00000000 fffff887`e71e77f0 00000000`1bbf0000 : nt!MiFreeVadRange+0xa3
fffff887`e71e76f0 fffff803`05443bc5 : 00000000`00000000 00000000`0000001e ffffdb8a`06eb7000 00000000`00000000 : nt!MmFreeVirtualMemory+0x4ec
fffff887`e71e7840 fffff803`0dbfbce6 : 00000000`00000000 00000000`00000056 fffff887`e71e78d0 00000000`00000001 : nt!NtFreeVirtualMemory+0x95
fffff887`e71e78a0 00000000`00000000 : 00000000`00000056 fffff887`e71e78d0 00000000`00000001 fffff887`e71e78f0 : 360Hvm64+0x1bce6
SYMBOL_NAME: 360Hvm64+1bce6
MODULE_NAME: 360Hvm64
IMAGE_NAME: 360Hvm64.sys
STACK_COMMAND: .process /r /p 0xffffa10756b76080; .thread 0xffffa1075a0f3080 ; kb
BUCKET_ID_FUNC_OFFSET: 1bce6
FAILURE_BUCKET_ID: 0x1a_403_360Hvm64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1026e33b-1f0f-54db-6c88-d297ffb0d2c5}
Followup: MachineOwner
---------
|
|
|
|
|
|
评论
直达楼层