Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\86180\Desktop\100122-17218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807`15400000 PsLoadedModuleList = 0xfffff807`1602a290
Debug session time: Sat Oct 1 11:26:46.286 2022 (UTC + 8:00)
System Uptime: 0 days 3:17:49.082
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`157f8fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff10f`27b96c10=00000000000000ef
3: kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc905031f0080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3780
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12591
Key : Analysis.Init.CPU.mSec
Value: 1233
Key : Analysis.Init.Elapsed.mSec
Value: 257180
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.DumpHeader
Value: 0xef
Key : Bugcheck.Code.Register
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: 4964040
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 100122-17218-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc905031f0080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: ffffc905031f07c0 -- (.exr 0xffffc905031f07c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x4964040 -<Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
fffff10f`27b96c08 fffff807`15d089d2 : 00000000`000000ef ffffc905`031f0080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff10f`27b96c10 fffff807`15bf4783 : 00000000`00000001 fffff807`156062c5 00000000`00000002 fffff807`156061ef : nt!PspCatchCriticalBreak+0x10e
fffff10f`27b96cb0 fffff807`159d5da0 : ffffc905`00000000 00000000`00000000 ffffc905`031f0080 ffffc905`031f04b8 : nt!PspTerminateAllThreads+0x1ad1d7
fffff10f`27b96d20 fffff807`159d5b9c : ffffc905`031f0080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff10f`27b96d60 fffff807`1580a9b5 : ffffc905`031f0080 ffffc905`04964040 fffff10f`27b96e50 fffff807`15b23d32 : nt!NtTerminateProcess+0x9c
fffff10f`27b96dd0 fffff807`157fce30 : fffff807`1583cd8f fffff10f`27b97958 fffff10f`27b97958 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
fffff10f`27b96f68 fffff807`1583cd8f : fffff10f`27b97958 fffff10f`27b97958 ffffffff`ffffffff 00007ffc`791edc98 : nt!KiServiceLinkage
fffff10f`27b96f70 fffff807`1580b0ac : ffffc905`031f07c0 fffff807`15689916 00000000`00005000 fffff10f`27b97a00 : nt!KiDispatchException+0x1c689f
fffff10f`27b97820 fffff807`15807243 : 00000046`5dc826b0 ffffc905`00000001 00000000`00000017 fffff10f`27b97a80 : nt!KiExceptionDispatch+0x12c
fffff10f`27b97a00 00007ffc`7dda0f64 : 00007ffc`7dd70000 00007ffc`7de10e8e 00007ffc`7de10e8e 00007ffc`7ddc1d73 : nt!KiPageFault+0x443
00000046`5dc815b0 00007ffc`7dd70000 : 00007ffc`7de10e8e 00007ffc`7de10e8e 00007ffc`7ddc1d73 00000046`5dc816f0 : 0x00007ffc`7dda0f64
00000046`5dc815b8 00007ffc`7de10e8e : 00007ffc`7de10e8e 00007ffc`7ddc1d73 00000046`5dc816f0 00000000`00000000 : 0x00007ffc`7dd70000
00000046`5dc815c0 00007ffc`7de10e8e : 00007ffc`7ddc1d73 00000046`5dc816f0 00000000`00000000 00000046`5dc81648 : 0x00007ffc`7de10e8e
00000046`5dc815c8 00007ffc`7ddc1d73 : 00000046`5dc816f0 00000000`00000000 00000046`5dc81648 00000046`5dc81688 : 0x00007ffc`7de10e8e
00000046`5dc815d0 00000046`5dc816f0 : 00000000`00000000 00000046`5dc81648 00000046`5dc81688 00007ffc`7916a688 : 0x00007ffc`7ddc1d73
00000046`5dc815d8 00000000`00000000 : 00000046`5dc81648 00000046`5dc81688 00007ffc`7916a688 00000000`00000001 : 0x00000046`5dc816f0
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4964040_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {26655353-fac4-7f63-7a96-161d19cfdd05}
Followup: MachineOwner |
|
|
|
评论
直达楼层