Windows 10
在个人计算机和平板电脑上运行的 Microsoft 操作系统。
261 个问题
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 44
Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\桌面\060425-6421-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff807`72200000 PsLoadedModuleList = 0xfffff807`730f4af0
Debug session time: Wed Jun 4 20:43:40.435 2025 (UTC + 8:00)
System Uptime: 0 days 0:18:00.125
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000e9`d878c018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`72701c40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9382`eb4f7460=000000000000000a
6: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000e9`d878c018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff807714e1141, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff807714e1141, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1734
Key : Analysis.Elapsed.mSec
Value: 1734
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 781
Key : Analysis.Init.Elapsed.mSec
Value: 9804
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 0x21808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_CODE_AV_BAD_IP_nt!KiPageFault
Key : Failure.Exception.IP.Address
Value: 0xfffff807714e1141
Key : Failure.Hash
Value: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Key : Hypervisor.Enlightenments.ValueHex
Value: 0x7417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 55185662
Key : Hypervisor.Flags.ValueHex
Value: 0x34a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 0x3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff807714e1141
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff807714e1141
FILE_IN_CAB: 060425-6421-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x21808
Kernel Generated Triage Dump
FAULTING_THREAD: ffff8188b37fa080
READ_ADDRESS: fffff807731c34c0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff807714e1141
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SLBrowser.exe
FAILED_INSTRUCTION_ADDRESS:
+0
fffff807`714e1141 ?? ???
STACK_TEXT:
ffff9382`eb4f7458 fffff807`728b8fe9 : 00000000`0000000a fffff807`714e1141 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffff9382`eb4f7460 fffff807`728b42a8 : 00000000`00000000 ffff8188`aff8e328 ffff8188`b37fa080 fffff807`725bdf27 : nt!KiBugCheckDispatch+0x69
ffff9382`eb4f75a0 fffff807`714e1141 : ffff9382`eb4f7748 fffff807`724546f0 ffff8188`aff8e280 fffff807`72466e43 : nt!KiPageFault+0x468
ffff9382`eb4f7730 ffff9382`eb4f7748 : fffff807`724546f0 ffff8188`aff8e280 fffff807`72466e43 ffff8188`c96c8140 : 0xfffff807`714e1141
ffff9382`eb4f7738 fffff807`724546f0 : ffff8188`aff8e280 fffff807`72466e43 ffff8188`c96c8140 ffff8188`b3c69ef0 : 0xffff9382`eb4f7748
ffff9382`eb4f7740 000000e9`e307f338 : ffff9382`eb4f7aa0 ffff9382`eb4f7950 00000000`00040282 fffff807`724e0922 : nt!IopAllocateAndPopulateWriteIrp+0xb0
ffff9382`eb4f77c0 ffff9382`eb4f7aa0 : ffff9382`eb4f7950 00000000`00040282 fffff807`724e0922 ffff8188`c1b1da00 : 0x000000e9`e307f338
ffff9382`eb4f77c8 ffff9382`eb4f7950 : 00000000`00040282 fffff807`724e0922 ffff8188`c1b1da00 fffff807`72561201 : 0xffff9382`eb4f7aa0
ffff9382`eb4f77d0 00000000`00040282 : fffff807`724e0922 ffff8188`c1b1da00 fffff807`72561201 00000000`00000000 : 0xffff9382`eb4f7950
ffff9382`eb4f77d8 fffff807`724e0922 : ffff8188`c1b1da00 fffff807`72561201 00000000`00000000 fffff807`72a4b929 : 0x40282
ffff9382`eb4f77e0 fffff807`72b99ddf : ffff9382`eb4f7950 00000000`00000102 ffff8188`00000068 000000e9`e307f280 : nt!IoRemoveIoCompletion+0x92
ffff9382`eb4f7900 fffff807`728b8655 : ffff8188`b37fa080 000000e9`e307f338 ffff9382`eb4f79c8 00000000`00000000 : nt!NtRemoveIoCompletion+0x12f
ffff9382`eb4f79b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
SYMBOL_NAME: nt!KiPageFault+468
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26100.4061
STACK_COMMAND: .process /r /p 0xffff8188ba51a080; .thread 0xffff8188b37fa080 ; kb
BUCKET_ID_FUNC_OFFSET: 468
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
6: kd> .thread /r /p ffff8188b37fa080
Implicit thread is now ffff8188`b37fa080
Implicit process is now ffff8188`ba51a080
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000e9`d878c018). Type ".hh dbgerr001" for details
6: kd> !blackboxbsd
Version: 0xc8
Product type: 1
Auto advanced boot: FALSE
Advanced boot menu timeout: 30
Last boot succeeded: TRUE
Last boot shutdown: FALSE
Sleep in progress: FALSE
Power button timestamp: 0x0
System running: TRUE
Connected standby in progress: FALSE
User shutdown in progress: FALSE
System shutdown in progress: FALSE
Sleep in progress: 0
Connected standby scenario instance id: 0
Connected standby entry reason: 0
Connected standby exit reason: 0
System sleep transitions to on: 0
Last reference time: 0x1dbd54bca3b96f4
2025-06-04T12:25:42.972Z
Last reference time checksum: 0x8d9f856e
Last update boot id: 20
Boot attempt count: 1
Last boot checkpoint: TRUE
Checksum: 0x59
Last boot id: 20
Last successful shutdown boot id: 19
Last reported abnormal shutdown boot id: 19
Error info boot id: 0
Error info repeat count: 0
Error info other error count: 0
Error info code: 0
Error info status: 0x0
Power button last press time: 0x0
Power button cumulative press count: 0
Power button last press boot id: 0
Power button last power watchdog stage: 0
Power button watchdog armed: FALSE
Power button shutdown in progress: FALSE
Power button last release time: 0x0
Power button cumulative release count: 0
Power button last release boot id: 0
Power button error count: 0
Power button current connected standby phase: 0
Power button transition latest checkpoint id: 0
Power button transition latest checkpoint type: 0
Power button transition latest checkpoint sequence number: 0
Power transition Shutdown Device Type: 0
Power transition Setup In Progress: FALSE
Power transition OOBE In Progress: FALSE
Power transition Sleep Checkpoint Source: 0
Power transition Sleep Checkpoint: 0
Power transition Connected Standby Entry Reason Category: 0
Power transition Connected Standby Exit Reason Category: 0
Power transition Connected Standby Entry Scenario Instance Id: 0x0
Feature Configuration State : Committed
6: kd> !blackboxntfs
NTFS Blackbox Data
0 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
6: kd> lmvm nt
Browse full module list
start end module name
fffff807`72200000 fffff807`73650000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\D783DA3D8CE8C95843A0BA21F1DC22941\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\2F1BEFC41450000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data Symbol Reload
Image was built with /Brepro flag.
Timestamp: 2F1BEFC4 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00C60556
ImageSize: 01450000
File version: 10.0.26100.4061
Product version: 10.0.26100.4061
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.26100.4061
FileVersion: 10.0.26100.4061 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
6: kd> .process /r /p 0xffff8188ba51a080; .thread 0xffff8188b37fa080 ; kb
Implicit process is now ffff8188`ba51a080
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000e9`d878c018). Type ".hh dbgerr001" for details
Implicit thread is now ffff8188`b37fa080
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 fffff807`728b8fe9 : 00000000`0000000a fffff807`714e1141 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
01 fffff807`728b42a8 : 00000000`00000000 ffff8188`aff8e328 ffff8188`b37fa080 fffff807`725bdf27 : nt!KiBugCheckDispatch+0x69
02 fffff807`714e1141 : ffff9382`eb4f7748 fffff807`724546f0 ffff8188`aff8e280 fffff807`72466e43 : nt!KiPageFault+0x468
03 ffff9382`eb4f7748 : fffff807`724546f0 ffff8188`aff8e280 fffff807`72466e43 ffff8188`c96c8140 : 0xfffff807`714e1141
04 fffff807`724546f0 : ffff8188`aff8e280 fffff807`72466e43 ffff8188`c96c8140 ffff8188`b3c69ef0 : 0xffff9382`eb4f7748
05 000000e9`e307f338 : ffff9382`eb4f7aa0 ffff9382`eb4f7950 00000000`00040282 fffff807`724e0922 : nt!IopAllocateAndPopulateWriteIrp+0xb0
06 ffff9382`eb4f7aa0 : ffff9382`eb4f7950 00000000`00040282 fffff807`724e0922 ffff8188`c1b1da00 : 0x000000e9`e307f338
07 ffff9382`eb4f7950 : 00000000`00040282 fffff807`724e0922 ffff8188`c1b1da00 fffff807`72561201 : 0xffff9382`eb4f7aa0
08 00000000`00040282 : fffff807`724e0922 ffff8188`c1b1da00 fffff807`72561201 00000000`00000000 : 0xffff9382`eb4f7950
09 fffff807`724e0922 : ffff8188`c1b1da00 fffff807`72561201 00000000`00000000 fffff807`72a4b929 : 0x40282
0a fffff807`72b99ddf : ffff9382`eb4f7950 00000000`00000102 ffff8188`00000068 000000e9`e307f280 : nt!IoRemoveIoCompletion+0x92
0b fffff807`728b8655 : ffff8188`b37fa080 000000e9`e307f338 ffff9382`eb4f79c8 00000000`00000000 : nt!NtRemoveIoCompletion+0x12f
0c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25