Windows
Microsoft 操作系统系列,可跨个人计算机、平板电脑、笔记本电脑、手机、物联网设备、独立混合现实头戴显示设备、大型协作屏幕和其他设备运行。
568 个问题
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.000 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\021025-6453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff806`81c00000 PsLoadedModuleList = 0xfffff806`82af4870
Debug session time: Mon Feb 10 14:16:38.637 2025 (UTC + 8:00)
System Uptime: 0 days 0:17:37.238
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!RtlpHpLfhOwnerRunMaintenance+0x39:
fffff806`82004eed 4d8b36 mov r14,qword ptr [r14] ds:002b:ffbfb30b`c919e000=????????????????
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80682004eed, The address that the exception occurred at
Arg3: fffff6805f77a2b8, Exception Record Address
Arg4: ffffd68170cee8d0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1062
Key : Analysis.Elapsed.mSec
Value: 1947
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 5664
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Bugcheck.Code.TargetModel
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!RtlpHpLfhOwnerRunMaintenance
Key : Failure.Hash
Value: {46316152-3ee0-f887-508d-d7be1567adf7}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80682004eed
BUGCHECK_P3: fffff6805f77a2b8
BUGCHECK_P4: ffffd68170cee8d0
FILE_IN_CAB: 021025-6453-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffb30bbf718040
EXCEPTION_RECORD: fffff6805f77a2b8 -- (.exr 0xfffff6805f77a2b8)
ExceptionAddress: fffff80682004eed (nt!RtlpHpLfhOwnerRunMaintenance+0x0000000000000039)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd68170cee8d0 -- (.cxr 0xffffd68170cee8d0)
rax=0000000000000407 rbx=ffbfb30bc919e000 rcx=c0020181a050b040
rdx=0000000000000200 rsi=ffffb30bbf106e40 rdi=fffff6805f77a570
rip=fffff80682004eed rsp=fffff6805f77a4f0 rbp=ffffb30bbf100380
r8=0000000000000000 r9=ffffb30bde143150 r10=00000000000000f0
r11=000ffffb30bde143 r12=ffffb30bbf106e58 r13=0000000000000000
r14=ffbfb30bc919e000 r15=0000000000000007
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050293
nt!RtlpHpLfhOwnerRunMaintenance+0x39:
fffff806`82004eed 4d8b36 mov r14,qword ptr [r14] ds:002b:ffbfb30b`c919e000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80682bc34b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p %s
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff680`5f77a4f0 fffff806`8202d282 : 00000000`00000007 00000000`00560151 ffffb30b`bf100380 ffffb30b`bf104240 : nt!RtlpHpLfhOwnerRunMaintenance+0x39
fffff680`5f77a550 fffff806`8202d35f : 00000000`00000000 ffffb30b`bf104100 ffffb30b`bf104100 fffff680`5f77a710 : nt!RtlpHpLfhOwnerCompact+0xc2
fffff680`5f77a6d0 fffff806`8202d02f : 00000000`00000000 fffff806`8202d3e6 00010000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0x19f
fffff680`5f77a850 fffff806`8202cf65 : ffffb30b`bf100000 00000000`00000000 00000000`00000000 fffff806`824c285c : nt!RtlpHpLfhContextCompact+0xa3
fffff680`5f77a890 fffff806`8202cf03 : 00000000`00000001 00000000`00000000 00000000`00000001 ffffb30b`bf718080 : nt!RtlpHpHeapCompact+0x21
fffff680`5f77a8c0 fffff806`82071075 : 00000000`00000001 00000000`00000001 00000000`00000000 fffff806`81f70b46 : nt!ExpHpCompactHeapCallback+0x23
fffff680`5f77a8f0 fffff806`82070fd5 : 00000000`00000001 fffff680`5f77aa80 ffffb30b`bf71eab0 ffffb30b`bf71eab0 : nt!ExpHpEnumerateHeaps+0x71
fffff680`5f77a950 fffff806`81f704a2 : ffffb30b`bf718040 ffffb30b`bf718000 00000000`00000000 ffffb30b`00000000 : nt!ExpHpCompactionRoutine+0x15
fffff680`5f77a980 fffff806`8205585a : ffffb30b`bf718040 ffffb30b`bf718040 fffff806`81f702f0 ffffb30b`bf71eab0 : nt!ExpWorkerThread+0x1b2
fffff680`5f77ab30 fffff806`8227ae54 : ffffd681`7118e180 ffffb30b`bf718040 fffff806`82055800 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff680`5f77ab80 00000000`00000000 : fffff680`5f77b000 fffff680`5f774000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!RtlpHpLfhOwnerRunMaintenance+39
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26100.2894
STACK_COMMAND: .cxr 0xffffd68170cee8d0 ; kb
BUCKET_ID_FUNC_OFFSET: 39
FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhOwnerRunMaintenance
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {46316152-3ee0-f887-508d-d7be1567adf7}
Followup: MachineOwner
---------