************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
*************WAIting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\地方\Desktop\031825-6156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSKernel base = 0xfffff804`03200000 PSLoadedModuleList = 0xfffff804`03e2a770Debug session time: Tue Mar 18 11:56:42.638 2025 (UTC + 8:00)System Uptime: 0 days 0:00:32.388Loading Kernel Symbols.....................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff804`035fd6f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa809`9a88b410=000000000000000a8: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: ffffbc5b82406068, memory referencedArg2: 00000000000000ff, IRQLArg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff80403607b84, address which referenced memoryDebugging Details:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2625 Key : Analysis.Elapsed.mSec Value: 2675 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 609 Key : Analysis.Init.Elapsed.mSec Value: 6624 Key : Analysis.Memory.CommitPeak.Mb Value: 91 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Failure.Bucket Value: AV_nt!guard_dispatch_icall Key : Failure.Hash Value: {e05b71c3-29b2-bd38-ddcd-e2af02495127}BUGCHECK_CODE: aBUGCHECK_P1: ffffbc5b82406068BUGCHECK_P2: ffBUGCHECK_P3: 0BUGCHECK_P4: fffff80403607b84FILE_IN_CAB: 031825-6156-01.dmpDUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage DumpREAD_ADDRESS: fffff80403efb390: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse ffffbc5b82406068
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXntfs: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa8099a88b550 -- (.trap 0xffffa8099a88b550)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=ff00000303529520 rbx=0000000000000000 rcx=0000000000000001rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=fffff80403607b84 rsp=ffffa8099a88b6e8 rbp=0000000000000000 r8=0000000000000000 r9=ffff8409f30a8110 r10=0000ff0000030352r11=ffff9c7b82400000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up di pl nz ac pe cynt!guard_dispatch_icall+0x44:fffff804`03607b84 4d0fa313 bt qword ptr [r11],r10 ds:ffff9c7b`82400000=???????????????? Resetting default scope
STACK_TEXT: ffffa809`9a88b408 fffff804`03611aa9 : 00000000`0000000a ffffbc5b`82406068 00000000`000000ff 00000000`00000000 : nt!KeBugCheckExffffa809`9a88b410 fffff804`0360d563 : fffff804`08198a10 fffff804`28ca2e03 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69ffffa809`9a88b550 fffff804`03607b84 : fffff804`03454b68 ffff8409`f30a8328 00000000`00000000 00000000`1371f4dd : nt!KiPageFault+0x463ffffa809`9a88b6e8 fffff804`03454b68 : ffff8409`f30a8328 00000000`00000000 00000000`1371f4dd 00000000`1371f4dd : nt!guard_dispatch_icall+0x44ffffa809`9a88b6f0 fffff804`03454194 : ffff9c7b`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x858ffffa809`9a88baf0 fffff804`036020a4 : ffffffff`00000000 ffffac80`2c133340 ffff840a`01ca5080 00000000`00000708 : nt!PoIdle+0x374ffffa809`9a88bc60 00000000`00000000 : ffffa809`9a88c000 ffffa809`9a886000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54SYMBOL_NAME: nt!guard_dispatch_icall+44
MODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeIMAGE_VERSION: 10.0.19041.3803STACK_COMMAND: .cxr; .ecxr ; kbBUCKET_ID_FUNC_OFFSET: 44FAILURE_BUCKET_ID: AV_nt!guard_dispatch_icallOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {e05b71c3-29b2-bd38-ddcd-e2af02495127}Followup: MachineOwner--------- |