社区中心 | 讨论问答网站 | 开始问答
开始使用 Microsoft Q&A 的初始步骤或说明
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 44
Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Tutu\OneDrive\桌面\071225-4906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff804`35a00000 PsLoadedModuleList = 0xfffff804`3662a3f0
Debug session time: Sat Jul 12 01:09:42.081 2025 (UTC + 8:00)
System Uptime: 0 days 1:11:21.756
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00261018). Type ".hh dbgerr001" for details
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`35dfd3c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8b8d`df08f3e0=000000000000001a
4: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00261018). Type ".hh dbgerr001" for details
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000009696, The subtype of the BugCheck.
Arg2: ffffb80000180090
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 984
Key : Analysis.Elapsed.mSec
Value: 2827
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 9180
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Bugcheck.Code.TargetModel
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 0x8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: 0x1a_9696_nt!MiIdentifyPfn
Key : Failure.Hash
Value: {ec3d8058-693a-a1fd-9afc-b2d81d6a90d5}
BUGCHECK_CODE: 1a
BUGCHECK_P1: 9696
BUGCHECK_P2: ffffb80000180090
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 071225-4906-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
FAULTING_THREAD: ffff8f0417f82080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: DeltaForceClie
STACK_TEXT:
ffff8b8d`df08f3d8 fffff804`35cca6a0 : 00000000`0000001a 00000000`00009696 ffffb800`00180090 00000000`00000000 : nt!KeBugCheckEx
ffff8b8d`df08f3e0 fffff804`35cc9915 : 00000000`00000800 ffff8b8d`00000000 00000000`00000001 ffff8b8d`df08f5c8 : nt!MiIdentifyPfn+0xd20
ffff8b8d`df08f4d0 fffff804`36040174 : 00000000`00000000 ffff8f04`20b5e908 ffff8b8d`df08fac0 ffff8f04`20b600c0 : nt!MiIdentifyPfnWrapper+0x55
ffff8b8d`df08f500 fffff804`360cd5dc : 00000000`00000000 00000000`00000001 ffff8b8d`df08f6f0 ffff8f04`20b54000 : nt!PfpPfnPrioRequest+0xe4
ffff8b8d`df08f580 fffff804`360cba5b : 0000004c`32a8f730 fffff804`35cc9585 00000000`00000001 ffff8f04`19b03390 : nt!PfQuerySuperfetchInformation+0x2ec
ffff8b8d`df08f6c0 fffff804`360c9a07 : 0000004c`32a8efc0 00000000`0000024c 0000004c`32a8f3a0 00000000`00000030 : nt!ExpQuerySystemInformation+0x1f0b
ffff8b8d`df08fa00 fffff804`35e11305 : 00000000`00000000 0000004c`32a8f070 ffffffff`ff115a40 00000000`00000000 : nt!NtQuerySystemInformation+0x37
ffff8b8d`df08fa40 00007ffe`0384dbb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004c`32a8f6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0384dbb4
SYMBOL_NAME: nt!MiIdentifyPfn+d20
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.6093
STACK_COMMAND: .process /r /p 0xffff8f04213e0340; .thread 0xffff8f0417f82080 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: d20
FAILURE_BUCKET_ID: 0x1a_9696_nt!MiIdentifyPfn
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec3d8058-693a-a1fd-9afc-b2d81d6a90d5}
Followup: MachineOwner
晚上好,图图,
通过纯文本格式日志无法确定蓝屏成因,烦请将 DMP 日志原文件上传至国内外任意网盘产品 (如 OneDrive 等),生成分享链接,将链接发送到本话题以供详细分析。
请注意:必须上传 “小内存转储” (Minidump) 类型日志 (如下图),其他大型日志中可能记录了您的个人隐私信息,通过本公共社区上传有泄露的风险,请特别留意。
谢谢!😀
顺颂 时祺
- Ling Gao
2021 Windows Insider 最有价值专家 (MVP),
Microsoft 管理社区冠军,Windows 商业 & 云冠军