************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 46
Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Users\Administered\Desktop\102925-12250-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (4 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Edition build lab: 14393.2248.amd64fre.rs1_release.180427-1804
Kernel base = 0xfffff800`5fe78000 PsLoadedModuleList = 0xfffff800`6017f160
Debug session time: Wed Oct 29 04:24:54.325 2025 (UTC + 8:00)
System Uptime: 1 days 7:20:09.329
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`006c3018). Type ".hh dbgerr001" for details
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`5ffd3940 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd101`6e80d130=000000000000004e
2: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`006c3018). Type ".hh dbgerr001" for details
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000028d47c, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0c0002800028d47d, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 953
Key : Analysis.Elapsed.mSec
Value: 13665
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 60305
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.Version.DbgEng
Value: 10.0.29457.1000
Key : Analysis.Version.Description
Value: 10.2506.23.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2506.23.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x4e
Key : Bugcheck.Code.TargetModel
Value: 0x4e
Key : Failure.Bucket
Value: 0x4E_99_nt!MiDeletePteRun
Key : Failure.Hash
Value: {826a8dfe-b402-47c5-bb75-e9ab5230289f}
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Version
Value: 10.0.14393.2248
Key : WER.System.BIOSRevision
Value: 1.114.0.0
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 28d47c
BUGCHECK_P3: 2
BUGCHECK_P4: c0002800028d47d
FILE_IN_CAB: 102925-12250-01.dmp
FAULTING_THREAD: ffffab02083c0800
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: php.exe
STACK_TEXT:
ffffd101`6e80d128 fffff800`5ff5d68c : 00000000`0000004e 00000000`00000099 00000000`0028d47c 00000000`00000002 : nt!KeBugCheckEx
ffffd101`6e80d130 fffff800`5fea999c : 11800006`8d50c867 ffffce00`00056000 ffffd101`6e80d3a0 ffff8d80`07fb17d0 : nt!MiDeletePteRun+0x81c
ffffd101`6e80d2a0 fffff800`5fe90777 : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 ffffab02`0c8e4490 : nt!MiDeleteVirtualAddresses+0xe8c
ffffd101`6e80d4b0 fffff800`602688a3 : ffffab02`0c8e4490 ffffab02`0c8e4490 ffffab02`083c0800 ffffab02`0c8e2840 : nt!MiDeleteVad+0x277
ffffd101`6e80d5e0 fffff800`602686bf : 00000000`00040000 ffffab02`083c0800 00000000`00000001 ffffab02`0c8e2840 : nt!MmCleanProcessAddressSpace+0xbf
ffffd101`6e80d650 fffff800`602dcc48 : ffffab02`0c8e2840 ffffe483`85341060 ffffd101`6e80d740 00000000`00000000 : nt!PspRundownSingleProcess+0x117
ffffd101`6e80d6d0 fffff800`602fd01e : 00000000`c0000005 ffffab02`083c0800 ffffd101`6e80da80 ffffab02`083c08a8 : nt!PspExitThread+0x508
ffffd101`6e80d810 fffff800`5feca8c2 : 00000000`005aee20 00000000`00000001 00000000`00000030 ffffab02`0c1cecd0 : nt!KiSchedulerApcTerminate+0x2e
ffffd101`6e80d840 fffff800`5ffd7eb0 : 00000000`005aee20 ffffab02`0c8e2d40 ffffab02`083c0800 00000000`00000000 : nt!KiDeliverApc+0x2f2
ffffd101`6e80d8d0 fffff800`5ffe4b0a : 00000000`00000000 fffff800`5ff3dd42 ffff19ab`28fb0f5b 00000000`773a6770 : nt!KiInitiateUserApc+0x70
ffffd101`6e80da10 00007ffa`cdb698a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`005ae6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`cdb698a4
SYMBOL_NAME: nt!MiDeletePteRun+81c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.14393.2248
STACK_COMMAND: .process /r /p 0xffffab020c8e2840; .thread 0xffffab02083c0800 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 81c
FAILURE_BUCKET_ID: 0x4E_99_nt!MiDeletePteRun
OS_VERSION: 10.0.14393.2248
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {826a8dfe-b402-47c5-bb75-e9ab5230289f}
Followup: MachineOwner
---------
上传了dmp文件,麻烦改下后缀看下。