Blazor
一个免费的开源 Web 框架,使开发人员能够使用 Microsoft 开发的 C# 和 HTML 创建 Web 应用。
23 个问题
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\081824-12171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff805`54600000 PsLoadedModuleList = 0xfffff805`5522a820
Debug session time: Sun Aug 18 20:55:07.158 2024 (UTC + 8:00)
System Uptime: 0 days 1:59:19.890
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000029`5f5b8018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`549fdde0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffac0f`83c3e3f0=0000000000000139
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000021, Type of memory safety violation
Arg2: ffffac0f83c3e710, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffac0f83c3e668, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2108
Key : Analysis.Elapsed.mSec
Value: 2116
Key : Analysis.IO.Other.Mb
Value: 8
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 1359
Key : Analysis.Init.Elapsed.mSec
Value: 511899
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : FailFast.Name
Value: INVALID_IDLE_STATE
Key : FailFast.Type
Value: 33
Key : Failure.Bucket
Value: 0x139_21_INVALID_IDLE_STATE_STACKPTR_ERROR_nt!KiFastFailDispatch
Key : Failure.Hash
Value: {8241aee2-4396-87fa-a71b-7db8342db535}
BUGCHECK_CODE: 139
BUGCHECK_P1: 21
BUGCHECK_P2: ffffac0f83c3e710
BUGCHECK_P3: ffffac0f83c3e668
BUGCHECK_P4: 0
FILE_IN_CAB: 081824-12171-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
FAULTING_THREAD: ffffe78f5a0f2080
TRAP_FRAME: ffffac0f83c3e710 -- (.trap 0xffffac0f83c3e710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000021
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80554a2f1b0 rsp=ffffac0f83c3e8a0 rbp=0000000000000002
r8=0000000000000009 r9=fffff8054f526aa0 r10=ffffe78f5a0f2158
r11=ffffd380c14df180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSearchForNewThreadOnProcessor+0x1f5fe0:
fffff805`54a2f1b0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffac0f83c3e668 -- (.exr 0xffffac0f83c3e668)
ExceptionAddress: fffff80554a2f1b0 (nt!KiSearchForNewThreadOnProcessor+0x00000000001f5fe0)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000021
Subcode: 0x21 FAST_FAIL_INVALID_IDLE_STATE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000021
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffac0f83c3e3e8
STACK_TEXT:
ffffac0f`83c3e3e8 fffff805`54a125a9 : 00000000`00000139 00000000`00000021 ffffac0f`83c3e710 ffffac0f`83c3e668 : nt!KeBugCheckEx
ffffac0f`83c3e3f0 fffff805`54a12b50 : fffff805`5491f000 fffff805`5491c530 00000000`00000006 00000002`00000001 : nt!KiBugCheckDispatch+0x69
ffffac0f`83c3e530 fffff805`54a109f2 : 00000000`00000000 ffffd380`c14df180 00000000`00000000 00000800`00000000 : nt!KiFastFailDispatch+0xd0
ffffac0f`83c3e710 fffff805`54a2f1b0 : ffffd380`c14df180 00000000`00000000 fffff805`4f526a00 00000000`00000009 : nt!KiRaiseSecurityCheckFailure+0x332
ffffac0f`83c3e8a0 fffff805`54838b1c : ffffd380`c14df180 00000000`ffffffff 00000000`00000000 ffffe78f`5c709158 : nt!KiSearchForNewThreadOnProcessor+0x1f5fe0
ffffac0f`83c3e920 fffff805`54837f5f : ffffffff`00000004 ffffe78f`00000000 00000000`00000000 ffffd380`00000000 : nt!KiSwapThread+0x5ec
ffffac0f`83c3e9d0 fffff805`548d0984 : ffffe78f`00000000 ffffe78f`00000000 ffffac0f`00000000 00005e1c`05db0388 : nt!KiCommitThreadWait+0x14f
ffffac0f`83c3ea70 fffff805`54c88f80 : ffffe78f`5dd03080 ffffac0f`83c3eb80 ffffac0f`83c3eb80 00000000`00000000 : nt!KeWaitForAlertByThreadId+0xc4
ffffac0f`83c3ead0 fffff805`54a11d08 : ffffe78f`5dd03080 00000000`00000000 00000000`00000000 ffffe78f`00000000 : nt!NtWaitForAlertByThreadId+0x30
ffffac0f`83c3eb00 00007fff`2df70f94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000029`708ff6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2df70f94
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.4648
STACK_COMMAND: .process /r /p 0xffffe78f608e6080; .thread 0xffffe78f5a0f2080 ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_21_INVALID_IDLE_STATE_STACKPTR_ERROR_nt!KiFastFailDispatch
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8241aee2-4396-87fa-a71b-7db8342db535}
Followup: MachineOwner
---------