windows 10 蓝屏 SYSTEM_SERVICE_EXCEPTION 0x0000003b ntoskrnl.exe
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Users\qiwang_tan\Desktop\F3-1F生产电脑蓝屏\10.163.35.186\MEMORY\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff8041f800000 PsLoadedModuleList = 0xfffff804
2042a290
Debug session time: Thu Sep 26 16:03:32.590 2024 (UTC + 8:00)
System Uptime: 26 days 23:48:10.015
Loading Kernel Symbols
...............................................................
.....Page 8455fc not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
................................................................
......
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff8041fbf8fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb90f
43278ac0=000000000000003b
2: kd> !analyze -v
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8041fea0978, Address of the instruction which caused the BugCheck
Arg3: ffffb90f432793c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3249
Key : Analysis.Elapsed.mSec
Value: 3428
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1452
Key : Analysis.Init.Elapsed.mSec
Value: 4908
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.KiBugCheckData
Value: 0x3b
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Failure.Bucket
Value: AV_nt!HvpGetCellPaged
Key : Failure.Hash
Value: {90e145c3-c04a-f304-4254-781be6862dc9}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 131072
Key : Hypervisor.Flags.ValueHex
Value: 20000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8041fea0978
BUGCHECK_P3: ffffb90f432793c0
BUGCHECK_P4: 0
FILE_IN_CAB: MEMORY.DMP
FAULTING_THREAD: ffffa58192ecb0c0
CONTEXT: ffffb90f432793c0 -- (.cxr 0xffffb90f432793c0)
rax=0000000000002fe8 rbx=ffffb90f43279e20 rcx=00000000000005fd
rdx=00000000ffffffe0 rsi=ffff81004270b000 rdi=ffff81004270b000
rip=fffff8041fea0978 rsp=ffffb90f43279dc8 rbp=ffff81004270b000
r8=ffff81004270b398 r9=00000000000003ff r10=0000000000000fe0
r11=0000000000000fe0 r12=ffffb90f43279f2c r13=ffffb90f4327a1a0
r14=ffff81004270b000 r15=ffffb90f43279f2c
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0x68:
fffff8041fea0978 488b4808 mov rcx,qword ptr [rax+8] ds:002b:00000000
00002ff0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffb90f43279dc8 fffff804
1fdf38ef : 0000026b1c80469c ffffb90f
4327a1a0 ffffa58192ecb0c0 00000000
00000000 : nt!HvpGetCellPaged+0x68
ffffb90f43279dd0 fffff804
1fdf3191 : 00000000ffffffff 0000026b
1d09680c ffff81004270b000 ffff8100
4270b000 : nt!CmpDoCompareKeyName+0x2f
ffffb90f43279e20 fffff804
1fdf2c11 : 0000026b1c80469c 00000000
00000001 ffff81004270b000 fffff804
1fa0e61b : nt!CmpCompareInIndex+0xc1
ffffb90f43279e60 fffff804
1fdf9773 : 00000001003c6020 0000026b
1c80469c 00000000e0d9e6c5 00000000
00000000 : nt!CmpFindSubKeyInRoot+0x1f5
ffffb90f43279ed0 fffff804
1fdfc949 : ffff810042683b00 00000000
00000001 ffffb90f4327a0d0 ffffb90f
4327a150 : nt!CmpWalkOneLevel+0x743
ffffb90f43279fd0 fffff804
1fdfb233 : 000000000000001c ffffb90f
4327a320 ffffb90f4327a2d8 ffffa581
97602ae0 : nt!CmpDoParseKey+0x849
ffffb90f4327a270 fffff804
1fdff2fe : fffff8041fdfaf01 00000000
00000000 ffffa58197602ae0 00000000
00000001 : nt!CmpParseKey+0x2c3
ffffb90f4327a410 fffff804
1fe28b2a : ffffa58197602a00 ffffb90f
4327a678 0000000000000040 ffffa581
7c7f6e80 : nt!ObpLookupObjectName+0x3fe
ffffb90f4327a5e0 fffff804
1fe2890c : 0000000000000000 00000000
00000000 0000000000000000 ffffa581
7c7f6e80 : nt!ObOpenObjectByNameEx+0x1fa
ffffb90f4327a710 fffff804
1fe28431 : 00000000440ad478 ffffb90f
4327aa80 0000000000000001 fffff804
1fa0eb2e : nt!ObOpenObjectByName+0x5c
ffffb90f4327a760 fffff804
1fe2815f : 00000000440ad7d8 00000000
466bb060 000000000000136c 00000000
440ad7d4 : nt!CmOpenKey+0x2c1
ffffb90f4327a9c0 fffff804
1fc0a9b5 : ffffa58192ecb000 00000000
00000000 ffffb90f4327aa80 ffffa581
924f9b50 : nt!NtOpenKeyEx+0xf
ffffb90f4327aa00 00007ffe
aef0f3f4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000440ad398 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ffe`aef0f3f4
SYMBOL_NAME: nt!HvpGetCellPaged+68
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xffffb90f432793c0 ; kb
BUCKET_ID_FUNC_OFFSET: 68
FAILURE_BUCKET_ID: AV_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {90e145c3-c04a-f304-4254-781be6862dc9}
Followup: MachineOwner