windows 10 pro 1809 主板为捷波 P6A8G R2 ,P35芯片,板载声卡和网卡。代码如下:
Microsoft (R) Windows Debugger Version 10.0.17763.168 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Windows 10 Kernel Version 17763 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff806`5c801000 PsLoadedModuleList = 0xfffff806`5cc1c790
Debug session time: Fri May 3 11:14:14.018 2019 (UTC + 8:00)
System Uptime: 0 days 13:13:17.994
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000ce`5c1de018). Type ".hh dbgerr001" for details
Loading unloaded module list
...................
************* Symbol Loading Error Summary **************
Module name Error
ntkrnlmp The system cannot find the file specified
You can troubleshoot most symbol related issues by turning on symbol loading diagnostics (!sym noisy) and repeating the command that caused symbols to be loaded.
You should also verify that your symbol search path (.sympath) is correct.
Unable to add extension DLL: kdexts
Unable to add extension DLL: kext
Unable to add extension DLL: exts
The call to LoadLibrary(ext) failed, Win32 error 0n2
"系统找不到指定的文件。"
Please check your debugger configuration and/or network access.
The call to LoadLibrary(ext) failed, Win32 error 0n2
"系统找不到指定的文件。"
Please check your debugger configuration and/or network access.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Bugcheck code 00000109
Arguments a39ff75d`856af566 b3b703e3`d7ee47bc ffff803e`55184000 00000000`0000000c
RetAddr : Args to Child : Call Site
00000000`00000000 : 00000000`00000109 a39ff75d`856af566 b3b703e3`d7ee47bc ffff803e`55184000 : nt!KeBugCheckEx