这是用Windbg测出的日志,我只能看到好像是由谷歌浏览器触发的BUG
Microsoft (R) Windows Debugger Version 10.0.18272.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\121818-9765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff804`2229b000 PsLoadedModuleList = 0xfffff804`226ba9b0
Debug session time: Tue Dec 18 09:47:51.796 2018 (UTC + 8:00)
System Uptime: 0 days 1:52:06.569
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`2244c040 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9b88`e8889ad0=000000000000003b
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Can't set dump file contexts
MachineInfo::SetContext failed - Thread: 000002811638F2B0 Handle: 4 Id: 4 - Error == 0x8000FFFF
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff804`2229b000 PsLoadedModuleList = 0xfffff804`226ba9b0
Debug session time: Tue Dec 18 09:47:51.796 2018 (UTC + 8:00)
System Uptime: 0 days 1:52:06.569
Loading Kernel Symbols
.....................................Page 20044d159 too large to be in the dump file.
Page 200449458 too large to be in the dump file.
..........................
................................................................
................................................................
........
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000007b`f2066018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
nt!KeBugCheckEx:
fffff804`2244c040 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9b88`e8889ad0=000000000000003b
||1:3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************