开发人员技术 | 通用 Windows 平台 (UWP)
用于构建和发布适用于 Windows 设备的应用的Microsoft平台。
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 46
Microsoft (R) Windows Debugger Version 10.0.29507.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\030326-8609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff802`9f000000 PsLoadedModuleList = 0xfffff802`9fef5100
Debug session time: Tue Mar 3 15:30:56.537 2026 (UTC + 8:00)
System Uptime: 0 days 4:12:00.154
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000090`3bcb1018). Type ".hh dbgerr001" for details
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`9f4fba80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffda03`60dbcf80=000000000000003b
2: kd> !analyze -v
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000090`3bcb1018). Type ".hh dbgerr001" for details
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8029f2e6308, Address of the instruction which caused the BugCheck
Arg3: ffffda0360dbd8c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for amdkmdag.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1078
Key : Analysis.Elapsed.mSec
Value: 29821
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 500
Key : Analysis.Init.Elapsed.mSec
Value: 95933
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.Version.DbgEng
Value: 10.0.29507.1001
Key : Analysis.Version.Description
Value: 10.2511.5.1 amd64fre
Key : Analysis.Version.Ext
Value: 1.2511.5.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_amdkmdag!unknown_function
Key : Failure.Exception.IP.Address
Value: 0xfffff8029f2e6308
Key : Failure.Exception.IP.Module
Value: nt
Key : Failure.Exception.IP.Offset
Value: 0x2e6308
Key : Failure.Hash
Value: {c753a2f9-94a6-448f-1d0e-e079b3442215}
Key : Faulting.IP.Type
Value: Paged
Key : WER.System.BIOSRevision
Value: 14.2.0.0
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8029f2e6308
BUGCHECK_P3: ffffda0360dbd8c0
BUGCHECK_P4: 0
FILE_IN_CAB: 030326-8609-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffde8e5578b0c0
CONTEXT: ffffda0360dbd8c0 -- (.cxr 0xffffda0360dbd8c0)
rax=ffffde8e5578bab0 rbx=0000000000000740 rcx=0000000000000740
rdx=0000000000000000 rsi=ffffde8e5578bab0 rdi=ffffde8e7a46d800
rip=fffff8029f2e6308 rsp=ffffda0360dbe2f0 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000001 r10=ffffde8e5578b0c0
r11=ffffde8e5578ba48 r12=ffffda0360dbe584 r13=ffffda0360dbe568
r14=ffffde8e7a46d800 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExAcquireFastMutex+0x38:
fffff802`9f2e6308 f00fba3300 lock btr dword ptr [rbx],0 ds:002b:00000000`00000740=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
IP_IN_PAGED_CODE:
nt!ExAcquireFastMutex+38
fffff802`9f2e6308 f00fba3300 lock btr dword ptr [rbx],0
STACK_TEXT:
ffffda03`60dbe2f0 fffff802`7279ee03 : ffffde8e`317f6040 ffffde8e`7a46d800 00000000`00000000 00000000`00000000 : nt!ExAcquireFastMutex+0x38
ffffda03`60dbe340 ffffde8e`317f6040 : ffffde8e`7a46d800 00000000`00000000 00000000`00000000 ffffde8e`8c979b50 : amdkmdag+0x29ee03
ffffda03`60dbe348 ffffde8e`7a46d800 : 00000000`00000000 00000000`00000000 ffffde8e`8c979b50 fffff802`727a0e57 : 0xffffde8e`317f6040
ffffda03`60dbe350 00000000`00000000 : 00000000`00000000 ffffde8e`8c979b50 fffff802`727a0e57 ffffde8e`7a46d868 : 0xffffde8e`7a46d800
SYMBOL_NAME: amdkmdag+29ee03
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .cxr 0xffffda0360dbd8c0 ; kb
BUCKET_ID_FUNC_OFFSET: 29ee03
FAILURE_BUCKET_ID: AV_amdkmdag!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c753a2f9-94a6-448f-1d0e-e079b3442215}
Followup: MachineOwner
---------
用于构建和发布适用于 Windows 设备的应用的Microsoft平台。