新电脑玩游戏老是自动重启 我用windbg分析能帮我看看吗

宏元 项 0 信誉分
2026-03-03T08:06:19.19+00:00
************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 46

Microsoft (R) Windows Debugger Version 10.0.29507.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\030326-8609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 26100 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff802`9f000000 PsLoadedModuleList = 0xfffff802`9fef5100
Debug session time: Tue Mar  3 15:30:56.537 2026 (UTC + 8:00)
System Uptime: 0 days 4:12:00.154
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
.................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000090`3bcb1018).  Type ".hh dbgerr001" for details
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`9f4fba80 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffda03`60dbcf80=000000000000003b
2: kd> !analyze -v
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
.................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000090`3bcb1018).  Type ".hh dbgerr001" for details
Loading unloaded module list
................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8029f2e6308, Address of the instruction which caused the BugCheck
Arg3: ffffda0360dbd8c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for amdkmdag.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1078

    Key  : Analysis.Elapsed.mSec
    Value: 29821

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 1

    Key  : Analysis.Init.CPU.mSec
    Value: 500

    Key  : Analysis.Init.Elapsed.mSec
    Value: 95933

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29507.1001

    Key  : Analysis.Version.Description
    Value: 10.2511.5.1 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2511.5.1

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Bugcheck.Code.TargetModel
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 0x21008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0x0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_amdkmdag!unknown_function

    Key  : Failure.Exception.IP.Address
    Value: 0xfffff8029f2e6308

    Key  : Failure.Exception.IP.Module
    Value: nt

    Key  : Failure.Exception.IP.Offset
    Value: 0x2e6308

    Key  : Failure.Hash
    Value: {c753a2f9-94a6-448f-1d0e-e079b3442215}

    Key  : Faulting.IP.Type
    Value: Paged

    Key  : WER.System.BIOSRevision
    Value: 14.2.0.0


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8029f2e6308

BUGCHECK_P3: ffffda0360dbd8c0

BUGCHECK_P4: 0

FILE_IN_CAB:  030326-8609-01.dmp

DUMP_FILE_ATTRIBUTES: 0x21008
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffffde8e5578b0c0

CONTEXT:  ffffda0360dbd8c0 -- (.cxr 0xffffda0360dbd8c0)
rax=ffffde8e5578bab0 rbx=0000000000000740 rcx=0000000000000740
rdx=0000000000000000 rsi=ffffde8e5578bab0 rdi=ffffde8e7a46d800
rip=fffff8029f2e6308 rsp=ffffda0360dbe2f0 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000001 r10=ffffde8e5578b0c0
r11=ffffde8e5578ba48 r12=ffffda0360dbe584 r13=ffffda0360dbe568
r14=ffffde8e7a46d800 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExAcquireFastMutex+0x38:
fffff802`9f2e6308 f00fba3300      lock btr dword ptr [rbx],0 ds:002b:00000000`00000740=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

IP_IN_PAGED_CODE: 
nt!ExAcquireFastMutex+38
fffff802`9f2e6308 f00fba3300      lock btr dword ptr [rbx],0

STACK_TEXT:  
ffffda03`60dbe2f0 fffff802`7279ee03     : ffffde8e`317f6040 ffffde8e`7a46d800 00000000`00000000 00000000`00000000 : nt!ExAcquireFastMutex+0x38
ffffda03`60dbe340 ffffde8e`317f6040     : ffffde8e`7a46d800 00000000`00000000 00000000`00000000 ffffde8e`8c979b50 : amdkmdag+0x29ee03
ffffda03`60dbe348 ffffde8e`7a46d800     : 00000000`00000000 00000000`00000000 ffffde8e`8c979b50 fffff802`727a0e57 : 0xffffde8e`317f6040
ffffda03`60dbe350 00000000`00000000     : 00000000`00000000 ffffde8e`8c979b50 fffff802`727a0e57 ffffde8e`7a46d868 : 0xffffde8e`7a46d800


SYMBOL_NAME:  amdkmdag+29ee03

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND: .cxr 0xffffda0360dbd8c0 ; kb

BUCKET_ID_FUNC_OFFSET:  29ee03

FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}

Followup:     MachineOwner
---------
开发人员技术 | 通用 Windows 平台 (UWP)
0 个注释 无注释
{count} 票

你的答案

提问者可以将答案标记为“已接受”,版主可以将答案标记为“已推荐”,这有助于用户了解答案是否解决了提问者的问题。