数据线连接手机后没反应 重启过程中蓝屏
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`04600000 PsLoadedModuleList = 0xfffff802`0522a2b0
Debug session time: Sat Dec 19 21:21:23.592 2020 (UTC + 8:00)
System Uptime: 6 days 9:43:10.420
Loading Kernel Symbols
...............................................................
....Page 1f11d0 not present in the dump file. Type ".hh dbgerr004" for details
............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`049f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8308`ab8ef750=000000000000009f
13: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_POWER_STATE_FAILURE (9f)
A driver has failed to complete a power IRP within a specific time.
Arguments:
Arg1: 0000000000000004, The power transition timed out waiting to synchronize with the Pnp
subsystem.
Arg2: 000000000000012c, Timeout in seconds.
Arg3: ffffc78b30d85040, The thread currently holding on to the Pnp lock.
Arg4: ffff8308ab8ef780, nt!TRIAGE_9F_PNP on Win7 and higher
Debugging Details:
------------------
Implicit thread is now ffffc78b`30d85040
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1I32UE3
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 44847
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 9f
BUGCHECK_P1: 4
BUGCHECK_P2: 12c
BUGCHECK_P3: ffffc78b30d85040
BUGCHECK_P4: ffff8308ab8ef780
DRVPOWERSTATE_SUBCODE: 4
IMAGE_NAME: usbccgp.sys
MODULE_NAME: usbccgp
FAULTING_MODULE: fffff8021e530000 usbccgp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8308`ab8ef748 fffff802`04b075e6 : 00000000`0000009f 00000000`00000004 00000000`0000012c ffffc78b`30d85040 : nt!KeBugCheckEx
ffff8308`ab8ef750 fffff802`04fae8e6 : 00000000`00000000 00000000`00000001 00000000`00000080 ffffdd81`17598180 : nt!PnpBugcheckPowerTimeout+0x76
ffff8308`ab8ef7b0 fffff802`04844f12 : ffff8308`ac377230 ffffdd81`17598180 ffff8308`ab8efa18 00000000`00000000 : nt!PopBuildDeviceNotifyListWatchdog+0x16
ffff8308`ab8ef7e0 fffff802`04806eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`01421db1 : nt!KiProcessExpiredTimerList+0x172
ffff8308`ab8ef8d0 fffff802`049f92ee : ffffffff`00000000 ffffdd81`17598180 ffffdd81`175a3440 ffffc78b`33e0b640 : nt!KiRetireDpcList+0x5dd
ffff8308`ab8efb60 00000000`00000000 : ffff8308`ab8f0000 ffff8308`ab8e9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x9F_4_netaapl64_IMAGE_usbccgp.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9ab783e2-0458-c388-ab50-9e74cc553a51}
Followup: MachineOwner
---------
13: kd> lmvm usbccgp
Browse full module list
start end module name
fffff802`1e530000 fffff802`1e563000 usbccgp (pdb symbols) C:\ProgramData\Dbg\sym\usbccgp.pdb\8B07765EE2936D1133EBD6D8BF6243731\usbccgp.pdb
Loaded symbol image file: usbccgp.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\usbccgp.sys\6ADA60BC33000\usbccgp.sys
Image path: \SystemRoot\System32\drivers\usbccgp.sys
Image name: usbccgp.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 6ADA60BC (This is a reproducible build file hash, not a timestamp)
CheckSum: 000363E2
ImageSize: 00033000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: 您可以用管理员身份运行命令提示符,输入chkdskC:/f回车尝试我不是本站的审阅人,也不是
您好欢迎咨询本站,