数据线连接手机后没反应  重启过程中蓝屏


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`04600000 PsLoadedModuleList = 0xfffff802`0522a2b0
Debug session time: Sat Dec 19 21:21:23.592 2020 (UTC + 8:00)
System Uptime: 6 days 9:43:10.420
Loading Kernel Symbols
...............................................................
....Page 1f11d0 not present in the dump file. Type ".hh dbgerr004" for details
............................................................
................................................................
.............
Loading User Symbols

Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`049f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8308`ab8ef750=000000000000009f
13: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_POWER_STATE_FAILURE (9f)
A driver has failed to complete a power IRP within a specific time.
Arguments:
Arg1: 0000000000000004, The power transition timed out waiting to synchronize with the Pnp
    subsystem.
Arg2: 000000000000012c, Timeout in seconds.
Arg3: ffffc78b30d85040, The thread currently holding on to the Pnp lock.
Arg4: ffff8308ab8ef780, nt!TRIAGE_9F_PNP on Win7 and higher

Debugging Details:
------------------

Implicit thread is now ffffc78b`30d85040

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1I32UE3

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 44847

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  9f

BUGCHECK_P1: 4

BUGCHECK_P2: 12c

BUGCHECK_P3: ffffc78b30d85040

BUGCHECK_P4: ffff8308ab8ef780

DRVPOWERSTATE_SUBCODE:  4

IMAGE_NAME:  usbccgp.sys

MODULE_NAME: usbccgp

FAULTING_MODULE: fffff8021e530000 usbccgp

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

STACK_TEXT: 
ffff8308`ab8ef748 fffff802`04b075e6     : 00000000`0000009f 00000000`00000004 00000000`0000012c ffffc78b`30d85040 : nt!KeBugCheckEx
ffff8308`ab8ef750 fffff802`04fae8e6     : 00000000`00000000 00000000`00000001 00000000`00000080 ffffdd81`17598180 : nt!PnpBugcheckPowerTimeout+0x76
ffff8308`ab8ef7b0 fffff802`04844f12     : ffff8308`ac377230 ffffdd81`17598180 ffff8308`ab8efa18 00000000`00000000 : nt!PopBuildDeviceNotifyListWatchdog+0x16
ffff8308`ab8ef7e0 fffff802`04806eed     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`01421db1 : nt!KiProcessExpiredTimerList+0x172
ffff8308`ab8ef8d0 fffff802`049f92ee     : ffffffff`00000000 ffffdd81`17598180 ffffdd81`175a3440 ffffc78b`33e0b640 : nt!KiRetireDpcList+0x5dd
ffff8308`ab8efb60 00000000`00000000     : ffff8308`ab8f0000 ffff8308`ab8e9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x9F_4_netaapl64_IMAGE_usbccgp.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9ab783e2-0458-c388-ab50-9e74cc553a51}

Followup:     MachineOwner
---------

13: kd> lmvm usbccgp
Browse full module list
start             end                 module name
fffff802`1e530000 fffff802`1e563000   usbccgp    (pdb symbols)          C:\ProgramData\Dbg\sym\usbccgp.pdb\8B07765EE2936D1133EBD6D8BF6243731\usbccgp.pdb
    Loaded symbol image file: usbccgp.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\usbccgp.sys\6ADA60BC33000\usbccgp.sys
    Image path: \SystemRoot\System32\drivers\usbccgp.sys
    Image name: usbccgp.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        6ADA60BC (This is a reproducible build file hash, not a timestamp)
    CheckSum:         000363E2
    ImageSize:        00033000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:      您可以用管理员身份运行命令提示符,输入chkdskC:/f回车尝试我不是本站的审阅人,也不是
        您好欢迎咨询本站,

点赞(49) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部