..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000009F, {4, 258, fffffa80033ee040, fffff80000b9c510}
Probably caused by : ntkrnlmp.exe ( nt!KiSwapContext+7a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
[COLOR=#ff0000][U][B]DRIVER_POWER_STATE_FAILURE (9f)
A driver is causing an inconsistent power state.[/B][/U][/COLOR]
Arguments:
Arg1: 0000000000000004, The power transition timed out waiting to synchronize with the Pnp
subsystem.
Arg2: 0000000000000258, Timeout in seconds.
Arg3: fffffa80033ee040, The thread currently holding on to the Pnp lock.
Arg4: fffff80000b9c510
Debugging Details:
------------------
DRVPOWERSTATE_SUBCODE: 4
FAULTING_THREAD: fffffa80033ee040
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x9F
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800034e5f32 to fffff800034e34da
STACK_TEXT:
fffff880`039d2580 fffff800`034e5f32 : fffffa80`033ee040 fffffa80`033ee040 00000000`00000000 00000000`0000000d : nt!KiSwapContext+0x7a
fffff880`039d26c0 fffff800`034e544a : fffff8a0`000028e0 00000000`00002a18 fffff8a0`00000000 00000000`00000200 : nt!KiCommitThreadWait+0x1d2
fffff880`039d2750 fffff800`0374b214 : fffffa80`00000003 fffff880`039d2a68 00000000`00000001 fffffa80`00000000 : nt!KeWaitForMultipleObjects+0x272
fffff880`039d2a10 fffff800`0387f949 : 00000000`00000000 fffffa80`0379d870 fffff8a0`0f50a1f0 00000000`00000000 : nt!PnpNotifyUserMode+0x158
fffff880`039d2a90 fffff800`0395a951 : 00000000`00000000 00000000`00000000 fffff8a0`0f50a1f0 00000000`00000000 : nt!PnpNotifyUserModeDeviceRemoval+0x49
fffff880`039d2ae0 fffff800`0395b08c : fffff880`039d2cb8 00000000`00000000 fffff8a0`02b7ca00 fffffa80`00000000 : nt!PnpProcessQueryRemoveAndEject+0xb51
fffff880`039d2c20 fffff800`0384434e : 00000000`00000000 fffffa80`037e6210 fffff8a0`0f50a1f0 00000000`00000001 : nt!PnpProcessTargetDeviceEvent+0x4c
fffff880`039d2c50 fffff800`034eb001 : fffff800`0374a998 fffff8a0`0f50a1f0 fffff800`036812b8 fffffa80`033ee040 : nt! ?? ::NNGAKEGL::`string'+0x5b3cb
fffff880`039d2cb0 fffff800`0377bfee : 00000000`00000000 fffffa80`033ee040 00000000`00000080 fffffa80`033dc890 : nt!ExpWorkerThread+0x111
fffff880`039d2d40 fffff800`034d25e6 : fffff880`009e8180 fffffa80`033ee040 fffff880`009f2f40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`039d2d80 00000000`00000000 : fffff880`039d3000 fffff880`039cd000 fffff880`039d29e0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .thread 0xfffffa80033ee040 ; kb
FOLLOWUP_IP:
nt!KiSwapContext+7a
fffff800`034e34da 488d8c2400010000 lea rcx,[rsp+100h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiSwapContext+7a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x9F_4_nt!KiSwapContext+7a
BUCKET_ID: X64_0x9F_4_nt!KiSwapContext+7a
Followup: MachineOwner