yorath

lock dump

Jan 15th, 2014
78
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.76 KB | None | 0 0
  1. 0: kd> !analyze -v
  2. *******************************************************************************
  3. * *
  4. * Bugcheck Analysis *
  5. * *
  6. *******************************************************************************
  7.  
  8. MANUALLY_INITIATED_CRASH (e2)
  9. The user manually initiated this crash dump.
  10. Arguments:
  11. Arg1: 0000000000000000
  12. Arg2: 0000000000000000
  13. Arg3: 0000000000000000
  14. Arg4: 0000000000000000
  15.  
  16. Debugging Details:
  17. ------------------
  18.  
  19.  
  20. BUGCHECK_STR: MANUALLY_INITIATED_CRASH
  21.  
  22. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  23.  
  24. PROCESS_NAME: services.exe
  25.  
  26. CURRENT_IRQL: 7
  27.  
  28. EXCEPTION_RECORD: fffff98024f62f90 -- (.exr 0xfffff98024f62f90)
  29. Cannot read Exception record @ fffff98024f62f90
  30.  
  31. LAST_CONTROL_TRANSFER: from fffff8800493f5db to fffff80295471440
  32.  
  33. STACK_TEXT:
  34. fffff880`18f2ed98 fffff880`0493f5db : 00000000`000000e2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  35. fffff880`18f2eda0 fffff880`0493fa95 : fffffa80`0970f190 fffff880`18f2eee0 fffff880`18f2eee0 00000000`00000002 : i8042prt!I8xProcessCrashDump+0x24f
  36. fffff880`18f2ede0 fffff802`95469c76 : 00000002`8580d325 fffffa80`0970f040 fffff880`18f2eec6 fffffa80`0970f514 : i8042prt!I8042KeyboardInterruptService+0x399
  37. fffff880`18f2ee60 fffff802`954c512e : fffff980`24f62f90 fffff880`00000000 fffff880`170be523 00000000`00000720 : nt!KiInterruptDispatch+0x1d6
  38. fffff880`18f2eff0 fffff880`170be532 : fffff980`24f62f90 fffff980`062008e0 fffff880`18f2f1d8 fffff802`95a58ef2 : nt!RtlEnumerateGenericTable+0x5a
  39. fffff880`18f2f020 fffff880`170bba4b : ffffffff`ffb3b4c0 fffffa80`00000011 fffff980`062008e0 fffff880`18f2f1d8 : asd2fsm!FsmScanInUserMode+0x62 [f:\source\projects\asd2\extend\asd2fsm\asd2fsm\util.c @ 127]
  40. fffff880`18f2f080 fffff880`015d019f : fffff8a0`056504f0 00000000`00000016 fffff880`18f2f1d8 fffff8a0`20786e53 : asd2fsm!FsmPostCreate+0x19b [f:\source\projects\asd2\extend\asd2fsm\asd2fsm\asd2fsm.c @ 1065]
  41. fffff880`18f2f100 fffff880`0157ded3 : fffffa80`08c34a00 fffff8a0`00000000 00000000`00000000 fffffa80`08c34b58 : fltmgr!FltvPostOperation+0xa7
  42. fffff880`18f2f190 fffff880`0157f65e : fffff8a0`0583e800 fffff8a0`0583e800 fffffa80`06fee9e0 00000000`00000000 : fltmgr!FltpPerformPostCallbacks+0x2b3
  43. fffff880`18f2f260 fffff880`0157e61b : fffffa80`08c34a80 fffff980`26078c10 fffff980`26078fb0 fffffa80`08c34a80 : fltmgr!FltpPassThroughCompletionWorker+0x7e
  44. fffff880`18f2f2d0 fffff880`015a835d : fffffa80`08c34a80 fffff980`26078c10 fffffa80`091c6de0 fffffa80`09192c90 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x38b
  45. fffff880`18f2f370 fffff802`95a57d66 : fffff980`26078c00 fffff980`26078c10 00000000`00000000 fffff802`95a5b660 : fltmgr!FltpCreate+0x34d
  46. fffff880`18f2f420 fffff802`958439d8 : 00000000`00000045 fffff880`18f2f750 fffffa80`08abfa28 fffffa80`07ae6e40 : nt!IovCallDriver+0x3e6
  47. fffff880`18f2f470 fffff802`95840a85 : fffffa80`08c3a740 fffffa80`08c3a740 00000000`00000001 fffffa80`09192c90 : nt!IopParseDevice+0x173c
  48. fffff880`18f2f650 fffff802`958503f8 : 00000000`00000000 fffff880`18f2f818 fffffa80`00000040 fffffa80`06f33280 : nt!ObpLookupObjectName+0x806
  49. fffff880`18f2f7a0 fffff802`958a5e9c : 00000000`00000000 000000cf`1446d440 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x258
  50. fffff880`18f2f870 fffff802`95470453 : fffffa80`08af7b00 fffffa80`08af7b00 fffffa80`08af7b00 000000cf`133185c0 : nt!NtQueryAttributesFile+0x13b
  51. fffff880`18f2fb00 000007fc`345e2fba : 000007fc`3460fe37 000000cf`1446d830 00000000`000001d0 00000001`00000000 : nt!KiSystemServiceCopyEnd+0x13
  52. 000000cf`1446d398 000007fc`3460fe37 : 000000cf`1446d830 00000000`000001d0 00000001`00000000 00000019`00190160 : ntdll!NtQueryAttributesFile+0xa
  53. 000000cf`1446d3a0 000007fc`3461029d : 000000cf`132602ac 00000000`00000006 000000cf`1446d830 000000cf`13260d20 : ntdll!RtlDoesFileExists_UstrEx+0xa3
  54. 000000cf`1446d490 000007fc`3158b8bf : 00000000`00000000 00000000`00000000 00000000`00000000 000000cf`13335b30 : ntdll!RtlDosSearchPath_Ustr+0x443
  55. 000000cf`1446d7a0 000007fc`3156a198 : 000000cf`133593c2 000000cf`1334ebce 00000000`00000000 00000000`00000000 : KERNELBASE!SearchPathW+0x12f
  56. 000000cf`1446d870 000007fc`315786db : 00000000`00000018 000007fc`34612402 000000cf`1432ab40 000000cf`1334e730 : KERNELBASE!CreateProcessInternalW+0x19af
  57. 000000cf`1446e1e0 000007fc`319d4b17 : 00000000`00000600 00000004`00000001 000000cf`00000030 00000000`00000000 : KERNELBASE!CreateProcessAsUserW+0x63
  58. 000000cf`1446e250 000007f6`b5d483b0 : 000000cf`1446e488 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!CreateProcessAsUserWStub+0x5f
  59. 000000cf`1446e2c0 000007f6`b5d47f62 : 000000cf`133185c0 000000cf`1446e600 000000cf`133186c0 000000cf`133186c0 : services!ScLogonAndStartImage+0x430
  60. 000000cf`1446e500 000007f6`b5d46a96 : 000000cf`133185c0 000000cf`1446e930 00000000`00000001 000000cf`133185c0 : services!ScStartService+0x4ea
  61. 000000cf`1446e8e0 000007f6`b5d46261 : 00000000`00000000 00000000`00000001 000000cf`1432aa80 00000000`00000000 : services!ScStartMarkedServices+0x16d
  62. 000000cf`1446e970 000007f6`b5d45f3f : 000000cf`00000000 000007f6`00000001 000000cf`133185c0 000000cf`00000000 : services!ScStartServiceAndDependencies+0x2b7
  63. 000000cf`1446ea00 000007fc`327f2185 : 000000cf`1446ea80 00000000`00000000 000000cf`1446eec8 000007fc`00000000 : services!RStartServiceW+0xef
  64. 000000cf`1446ea60 000007fc`327f9e87 : 000007f6`b5d51c12 000000cf`1446eeb0 00000000`00000000 000000cf`1446f138 : RPCRT4!Invoke+0x65
  65. 000000cf`1446eac0 000007fc`327fafad : 00000000`00000000 000000cf`143b0330 000007f6`b5d518b0 000000cf`133589b0 : RPCRT4!NdrStubCall2+0x346
  66. 000000cf`1446f100 000007fc`327f2424 : 000000cf`00000000 000007f6`00000001 000000cf`00000000 000000cf`00000005 : RPCRT4!NdrServerCall2+0x1d
  67. 000000cf`1446f130 000007fc`327f233d : 000000cf`13325270 000000cf`1446f280 000000cf`1446f370 00000000`00000000 : RPCRT4!DispatchToStubInCNoAvrf+0x14
  68. 000000cf`1446f180 000007fc`327f2f53 : 000000cf`132c0000 00000000`000002a0 00000000`00000000 000007fc`345e5740 : RPCRT4!RPC_INTERFACE::DispatchToStubWorker+0x17d
  69. 000000cf`1446f320 000007fc`327f2b9c : 000000cf`132c0000 00000000`00000001 00000000`00000000 00000000`000080c8 : RPCRT4!LRPC_SCALL::DispatchRequest+0x91e
  70. 000000cf`1446f420 000007fc`327f2952 : 00000000`00000000 00000000`00000003 00000000`00000001 000000cf`143b8080 : RPCRT4!LRPC_SCALL::HandleRequest+0x7d2
  71. 000000cf`1446f570 000007fc`327f155b : 00000000`00000000 000000cf`13322858 00000000`00000000 00000000`00000000 : RPCRT4!LRPC_ADDRESS::ProcessIO+0x17bb
  72. 000000cf`1446f6e0 000007fc`345ed996 : 000000cf`14305380 00000000`00000000 000000cf`13313470 000000cf`143056e0 : RPCRT4!LrpcIoComplete+0x97
  73. 000000cf`1446f770 000007fc`345e82d6 : 00000000`00000000 000000cf`13313400 00000000`00000000 000000cf`143056e0 : ntdll!TppAlpcpExecuteCallback+0x1f6
  74. 000000cf`1446f7e0 000007fc`319d1832 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x388
  75. 000000cf`1446fa80 000007fc`3463d609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x1a
  76. 000000cf`1446fab0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
  77.  
  78.  
  79. STACK_COMMAND: kb
  80.  
  81. FOLLOWUP_IP:
  82. i8042prt!I8xProcessCrashDump+24f
  83. fffff880`0493f5db cc int 3
  84.  
  85. SYMBOL_STACK_INDEX: 1
  86.  
  87. SYMBOL_NAME: i8042prt!I8xProcessCrashDump+24f
  88.  
  89. FOLLOWUP_NAME: MachineOwner
  90.  
  91. MODULE_NAME: i8042prt
  92.  
  93. IMAGE_NAME: i8042prt.sys
  94.  
  95. DEBUG_FLR_IMAGE_TIMESTAMP: 5010ab62
  96.  
  97. BUCKET_ID_FUNC_OFFSET: 24f
  98.  
  99. FAILURE_BUCKET_ID: MANUALLY_INITIATED_CRASH_VRF_i8042prt!I8xProcessCrashDump
  100.  
  101. BUCKET_ID: MANUALLY_INITIATED_CRASH_VRF_i8042prt!I8xProcessCrashDump
  102.  
  103. Followup: MachineOwner
Add Comment
Please, Sign In to add comment