Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_Mini102710-01[2].zip\Mini090210-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18267.x86fre.vistasp2_gdr.100608-0458
Machine Name:
Kernel base = 0x82a15000 PsLoadedModuleList = 0x82b2cc70
Debug session time: Thu Sep 2 10:40:58.382 2010 (GMT-4)
System Uptime: 0 days 1:31:56.162
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\System32\DRIVERS\srvnet.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for srvnet.sys
*** ERROR: Module load completed but symbols could not be loaded for srvnet.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 9ee85df1, 9d8c5890, 0}
Unable to load image \SystemRoot\System32\Drivers\avgtdix.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdix.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdix.sys
Probably caused by : srvnet.sys ( srvnet+bdf1 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 9ee85df1, The address that the exception occurred at
Arg3: 9d8c5890, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
srvnet+bdf1
9ee85df1 8b08 mov ecx,dword ptr [eax]
TRAP_FRAME: 9d8c5890 -- (.trap 0xffffffff9d8c5890)
ErrCode = 00000000
eax=00000000 ebx=879f0018 ecx=9d8c5914 edx=00000000 esi=879ef148 edi=879f0180
eip=9ee85df1 esp=9d8c5904 ebp=9d8c592c iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
srvnet+0xbdf1:
9ee85df1 8b08 mov ecx,dword ptr [eax] ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: avgnsx.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 9ee8211c to 9ee85df1
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
9d8c592c 9ee8211c 879f0018 9ee8a3a8 879f0018 srvnet+0xbdf1
9d8c5948 9ee81fc6 009f0018 879f0180 879f0018 srvnet+0x811c
9d8c5970 9ee80c83 009f0018 9d8c5b04 89a41f98 srvnet+0x7fc6
9d8c5ab8 908f17cf 879f0018 00000000 893eb2bc srvnet+0x6c83
9d8c5ae8 908f7b48 89a41f98 008c5b04 8999eda0 afd!WskProTLEVENTReceive+0xa8
9d8c5b1c 90870e56 891138c8 85dd16e0 00000820 afd!WskTdiEHReceive+0x1f2
9d8c5b7c 908711ac 0099ed28 00000000 af9e9a7c avgtdix+0x4e56
9d8c5b94 90871cd1 0099ed28 af9e9a7c 00000089 avgtdix+0x51ac
9d8c5bd0 9086d2a4 89cff8f0 892cfc08 88eb8348 avgtdix+0x5cd1
9d8c5c1c 9086f57f 88eb8348 89cff8f0 9d8c5c44 avgtdix+0x12a4
9d8c5c2c 82a599c6 88eb8348 89cff8f0 89cff8f0 avgtdix+0x357f
9d8c5c44 82c5b7a3 892cfc08 89cff8f0 89cff960 nt!IofCallDriver+0x63
9d8c5c64 82c5bf48 88eb8348 892cfc08 00000000 nt!IopSynchronousServiceTail+0x1d9
9d8c5d00 82c5d012 88eb8348 89cff8f0 00000000 nt!IopXxxControlFile+0x6b7
9d8c5d34 82a5fc7a 000002d8 000003a0 00000000 nt!NtDeviceIoControlFile+0x2a
9d8c5d34 77d15e74 000002d8 000003a0 00000000 nt!KiFastCallEntry+0x12a
0166fd58 00000000 00000000 00000000 00000000 0x77d15e74
STACK_COMMAND: kb
FOLLOWUP_IP:
srvnet+bdf1
9ee85df1 8b08 mov ecx,dword ptr [eax]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: srvnet+bdf1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srvnet
IMAGE_NAME: srvnet.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b22304e
FAILURE_BUCKET_ID: 0x8E_srvnet+bdf1
BUCKET_ID: 0x8E_srvnet+bdf1
Followup: MachineOwner
---------