Jump to content

srv.sys 0x4e bsod


Recommended Posts

Posted

I am getting a constant bsod reboot of my windows 2003 server dual core p4 4g

RAM raid server. Here is my dump file:

 

 

Loading Dump File [R:\minidump\Mini091307-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

 

Symbol search path is: *** Invalid ***

****************************************************************************

* Symbol loading may be unreliable without a symbol search path. *

* Use .symfix to have the debugger choose a symbol path. *

* After setting your symbol path, use .reload to refresh symbol locations. *

****************************************************************************

Executable search path is:

*********************************************************************

* Symbols can not be loaded because symbol path is not initialized. *

* *

* The Symbol Path can be set by: *

* using the _NT_SYMBOL_PATH environment variable. *

* using the -y <symbol_path> argument when starting the debugger. *

* using .sympath and .sympath+ *

*********************************************************************

Unable to load image \WINDOWS\system32\ntoskrnl.exe, Win32 error 0n2

*** WARNING: Unable to verify timestamp for ntoskrnl.exe

*** ERROR: Module load completed but symbols could not be loaded for

ntoskrnl.exe

Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free

x86 compatible

Product: Server, suite: TerminalServer SingleUserTS

Kernel base = 0x80800000 PsLoadedModuleList = 0x808af9c8

Debug session time: Wed Sep 12 23:58:13.844 2007 (GMT-6)

System Uptime: 0 days 18:52:59.968

*********************************************************************

* Symbols can not be loaded because symbol path is not initialized. *

* *

* The Symbol Path can be set by: *

* using the _NT_SYMBOL_PATH environment variable. *

* using the -y <symbol_path> argument when starting the debugger. *

* using .sympath and .sympath+ *

*********************************************************************

Unable to load image \WINDOWS\system32\ntoskrnl.exe, Win32 error 0n2

*** WARNING: Unable to verify timestamp for ntoskrnl.exe

*** ERROR: Module load completed but symbols could not be loaded for

ntoskrnl.exe

Loading Kernel Symbols

..............................................................................................................

Loading User Symbols

Loading unloaded module list

....

*******************************************************************************

*

*

* Bugcheck Analysis

*

*

*

*******************************************************************************

 

Use !analyze -v to get detailed debugging information.

 

BugCheck 4E, {9a, 7048, 6, 2}

 

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

 

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

*** WARNING: Unable to verify timestamp for srv.sys

*** ERROR: Module load completed but symbols could not be loaded for srv.sys

Probably caused by : srv.sys ( srv+118d )

 

Followup: MachineOwner

---------

 

3: kd> !analyze -v

*******************************************************************************

*

*

* Bugcheck Analysis

*

*

*

*******************************************************************************

 

PFN_LIST_CORRUPT (4e)

Typically caused by drivers passing bad memory descriptor lists (ie: calling

MmUnlockPages twice with the same list, etc). If a kernel debugger is

available get the stack trace.

Arguments:

Arg1: 0000009a,

Arg2: 00007048

Arg3: 00000006

Arg4: 00000002

 

Debugging Details:

------------------

 

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

 

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

*************************************************************************

*** ***

*** ***

*** Your debugger is not using the correct symbols ***

*** ***

*** In order for this command to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: nt!_KPRCB ***

*** ***

*************************************************************************

 

MODULE_NAME: srv

 

FAULTING_MODULE: 80800000 nt

 

DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a048

 

BUGCHECK_STR: 0x4E_9a

 

CUSTOMER_CRASH_COUNT: 1

 

DEFAULT_BUCKET_ID: WRONG_SYMBOLS

 

LAST_CONTROL_TRANSFER: from 80888c9e to 8087c480

 

STACK_TEXT:

WARNING: Stack unwind information not available. Following frames may be

wrong.

f6545bd0 80888c9e 0000004e 0000009a 00007048 nt+0x7c480

f6545bec 8089ac04 818a86c0 808b7600 05c32f50 nt+0x88c9e

f6545c20 8089c36d 87048000 e20f60c0 e20f6008 nt+0x9ac04

f6545c78 f63d218d 6264534c 00000000 f63edc47 nt+0x9c36d

f6545cd4 f63ee973 87bf6901 87bf6998 e20f6008 srv+0x118d

f6545cec f63f1764 87bf6998 87bf6998 808389fd srv+0x1d973

f6545d78 f63d3e87 87bf69a0 8256b6e0 f63e76c7 srv+0x20764

f6545dac 80920833 0056b6e0 00000000 00000000 srv+0x2e87

f6545ddc 8083fe9f f63e7602 8256b6e0 00000000 nt+0x120833

00000000 00000000 00000000 00000000 00000000 nt+0x3fe9f

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

srv+118d

f63d218d ?? ???

 

SYMBOL_STACK_INDEX: 4

 

FOLLOWUP_NAME: MachineOwner

 

IMAGE_NAME: srv.sys

 

SYMBOL_NAME: srv+118d

 

BUCKET_ID: WRONG_SYMBOLS

 

Followup: MachineOwner

---------

 

3: kd> lmvm nt

start end module name

80800000 80a7a000 nt T (no symbols)

Loaded symbol image file: ntoskrnl.exe

Image path: \WINDOWS\system32\ntoskrnl.exe

Image name: ntoskrnl.exe

Timestamp: Mon Mar 05 06:02:02 2007 (45EC14CA)

CheckSum: 00269C05

ImageSize: 0027A000

Translations: 0000.04b0 0000.04e0 0409.04b0 0409.04e0

3: kd> lmvm srv

start end module name

f63d1000 f642e000 srv T (no symbols)

Loaded symbol image file: srv.sys

Image path: \SystemRoot\system32\DRIVERS\srv.sys

Image name: srv.sys

Timestamp: Fri Feb 16 23:27:20 2007 (45D6A048)

CheckSum: 0005AEFC

ImageSize: 0005D000

Translations: 0000.04b0 0000.04e0 0409.04b0 0409.04e0

  • Replies 1
  • Created
  • Last Reply

Popular Days

Posted

RE: srv.sys 0x4e bsod

 

Sorry, here is an updated version of the memorydump that was created the same

time with the symbols in this time.

 

 

Microsoft ® Windows Debugger Version 6.7.0005.1

Copyright © Microsoft Corporation. All rights reserved.

 

 

Loading Dump File [C:\WINDOWS\MEMORY.DMP]

Kernel Summary Dump File: Only kernel address space is available

 

Symbol search path is:

SRV*c:\symbols*http://msdl.microsoft.com/download/symbols

Executable search path is:

Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free

x86 compatible

Product: Server, suite: TerminalServer SingleUserTS

Built by: 3790.srv03_sp2_gdr.070304-2240

Kernel base = 0x80800000 PsLoadedModuleList = 0x808af9c8

Debug session time: Wed Sep 12 23:58:13.844 2007 (GMT-6)

System Uptime: 0 days 18:52:59.968

Loading Kernel Symbols

..............................................................................................................

Loading User Symbols

 

Loading unloaded module list

....

ERROR: FindPlugIns 8007007b

*******************************************************************************

*

*

* Bugcheck Analysis

*

*

*

*******************************************************************************

 

Use !analyze -v to get detailed debugging information.

 

BugCheck 4E, {9a, 7048, 6, 2}

 

Probably caused by : srv.sys ( srv!SrvFreeNonPagedPool+2a )

 

Followup: MachineOwner

---------

 

3: kd> !analyze -v

ERROR: FindPlugIns 8007007b

*******************************************************************************

*

*

* Bugcheck Analysis

*

*

*

*******************************************************************************

 

PFN_LIST_CORRUPT (4e)

Typically caused by drivers passing bad memory descriptor lists (ie: calling

MmUnlockPages twice with the same list, etc). If a kernel debugger is

available get the stack trace.

Arguments:

Arg1: 0000009a,

Arg2: 00007048

Arg3: 00000006

Arg4: 00000002

 

Debugging Details:

------------------

 

 

BUGCHECK_STR: 0x4E_9a

 

DEFAULT_BUCKET_ID: DRIVER_FAULT

 

PROCESS_NAME: System

 

CURRENT_IRQL: 0

 

LAST_CONTROL_TRANSFER: from 80888c9e to 8087c480

 

STACK_TEXT:

f6545bd0 80888c9e 0000004e 0000009a 00007048 nt!KeBugCheckEx+0x1b

f6545bec 8089ac04 818a86c0 808b7600 05c32f50 nt!MiBadRefCount+0x33

f6545c20 8089c36d 87048000 e20f60c0 e20f6008 nt!MiFreePoolPages+0x5b9

f6545c78 f63d218d 6264534c 00000000 f63edc47 nt!ExFreePoolWithTag+0x277

f6545c84 f63edc47 00000003 87bf6998 00000001 srv!SrvFreeNonPagedPool+0x2a

f6545cd4 f63ee973 87bf6901 87bf6998 e20f6008 srv!DoFindFirst2+0x6bf

f6545cec f63f1764 87bf6998 87bf6998 808389fd srv!SrvSmbFindFirst2+0x6b

f6545d00 f63f0432 f63e280c 87bf6998 8256b718 srv!ExecuteTransaction+0x29e

f6545d78 f63d3e87 87bf69a0 8256b6e0 f63e76c7 srv!SrvSmbTransaction+0x7ac

f6545d84 f63e76c7 00000000 82568db0 00000000 srv!SrvProcessSmb+0xb7

f6545dac 80920833 0056b6e0 00000000 00000000 srv!WorkerThread+0x138

f6545ddc 8083fe9f f63e7602 8256b6e0 00000000 nt!PspSystemThreadStartup+0x2e

00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

srv!SrvFreeNonPagedPool+2a

f63d218d ebe7 jmp srv!SrvFreeNonPagedPool+0x2a (f63d2176)

 

SYMBOL_STACK_INDEX: 4

 

FOLLOWUP_NAME: MachineOwner

 

MODULE_NAME: srv

 

IMAGE_NAME: srv.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a048

 

SYMBOL_NAME: srv!SrvFreeNonPagedPool+2a

 

FAILURE_BUCKET_ID: 0x4E_9a_srv!SrvFreeNonPagedPool+2a

 

BUCKET_ID: 0x4E_9a_srv!SrvFreeNonPagedPool+2a

 

Followup: MachineOwner

---------

 

3: kd> lmvm srv

start end module name

f63d1000 f642e000 srv (pdb symbols)

c:\symbols\srv.pdb\826BC4DC0D8C477E874DEB57B3F628372\srv.pdb

Loaded symbol image file: srv.sys

Image path: \SystemRoot\system32\DRIVERS\srv.sys

Image name: srv.sys

Timestamp: Fri Feb 16 23:27:20 2007 (45D6A048)

CheckSum: 0005AEFC

ImageSize: 0005D000

Translations: 0000.04b0 0000.04e0 0409.04b0 0409.04e0

 

 

 

 

"Andy" wrote:

>

>

> I am getting a constant bsod reboot of my windows 2003 server dual core p4 4g

> RAM raid server. Here is my dump file:

>

>

> Loading Dump File [R:\minidump\Mini091307-01.dmp]

> Mini Kernel Dump File: Only registers and stack trace are available

>

> Symbol search path is: *** Invalid ***

> ****************************************************************************

> * Symbol loading may be unreliable without a symbol search path. *

> * Use .symfix to have the debugger choose a symbol path. *

> * After setting your symbol path, use .reload to refresh symbol locations. *

> ****************************************************************************

> Executable search path is:

> *********************************************************************

> * Symbols can not be loaded because symbol path is not initialized. *

> * *

> * The Symbol Path can be set by: *

> * using the _NT_SYMBOL_PATH environment variable. *

> * using the -y <symbol_path> argument when starting the debugger. *

> * using .sympath and .sympath+ *

> *********************************************************************

> Unable to load image \WINDOWS\system32\ntoskrnl.exe, Win32 error 0n2

> *** WARNING: Unable to verify timestamp for ntoskrnl.exe

> *** ERROR: Module load completed but symbols could not be loaded for

> ntoskrnl.exe

> Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free

> x86 compatible

> Product: Server, suite: TerminalServer SingleUserTS

> Kernel base = 0x80800000 PsLoadedModuleList = 0x808af9c8

> Debug session time: Wed Sep 12 23:58:13.844 2007 (GMT-6)

> System Uptime: 0 days 18:52:59.968

> *********************************************************************

> * Symbols can not be loaded because symbol path is not initialized. *

> * *

> * The Symbol Path can be set by: *

> * using the _NT_SYMBOL_PATH environment variable. *

> * using the -y <symbol_path> argument when starting the debugger. *

> * using .sympath and .sympath+ *

> *********************************************************************

> Unable to load image \WINDOWS\system32\ntoskrnl.exe, Win32 error 0n2

> *** WARNING: Unable to verify timestamp for ntoskrnl.exe

> *** ERROR: Module load completed but symbols could not be loaded for

> ntoskrnl.exe

> Loading Kernel Symbols

> .............................................................................................................

> Loading User Symbols

> Loading unloaded module list

> ...

> *******************************************************************************

> *

> *

> * Bugcheck Analysis

> *

> *

> *

> *******************************************************************************

>

> Use !analyze -v to get detailed debugging information.

>

> BugCheck 4E, {9a, 7048, 6, 2}

>

> ***** Kernel symbols are WRONG. Please fix symbols to do analysis.

>

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

> *** WARNING: Unable to verify timestamp for srv.sys

> *** ERROR: Module load completed but symbols could not be loaded for srv.sys

> Probably caused by : srv.sys ( srv+118d )

>

> Followup: MachineOwner

> ---------

>

> 3: kd> !analyze -v

> *******************************************************************************

> *

> *

> * Bugcheck Analysis

> *

> *

> *

> *******************************************************************************

>

> PFN_LIST_CORRUPT (4e)

> Typically caused by drivers passing bad memory descriptor lists (ie: calling

> MmUnlockPages twice with the same list, etc). If a kernel debugger is

> available get the stack trace.

> Arguments:

> Arg1: 0000009a,

> Arg2: 00007048

> Arg3: 00000006

> Arg4: 00000002

>

> Debugging Details:

> ------------------

>

> ***** Kernel symbols are WRONG. Please fix symbols to do analysis.

>

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

> *************************************************************************

> *** ***

> *** ***

> *** Your debugger is not using the correct symbols ***

> *** ***

> *** In order for this command to work properly, your symbol path ***

> *** must point to .pdb files that have full type information. ***

> *** ***

> *** Certain .pdb files (such as the public OS symbols) do not ***

> *** contain the required information. Contact the group that ***

> *** provided you with these symbols if you need this command to ***

> *** work. ***

> *** ***

> *** Type referenced: nt!_KPRCB ***

> *** ***

> *************************************************************************

>

> MODULE_NAME: srv

>

> FAULTING_MODULE: 80800000 nt

>

> DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a048

>

> BUGCHECK_STR: 0x4E_9a

>

> CUSTOMER_CRASH_COUNT: 1

>

> DEFAULT_BUCKET_ID: WRONG_SYMBOLS

>

> LAST_CONTROL_TRANSFER: from 80888c9e to 8087c480

>

> STACK_TEXT:


×
×
  • Create New...