I got a BSoD today, when I opened http://www.nascar.com/ in IE8. I uploaded the minidump file to ftp://ftp.avast.com/incoming/bover907.dmp
Any help on what this means would be greatly appreciated. I have loved Avast for years. I recently built this computer, and put Avast 5 on it. My other computers still have 4.8 on them, as I was just waiting for Auto Update to prompt for ver5 install.
Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini032810-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (3 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sun Mar 28 00:56:06.828 2010 (GMT-4)
System Uptime: 0 days 2:16:49.660
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...
Loading User Symbols
Loading unloaded module list
..............
Unable to load image tcpip.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for tcpip.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {2, 887a232c, 887aa000, 89ce80c0}
Unable to load image aswTdi.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
*** WARNING: Unable to verify timestamp for afd.sys
Probably caused by : aswTdi.SYS ( aswTdi+977 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 00000002, Pool header has been corrupted
Arg2: 887a232c, Pointer to pool header
Arg3: 887aa000, First part of pool header contents
Arg4: 89ce80c0, 0
Debugging Details:
------------------
BUGCHECK_STR: 0xc2_2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: AvastSvc.exe
LAST_CONTROL_TRANSFER: from a948f0d3 to 804f9f43
STACK_TEXT:
a5c9a874 a948f0d3 000000c2 00000002 887a232c nt!_woutput+0x414
a5c9a8a0 a9464b38 89ce8040 a5c9a99c 88a7a97c tcpip!FillARPControlBlock+0x15
a5c9a8b8 a94645af 89ce8040 a5c9a99c a5c9a9f0 tcpip!MdpAllocate+0x1a
a5c9a8c8 a9463e80 a5c9a99c 84f841e8 88a7a8a0 tcpip!GetIPHdrBuffer+0x13
a5c9a9f0 a9468b07 a94a2b98 84f841e8 84f84180 tcpip!IPTransmit+0xa8f
a5c9aa5c a9468d35 8c563886 00004000 88bcc0cc tcpip!TCPSend+0x5db
a5c9aa84 a94684a5 00000001 00000000 00004000 tcpip!TdiSend+0x1ca
a5c9aab8 a94677b6 88bcc038 88a6a59c 88bcc038 tcpip!TCPSendData+0x83
a5c9aad4 804ef19f 89b34030 88bcc038 89a6c710 tcpip!TCPDispatchInternalDeviceControl+0x51
a5c9ab1c ba278977 89a6c6e0 88bcc038 89b34030 nt!MiFlushSectionInternal+0x256
WARNING: Stack unwind information not available. Following frames may be wrong.
a5c9ab64 804ef19f 89b34030 88bcc038 89b4f7a0 aswTdi+0x977
a5c9ab80 804ef19f 89b4f6e8 88bcc038 89aac508 nt!MiFlushSectionInternal+0x256
a5c9ac28 a93fc2d7 84fa0e48 a93fc2d7 84f917b8 nt!MiFlushSectionInternal+0x256
a5c9ac40 804ef19f 89b5fe18 84fa0e48 806e6410 afd!AfdReturnBuffer+0x37
a5c9ac64 805807f7 89b5fe18 84fa0e48 84f917b8 nt!MiFlushSectionInternal+0x256
a5c9ad00 80579274 00000fe8 00000000 71a681b9 nt!NtSetInformationThread+0x125
a5c9ad34 8054163c 00000fe8 00000000 71a681b9 nt!SepOpenTokenOfThread+0x87
a5c9ad64 7c90e514 badb0d00 0739faac 00000000 nt!RtlIpv4StringToAddressExW+0xbd
a5c9ad78 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
aswTdi+977
ba278977 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: aswTdi+977
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswTdi
IMAGE_NAME: aswTdi.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4b95b21c
FAILURE_BUCKET_ID: 0xc2_2_aswTdi+977
BUCKET_ID: 0xc2_2_aswTdi+977
Followup: MachineOwner
---------