Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\060811-31059-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[
Link nur für registrierte Mitglieder sichtbar. Bitte einloggen oder neu registrieren ]
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`03215000 PsLoadedModuleList = 0xfffff800`0345a650
Debug session time: Wed Jun 8 17:56:31.263 2011 (GMT+2)
System Uptime: 0 days 5:54:17.793
Loading Kernel Symbols
.................................................. .............
.................................................. ..............
..................................................
Loading User Symbols
Loading unloaded module list
........
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffffa8010072630, fffffa8010072f10, 48e0003}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+202845 )
Followup: MachineOwner
---------
1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffffa8010072630, The pool entry we were looking for within the page.
Arg3: fffffa8010072f10, The next pool entry.
Arg4: 00000000048e0003, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800034c4100
fffffa8010072630
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: BlackOpsMP.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800033bfcae to fffff80003294d00
STACK_TEXT:
fffff880`088c5eb8 fffff800`033bfcae : 00000000`00000019 00000000`00000020 fffffa80`10072630 fffffa80`10072f10 : nt!KeBugCheckEx
fffff880`088c5ec0 fffff880`1368e845 : 00000000`00000000 fffffa80`0d4df298 fffffa80`4d52564e 00000000`00000000 : nt!ExDeferredFreePool+0x12da
fffff880`088c5f70 00000000`00000000 : fffffa80`0d4df298 fffffa80`4d52564e 00000000`00000000 fffffa80`10072640 : nvlddmkm+0x202845
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+202845
fffff880`1368e845 ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nvlddmkm+202845
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4dd73a68
FAILURE_BUCKET_ID: X64_0x19_20_nvlddmkm+202845
BUCKET_ID: X64_0x19_20_nvlddmkm+202845
Followup: MachineOwner
---------