Microsoft (R) Windows Debugger Version 6.12.0002.633 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini101010-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbole*http://msdl.microsoft.com/download/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 2600.xpsp_sp2_gdr.100216-1441 Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700 Debug session time: Sun Oct 10 20:21:10.468 2010 (UTC + 2:00) System Uptime: 0 days 7:34:58.200 Loading Kernel Symbols ............................................................... ......................................................... Loading User Symbols Loading unloaded module list ................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 19, {20, 88e4e4c8, 88e4ecf0, 1b05002b} Unable to load image pxtdapod.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for pxtdapod.sys *** ERROR: Module load completed but symbols could not be loaded for pxtdapod.sys Probably caused by : pxtdapod.sys ( pxtdapod+22c7 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_HEADER (19) The pool is already corrupt at the time of the current request. This may or may not be due to the caller. The internal pool links must be walked to figure out a possible cause of the problem, and then special pool applied to the suspect tags or the driver verifier to a suspect driver. Arguments: Arg1: 00000020, a pool block header size is corrupt. Arg2: 88e4e4c8, The pool entry we were looking for within the page. Arg3: 88e4ecf0, The next pool entry. Arg4: 1b05002b, (reserved) Debugging Details: ------------------ BUGCHECK_STR: 0x19_20 POOL_ADDRESS: 88e4e4c8 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT PROCESS_NAME: ghj54vwo.exe IRP_ADDRESS: 89ba1e68 LAST_CONTROL_TRANSFER: from 8054a583 to 804f9e0b STACK_TEXT: af003a4c 8054a583 00000019 00000020 88e4e4c8 nt!KeBugCheckEx+0x1b af003a9c 804f4b34 88e4e4d0 00000000 89ba1ea8 nt!ExFreePoolWithTag+0x2a3 af003af4 804fed89 89ba1ea8 af003b40 af003b34 nt!IopCompleteRequest+0xf4 af003b44 806e4ef2 00000000 00000000 af003b5c nt!KiDeliverApc+0xb3 af003b44 806e4ae4 00000000 00000000 af003b5c hal!HalpApcInterrupt+0xc6 af003bcc 804fc3bf 89ba1ea8 89ba1e68 00000000 hal!KeReleaseQueuedSpinLock+0x3c af003bec 804f170c 89ba1ea8 89a756b0 00000000 nt!KeInsertQueueApc+0x6d af003c20 ab03c2c7 899ed898 89a26bf0 89ba1e68 nt!IopfCompleteRequest+0x1d8 WARNING: Stack unwind information not available. Following frames may be wrong. af003c40 804ef0b5 89500980 00000000 806e4410 pxtdapod+0x22c7 af003c50 8057e702 89ba1ed8 89a756b0 89ba1e68 nt!IopfCallDriver+0x31 af003c64 8057f565 89500980 89ba1e68 89a756b0 nt!IopSynchronousServiceTail+0x60 af003d00 805780ba 000000a0 00000000 00000000 nt!IopXxxControlFile+0x5c5 af003d34 8054089c 000000a0 00000000 00000000 nt!NtDeviceIoControlFile+0x2a af003d34 7c90e514 000000a0 00000000 00000000 nt!KiFastCallEntry+0xfc 0012952c 00000000 00000000 00000000 00000000 0x7c90e514 STACK_COMMAND: kb FOLLOWUP_IP: pxtdapod+22c7 ab03c2c7 ?? ??? SYMBOL_STACK_INDEX: 8 SYMBOL_NAME: pxtdapod+22c7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pxtdapod IMAGE_NAME: pxtdapod.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4b274f8d FAILURE_BUCKET_ID: 0x19_20_pxtdapod+22c7 BUCKET_ID: 0x19_20_pxtdapod+22c7 Followup: MachineOwner ---------