d4vids
Nowy
Liczba postów: 9
|
RE: Windows 7 64bit bluescreen
Kod:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Windows\Minidump\111211-40997-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*c: \symbols*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
Machine Name:
Kernel base = 0xfffff800`03401000 PsLoadedModuleList = 0xfffff800`0363ee70
Debug session time: Sat Nov 12 16: 04: 55.439 2011 (GMT+1)
System Uptime: 0 days 7: 45: 04.938
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
....
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F7, {77ffcce484f, 2b992ddfa232, ffffd466d2205dcd, 0}
Probably caused by : nvlddmkm.sys ( nvlddmkm+1c9e46 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 0000077ffcce484f, Actual security check cookie from the stack
Arg2: 00002b992ddfa232, Expected security check cookie
Arg3: ffffd466d2205dcd, Complement of the expected security check cookie
Arg4: 0000000000000000, zero
Debugging Details:
------------------
DEFAULT_BUCKET_ID: GS_FALSE_POSITIVE_MISSING_GSFRAME
SECURITY_COOKIE: Expected 00002b992ddfa232 found 0000077ffcce484f
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0xF7
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8801041be46 to fffff800034715c0
STACK_TEXT:
fffff880`0331b768 fffff880`1041be46 : 00000000`000000f7 0000077f`fcce484f 00002b99`2ddfa232 ffffd466`d2205dcd : nt!KeBugCheckEx
fffff880`0331b770 00000000`000000f7 : 0000077f`fcce484f 00002b99`2ddfa232 ffffd466`d2205dcd 00000000`00000000 : nvlddmkm+0x1c9e46
fffff880`0331b778 0000077f`fcce484f : 00002b99`2ddfa232 ffffd466`d2205dcd 00000000`00000000 fffffa80`0423f000 : 0xf7
fffff880`0331b780 00002b99`2ddfa232 : ffffd466`d2205dcd 00000000`00000000 fffffa80`0423f000 00000000`00000030 : 0x77f`fcce484f
fffff880`0331b788 ffffd466`d2205dcd : 00000000`00000000 fffffa80`0423f000 00000000`00000030 fffff880`105ae91a : 0x2b99`2ddfa232
fffff880`0331b790 00000000`00000000 : fffffa80`0423f000 00000000`00000030 fffff880`105ae91a fffffa80`13854640 : 0xffffd466`d2205dcd
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+1c9e46
fffff880`1041be46 ? ?
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nvlddmkm+1c9e46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e99233b
FAILURE_BUCKET_ID: X64_0xF7_MISSING_GSFRAME_nvlddmkm+1c9e46
BUCKET_ID: X64_0xF7_MISSING_GSFRAME_nvlddmkm+1c9e46
Followup: MachineOwner
---------
|