Weźże zrzuty (tylko dmp) spakuj do jednego archiwum.
Ogólnie jest problem ze sterownikiem grafiki nvidii. Pytanie czy po przywróceniu robisz aktualizację sterownika referencyjnego lub z aktualizacji ?
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G: \Downloads\041413-20982-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18113.amd64fre.win7sp1_gdr.130318-1533
Machine Name:
Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`0304e670
Debug session time: Sun Apr 14 17: 24: 28.442 2013 (UTC + 2: 00)
System Uptime: 0 days 0: 00: 36.862
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {91, 2, fffffa8009af16f0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1bb8c5 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
the operating system. The only supported way to extend a kernel
mode stack is by using KeExpandKernelStackAndCallout.
Arg2: 0000000000000002
Arg3: fffffa8009af16f0
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc4_91
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002ed74ea to fffff80002e80c00
STACK_TEXT:
fffff800`00b9d018 fffff800`02ed74ea : 00000000`000000c4 00000000`00000091 00000000`00000002 fffffa80`09af16f0 : nt!KeBugCheckEx
fffff800`00b9d020 fffff800`02f25605 : 00000000`00070000 fffffa80`098e5000 fffff800`00000003 fffff880`059e126b : nt! ? : FNODOBFM: `string'+0x4884
fffff800`00b9d060 fffff800`02f4371d : fffff880`056e0000 fffff880`056e6000 fffff800`00b9d100 fffff880`05a2fb8b : nt!RtlEnoughStackSpaceForStackCapture+0x15
fffff800`00b9d090 fffff800`02f445bb : 00000000`00000001 fffff800`00b9d110 00000000`00000000 fffff880`05a2e7e9 : nt!RtlWalkFrameChain+0x4d
fffff800`00b9d0c0 fffff880`059e38c5 : 00000000`00000000 fffff800`00b9d150 fffffa80`06c9a000 fffff880`05ba8300 : nt!RtlCaptureStackBackTrace+0x4b
fffff800`00b9d0f0 00000000`00000000 : fffff800`00b9d150 fffffa80`06c9a000 fffff880`05ba8300 fffffa80`00000000 : nvlddmkm+0x1bb8c5
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+1bb8c5
fffff880`059e38c5 ? ?
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: nvlddmkm+1bb8c5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51427b3c
FAILURE_BUCKET_ID: X64_0xc4_91_nvlddmkm+1bb8c5
BUCKET_ID: X64_0xc4_91_nvlddmkm+1bb8c5
Followup: MachineOwner
---------
0: kd> lmvm nvlddmkm
start end module name
fffff880`05828000 fffff880`062d3000 nvlddmkm T (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\system32\DRIVERS\nvlddmkm.sys
Image name: nvlddmkm.sys
Timestamp: Fri Mar 15 02: 37: 00 2013 (51427B3C)
CheckSum: 00A8D47C
ImageSize: 00AAB000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4