win7旗舰版,avast和look n stop杀软和防火墙,只要是迅雷或者酷播累得进行BT类的P2P下载一阵之后就出现7F蓝屏,看DMP文件说是显卡驱动的一个文件问题,网卡显卡驱动都更新过很多次还是不行,附dmp文件地址https://byqorg.bay.livefilestore.com/y1phICOgIZDDczlwtkPHXLGVnTIN_9siliFUM40CIsxnYlzGN
guzoWP0lfAqI_6wC1cuJtFK1zx6t1th-SJRnATIuAuWaHLEqlh/062511-15531-01.dmp?download&psid=1
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\062511-15531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: srv*d:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17592.x86fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0x84437000 PsLoadedModuleList = 0x84577230
Debug session time: Sat Jun 25 11:08:25.395 2011 (GMT+8)
System Uptime: 0 days 2:35:59.036
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {8, 801cb000, 0, 0}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Unable to load image Rt86win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt86win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt86win7.sys
Unable to load image lnsfw.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for lnsfw.sys
*** ERROR: Module load completed but symbols could not be loaded for lnsfw.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+24 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801cb000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: a
LAST_CONTROL_TRANSFER: from 996ee952 to 996ec584
STACK_TEXT:
80d8802c 996ee952 89106670 000ae414 00000001 dxgmms1!VidSchiProcessIsrCompletedPacket
+0x24
80d8805c 996eef6d 890b9000 80d8811c 00000001 dxgmms1!VidSchDdiNotifyInterruptWorker
+0x1b2
80d88078 9962cea5 884f4020 80d8811c 80d880a0 dxgmms1!VidSchDdiNotifyInterrupt+0x7b
80d88088 9962cf0e 884d0098 884f4020 80d8811c dxgkrnl!
VIDSCH_EXPORT::VidSchDdiNotifyInterrupt+0x14
80d880a0 98cbe843 884f4020 80d8811c 80d8811c dxgkrnl!DxgNotifyInterruptCB+0x60
WARNING: Stack unwind information not available. Following frames may be wrong.
80d880c8 98cbea62 80d8811c 00000000 88e66dc0 nvlddmkm+0x90843
80d88104 98d147c8 98cbea1f 88e8b000 88e8b730 nvlddmkm+0x90a62
80d881a4 98d15c94 88651000 00000000 00000000 nvlddmkm+0xe67c8
80d881bc 98cbecea 000ae414 00000000 00000000 nvlddmkm+0xe7c94
80d8820c 98cbef7f 995d6be8 88651000 00000000 nvlddmkm+0x90cea
80d88238 9962cb14 98c48da0 00000000 80d8825c nvlddmkm+0x90f7f
80d88248 9963cd59 88b42500 884f4020 00000000 dxgkrnl!DpiFdoMessageInterruptRoutine
+0x17
80d8825c 84468bfc 88b42500 884f4020 00000800 dxgkrnl!DpiFdoLineInterruptRoutine+0x12
80d88288 84468b49 86de2b02 000000b2 80d88348 nt!KiChainedDispatch2ndLvl+0x60
80d88288 9983f27e 86de2b02 000000b2 80d88348 nt!KiChainedDispatch+0x29
80d88308 99841d42 88779000 8874bee0 888898c0 Rt86win7+0x1227e
80d88348 84404a2e 88685028 00000000 888898c0 Rt86win7+0x14d42
80d88374 8d81f760 888898c0 88685028 89ec9ca0 hal!HalBuildScatterGatherList+0x1ba
80d883b8 9984214e 0000006a 87520030 8874bee0 ndis!NdisMAllocateNetBufferSGList+0xa6
80d88410 9982e4c8 88779000 86c1b018 00000000 Rt86win7+0x1514e
80d88440 99830d4f 02779000 86c1b018 00000000 Rt86win7+0x14c8
80d88474 8d883da1 88779000 86c1b018 00000000 Rt86win7+0x3d4f
80d884a8 8d84c46b 886850e0 86c1b018 00000000 ndis!ndisMSendNBLToMiniport+0x11a
80d884e8 8d84c397 886850e0 00d8854c 00000001 ndis!ndisMSendPacketsToNetBufferLists
+0x92
80d88524 8d885145 88ac9998 80d8854c 00000001 ndis!ndisSendPacketsWithPause+0x236
80d88540 8d88844c 88ac9998 88ac713c 80d88bec ndis!ndisSendWithPause+0x48
80d88550 99a435a6 80d885b8 88ac9998 88ac713c ndis!NdisSend+0xf
80d88bec 8d8874a7 88acb000 8a1bb764 00000000 lnsfw+0x35a6
80d88c18 8d88732a 80d88c38 80d88c38 00000000 ndis!ndisMSendPacketsXToMiniport+0xe4
80d88c80 8d81f4d8 887200e0 86f58278 00000000 ndis!ndisMSendNetBufferListsToPackets
+0x84
80d88ca0 8d81f448 86f58278 86f58278 00000000 ndis!ndisFilterSendNetBufferLists+0x87
80d88cb8 94efac20 88bad540 86f58278 00000000 ndis!NdisFSendNetBufferLists+0x38
80d88d34 8d81f618 88b590f0 86f58278 00000000 pacer!PcFilterSendNetBufferLists+0x256
80d88d60 8d84c46b 887200e0 86f58278 00000000 ndis!ndisSendNBLToFilter+0xf2
80d88da0 8d84c397 887200e0 00d88e04 00000001 ndis!ndisMSendPacketsToNetBufferLists
+0x92
80d88ddc 8d885145 89c23920 80d88e04 00000000 ndis!ndisSendPacketsWithPause+0x236
80d88df8 99a0036c 89c23920 8a281334 88b918b0 ndis!ndisSendWithPause+0x48
80d88e18 999fb3e9 89c2d838 8a15dce8 00000000 raspppoe!PrSend+0x78
80d88e3c 999fc49b 88b918b8 8a281334 8a281334 raspppoe!MpSendPacketOnCall+0x22f
80d88e58 8d84b8a1 89c2c008 80d88ee0 00000001 raspppoe!PppoeCoSendPackets+0xc5
80d88e9c 8d8aa924 89000302 80d88ee0 00000001 ndis!ndisCoSendPacketsToNdisPackets+0x18f
80d88eb0 999e8c96 89ebd5a8 80d88ee0 00000001 ndis!NdisCoSendPackets+0x15
80d88ed8 999e934f 8a281334 89ea8008 00000001 ndiswan!SendOnLink+0x11a
80d88f40 999e95d3 00000010 8a025850 8712f270 ndiswan!FramePacket+0x354
80d88f78 999e9808 89ea8008 00000000 80d88fac ndiswan!SendFromProtocol+0xbd
80d88fb8 999d7244 01ea8008 999db000 00000000 ndiswan!SendPacketOnBundle+0x17d
80d88fe0 999d5fa1 88b92ee8 00000000 86cdbd0c ndiswan!NdisWanQueueSend+0x38a
80d88fec 86cdbd0c 8870a0e0 8870a0e0 80d89024 ndiswan!MPSendPackets+0x54
00000000 00000000 00000000 00000000 00000000 0x86cdbd0c
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+24
996ec584 53 push ebx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d4a24c1
FAILURE_BUCKET_ID: 0x7f_8_dxgmms1!VidSchiProcessIsrCompletedPacket+24
BUCKET_ID: 0x7f_8_dxgmms1!VidSchiProcessIsrCompletedPacket+24
Followup: MachineOwner
---------
0: kd> lmvm dxgmms1
start end module name
996e2000 9971b000 dxgmms1 (pdb symbols) d:\symbols\dxgmms1.pdb
\DA8ACD5DDA95431082D1FD0213C2AD001\dxgmms1.pdb
Loaded symbol image file: dxgmms1.sys
Mapped memory image file: d:\symbols\dxgmms1.sys\4D4A24C139000\dxgmms1.sys
Image path: dxgmms1.sys
Image name: dxgmms1.sys
Timestamp: Thu Feb 03 11:45:05 2011 (4D4A24C1)
CheckSum: 00043FB4
ImageSize: 00039000
File version: 6.1.7601.17554
Product version: 6.1.7601.17554
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgmms1.sys
OriginalFilename: dxgmms1.sys
ProductVersion: 6.1.7601.17554
FileVersion: 6.1.7601.17554 (win7sp1_gdr.110202-1504)
FileDescription: DirectX Graphics MMS
LegalCopyright: © Microsoft Corporation. All rights reserved.