none
Windows 7 64位偶尔蓝屏 RRS feed

  • 问题

  • Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [D:\我的文档\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available

    WARNING: Inaccessible path: 'C:\MyCodesSymbols'
    WARNING: Whitespace at start of path element
    Symbol search path is: C:\MyCodesSymbols; SRV*C:\MyLocalSymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18113.amd64fre.win7sp1_gdr.130318-1533
    Machine Name:
    Kernel base = 0xfffff800`0424d000 PsLoadedModuleList = 0xfffff800`04490670
    Debug session time: Tue Aug 26 07:52:06.644 2014 (GMT+8)
    System Uptime: 0 days 0:07:37.423
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................................................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00000000`7efdf018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    .........
    *****************************************
    *                                                                              *
    *                        Bugcheck Analysis                          *
    *                                                                              *
    *****************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {0, 2, 0, fffff8800471444e}

    *** ERROR: Module load completed but symbols could not be loaded for tmtdi.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
    Page 8a9ea not present in the dump file. Type ".hh dbgerr004" for details
    PEB is paged out (Peb.Ldr = 00000000`7efdf018).  Type ".hh dbgerr001" for details
    PEB is paged out (Peb.Ldr = 00000000`7efdf018).  Type ".hh dbgerr001" for details
    Probably caused by : tmtdi.sys ( tmtdi+c520 )

    Followup: MachineOwner
    ---------
    • 已编辑 ChildJian 2014年9月1日 1:00 修改了内容
    2014年8月28日 7:07

答案

  • 你好,

    这是您的dunp文件分析(未删减):

    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 0, fffff8800471444e}
    
    *** ERROR: Module load completed but symbols could not be loaded for tmtdi.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
    Page 8a9ea not present in the dump file. Type ".hh dbgerr004" for details
    Probably caused by : tmtdi.sys ( tmtdi+c520 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800471444e, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    afd!AfdBReceiveEventHandler+14e
    fffff880`0471444e 488b01          mov     rax,qword ptr [rcx]
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  QQExternal.exe
    
    ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
    
    DPC_STACK_BASE:  FFFFF80005C30FB0
    
    TRAP_FRAME:  fffff88000000000 -- (.trap 0xfffff88000000000)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    Unable to get program counter
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=000000000000001f rsp=ffffffffffffffff rbp=ffffffffffffffff
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=2     vif ov up di pl zr ac po cy
    ff80:001f ??              ???
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff96000172ef6 -- (.exr 0xfffff96000172ef6)
    ExceptionAddress: 48c48b4dce8b4430
       ExceptionCode: 48e88b48
      ExceptionFlags: 840ff83b
    NumberParameters: -1958160501
       Parameter[0]: e820245c89482824
       Parameter[1]: 0fc73b410003952e
       Parameter[2]: e8ce8b000000f185
       Parameter[3]: 41e88b4400038e2e
       Parameter[4]: 000002b80f74c73b
       Parameter[5]: 83e9302444896600
       Parameter[6]: 000112b841000000
       Parameter[7]: 81482575f03b4100
       Parameter[8]: 4812740000f020fb
       Parameter[9]: 09740000f120fb81
       Parameter[10]: 750000f060fb8148
       Parameter[11]: 86e900000002b80a
       Parameter[12]: 2ab0058b48000000
       Parameter[13]: 2000b80739480021
       Parameter[14]: 02f4878b06740000
    
    UNALIGNED_STACK_POINTER:  ffffffffffffffff
    
    LAST_CONTROL_TRANSFER:  from fffff800042c21a9 to fffff800042c2c00
    
    STACK_TEXT:  
    fffff800`05c2f308 fffff800`042c21a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff800`05c2f310 fffff800`042c0e20 : fffffa80`074612a0 fffffa80`095d1ac0 fffff800`05c2f488 00000000`000005b4 : nt!KiBugCheckDispatch+0x69
    fffff800`05c2f450 fffff880`0471444e : 00000000`00000000 fffffa80`04879020 fffffa80`0a0eab90 00000000`00140005 : nt!KiPageFault+0x260
    fffff800`05c2f5e0 fffff880`04627520 : fffffa80`04879020 fffff800`05c2f980 fffffa80`00000820 fffff880`000005b4 : afd!AfdBReceiveEventHandler+0x14e
    fffff800`05c2f6a0 fffff880`05a89ea8 : fffffa80`0a0e3760 fffff800`05c2f9f8 00000000`00000820 fffff800`05c2f860 : tmtdi+0xc520
    fffff800`05c2f700 fffff880`01c67074 : fffffa80`06b6f1a0 fffff880`018b5419 fffffa80`04874590 00000000`00000000 : tdx!TdxEventReceiveConnection+0x178
    fffff800`05c2f840 fffff880`01c667d7 : 00000000`00000000 fffff880`01a90d4b 00000000`00000017 00000000`00000000 : tcpip!TcpIndicateData+0x104
    fffff800`05c2f940 fffff880`01c651d7 : fffffa80`00000000 00000003`0000b2b8 00000001`00000011 00000000`00000002 : tcpip!TcpDeliverDataToClient+0x2b7
    fffff800`05c2fac0 fffff880`01c6379b : fffffa80`00000095 fffff880`00000095 fffff800`05c2fc28 fffff880`08ed96aa : tcpip!TcpDeliverReceive+0xa7
    fffff800`05c2fbc0 fffff880`01c62d65 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff880`0834d44c : tcpip!TcpTcbFastDatagram+0x3ab
    fffff800`05c2fc50 fffff880`01c6269a : fffffa80`04987930 fffff880`01c5b500 fffffa80`04950c01 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
    fffff800`05c2fe00 fffff880`01c63c3b : fffff880`08ee0062 fffffa80`066ae000 00000000`00000000 00000000`00000000 : tcpip!TcpMatchReceive+0x1fa
    fffff800`05c2ff50 fffff880`01c5bbd7 : fffffa80`04987930 fffffa80`0498c820 fffffa80`000065db 00000000`00000002 : tcpip!TcpPreValidatedReceive+0x36b
    fffff800`05c30020 fffff880`01c5b74a : 00000000`00000000 fffff880`01d6e9a0 fffff800`05c301e0 fffffa80`074a6690 : tcpip!IppDeliverListToProtocol+0x97
    fffff800`05c300e0 fffff880`01c5ad49 : fffff880`01d6e9a0 fffffa80`074a6700 fffff800`05c301a0 fffff800`05c301d0 : tcpip!IppProcessDeliverList+0x5a
    fffff800`05c30180 fffff880`01c589ef : 00000000`3c60cf17 fffff880`01d6e9a0 fffff880`01d6e9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff800`05c30260 fffff880`01c57fc2 : fffffa80`07d2d440 00000000`00000000 fffffa80`0765d901 00000000`00000003 : tcpip!IpFlcReceivePackets+0x64f
    fffff800`05c30460 fffff880`01c573ea : fffffa80`0765d9a0 fffff800`05c30590 fffffa80`0765d9a0 fffff880`01c80000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff800`05c30540 fffff800`042ce878 : fffffa80`074bd030 00000000`00004800 fffffa80`03f48060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff800`05c30590 fffff880`01c57ae2 : fffff880`01c57310 fffff880`01c885f2 fffffa80`066cfb02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff800`05c30670 fffff880`019710eb : fffffa80`0765e010 00000000`00000000 fffffa80`06b6f1a0 fffffa80`06b6f1a0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff800`05c306e0 fffff880`0193aad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff800`05c30750 fffff880`018b4ac1 : fffffa80`06b6f1a0 00000000`00000002 00000000`00000003 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff800`05c30bd0 fffff880`0835db69 : fffffa80`07467000 00000000`00000003 fffffa80`07467610 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff800`05c30c20 fffff880`0834bfa5 : fffffa80`07659000 fffff880`0834d100 fffffa80`00000000 fffff800`05c30e70 : Rt64win7+0x16b69
    fffff800`05c30e10 fffff880`018b4951 : 00000000`00000000 fffffa80`07659010 00000000`00000000 fffffa80`06b6f1a0 : Rt64win7+0x4fa5
    fffff800`05c30e70 fffff800`042cd2fc : fffffa80`07659228 00000000`00000000 00000000`00000000 fffff800`0443de80 : ndis!ndisInterruptDpc+0x151
    fffff800`05c30f00 fffff800`042c5d05 : 00000000`00000000 fffffa80`03f48060 00000000`00000000 fffff880`018b4800 : nt!KiRetireDpcList+0x1bc
    fffff800`05c30fb0 fffff800`042c5b1c : fffffa80`06b6f1a0 fffffa80`0396e300 fffffa80`03f48060 fffffa80`03f48060 : nt!KyRetireDpcList+0x5
    fffff880`05520830 fffff800`0430db53 : fffff800`042bea96 fffff800`042beb02 00000000`00000001 00000000`00000001 : nt!KiDispatchInterruptContinue
    fffff880`05520860 fffff800`042beb02 : 00000000`00000001 00000000`00000001 fffff900`c06449d0 fffffa80`00000000 : nt!KiDpcInterruptBypass+0x13
    fffff880`05520870 fffff800`042dc998 : fffff960`00172ef6 fffff900`00000000 fffff880`00000000 00000000`730c2450 : nt!KiInterruptDispatch+0x212
    fffff880`05520a08 fffff960`00172ef6 : fffff900`00000000 fffff880`00000000 00000000`730c2450 00000000`0466f170 : nt!PsGetCurrentProcessWin32Process+0x14
    fffff880`05520a10 fffff960`00172a89 : 00000000`00000000 00000000`00000000 00000000`00010438 00000000`00000000 : win32k!PostMessageCheckIL+0x8e
    fffff880`05520a80 fffff800`042c1e93 : fffffa80`03f48060 fffff880`05520b60 00000000`00000001 00000000`00000020 : win32k!NtUserPostMessage+0xed
    fffff880`05520ae0 00000000`7310feca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0466e778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7310feca
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tmtdi+c520
    fffff880`04627520 eb05            jmp     tmtdi+0xc527 (fffff880`04627527)
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  tmtdi+c520
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tmtdi
    
    IMAGE_NAME:  tmtdi.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cd7d7f4
    
    FAILURE_BUCKET_ID:  X64_0xD1_tmtdi+c520
    
    BUCKET_ID:  X64_0xD1_tmtdi+c520
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0xd1_tmtdi+c520
    
    FAILURE_ID_HASH:  {09374d35-8b2c-4c66-3352-ce0f01bf1f5d}
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmvm tmtdi
    start             end                 module name
    fffff880`0461b000 fffff880`04638000   tmtdi      (no symbols)           
        Loaded symbol image file: tmtdi.sys
        Image path: \SystemRoot\system32\DRIVERS\tmtdi.sys
        Image name: tmtdi.sys
        Timestamp:        Mon Nov 08 18:59:00 2010 (4CD7D7F4)
        CheckSum:         0001D0FC
        ImageSize:        0001D000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    

    请到\SystemRoot\system32\DRIVERS\tmtdi.sys路径下查看TMTDI.sys的属性,然后请参照Alexis的建议升级一下相关驱动,tmtdi.sys的时间标签是2010年11月8日 18:59.  

    关于BugCheck ID 0XD1, 请参考(英文资料): Bug Check 0xD1: DRIVER_IRQL_NOT_LESS_OR_EQUAL

    另外,论坛里是不支持针对内核调试的进一步分析的。希望您能理解。

    希望这有帮助


    Michael Shao
    TechNet Community Support

    2014年9月1日 10:16
    版主

全部回复

  • 你好,

    针对蓝屏问题,请上传您的Dump文件以做进一步分析。从您贴出来的结果看,您的WinDbg没有正确配置symbol文件。

    如果您希望自己分析Dump,请查看:

    何读取小存储器转储文件所创建的 Windows 中,如果发生了崩溃

    请根据以上文档配置symbol文件之后,重新加载dump文件。

    您也可以将Dump文件上传到OneDrive,然后将OneDrive的链接地址贴上来,我们会将分析结果反馈给您。

    希望这有帮助。


    Michael Shao
    TechNet Community Support

    2014年8月29日 8:14
    版主
  • 你是不是用了赛门铁克杀毒软件?它的驱动文件 TMTDI.SYS 可能与你的瑞昱网卡驱动有冲突,在进行网络安全防护时产生了兼容问题。

    可能需要升级赛门铁克或瑞昱网卡驱动看看有没有 BUG 修复。


    Alexis Zhang

    http://mvp.support.microsoft.com/profile/jie
    http://blogs.itecn.net/blogs/alexis

    推荐以 NNTP Bridge 桥接新闻组方式访问论坛。

    本帖是回复帖,原帖作者是楼上的 <ChildJian>;

    | Probably caused by : tmtdi.sys ( tmtdi+c520 )
    | Followup: MachineOwner

    2014年8月30日 0:14
  • 加载符号文件后重新分析了DMP文件,贴子内容已更新,麻烦再看一下。

    另外,OneDrive登陆后不能上传文件,只好放到百度网盘,请分析一下。谢谢。

    百度网盘地址:http://pan.baidu.com/s/1dDkt0ad

    2014年9月1日 1:25
  • 你好,

    这是您的dunp文件分析(未删减):

    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 0, fffff8800471444e}
    
    *** ERROR: Module load completed but symbols could not be loaded for tmtdi.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
    Page 8a9ea not present in the dump file. Type ".hh dbgerr004" for details
    Probably caused by : tmtdi.sys ( tmtdi+c520 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff8800471444e, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    afd!AfdBReceiveEventHandler+14e
    fffff880`0471444e 488b01          mov     rax,qword ptr [rcx]
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  QQExternal.exe
    
    ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
    
    DPC_STACK_BASE:  FFFFF80005C30FB0
    
    TRAP_FRAME:  fffff88000000000 -- (.trap 0xfffff88000000000)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    Unable to get program counter
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=000000000000001f rsp=ffffffffffffffff rbp=ffffffffffffffff
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=2     vif ov up di pl zr ac po cy
    ff80:001f ??              ???
    Resetting default scope
    
    EXCEPTION_RECORD:  fffff96000172ef6 -- (.exr 0xfffff96000172ef6)
    ExceptionAddress: 48c48b4dce8b4430
       ExceptionCode: 48e88b48
      ExceptionFlags: 840ff83b
    NumberParameters: -1958160501
       Parameter[0]: e820245c89482824
       Parameter[1]: 0fc73b410003952e
       Parameter[2]: e8ce8b000000f185
       Parameter[3]: 41e88b4400038e2e
       Parameter[4]: 000002b80f74c73b
       Parameter[5]: 83e9302444896600
       Parameter[6]: 000112b841000000
       Parameter[7]: 81482575f03b4100
       Parameter[8]: 4812740000f020fb
       Parameter[9]: 09740000f120fb81
       Parameter[10]: 750000f060fb8148
       Parameter[11]: 86e900000002b80a
       Parameter[12]: 2ab0058b48000000
       Parameter[13]: 2000b80739480021
       Parameter[14]: 02f4878b06740000
    
    UNALIGNED_STACK_POINTER:  ffffffffffffffff
    
    LAST_CONTROL_TRANSFER:  from fffff800042c21a9 to fffff800042c2c00
    
    STACK_TEXT:  
    fffff800`05c2f308 fffff800`042c21a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff800`05c2f310 fffff800`042c0e20 : fffffa80`074612a0 fffffa80`095d1ac0 fffff800`05c2f488 00000000`000005b4 : nt!KiBugCheckDispatch+0x69
    fffff800`05c2f450 fffff880`0471444e : 00000000`00000000 fffffa80`04879020 fffffa80`0a0eab90 00000000`00140005 : nt!KiPageFault+0x260
    fffff800`05c2f5e0 fffff880`04627520 : fffffa80`04879020 fffff800`05c2f980 fffffa80`00000820 fffff880`000005b4 : afd!AfdBReceiveEventHandler+0x14e
    fffff800`05c2f6a0 fffff880`05a89ea8 : fffffa80`0a0e3760 fffff800`05c2f9f8 00000000`00000820 fffff800`05c2f860 : tmtdi+0xc520
    fffff800`05c2f700 fffff880`01c67074 : fffffa80`06b6f1a0 fffff880`018b5419 fffffa80`04874590 00000000`00000000 : tdx!TdxEventReceiveConnection+0x178
    fffff800`05c2f840 fffff880`01c667d7 : 00000000`00000000 fffff880`01a90d4b 00000000`00000017 00000000`00000000 : tcpip!TcpIndicateData+0x104
    fffff800`05c2f940 fffff880`01c651d7 : fffffa80`00000000 00000003`0000b2b8 00000001`00000011 00000000`00000002 : tcpip!TcpDeliverDataToClient+0x2b7
    fffff800`05c2fac0 fffff880`01c6379b : fffffa80`00000095 fffff880`00000095 fffff800`05c2fc28 fffff880`08ed96aa : tcpip!TcpDeliverReceive+0xa7
    fffff800`05c2fbc0 fffff880`01c62d65 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff880`0834d44c : tcpip!TcpTcbFastDatagram+0x3ab
    fffff800`05c2fc50 fffff880`01c6269a : fffffa80`04987930 fffff880`01c5b500 fffffa80`04950c01 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
    fffff800`05c2fe00 fffff880`01c63c3b : fffff880`08ee0062 fffffa80`066ae000 00000000`00000000 00000000`00000000 : tcpip!TcpMatchReceive+0x1fa
    fffff800`05c2ff50 fffff880`01c5bbd7 : fffffa80`04987930 fffffa80`0498c820 fffffa80`000065db 00000000`00000002 : tcpip!TcpPreValidatedReceive+0x36b
    fffff800`05c30020 fffff880`01c5b74a : 00000000`00000000 fffff880`01d6e9a0 fffff800`05c301e0 fffffa80`074a6690 : tcpip!IppDeliverListToProtocol+0x97
    fffff800`05c300e0 fffff880`01c5ad49 : fffff880`01d6e9a0 fffffa80`074a6700 fffff800`05c301a0 fffff800`05c301d0 : tcpip!IppProcessDeliverList+0x5a
    fffff800`05c30180 fffff880`01c589ef : 00000000`3c60cf17 fffff880`01d6e9a0 fffff880`01d6e9a0 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff800`05c30260 fffff880`01c57fc2 : fffffa80`07d2d440 00000000`00000000 fffffa80`0765d901 00000000`00000003 : tcpip!IpFlcReceivePackets+0x64f
    fffff800`05c30460 fffff880`01c573ea : fffffa80`0765d9a0 fffff800`05c30590 fffffa80`0765d9a0 fffff880`01c80000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff800`05c30540 fffff800`042ce878 : fffffa80`074bd030 00000000`00004800 fffffa80`03f48060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff800`05c30590 fffff880`01c57ae2 : fffff880`01c57310 fffff880`01c885f2 fffffa80`066cfb02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff800`05c30670 fffff880`019710eb : fffffa80`0765e010 00000000`00000000 fffffa80`06b6f1a0 fffffa80`06b6f1a0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff800`05c306e0 fffff880`0193aad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff800`05c30750 fffff880`018b4ac1 : fffffa80`06b6f1a0 00000000`00000002 00000000`00000003 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff800`05c30bd0 fffff880`0835db69 : fffffa80`07467000 00000000`00000003 fffffa80`07467610 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
    fffff800`05c30c20 fffff880`0834bfa5 : fffffa80`07659000 fffff880`0834d100 fffffa80`00000000 fffff800`05c30e70 : Rt64win7+0x16b69
    fffff800`05c30e10 fffff880`018b4951 : 00000000`00000000 fffffa80`07659010 00000000`00000000 fffffa80`06b6f1a0 : Rt64win7+0x4fa5
    fffff800`05c30e70 fffff800`042cd2fc : fffffa80`07659228 00000000`00000000 00000000`00000000 fffff800`0443de80 : ndis!ndisInterruptDpc+0x151
    fffff800`05c30f00 fffff800`042c5d05 : 00000000`00000000 fffffa80`03f48060 00000000`00000000 fffff880`018b4800 : nt!KiRetireDpcList+0x1bc
    fffff800`05c30fb0 fffff800`042c5b1c : fffffa80`06b6f1a0 fffffa80`0396e300 fffffa80`03f48060 fffffa80`03f48060 : nt!KyRetireDpcList+0x5
    fffff880`05520830 fffff800`0430db53 : fffff800`042bea96 fffff800`042beb02 00000000`00000001 00000000`00000001 : nt!KiDispatchInterruptContinue
    fffff880`05520860 fffff800`042beb02 : 00000000`00000001 00000000`00000001 fffff900`c06449d0 fffffa80`00000000 : nt!KiDpcInterruptBypass+0x13
    fffff880`05520870 fffff800`042dc998 : fffff960`00172ef6 fffff900`00000000 fffff880`00000000 00000000`730c2450 : nt!KiInterruptDispatch+0x212
    fffff880`05520a08 fffff960`00172ef6 : fffff900`00000000 fffff880`00000000 00000000`730c2450 00000000`0466f170 : nt!PsGetCurrentProcessWin32Process+0x14
    fffff880`05520a10 fffff960`00172a89 : 00000000`00000000 00000000`00000000 00000000`00010438 00000000`00000000 : win32k!PostMessageCheckIL+0x8e
    fffff880`05520a80 fffff800`042c1e93 : fffffa80`03f48060 fffff880`05520b60 00000000`00000001 00000000`00000020 : win32k!NtUserPostMessage+0xed
    fffff880`05520ae0 00000000`7310feca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0466e778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7310feca
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tmtdi+c520
    fffff880`04627520 eb05            jmp     tmtdi+0xc527 (fffff880`04627527)
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  tmtdi+c520
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tmtdi
    
    IMAGE_NAME:  tmtdi.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cd7d7f4
    
    FAILURE_BUCKET_ID:  X64_0xD1_tmtdi+c520
    
    BUCKET_ID:  X64_0xD1_tmtdi+c520
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0xd1_tmtdi+c520
    
    FAILURE_ID_HASH:  {09374d35-8b2c-4c66-3352-ce0f01bf1f5d}
    
    Followup: MachineOwner
    ---------
    
    0: kd> lmvm tmtdi
    start             end                 module name
    fffff880`0461b000 fffff880`04638000   tmtdi      (no symbols)           
        Loaded symbol image file: tmtdi.sys
        Image path: \SystemRoot\system32\DRIVERS\tmtdi.sys
        Image name: tmtdi.sys
        Timestamp:        Mon Nov 08 18:59:00 2010 (4CD7D7F4)
        CheckSum:         0001D0FC
        ImageSize:        0001D000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    

    请到\SystemRoot\system32\DRIVERS\tmtdi.sys路径下查看TMTDI.sys的属性,然后请参照Alexis的建议升级一下相关驱动,tmtdi.sys的时间标签是2010年11月8日 18:59.  

    关于BugCheck ID 0XD1, 请参考(英文资料): Bug Check 0xD1: DRIVER_IRQL_NOT_LESS_OR_EQUAL

    另外,论坛里是不支持针对内核调试的进一步分析的。希望您能理解。

    希望这有帮助


    Michael Shao
    TechNet Community Support

    2014年9月1日 10:16
    版主