locked
Driver IRQL Not Less or Equal RRS feed

  • General discussion

  • I recently restored my Asus Laptop to its factory defaults and since then I've been getting this Blue Screen of Death. I got the mindumps and uploaded them here: http://www.osronline.com/dump/DA2.cfm. So, I'm posting them. Hope you can help me.
    Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
    Online Crash Dump Analysis Service
    See http://www.osronline.com for more information
    Windows 8 Kernel Version 9200 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9200.16424.amd64fre.win8_gdr.120926-1855
    Machine Name:
    Kernel base = 0xfffff800`f0613000 PsLoadedModuleList = 0xfffff800`f08dda60
    Debug session time: Thu May 21 21:15:09.857 2015 (UTC - 4:00)
    System Uptime: 0 days 1:42:48.603
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000158, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff880025b31e3, address which referenced memory
    
    Debugging Details:
    ------------------
    
    TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800f0969168
    GetUlongFromAddress: unable to read from fffff800f09691f8
     0000000000000158 Nonpaged pool
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    tcpip! ?? ::FNODOBFM::`string'+206ab
    fffff880`025b31e3 f0ff8058010000  lock inc dword ptr [rax+158h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff88004a15d10 -- (.trap 0xfffff88004a15d10)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800804fa40
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880025b31e3 rsp=fffff88004a15ea0 rbp=fffff88004a15ff0
     r8=fffff88004a16048  r9=fffff88004a16138 r10=fffffa80079c2cc0
    r11=0000000000000036 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    tcpip! ?? ::FNODOBFM::`string'+0x206ab:
    fffff880`025b31e3 f0ff8058010000  lock inc dword ptr [rax+158h] ds:00000000`00000158=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800f068d069 to fffff800f068dd40
    
    STACK_TEXT:  
    fffff880`04a15bc8 fffff800`f068d069 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`04a15bd0 fffff800`f068b8e0 : 00000000`00000001 fffffa80`0804fa40 ffff21ee`1d995b00 fffff880`04a15d10 : nt!KiBugCheckDispatch+0x69
    fffff880`04a15d10 fffff880`025b31e3 : fffff880`04a15ff0 fffffa80`079bd010 00000000`00000001 fffffa80`0804fa40 : nt!KiPageFault+0x260
    fffff880`04a15ea0 fffff880`024c243e : fffff880`04a16440 fffff880`04a10002 ffff21ee`1d99ffc1 fffff880`0200ad21 : tcpip! ?? ::FNODOBFM::`string'+0x206ab
    fffff880`04a160c0 fffff880`0250958e : 00000000`00000000 fffffa80`0e5fd010 fffffa80`0e5fd010 fffffa80`07d37b0c : tcpip!WfpInspectSendNonTcpDatagram+0x15e
    fffff880`04a161d0 fffff880`02506aca : fffffa80`07d37e18 fffffa80`07d37b38 00000000`00004cf2 fffff880`0260ab90 : tcpip!IppInspectLocalDatagramsOut+0x4de
    fffff880`04a16380 fffff880`02572eb9 : 00000000`00000004 fffff880`0260ab90 fffffa80`0e5fd010 00000000`00000000 : tcpip!IppSendDatagramsCommon+0x3da
    fffff880`04a16540 fffff880`026c2ad8 : fffffa80`069eca10 00000000`00000004 fffff880`04a11000 fffff880`02624f40 : tcpip!IppInspectInjectTlSend+0x185
    fffff880`04a16670 fffff800`f06cef15 : fffffa80`0aca27a0 fffffa80`0aca27a0 00000000`00004cf2 00000000`00000001 : fwpkclnt!FwppInjectionStackCallout+0x88
    fffff880`04a16700 fffff800`f06cfea5 : fffff880`026c2a50 fffff880`04a16900 00000000`00000010 fffffa80`0e5fd010 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
    fffff880`04a16800 fffff880`026c39fe : 00000000`00000000 fffff880`04a16940 fffffa80`0e551df0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
    fffff880`04a16840 fffff880`026c3b7a : fffff880`00000001 fffffa80`0aca27a0 00000000`00000000 fffffa80`07f6f9b0 : fwpkclnt!FwppInjectTransportSendAsync+0x5de
    fffff880`04a16a40 fffff880`04e6ef7a : fffffa80`07f6f9b0 fffffa80`07ff72d0 fffff880`04e755b4 00000000`00000000 : fwpkclnt!FwpsInjectTransportSendAsync1+0x66
    fffff880`04a16ab0 fffffa80`07f6f9b0 : fffffa80`07ff72d0 fffff880`04e755b4 00000000`00000000 fffff880`04a16b00 : klwfp+0x1f7a
    fffff880`04a16ab8 fffffa80`07ff72d0 : fffff880`04e755b4 00000000`00000000 fffff880`04a16b00 00000000`00000002 : 0xfffffa80`07f6f9b0
    fffff880`04a16ac0 fffff880`04e755b4 : 00000000`00000000 fffff880`04a16b00 00000000`00000002 fffff880`00000001 : 0xfffffa80`07ff72d0
    fffff880`04a16ac8 00000000`00000000 : fffff880`04a16b00 00000000`00000002 fffff880`00000001 fffffa80`0e551df0 : klwfp+0x85b4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    fwpkclnt!FwppInjectionStackCallout+88
    fffff880`026c2ad8 eb5b            jmp     fwpkclnt!FwppInjectionStackCallout+0xe5 (fffff880`026c2b35)
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  fwpkclnt!FwppInjectionStackCallout+88
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: fwpkclnt
    
    IMAGE_NAME:  fwpkclnt.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  505ab276
    
    FAILURE_BUCKET_ID:  X64_AV_fwpkclnt!FwppInjectionStackCallout+88
    
    BUCKET_ID:  X64_AV_fwpkclnt!FwppInjectionStackCallout+88
    
    Followup: MachineOwner
    ---------

    Friday, May 22, 2015 1:36 AM