View Full Version : Schermata Blu, Problema DRIVER_IRQL_NOT_LESS_OR_EQUAL tcpip.sys
Ciao Ragazzi. Ho un problema sul mio asus n56vz che mi fa in crash per il problema scritto da titolo. Posto i minidump in un file .zip
Help Me !!!
http://depositfiles.com/files/nch1j7hm2
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Noemi-Asus\Desktop\File Dump\012013-19578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9200.16424.amd64fre.win8_gdr.120926-1855
Machine Name:
Kernel base = 0xfffff801`32c8a000 PsLoadedModuleList = 0xfffff801`32f54a60
Debug session time: Sun Jan 20 19:20:28.801 2013 (UTC + 1:00)
System Uptime: 0 days 0:01:34.563
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {158, 2, 1, fffff88001f5c1e3}
*** WARNING: Unable to verify timestamp for mfewfpk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfewfpk.sys
Probably caused by : fwpkclnt.sys ( fwpkclnt!FwppInjectionStackCallout+c8 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000158, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001f5c1e3, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80132fe0168
GetUlongFromAddress: unable to read from fffff80132fe01f8
0000000000000158 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+206ab
fffff880`01f5c1e3 f0ff8058010000 lock inc dword ptr [rax+158h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: McSvHost.exe
TAG_NOT_DEFINED_c000000f: FFFFF880019FEFB0
TRAP_FRAME: fffff880019fdf40 -- (.trap 0xfffff880019fdf40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800f1119e0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001f5c1e3 rsp=fffff880019fe0d0 rbp=fffff880019fe220
r8=fffff880019fe278 r9=fffff880019fe368 r10=fffffa8007952cc0
r11=0000000000000036 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x206ab:
fffff880`01f5c1e3 f0ff8058010000 lock inc dword ptr [rax+158h] ds:00000000`00000158=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80132d04069 to fffff80132d04d40
STACK_TEXT:
fffff880`019fddf8 fffff801`32d04069 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`019fde00 fffff801`32d028e0 : 00000000`00000001 fffffa80`0f1119e0 ffff59ca`d34cc600 fffff880`019fdf40 : nt!KiBugCheckDispatch+0x69
fffff880`019fdf40 fffff880`01f5c1e3 : fffff880`019fe220 fffffa80`0794d010 00000000`00000001 fffffa80`0f1119e0 : nt!KiPageFault+0x260
fffff880`019fe0d0 fffff880`01e6b43e : fffff880`019fe680 fffffa80`0df20002 fffffa80`0f259bc0 fffff880`01d9ff09 : tcpip! ?? ::FNODOBFM::`string'+0x206ab
fffff880`019fe2f0 fffff880`01eb258e : 00000000`00000000 fffffa80`089d2570 fffffa80`0ef1d190 fffffa80`07985b0c : tcpip!WfpInspectSendNonTcpDatagram+0x15e
fffff880`019fe400 fffff880`01eafaca : 00000000`20000001 fffff880`019fe640 fffff880`019fe7c0 00000000`20000001 : tcpip!IppInspectLocalDatagramsOut+0x4de
fffff880`019fe5b0 fffff880`01e3ba6a : fffffa80`079bdb00 fffff880`01fb3b90 fffffa80`089d2570 fffffa80`079bdb40 : tcpip!IppSendDatagramsCommon+0x3da
fffff880`019fe770 fffff880`0206bb18 : fffffa80`06bf7f10 fffff880`0206bb35 00000000`0d26e002 fffffa80`06bf7f10 : tcpip!IppInspectInjectRawSend+0x18a
fffff880`019fe960 fffff801`32d45f15 : fffffa80`079c7970 fffffa80`079c7970 fffffa80`0b3a1840 fffffa80`079c7901 : fwpkclnt!FwppInjectionStackCallout+0xc8
fffff880`019fe9f0 fffff801`32d46ea5 : fffff880`0206ba50 fffff880`019febb0 00000000`00000010 fffff880`020e94b0 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
fffff880`019feaf0 fffff880`0206c0c9 : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000006 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`019feb30 fffff880`020e9706 : fffffa80`0b3a1840 fffffa80`0d5e1580 fffff880`01fd0a00 fffff880`00000001 : fwpkclnt!FwpsInjectNetworkSendAsync0+0x281
fffff880`019fec70 fffffa80`0b3a1840 : fffffa80`0d5e1580 fffff880`01fd0a00 fffff880`00000001 fffffa80`0ef1d030 : mfewfpk+0xc706
fffff880`019fec78 fffffa80`0d5e1580 : fffff880`01fd0a00 fffff880`00000001 fffffa80`0ef1d030 fffff880`020e94b0 : 0xfffffa80`0b3a1840
fffff880`019fec80 fffff880`01fd0a00 : fffff880`00000001 fffffa80`0ef1d030 fffff880`020e94b0 fffffa80`0b3a1840 : 0xfffffa80`0d5e1580
fffff880`019fec88 fffff880`00000001 : fffffa80`0ef1d030 fffff880`020e94b0 fffffa80`0b3a1840 fffff880`020e94b0 : tcpip!LowNonPagedPoolEvent
fffff880`019fec90 fffffa80`0ef1d030 : fffff880`020e94b0 fffffa80`0b3a1840 fffff880`020e94b0 fffffa80`0d5e1580 : 0xfffff880`00000001
fffff880`019fec98 fffff880`020e94b0 : fffffa80`0b3a1840 fffff880`020e94b0 fffffa80`0d5e1580 fffff880`019f0000 : 0xfffffa80`0ef1d030
fffff880`019feca0 fffffa80`0b3a1840 : fffff880`020e94b0 fffffa80`0d5e1580 fffff880`019f0000 fffff880`019fee70 : mfewfpk+0xc4b0
fffff880`019feca8 fffff880`020e94b0 : fffffa80`0d5e1580 fffff880`019f0000 fffff880`019fee70 fffff880`020ec095 : 0xfffffa80`0b3a1840
fffff880`019fecb0 fffffa80`0d5e1580 : fffff880`019f0000 fffff880`019fee70 fffff880`020ec095 fffff880`019d0f00 : mfewfpk+0xc4b0
fffff880`019fecb8 fffff880`019f0000 : fffff880`019fee70 fffff880`020ec095 fffff880`019d0f00 fffff880`019d0f10 : 0xfffffa80`0d5e1580
fffff880`019fecc0 fffff880`019fee70 : fffff880`020ec095 fffff880`019d0f00 fffff880`019d0f10 fffff880`019fee00 : 0xfffff880`019f0000
fffff880`019fecc8 fffff880`020ec095 : fffff880`019d0f00 fffff880`019d0f10 fffff880`019fee00 fffffa80`0b3a1850 : 0xfffff880`019fee70
fffff880`019fecd0 fffff880`019d0f00 : fffff880`019d0f10 fffff880`019fee00 fffffa80`0b3a1850 fffff880`019fee80 : mfewfpk+0xf095
fffff880`019fecd8 fffff880`019d0f10 : fffff880`019fee00 fffffa80`0b3a1850 fffff880`019fee80 fffff801`32cfb968 : 0xfffff880`019d0f00
fffff880`019fece0 fffff880`019fee00 : fffffa80`0b3a1850 fffff880`019fee80 fffff801`32cfb968 fffff880`019d0f00 : 0xfffff880`019d0f10
fffff880`019fece8 fffffa80`0b3a1850 : fffff880`019fee80 fffff801`32cfb968 fffff880`019d0f00 fffff880`019fee00 : 0xfffff880`019fee00
fffff880`019fecf0 fffff880`019fee80 : fffff801`32cfb968 fffff880`019d0f00 fffff880`019fee00 fffff880`019fee00 : 0xfffffa80`0b3a1850
fffff880`019fecf8 fffff801`32cfb968 : fffff880`019d0f00 fffff880`019fee00 fffff880`019fee00 fffff880`01fd0d28 : 0xfffff880`019fee80
fffff880`019fed00 fffff801`32d2bbd0 : ffb07fe8`cf8b4806 b2000098`d6b841ff ffb06fe8`cf8b4806 b2000082`a0b841ff : nt!KiExecuteAllDpcs+0x198
fffff880`019fee40 fffff801`32d2b5c5 : 0de8cf8b`4806b200 fffff880`019ce180 fffff880`1cf5d220 fffffa80`0b3a1850 : nt!KiRetireDpcList+0xd0
fffff880`019fefb0 fffff801`32d2b3c9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`1cf5d170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
fwpkclnt!FwppInjectionStackCallout+c8
fffff880`0206bb18 eb1b jmp fwpkclnt!FwppInjectionStackCallout+0xe5 (fffff880`0206bb35)
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: fwpkclnt!FwppInjectionStackCallout+c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fwpkclnt
IMAGE_NAME: fwpkclnt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 505ab276
BUCKET_ID_FUNC_OFFSET: c8
FAILURE_BUCKET_ID: AV_fwpkclnt!FwppInjectionStackCallout
BUCKET_ID: AV_fwpkclnt!FwppInjectionStackCallout
Followup: MachineOwner
Ciao, (scusa se ti rispondo a cosi tanta distanza di tempo) anche io ho il tuo stesso identico problema.... non so se tu hai risolto... ma volevo chiederti una cosa quando ti acadeva ciņ che antivirus/antispyware/firewall avevi?
vBulletin® v3.6.4, Copyright ©2000-2026, Jelsoft Enterprises Ltd.