locked
Has this fwpkclnt!FwpsQueryPacketInjectionState0 bugcheck been fixed in Vista SP1? RRS feed

  • Question

  • DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000078, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 87e601f2, address which referenced memory

    Debugging Details:
    ------------------

    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for mfewfpk.sys -

    READ_ADDRESS:  00000078

    CURRENT_IRQL:  2

    FAULTING_IP:
    fwpkclnt!FwpsQueryPacketInjectionState0+46
    87e601f2 8b4878          mov     ecx,dword ptr [eax+78h]

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xD1

    PROCESS_NAME:  System

    TRAP_FRAME:  83812158 -- (.trap 0xffffffff83812158)
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=8326f970 edx=00000000 esi=832a8bf8 edi=89b1f810
    eip=87e601f2 esp=838121cc ebp=838121d0 iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    fwpkclnt!FwpsQueryPacketInjectionState0+0x46:
    87e601f2 8b4878          mov     ecx,dword ptr [eax+78h] ds:0023:00000078=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 87e601f2 to 8188fdc4

    STACK_TEXT: 
    83812158 87e601f2 badb0d00 00000000 00000002 nt!KiTrap0E+0x2ac
    838121d0 87e29856 832a8bf8 89b1f810 00000000 fwpkclnt!FwpsQueryPacketInjectionState0+0x46
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8381224c 87e2a7fe 008125c0 83812454 89b1f810 mfewfpk+0x4856
    83812264 8068cded 838125c0 83812454 89b1f810 mfewfpk+0x57fe
    838122ac 8068cae0 0000002c 838125c0 83812454 NETIO!ProcessCallout+0x10e
    8381231c 8068c727 0000002c 838125c0 83812454 NETIO!ArbitrateAndEnforce+0xaa
    83812400 88642846 0000002c 838125c0 83812454 NETIO!KfdClassify+0x12e
    83812428 88644db3 838125c0 83812454 89b1f810 tcpip!WfpAleClassify+0x36
    8381262c 8864471c 8c972ee8 0000002c 8868b320 tcpip!WfpAlepAuthorizeReceive+0x506
    83812768 8864247e 8c972ee8 00000002 00000011 tcpip!WfpAleAuthorizeReceive+0x240
    838127d0 88641c07 8c972ee8 00000002 00000011 tcpip!WfpAleConnectAcceptIndicate+0x98
    8381283c 88642b92 83812b1c 00000011 00000002 tcpip!ProcessALEForTransportPacket+0xca
    838128b8 88642eb0 83812b1c 83812aec 00000011 tcpip!ProcessAleForNonTcpIn+0x6f
    83812af0 88646143 00000011 00000002 00006c07 tcpip!WfpProcessInTransportStackIndication+0x2ae
    83812b40 88645e33 8c972ee8 00000002 00000011 tcpip!InetInspectReceiveDatagram+0x9a
    83812bc4 88645c6f 834c6100 8c9a11a0 89bac3e0 tcpip!UdpBeginMessageIndication+0x33
    83812c0c 88643897 834c6100 8c9a11a0 00000000 tcpip!UdpDeliverDatagrams+0xce
    83812c58 886437e4 834c6100 00e7c020 83812c94 tcpip!UdpReceiveDatagrams+0xab
    83812c68 886411b4 83812c7c c000023e 00000000 tcpip!UdpNlClientReceiveDatagrams+0x12
    83812c94 88640f84 88692d38 83812cf0 c000023e tcpip!IppDeliverListToProtocol+0x49
    83812cb4 88640eb3 886929c8 00000011 83812cf0 tcpip!IppProcessDeliverList+0x2a
    83812d08 8860b5a5 886929c8 00000011 818fde7c tcpip!IppReceiveHeaderBatch+0x1da
    83812d30 8198c872 89a75500 006929c8 827fc2d8 tcpip!IppLoopbackTransmit+0x52
    83812d44 81878fc0 83231950 00000000 827fc2d8 nt!IopProcessWorkItem+0x23
    83812d7c 81a25556 83231950 83819680 00000000 nt!ExpWorkerThread+0xfd
    83812dc0 818915fe 81878ec3 00000001 00000000 nt!PspSystemThreadStartup+0x9d
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

    kd> dt _NET_BUFFER_LIST (0x89b1f810)
    mfewfpk!_NET_BUFFER_LIST
       +0x000 NetBufferListHeader : _NET_BUFFER_LIST_HEADER
       +0x008 Context          : (null)
       +0x00c ParentNetBufferList : (null)
       +0x010 NdisPoolHandle   : 0x83326080
       +0x018 NdisReserved     : [2] (null)
       +0x020 ProtocolReserved : [4] 0x00000001
       +0x030 MiniportReserved : [2] (null)
       +0x038 Scratch          : (null)
       +0x03c SourceHandle     : (null)
       +0x040 NblFlags         : 0
       +0x044 ChildRefCount    : 0
       +0x048 Flags            : 0x3000100
       +0x04c Status           : 0
       +0x050 NetBufferListInfo : [13] (null)

    I could not find anything official on the forum, hence my question.

    Thanks in advance!
    Monday, March 30, 2009 5:13 PM

Answers

  • The fwpkclnt!FwpsQueryPacketInjectionState0 bugcheck is fixed in Vista SP1.

    Thanks,
    Charlie
    • Marked as answer by svassilev Tuesday, March 31, 2009 6:18 PM
    Tuesday, March 31, 2009 6:10 PM