操作系统:Windows 11 家庭中文版
电脑型号:Dell Inspiron 16 plus 7620
电脑为2022年9月份买的新机器,2023年2月6日第一次蓝屏没有太关注,3月月7日后系统蓝屏频率为每天一次,有点崩溃,望专业大佬解救下。
蓝屏代码主要为如下:
1、终止代码:DRIVER_IRQL_NOT_LESS_OR_EQUAL,失败的操作:fwpkclnt.sys
2、终止代码:DPC_WATCHDOG_VIOLATION
通过WinDbg分析,最近一次的蓝屏日志如下:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\032323-11062-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff805`10000000 PsLoadedModuleList = 0xfffff805`10c13430
Debug session time: Thu Mar 23 09:23:34.171 2023 (UTC + 8:00)
System Uptime: 0 days 20:32:55.855
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`10429400 48894c2408 mov qword ptr [rsp+8],rcx ss:fffffa88`f7684d40=000000000000000a
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe0803b43f000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80514eb4aaf, address which referenced memory
Debugging Details:
------------------
DBGHELP: Timeout to store: https://msdl.microsoft.com/download/symbols
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1046
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 57014
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 4
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 233
Key : Analysis.Init.Elapsed.mSec
Value: 11887
Key : Analysis.Memory.CommitPeak.Mb
Value: 107
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 032323-11062-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffe0803b43f000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80514eb4aaf
WRITE_ADDRESS: fffff80510d1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe0803b43f000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WeChat.exe
DPC_STACK_BASE: FFFFFA88F7687FB0
TRAP_FRAME: fffffa88f7684e80 -- (.trap 0xfffffa88f7684e80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff838eef5a8010 rbx=0000000000000000 rcx=ffff838eef5b7c60
rdx=ffff838eef5a8010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80514eb4aaf rsp=fffffa88f7685010 rbp=0000000000000001
r8=ffffe0803c0798c0 r9=000000006e706657 r10=fffff80514a9ef20
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fwpkclnt!FwppSetPacketInfo+0x89:
fffff805`14eb4aaf c7074677706e mov dword ptr [rdi],6E707746h ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
fffffa88`f7684d38 fffff805`1043eaa9 : 00000000`0000000a ffffe080`3b43f000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffa88`f7684d40 fffff805`1043a134 : 00000000`00000000 ffffe080`3c134180 ffff838e`ef5b7c60 fffffa88`f7685950 : nt!KiBugCheckDispatch+0x69
fffffa88`f7684e80 fffff805`14eb4aaf : ffff838e`ef5b7c60 00000000`00000000 00000000`00000001 ffffe080`3b43f000 : nt!KiPageFault+0x474
fffffa88`f7685010 fffff805`14eb4900 : ffffe080`3b43f000 00000000`00000000 00000000`646e7044 fffff805`102d614f : fwpkclnt!FwppSetPacketInfo+0x89
fffffa88`f7685040 fffff805`14eb49a6 : 00000000`00000000 00000000`00000000 ffff8389`d6537b01 00000000`00000000 : fwpkclnt!FwppReferenceNetBufferListCommon+0xc6
fffffa88`f7685070 fffff805`14eb551b : ffff838e`ef5b7c60 ffff8389`d6537ba0 ffff8389`d6537ba0 fffffa88`f7685490 : fwpkclnt!FwppReferenceNetioNetBufferList+0x4a
fffffa88`f76850c0 fffff805`3a3361db : fffffa88`f7685490 00000000`00000002 00000000`00000004 fffff805`00000007 : fwpkclnt!FwpsReferenceNetBufferList0+0x2b
fffffa88`f76850f0 fffffa88`f7685490 : 00000000`00000002 00000000`00000004 fffff805`00000007 ffff838e`ef5a5010 : Dcntgrd+0x61db
fffffa88`f76850f8 00000000`00000002 : 00000000`00000004 fffff805`00000007 ffff838e`ef5a5010 00000000`00000006 : 0xfffffa88`f7685490
fffffa88`f7685100 00000000`00000004 : fffff805`00000007 ffff838e`ef5a5010 00000000`00000006 ffffffff`00ffffff : 0x2
fffffa88`f7685108 fffff805`00000007 : ffff838e`ef5a5010 00000000`00000006 ffffffff`00ffffff 7421d358`00000000 : 0x4
fffffa88`f7685110 ffff838e`ef5a5010 : 00000000`00000006 ffffffff`00ffffff 7421d358`00000000 ffff8389`ce01a450 : 0xfffff805`00000007
fffffa88`f7685118 00000000`00000006 : ffffffff`00ffffff 7421d358`00000000 ffff8389`ce01a450 fffff805`14eb40d2 : 0xffff838e`ef5a5010
fffffa88`f7685120 ffffffff`00ffffff : 7421d358`00000000 ffff8389`ce01a450 fffff805`14eb40d2 ffff8389`00000050 : 0x6
fffffa88`f7685128 7421d358`00000000 : ffff8389`ce01a450 fffff805`14eb40d2 ffff8389`00000050 00000000`00000000 : 0xffffffff`00ffffff
fffffa88`f7685130 ffff8389`ce01a450 : fffff805`14eb40d2 ffff8389`00000050 00000000`00000000 00000000`00000002 : 0x7421d358`00000000
fffffa88`f7685138 fffff805`14eb40d2 : ffff8389`00000050 00000000`00000000 00000000`00000002 00000000`00000000 : 0xffff8389`ce01a450
fffffa88`f7685140 fffff805`14eb5485 : ffff8389`ce0103b9 00000000`00000000 00000000`00000cbe ffff838c`9d0a9030 : fwpkclnt!FwppGetPacketInfo+0x10
fffffa88`f7685170 fffff805`3a336aea : 00000000`00000000 fffffa88`f7685230 fffffa88`f7685950 00000000`00000017 : fwpkclnt!FwpsQueryPacketInjectionState0+0x85
fffffa88`f76851a0 00000000`00000000 : fffffa88`f7685230 fffffa88`f7685950 00000000`00000017 ffff8389`fafb1ed0 : Dcntgrd+0x6aea
SYMBOL_NAME: fwpkclnt!FwppSetPacketInfo+89
MODULE_NAME: fwpkclnt
IMAGE_NAME: fwpkclnt.sys
IMAGE_VERSION: 10.0.22621.1194
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 89
FAILURE_BUCKET_ID: AV_fwpkclnt!FwppSetPacketInfo
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {373ff51e-e794-ab37-6fe1-5c7719ddaac3}
Followup: MachineOwner
---------