*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018650f5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c40e0
000000000000000a
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IppSendDatagramsCommon+7a5
fffff880`018650f5 f6470a05 test byte ptr [rdi+0Ah],5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88007574440 -- (.trap 0xfffff88007574440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000b47c rbx=0000000000000000 rcx=00000000154b9f31
rdx=000000000000000d rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018650f5 rsp=fffff880075745d0 rbp=fffffa8010ea0890
r8=0000000000000000 r9=fffff8800185c72e r10=0000000000000000
r11=fffffa8010fa2200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
tcpip!IppSendDatagramsCommon+0x7a5:
fffff880`018650f5 f6470a05 test byte ptr [rdi+0Ah],5 ds:9310:00000000`0000000a=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8bc69 to fffff80002e8c700
STACK_TEXT:
fffff880`075742f8 fffff800`02e8bc69 : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07574300 fffff800`02e8a8e0 : fffffa80`10ec0220 00000000`0000059e fffffa80`0af8cc90 fffffa80`0b280080 : nt!KiBugCheckDispatch+0x69
fffff880`07574440 fffff880`018650f5 : 00000000`00000000 00000000`00000002 fffffa80`0b280045 00000000`0000ba05 : nt!KiPageFault+0x260
fffff880`075745d0 fffff880`01935859 : fffffa80`07342b40 fffffa80`10ea0704 fffff880`0196c9a0 fffffa80`0b350280 : tcpip!IppSendDatagramsCommon+0x7a5
fffff880`075748a0 fffff880`0179e74b : 00000000`00000000 00000000`00000004 fffff880`07574be0 fffffa80`10ea0760 : tcpip!IppInspectInjectTlSend+0x1b9
fffff880`075749c0 fffff880`0179e823 : 00000000`00000000 00000000`00000000 fffffa80`06753a01 00000000`00000000 : fwpkclnt!FwppInjectTransportSendAsync+0x41f
fffff880`07574aa0 fffff880`02e69572 : fffff880`07574bc0 fffff880`07574b20 fffffa80`0b348000 00000000`00000000 : fwpkclnt!FwpsInjectTransportSendAsync0+0x63
fffff880`07574b10 fffff880`07574bc0 : fffff880`07574b20 fffffa80`0b348000 00000000`00000000 fffff880`07574be0 : PctWfpFilter64+0x11572
fffff880`07574b18 fffff880`07574b20 : fffffa80`0b348000 00000000`00000000 fffff880`07574be0 fffff880`02e50002 : 0xfffff880`07574bc0
fffff880`07574b20 fffffa80`0b348000 : 00000000`00000000 fffff880`07574be0 fffff880`02e50002 00000000`00000001 : 0xfffff880`07574b20
fffff880`07574b28 00000000`00000000 : fffff880`07574be0 fffff880`02e50002 00000000`00000001 fffffa80`10ea0760 : 0xfffffa80`0b348000
STACK_COMMAND: kb
FOLLOWUP_IP:
fwpkclnt!FwppInjectTransportSendAsync+41f
fffff880`0179e74b 8b942484000000 mov edx,dword ptr [rsp+84h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: fwpkclnt!FwppInjectTransportSendAsync+41f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fwpkclnt
IMAGE_NAME: fwpkclnt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc164
FAILURE_BUCKET_ID: X64_0xD1_fwpkclnt!FwppInjectTransportSendAsync+41f
BUCKET_ID: X64_0xD1_fwpkclnt!FwppInjectTransportSendAsync+41f
Followup: MachineOwner
---------