DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8085763d5ce, address which referenced memory
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000028, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8085763d5ce, address which referenced memory
STACK_TEXT:
ffffc100
699afb98 fffff802
b63ec629 : 000000000000000a 00000000
00000028 0000000000000002 00000000
00000000 : nt!KeBugCheckEx ffffc100699afba0 fffff802
b63e976c : ffff9c0b7130c1a0 ffff9c0b
7130c030 ffff9c0b7f20c6a0 00000000
00000000 : nt!KiBugCheckDispatch+0x69 ffffc100699afce0 fffff808
5763d5ce : 0000000000000001 fffff808
57774eb0 ffffc1006abd3630 ffff9c0b
6be13be0 : nt!KiPageFault+0x42c ffffc100699afe70 fffff808
5763d4ae : ffff9c0b7130c030 00000000
00000000 0000000000000001 00000000
00000200 : tcpip!IppIsBasicIPHeaderContiguous+0x1e ffffc100699afeb0 fffff808
57774fc6 : 005c004b004f0002 ffffc100
699affd0 ffffc100699b0000 0022005c
00203001 : tcpip!IppInspectInjectReceive+0x3e ffffc100699afef0 fffff802
b63df9b7 : 460048140000002e 00003300
32003100 002e7d308a731400 8d140000
002e002e : fwpkclnt!FwppInjectionStackCallout+0x116 ffffc100699aff80 fffff802
b63df97d : 000000000000481a ffff9c0b
6b97f5f0 0000000000000000 fffff802
b6327fa1 : nt!KxSwitchKernelStackCallout+0x27 ffffc1006ac7c430 fffff802
b6327fa1 : ffff9c0b6b97f5f8 c0000022
00000019 ffff9c0b7130c100 00000000
00000001 : nt!KiSwitchKernelStackContinue ffffc1006ac7c450 fffff802
b6327c06 : ffffc1006ac7c4e0 00000000
00004800 0000000000000000 00000000
00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x241 ffffc1006ac7c4e0 fffff802
b6327acf : ffffc1006ac7c630 ffffc100
6ac7c630 0000000000000000 ffff9c0b
702bfdc0 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6 ffffc1006ac7c540 fffff808
577768f6 : ffff9c0b6b21fb60 ffff9c0b
7130c030 ffff9c0b6b97f5f0 ffff9c0b
6c191000 : nt!KeExpandKernelStackAndCalloutInternal+0x2f ffffc1006ac7c590 fffff808
57775ff6 : 0000000000000000 ffffc100
6ac7c6a9 ffff9c0b7130c030 00000000
00000001 : fwpkclnt!NetioExpandKernelStackAndCallout+0x52 ffffc1006ac7c5d0 fffff808
572515d9 : ffff9c0b70210180 00000000
00000000 ffffc1006ac7ca02 00000000
00000014 : fwpkclnt!FwpsInjectNetworkReceiveAsync0+0x1c6 ffffc1006ac7c6f0 ffff9c0b
70210180 : 0000000000000000 ffffc100
6ac7ca02 0000000000000014 00000000
00000001 : npcap+0x15d9 ffffc1006ac7c6f8 00000000
00000000 : ffffc1006ac7ca02 00000000
00000014 0000000000000001 ffff9c0b
00000000 : 0xffff9c0b`70210180