IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffdc440003648, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804722adc4d, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26868
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffffdc440003648
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804722adc4d
READ_ADDRESS: fffff804727733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047262a3b8: Unable to get Flags value from nt!KdVersionBlock
fffff8047262a3b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffffdc440003648
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc105df9256c0 -- (.trap 0xffffc105df9256c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000af rbx=0000000000000000 rcx=00003bddc26a8472
rdx=00000000000000af rsi=0000000000000000 rdi=0000000000000000
rip=fffff804722adc4d rsp=ffffc105df925850 rbp=0000000060c56cce
r8=0000000000002648 r9=fffffdc440001000 r10=0000000000000020
r11=00000000000000ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExFreeHeapPool+0x1dd:
fffff804`722adc4d 438b0408 mov eax,dword ptr [r8+r9] ds:fffffdc4`40003648=????????
Resetting default scope
STACK_TEXT:
ffffc105`df925578 fffff804`723d41e9 : 00000000`0000000a fffffdc4`40003648 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc105`df925580 fffff804`723d0529 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd401`9995b100 : nt!KiBugCheckDispatch+0x69
ffffc105`df9256c0 fffff804`722adc4d : ffffe50c`33a02340 fffff804`723c91ff ffffe50c`3440e068 00000000`00000000 : nt!KiPageFault+0x469
ffffc105`df925850 fffff804`7256f0a9 : ffffc105`df9259e4 ffffe50c`349fe760 ffffd401`9995b180 01000000`00100000 : nt!ExFreeHeapPool+0x1dd
ffffc105`df925970 fffff804`76143a34 : ffffe50c`34196800 00000000`00000000 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
ffffc105`df9259a0 fffff804`761430d2 : 00000000`00000300 00000000`0000ff00 00000000`00000000 00000000`00000002 : NETIO!UpdateCacheLruBucket+0x544
ffffc105`df925a80 fffff804`76155796 : ffffe50c`42000000 ffffe50c`34196da0 ffffe50c`34a10de0 ffffe50c`34aa6080 : NETIO!LruCleanupWorkItemRoutine+0x82
ffffc105`df925ab0 fffff804`72292042 : ffffe50c`34c7eb10 ffffe50c`34c7eb10 ffffe50c`34a10de0 fffff804`701442b0 : NETIO!NetiopIoWorkItemRoutine+0x56
ffffc105`df925b00 fffff804`72283965 : ffffe50c`34168c50 ffffe50c`3c083040 fffff804`72291fb0 00000000`0000000c : nt!IopProcessWorkItem+0x92
ffffc105`df925b70 fffff804`7231e155 : ffffe50c`3c083040 00000000`00000080 ffffe50c`34067300 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffc105`df925c10 fffff804`723c99c8 : ffffd401`99820180 ffffe50c`3c083040 fffff804`7231e100 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc105`df925c60 00000000`00000000 : ffffc105`df926000 ffffc105`df920000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.18362.1016
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------