IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8036dca5048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80351a9e182, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JC78BRD
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 17
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff8036dca5048
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80351a9e182
WRITE_ADDRESS: fffff80351f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80351e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80351e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8036dca5048
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MSI_LiveUpdate_Service.exe
DPC_STACK_BASE: FFFFA98AFFE30FB0
TRAP_FRAME: ffffa98affe309e0 -- (.trap 0xffffa98affe309e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000057 rbx=0000000000000000 rcx=00000000000035de
rdx=000000000000274b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80351a9e182 rsp=ffffa98affe30b70 rbp=0000000000024a16
r8=ffff900c73ddf6a0 r9=ffff900c73c11b50 r10=0000000000000014
r11=0000000000417d6e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!PpmPerfSnapUtility+0x192:
fffff803`51a9e182 4801bbc85e0000 add qword ptr [rbx+5EC8h],rdi ds:00000000`00005ec8=????????????????
Resetting default scope
STACK_TEXT:
ffffa98a`ffe30898 fffff803`51bd41e9 : 00000000`0000000a fffff803`6dca5048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffa98a`ffe308a0 fffff803`51bd052b : 00000000`00000000 00000000`00000002 00000000`01eca04f ffffa98a`ffe30e70 : nt!KiBugCheckDispatch+0x69
ffffa98a`ffe309e0 fffff803`51a9e182 : 00000000`0000000e fffff803`51a9dfb0 00000000`00000000 fffff803`51a00000 : nt!KiPageFault+0x46b
ffffa98a`ffe30b70 fffff803`51a9dfb0 : 00000000`00000000 fffff803`51a00000 00000000`00000000 ffffa98a`ffe30e80 : nt!PpmPerfSnapUtility+0x192
ffffa98a`ffe30b80 fffff803`51a43bc0 : ffffd700`6d98df80 ffffa98a`ffe30d40 fffff803`51e3b540 0000e0b8`e5ccd0e8 : nt!PpmCheckSnapAllUtility+0x70
ffffa98a`ffe30bb0 fffff803`51ac116a : ffffd700`6d98df80 ffff900c`732a3000 ffffd700`6d990f90 ffffd700`00000002 : nt!PpmCheckRun+0x40
ffffa98a`ffe30c40 fffff803`51ac07bf : 00000000`00000000 00000000`00989680 00000000`006bb282 00000000`0000009a : nt!KiExecuteAllDpcs+0x30a
ffffa98a`ffe30d80 fffff803`51bc93c5 : 00000000`00000000 ffffd700`6d98b180 00000000`00000000 ffffc2de`42c1c240 : nt!KiRetireDpcList+0x1ef
ffffa98a`ffe30fb0 fffff803`51bc91b0 : 00000000`00000001 ffffc2bf`737c5987 ffff900c`78046790 00000000`00989680 : nt!KxRetireDpcList+0x5
ffffa98b`03139df0 fffff803`51bc8880 : 00000000`00000020 ffffc2de`40200000 00000000`00000000 ffffffff`ffffffff : nt!KiDispatchInterruptContinue
ffffa98b`03139e20 fffff803`51b1e65d : ffffc2de`40200000 00000000`00000000 ffff900c`777c2d90 fffff803`51b1109a : nt!KiDpcInterrupt+0x2f0
ffffa98b`03139fb0 fffff803`51d6f019 : ffff900c`7e3b6005 ffffc2bf`737c1900 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x20d
ffffa98b`0313a0d0 ffffc2bf`72668e82 : 00000000`00000000 ffffc2de`42866680 00000000`00000000 ffffc6fc`ef200000 : nt!ExFreePool+0x9
ffffa98b`0313a100 00000000`00000000 : ffffc2de`42866680 00000000`00000000 ffffc6fc`ef200000 00000000`0b07e711 : win32kfull+0x68e82
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.18362.720
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------