An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 805456f3, address which referenced memory
f9dc700c 804f880d 00000003 f9dc7368 00000000 nt!RtlpBreakWithStatusInstruction
f9dc7058 804f93fa 00000003 00000004 805456f3 nt!KiBugCheckDebugBreak+0x19
f9dc7438 80540853 0000000a 00000004 00000002 nt!KeBugCheck2+0x574
f9dc7438 805456f3 0000000a 00000004 00000002 nt!KiTrap0E+0x233
f9dc7520 f96e6158 00000000 00000001 496d5061 nt!ExAllocatePoolWithTag+0x673
f9dc7534 f762608a f9dc7584 000005f4 496d5061 NDIS!NdisAllocateMemoryWithTag+0x13
WARNING: Stack unwind information not available. Following frames may be wrong.