IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9a8526f9c2a3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80766689074, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1883
Key : Analysis.Init.CPU.mSec
Value: 859
Key : Analysis.Init.Elapsed.mSec
Value: 33883
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
FILE_IN_CAB: 120221-15687-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffff9a8526f9c2a3
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80766689074
READ_ADDRESS: fffff807670fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9a8526f9c2a3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64
TRAP_FRAME: ffffd28b11453500 -- (.trap 0xffffd28b11453500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80766400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80766689074 rsp=ffffd28b11453690 rbp=ffffd28b114537c0
r8=0000000000000001 r9=0000000000000000 r10=ffffe703faf10628
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreeHeapPool+0x124:
fffff807`66689074 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
ffffd28b`114533b8 fffff807`66809269 : 00000000`0000000a ffff9a85`26f9c2a3 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd28b`114533c0 fffff807`66805569 : fffff807`6c117924 00000000`12b9bc76 fffff807`6c309dd7 ffffe703`faf100ff : nt!KiBugCheckDispatch+0x69
ffffd28b`11453500 fffff807`66689074 : 00000000`00000283 00000000`00000001 00000000`00000000 fffff807`6bc00000 : nt!KiPageFault+0x469
ffffd28b`11453690 fffff807`66db1149 : ffffd28b`114537c0 00000000`00001600 00000000`00000004 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffffd28b`11453770 fffff807`6c3d2a34 : fffff807`6672ee40 ffffe703`faf10080 fffff807`6bc00000 00000000`00000008 : nt!ExFreePool+0x9
ffffd28b`114537a0 fffff807`6672ee3f : ffffe703`faf10080 fffff807`6bc00000 00000000`00000008 fffff807`6bc00000 : vgk+0x7d2a34
ffffd28b`114537a8 ffffe703`faf10080 : fffff807`6bc00000 00000000`00000008 fffff807`6bc00000 00000000`00000001 : nt!PsGetCurrentProcessWow64Process+0x2f
ffffd28b`114537b0 fffff807`6bc00000 : 00000000`00000008 fffff807`6bc00000 00000000`00000001 00000000`00000000 : 0xffffe703`faf10080
ffffd28b`114537b8 00000000`00000008 : fffff807`6bc00000 00000000`00000001 00000000`00000000 00000000`00001658 : vgk
ffffd28b`114537c0 fffff807`6bc00000 : 00000000`00000001 00000000`00000000 00000000`00001658 ffffd28b`11453840 : 0x8
ffffd28b`114537c8 00000000`00000001 : 00000000`00000000 00000000`00001658 ffffd28b`11453840 fffff807`6c38b6f0 : vgk
ffffd28b`114537d0 00000000`00000000 : 00000000`00001658 ffffd28b`11453840 fffff807`6c38b6f0 fffff807`666d7910 : 0x1
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.1348
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption