0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff8d0b3a887000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80309e30fe8, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2030
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3935
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 9706
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
FILE_IN_CAB: 060122-13765-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffff8d0b3a887000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80309e30fe8
READ_ADDRESS: fffff8030a8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8d0b3a887000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64
TRAP_FRAME: ffff8a8aa029f350 -- (.trap 0xffff8a8aa029f350)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8d0b3a887000 rbx=0000000000000000 rcx=ffff8d0b32800cd8
rdx=ffff8d0b32800cc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80309e30fe8 rsp=ffff8a8aa029f4e0 rbp=0000000000000000
r8=ffff8d0b36f02000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000062 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlpHpLfhSubsegmentFreeBlock+0x2a8:
fffff803`09e30fe8 483930 cmp qword ptr [rax],rsi ds:ffff8d0b`3a887000=????????????????
Resetting default scope
STACK_TEXT:
ffff8a8a`a029f208 fffff803`0a009c69 : 00000000`0000000a ffff8d0b`3a887000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8a8a`a029f210 fffff803`0a005f69 : 00000000`00000000 00000000`00000000 ffff8d0b`3e583b60 fffff803`09ffeb5f : nt!KiBugCheckDispatch+0x69
ffff8a8a`a029f350 fffff803`09e30fe8 : ffffa60f`092a7628 ffff8a8a`a029f6c0 00000000`00000020 00000000`00040246 : nt!KiPageFault+0x469
ffff8a8a`a029f4e0 fffff803`09e47cd2 : ffff8d0b`32800340 00000000`000000ff 00000000`00000001 ffff8eb3`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x2a8
ffff8a8a`a029f590 fffff803`0a5b2019 : fffff803`00000000 00000000`00000008 ffff8d0b`3318ecb0 01000000`00100000 : nt!ExFreeHeapPool+0x362
ffff8a8a`a029f670 fffff803`1a1a681c : 00000000`00001ca4 ffffa60f`092a7080 fffff803`199c0000 00000000`00000008 : nt!ExFreePool+0x9
ffff8a8a`a029f6a0 00000000`00001ca4 : ffffa60f`092a7080 fffff803`199c0000 00000000`00000008 fffff803`199c0000 : vgk+0x7e681c
ffff8a8a`a029f6a8 ffffa60f`092a7080 : fffff803`199c0000 00000000`00000008 fffff803`199c0000 00000000`00000001 : 0x1ca4
ffff8a8a`a029f6b0 fffff803`199c0000 : 00000000`00000008 fffff803`199c0000 00000000`00000001 00000000`00000000 : 0xffffa60f`092a7080
ffff8a8a`a029f6b8 00000000`00000008 : fffff803`199c0000 00000000`00000001 00000000`00000000 00000000`00001ca4 : vgk
ffff8a8a`a029f6c0 fffff803`199c0000 : 00000000`00000001 00000000`00000000 00000000`00001ca4 ffff8a8a`a029f740 : 0x8
ffff8a8a`a029f6c8 00000000`00000001 : 00000000`00000000 00000000`00001ca4 ffff8a8a`a029f740 fffff803`1a15fe7c : vgk
ffff8a8a`a029f6d0 00000000`00000000 : 00000000`00001ca4 ffff8a8a`a029f740 fffff803`1a15fe7c fffff803`09f61f50 : 0x1
SYMBOL_NAME: vgk+7e681c
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 7e681c
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------