Pool_Corruption What is this?

노규래

Blue screen occurred today
I tried to debug the DMP file. But I can't understand because I don't know.
Please let me know what's wrong.
give me Email Address I will also send the blue screen DMP file that was opened last time.



*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 0000000000007060, memory referenced

Arg2: 0000000000000002, IRQL

Arg3: 0000000000000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: fffff80640e4293f, address which referenced memory



Debugging Details:

------------------



*** WARNING: Unable to verify timestamp for win32k.sys



KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 3



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-U8CN3Q6



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 37



Key : Analysis.Memory.CommitPeak.Mb

Value: 79



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: a



BUGCHECK_P1: 7060



BUGCHECK_P2: 2



BUGCHECK_P3: 0



BUGCHECK_P4: fffff80640e4293f



READ_ADDRESS: fffff806418fa390: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

fffff8064180f2f0: Unable to get Flags value from nt!KdVersionBlock

fffff8064180f2f0: Unable to get Flags value from nt!KdVersionBlock

unable to get nt!MmSpecialPagesInUse

0000000000007060



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: Discord.exe



TRAP_FRAME: ffffa7012aac3370 -- (.trap 0xffffa7012aac3370)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000007000 rbx=0000000000000000 rcx=0000000000008000

rdx=00000000fffff000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff80640e4293f rsp=ffffa7012aac3500 rbp=0000000000000425

r8=00000000000009f0 r9=000000000704c210 r10=0000000000000000

r11=ffffd683020a9038 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl nz na po nc

nt!RtlpHpVsChunkCoalesce+0x1bf:

fffff806`40e4293f 488b4c2460 mov rcx,qword ptr [rsp+60h] ss:0018:ffffa701`2aac3560=ffffd682f3010280

Resetting default scope



STACK_TEXT:

ffffa701`2aac3228 fffff806`40fefe29 : 00000000`0000000a 00000000`00007060 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx

ffffa701`2aac3230 fffff806`40fec129 : ffffa701`2aac345c fffff806`40f160da fffff806`08090a09 fffff806`40f117a0 : nt!KiBugCheckDispatch+0x69

ffffa701`2aac3370 fffff806`40e4293f : 00000000`00000425 ffffd683`07047fc0 00000000`00000000 ffffd683`0704c210 : nt!KiPageFault+0x469

ffffa701`2aac3500 fffff806`40e42278 : ffffd682`f3010280 ffffd683`07045000 00000000`00000000 ffffa701`2aac3608 : nt!RtlpHpVsChunkCoalesce+0x1bf

ffffa701`2aac3560 fffff806`40e40c04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188

ffffa701`2aac3600 fffff806`415c2019 : 00000000`00004220 ffffd682`f3010100 00000000`04d00000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4

ffffa701`2aac36e0 fffff806`4fb6e2d6 : 00000000`00000000 fffff806`40e25863 00000000`00000000 ffffd682`fde408f0 : nt!ExFreePool+0x9

ffffa701`2aac3710 fffff806`4fb6d2f9 : ffffa701`2aac37e0 ffffa802`c55d63d8 ffffd682`00000000 ffffd682`fde40800 : Npfs!NpReadDataQueue+0x246

ffffa701`2aac3780 fffff806`40e46d45 : ffffd682`f5c53d90 ffffd682`000031d8 00000000`13ea9368 ffffd683`074dfa70 : Npfs!NpFsdRead+0x259

ffffa701`2aac3830 fffff806`40064906 : 00000000`12d87dd4 00000000`00000001 ffffd682`fda42340 fffff806`411f95b1 : nt!IofCallDriver+0x55

ffffa701`2aac3870 fffff806`40e46d45 : ffffd683`074dfa70 00000000`11c1f810 ffffa701`2aac3b80 00000000`00000000 : FLTMGR!FltpDispatch+0xd6

ffffa701`2aac38d0 fffff806`4120eeb8 : ffffd683`074dfa70 00000000`00000000 ffffd683`074dfa70 00000000`00000000 : nt!IofCallDriver+0x55

ffffa701`2aac3910 fffff806`41212119 : ffffd682`00000000 ffffa701`2aac3b80 00000000`00000000 ffffa701`2aac3b80 : nt!IopSynchronousServiceTail+0x1a8

ffffa701`2aac39b0 fffff806`40fef878 : ffffd682`fbc61080 00000000`00000000 00000000`00000001 00000000`12d87dd4 : nt!NtReadFile+0x599

ffffa701`2aac3a90 00000000`77cb1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28

00000000`11b1f0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cb1cfc





SYMBOL_NAME: nt!ExFreePool+9



IMAGE_NAME: Pool_Corruption



IMAGE_VERSION: 10.0.19041.450



MODULE_NAME: Pool_Corruption



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 9



FAILURE_BUCKET_ID: AV_nt!ExFreePool



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}



Followup: Pool_corruption

---------

Continue reading...
 
Back
Top Bottom