노
노규래
Guest
Blue screen occurred today
I tried to debug the DMP file. But I can't understand because I don't know.
Please let me know what's wrong.
give me Email Address I will also send the blue screen DMP file that was opened last time.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000007060, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80640e4293f, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-U8CN3Q6
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 37
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: a
BUGCHECK_P1: 7060
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80640e4293f
READ_ADDRESS: fffff806418fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064180f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8064180f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000007060
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffa7012aac3370 -- (.trap 0xffffa7012aac3370)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000007000 rbx=0000000000000000 rcx=0000000000008000
rdx=00000000fffff000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80640e4293f rsp=ffffa7012aac3500 rbp=0000000000000425
r8=00000000000009f0 r9=000000000704c210 r10=0000000000000000
r11=ffffd683020a9038 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlpHpVsChunkCoalesce+0x1bf:
fffff806`40e4293f 488b4c2460 mov rcx,qword ptr [rsp+60h] ss:0018:ffffa701`2aac3560=ffffd682f3010280
Resetting default scope
STACK_TEXT:
ffffa701`2aac3228 fffff806`40fefe29 : 00000000`0000000a 00000000`00007060 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa701`2aac3230 fffff806`40fec129 : ffffa701`2aac345c fffff806`40f160da fffff806`08090a09 fffff806`40f117a0 : nt!KiBugCheckDispatch+0x69
ffffa701`2aac3370 fffff806`40e4293f : 00000000`00000425 ffffd683`07047fc0 00000000`00000000 ffffd683`0704c210 : nt!KiPageFault+0x469
ffffa701`2aac3500 fffff806`40e42278 : ffffd682`f3010280 ffffd683`07045000 00000000`00000000 ffffa701`2aac3608 : nt!RtlpHpVsChunkCoalesce+0x1bf
ffffa701`2aac3560 fffff806`40e40c04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffffa701`2aac3600 fffff806`415c2019 : 00000000`00004220 ffffd682`f3010100 00000000`04d00000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffa701`2aac36e0 fffff806`4fb6e2d6 : 00000000`00000000 fffff806`40e25863 00000000`00000000 ffffd682`fde408f0 : nt!ExFreePool+0x9
ffffa701`2aac3710 fffff806`4fb6d2f9 : ffffa701`2aac37e0 ffffa802`c55d63d8 ffffd682`00000000 ffffd682`fde40800 : Npfs!NpReadDataQueue+0x246
ffffa701`2aac3780 fffff806`40e46d45 : ffffd682`f5c53d90 ffffd682`000031d8 00000000`13ea9368 ffffd683`074dfa70 : Npfs!NpFsdRead+0x259
ffffa701`2aac3830 fffff806`40064906 : 00000000`12d87dd4 00000000`00000001 ffffd682`fda42340 fffff806`411f95b1 : nt!IofCallDriver+0x55
ffffa701`2aac3870 fffff806`40e46d45 : ffffd683`074dfa70 00000000`11c1f810 ffffa701`2aac3b80 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffffa701`2aac38d0 fffff806`4120eeb8 : ffffd683`074dfa70 00000000`00000000 ffffd683`074dfa70 00000000`00000000 : nt!IofCallDriver+0x55
ffffa701`2aac3910 fffff806`41212119 : ffffd682`00000000 ffffa701`2aac3b80 00000000`00000000 ffffa701`2aac3b80 : nt!IopSynchronousServiceTail+0x1a8
ffffa701`2aac39b0 fffff806`40fef878 : ffffd682`fbc61080 00000000`00000000 00000000`00000001 00000000`12d87dd4 : nt!NtReadFile+0x599
ffffa701`2aac3a90 00000000`77cb1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`11b1f0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cb1cfc
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.450
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------
Continue reading...
I tried to debug the DMP file. But I can't understand because I don't know.
Please let me know what's wrong.
give me Email Address I will also send the blue screen DMP file that was opened last time.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000007060, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80640e4293f, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-U8CN3Q6
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 37
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: a
BUGCHECK_P1: 7060
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80640e4293f
READ_ADDRESS: fffff806418fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064180f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8064180f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000007060
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffa7012aac3370 -- (.trap 0xffffa7012aac3370)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000007000 rbx=0000000000000000 rcx=0000000000008000
rdx=00000000fffff000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80640e4293f rsp=ffffa7012aac3500 rbp=0000000000000425
r8=00000000000009f0 r9=000000000704c210 r10=0000000000000000
r11=ffffd683020a9038 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlpHpVsChunkCoalesce+0x1bf:
fffff806`40e4293f 488b4c2460 mov rcx,qword ptr [rsp+60h] ss:0018:ffffa701`2aac3560=ffffd682f3010280
Resetting default scope
STACK_TEXT:
ffffa701`2aac3228 fffff806`40fefe29 : 00000000`0000000a 00000000`00007060 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa701`2aac3230 fffff806`40fec129 : ffffa701`2aac345c fffff806`40f160da fffff806`08090a09 fffff806`40f117a0 : nt!KiBugCheckDispatch+0x69
ffffa701`2aac3370 fffff806`40e4293f : 00000000`00000425 ffffd683`07047fc0 00000000`00000000 ffffd683`0704c210 : nt!KiPageFault+0x469
ffffa701`2aac3500 fffff806`40e42278 : ffffd682`f3010280 ffffd683`07045000 00000000`00000000 ffffa701`2aac3608 : nt!RtlpHpVsChunkCoalesce+0x1bf
ffffa701`2aac3560 fffff806`40e40c04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffffa701`2aac3600 fffff806`415c2019 : 00000000`00004220 ffffd682`f3010100 00000000`04d00000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffa701`2aac36e0 fffff806`4fb6e2d6 : 00000000`00000000 fffff806`40e25863 00000000`00000000 ffffd682`fde408f0 : nt!ExFreePool+0x9
ffffa701`2aac3710 fffff806`4fb6d2f9 : ffffa701`2aac37e0 ffffa802`c55d63d8 ffffd682`00000000 ffffd682`fde40800 : Npfs!NpReadDataQueue+0x246
ffffa701`2aac3780 fffff806`40e46d45 : ffffd682`f5c53d90 ffffd682`000031d8 00000000`13ea9368 ffffd683`074dfa70 : Npfs!NpFsdRead+0x259
ffffa701`2aac3830 fffff806`40064906 : 00000000`12d87dd4 00000000`00000001 ffffd682`fda42340 fffff806`411f95b1 : nt!IofCallDriver+0x55
ffffa701`2aac3870 fffff806`40e46d45 : ffffd683`074dfa70 00000000`11c1f810 ffffa701`2aac3b80 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffffa701`2aac38d0 fffff806`4120eeb8 : ffffd683`074dfa70 00000000`00000000 ffffd683`074dfa70 00000000`00000000 : nt!IofCallDriver+0x55
ffffa701`2aac3910 fffff806`41212119 : ffffd682`00000000 ffffa701`2aac3b80 00000000`00000000 ffffa701`2aac3b80 : nt!IopSynchronousServiceTail+0x1a8
ffffa701`2aac39b0 fffff806`40fef878 : ffffd682`fbc61080 00000000`00000000 00000000`00000001 00000000`12d87dd4 : nt!NtReadFile+0x599
ffffa701`2aac3a90 00000000`77cb1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`11b1f0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cb1cfc
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.450
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------
Continue reading...