Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff802198cc131, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80249e7e4c5, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A37
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends International, LLC.
BIOS_VERSION: 1.O6
BIOS_DATE: 07/13/2022
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: B350M MORTAR (MS-7A37)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffff802198cc131
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80249e7e4c5
READ_ADDRESS: fffff8024a8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff802198cc131
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSwapThread+655
fffff802`49e7e4c5 488b94d1c0cccf00 mov rdx,qword ptr [rcx+rdx*8+0CFCCC0h]
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: JX3ClientX64.exe
ANALYSIS_SESSION_HOST: DESKTOP-6JRH9P2
ANALYSIS_SESSION_TIME: 04-07-2023 08:18:23.0741
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff9109d3899690 -- (.trap 0xffff9109d3899690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000c rbx=0000000000000000 rcx=fffff80249c00000
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80249e7e4c5 rsp=ffff9109d3899820 rbp=0000000000001c00
r8=0000000000000000 r9=0000000000000000 r10=0000000000000003
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSwapThread+0x655:
fffff802`49e7e4c5 488b94d1c0cccf00 mov rdx,qword ptr [rcx+rdx*8+0CFCCC0h] ds:fffff802`4a8fcd20=ffff8000766a9180
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8024a00e129 to fffff80249ffa090
STACK_TEXT:
ffff9109`d3899548 fffff802`4a00e129 : 00000000`0000000a fffff802`198cc131 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9109`d3899550 fffff802`4a009ce3 : ffff8000`759d1180 fffff802`4a002752 000f8067`b4bbbdff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9109`d3899690 fffff802`49e7e4c5 : ffff8000`759d1180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x463
ffff9109`d3899820 fffff802`49e7d89f : ffffd78d`00000003 00001f80`0000000c ffff9109`d38999e0 ffff9109`00000000 : nt!KiSwapThread+0x655
ffff9109`d38998d0 fffff802`49e7d143 : ffffd78d`000000dd fffff802`00000000 ffff8000`759b5101 ffffd78d`ca960680 : nt!KiCommitThreadWait+0x14f
ffff9109`d3899970 fffff802`4a294df1 : ffffd78d`ca960540 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff9109`d3899a60 fffff802`4a294e9a : ffffd78d`ca960540 000000a3`1b83f8e8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffff9109`d3899ac0 fffff802`4a00d8f8 : 00000000`00000001 ffffd78d`cd745340 ffff9109`d3899b18 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x6a
ffff9109`d3899b00 00007ffb`187ad144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a3`1b83f8b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`187ad144
THREAD_SHA1_HASH_MOD_FUNC: 79c356dec4c0162fd3d7764408c376112dbbb453
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5d408e7929e4dcb2780e67cc360b91a32008efbc
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!KiSwapThread+655
fffff802`49e7e4c5 488b94d1c0cccf00 mov rdx,qword ptr [rcx+rdx*8+0CFCCC0h]
FAULT_INSTR_CODE: d1948b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSwapThread+655
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.2604
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 655
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
BUCKET_ID: AV_nt!KiSwapThread
PRIMARY_PROBLEM_CLASS: AV_nt!KiSwapThread
TARGET_TIME: 2023-03-31T06:24:04.000Z
OSBUILD: 19041
OSSERVICEPACK: 2604
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 8816
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiswapthread
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff802198cc131, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80249e7e4c5, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7A37
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends International, LLC.
BIOS_VERSION: 1.O6
BIOS_DATE: 07/13/2022
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: B350M MORTAR (MS-7A37)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffff802198cc131
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80249e7e4c5
READ_ADDRESS: fffff8024a8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff802198cc131
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSwapThread+655
fffff802`49e7e4c5 488b94d1c0cccf00 mov rdx,qword ptr [rcx+rdx*8+0CFCCC0h]
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: JX3ClientX64.exe
ANALYSIS_SESSION_HOST: DESKTOP-6JRH9P2
ANALYSIS_SESSION_TIME: 04-07-2023 08:18:23.0741
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff9109d3899690 -- (.trap 0xffff9109d3899690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000c rbx=0000000000000000 rcx=fffff80249c00000
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80249e7e4c5 rsp=ffff9109d3899820 rbp=0000000000001c00
r8=0000000000000000 r9=0000000000000000 r10=0000000000000003
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSwapThread+0x655:
fffff802`49e7e4c5 488b94d1c0cccf00 mov rdx,qword ptr [rcx+rdx*8+0CFCCC0h] ds:fffff802`4a8fcd20=ffff8000766a9180
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8024a00e129 to fffff80249ffa090
STACK_TEXT:
ffff9109`d3899548 fffff802`4a00e129 : 00000000`0000000a fffff802`198cc131 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9109`d3899550 fffff802`4a009ce3 : ffff8000`759d1180 fffff802`4a002752 000f8067`b4bbbdff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9109`d3899690 fffff802`49e7e4c5 : ffff8000`759d1180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x463
ffff9109`d3899820 fffff802`49e7d89f : ffffd78d`00000003 00001f80`0000000c ffff9109`d38999e0 ffff9109`00000000 : nt!KiSwapThread+0x655
ffff9109`d38998d0 fffff802`49e7d143 : ffffd78d`000000dd fffff802`00000000 ffff8000`759b5101 ffffd78d`ca960680 : nt!KiCommitThreadWait+0x14f
ffff9109`d3899970 fffff802`4a294df1 : ffffd78d`ca960540 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff9109`d3899a60 fffff802`4a294e9a : ffffd78d`ca960540 000000a3`1b83f8e8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffff9109`d3899ac0 fffff802`4a00d8f8 : 00000000`00000001 ffffd78d`cd745340 ffff9109`d3899b18 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x6a
ffff9109`d3899b00 00007ffb`187ad144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a3`1b83f8b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`187ad144
THREAD_SHA1_HASH_MOD_FUNC: 79c356dec4c0162fd3d7764408c376112dbbb453
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5d408e7929e4dcb2780e67cc360b91a32008efbc
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!KiSwapThread+655
fffff802`49e7e4c5 488b94d1c0cccf00 mov rdx,qword ptr [rcx+rdx*8+0CFCCC0h]
FAULT_INSTR_CODE: d1948b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSwapThread+655
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.2604
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 655
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
BUCKET_ID: AV_nt!KiSwapThread
PRIMARY_PROBLEM_CLASS: AV_nt!KiSwapThread
TARGET_TIME: 2023-03-31T06:24:04.000Z
OSBUILD: 19041
OSSERVICEPACK: 2604
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 8816
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiswapthread
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------