*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffa10120ea22b0
Arg3: 0000000000000000
Arg4: fffff8018c94206f
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffa10120ea22b0
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8018c94206f
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffa10120ea22b0 -- (.trap 0xffffa10120ea22b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8018c94206f rsp=0000000000000000 rbp=0000000000000000
r8=0000000000000000 r9=0000000000060000 r10=fffffffdf7010000
r11=fffffffdf7010000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
amdppm!ReadIoMemRaw+0xe7:
fffff801`8c94206f c3 ret
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: d48
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-21-2019 23:18:46.0348
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8017e7d32e9 to fffff8017e7c14e0
STACK_TEXT:
ffffa101`20ea2168 fffff801`7e7d32e9 : 00000000`0000007f 00000000`00000008 ffffa101`20ea22b0 00000000`00000000 : nt!KeBugCheckEx
ffffa101`20ea2170 fffff801`7e7ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa101`20ea22b0 fffff801`8c94206f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
00000000`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm!ReadIoMemRaw+0xe7
THREAD_SHA1_HASH_MOD_FUNC: 4f964913ed1a7ff793b7593ceb340082e3d85670
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5bf84d3240326fa3e50dc408b0303442e645de94
THREAD_SHA1_HASH_MOD: 00109c46c4e2abdb3f5efc9693900c59c2fdc69b
FOLLOWUP_IP:
amdppm!ReadIoMemRaw+e7
fffff801`8c94206f c3 ret
FAULT_INSTR_CODE: 8fa80c3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: amdppm!ReadIoMemRaw+e7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e7
FAILURE_BUCKET_ID: 0x7f_8_amdppm!ReadIoMemRaw
BUCKET_ID: 0x7f_8_amdppm!ReadIoMemRaw
PRIMARY_PROBLEM_CLASS: 0x7f_8_amdppm!ReadIoMemRaw
TARGET_TIME: 2019-11-20T18:41:05.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 60bb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_amdppm!readiomemraw
FAILURE_ID_HASH: {224c29e4-aa37-00cf-dfef-b2ba3b97b525}
Followup: MachineOwner
---------
2: kd> lmvm amdppm
Browse full module list
start end module name
fffff801`8c940000 fffff801`8c97a000 amdppm (pdb symbols) C:\ProgramData\dbg\sym\amdppm.pdb\1472A3120AD761705699557F551C7AE01\amdppm.pdb
Loaded symbol image file: amdppm.sys
Mapped memory image file: C:\ProgramData\dbg\sym\amdppm.sys\A51358DF3a000\amdppm.sys
Image path: \SystemRoot\System32\drivers\amdppm.sys
Image name: amdppm.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: A51358DF (This is a reproducible build file hash, not a timestamp)
CheckSum: 00039820
ImageSize: 0003A000
File version: 10.0.18362.387
Product version: 10.0.18362.387
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: amdppm.sys
OriginalFilename: amdppm.sys
ProductVersion: 10.0.18362.387
FileVersion: 10.0.18362.387 (WinBuild.160101.0800)
FileDescription: Processor Device Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.