Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\frzb\Downloads\100420-5687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`40600000 PsLoadedModuleList = 0xfffff802`4122a310
Debug session time: Sun Oct 4 18:21:18.795 2020 (UTC + 3:00)
System Uptime: 0 days 3:49:29.431
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`409f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff802`4586b430=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000795b20fbd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8025d7c30da, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-PF8M28O
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 29976
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 795b20fbd0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8025d7c30da
READ_ADDRESS: fffff802412fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8024120f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8024120f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000795b20fbd0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8024586b570 -- (.trap 0xfffff8024586b570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000b5 rbx=0000000000000000 rcx=000000795b20fbd0
rdx=00000000000000b5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025d7c30da rsp=fffff8024586b700 rbp=000000000000003d
r8=0000000000000001 r9=000000000005c600 r10=0000fffff8025d7c
r11=ffff9ef972e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
amdppm!WriteGenAddrEx+0x6:
fffff802`5d7c30da 80390a cmp byte ptr [rcx],0Ah ds:00000079`5b20fbd0=??
Resetting default scope
STACK_TEXT:
fffff802`4586b428 fffff802`40a05e69 : 00000000`0000000a 00000079`5b20fbd0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`4586b430 fffff802`40a02169 : 00000000`00000007 00000000`00000000 00000000`00000008 fffff802`5d7c2d23 : nt!KiBugCheckDispatch+0x69
fffff802`4586b570 fffff802`5d7c30da : 00000000`000026df 00000000`00000000 fffff802`5d7c1bb0 00000000`00000000 : nt!KiPageFault+0x469
fffff802`4586b700 fffff802`5d7c415e : 00000000`00000000 ffffbf01`dcb94010 00000000`00000000 fffff802`3d93a2e8 : amdppm!WriteGenAddrEx+0x6
fffff802`4586b730 fffff802`40994709 : fffff802`3d932180 00000000`00000000 ffffbf01`df978000 00000000`00000001 : amdppm!PerfControlCpc+0x5e
fffff802`4586b760 fffff802`4099457d : 00000000`00000000 ffffbf01`df978300 ffffbf01`df978010 00000000`00000000 : nt!PpmPerfArbitratorApplyProcessorState+0xe5
fffff802`4586b7c0 fffff802`40904287 : ffffbf01`df978310 00000000`00000000 00000000`00000004 fffff802`4586b960 : nt!PpmPerfApplyProcessorState+0xc1
fffff802`4586b830 fffff802`408e9a3e : fffff802`3d935240 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmPerfAction+0x87
fffff802`4586b860 fffff802`408e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff802`4586b9d0 fffff802`409f7a0e : 00000000`00000000 fffff802`3d932180 fffff802`41326600 ffffbf01`e378a0c0 : nt!KiRetireDpcList+0x1f4
fffff802`4586bc60 00000000`00000000 : fffff802`4586c000 fffff802`45866000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: amdppm!WriteGenAddrEx+6
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
IMAGE_VERSION: 10.0.19041.208
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: AV_amdppm!WriteGenAddrEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {07832aa6-2c4c-94fd-1040-ee733b7393cb}
Followup: MachineOwner
---------
0: kd> lmvm amdppm
Browse full module list
start end module name
fffff802`5d7c0000 fffff802`5d7fb000 amdppm # (pdb symbols) C:\ProgramData\Dbg\sym\amdppm.pdb\DCC255E80BFE34F58F44FA772ED8EAD81\amdppm.pdb
Loaded symbol image file: amdppm.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\amdppm.sys\B45EF06B3b000\amdppm.sys
Image path: \SystemRoot\System32\drivers\amdppm.sys
Image name: amdppm.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: B45EF06B (This is a reproducible build file hash, not a timestamp)
CheckSum: 0003798E
ImageSize: 0003B000
File version: 10.0.19041.208
Product version: 10.0.19041.208
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: amdppm.sys
OriginalFilename: amdppm.sys
ProductVersion: 10.0.19041.208
FileVersion: 10.0.19041.208 (WinBuild.160101.0800)
FileDescription: Processor Device Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.