Having a couple of BSODs randomly while playing different games, this one was the first of it's kind with amdppm.sys. I'm adding the WinDbg analysis below, any help on this is appreciated.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffdf040e17eea5, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000007a, value 0 = read operation, 1 = write operation
Arg4: fffff80579d8b2fc, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-CTPCB6O
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 23194
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffdf040e17eea5
BUGCHECK_P2: ff
BUGCHECK_P3: 7a
BUGCHECK_P4: fffff80579d8b2fc
READ_ADDRESS: ffffdf040e17eea5 Nonpaged pool
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffffdc83f0c53710 -- (.trap 0xffffdc83f0c53710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000080000000 rbx=0000000000000000 rcx=0000000000000028
rdx=000000000000003c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80579d8b2fc rsp=ffffdc83f0c538a8 rbp=ffffdc83f0c53a10
r8=0000000080000000 r9=0000000000000000 r10=ffffdf038e17ee90
r11=00000000000645ec r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
amdppm!SelectPreferredIdleState+0x120:
fffff805
Resetting default scope
STACK_TEXT:
ffffdc83
ffffdc83
ffffdc83
ffffdc83
ffffdc83
ffffdc83
ffffdc83
ffffdc83
ffffdc83
SYMBOL_NAME: amdppm!SelectPreferredIdleState+120
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 120
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!SelectPreferredIdleState
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ee22d0b7-5b72-c774-5dde-952264627719}
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffdf040e17eea5, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000007a, value 0 = read operation, 1 = write operation
Arg4: fffff80579d8b2fc, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-CTPCB6O
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 23194
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffdf040e17eea5
BUGCHECK_P2: ff
BUGCHECK_P3: 7a
BUGCHECK_P4: fffff80579d8b2fc
READ_ADDRESS: ffffdf040e17eea5 Nonpaged pool
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffffdc83f0c53710 -- (.trap 0xffffdc83f0c53710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000080000000 rbx=0000000000000000 rcx=0000000000000028
rdx=000000000000003c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80579d8b2fc rsp=ffffdc83f0c538a8 rbp=ffffdc83f0c53a10
r8=0000000080000000 r9=0000000000000000 r10=ffffdf038e17ee90
r11=00000000000645ec r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
amdppm!SelectPreferredIdleState+0x120:
fffff805
79d8b2fc 460fb65c1015 movzx r11d,byte ptr [rax+r10+15h] ds:ffffdf04
0e17eea5=??Resetting default scope
STACK_TEXT:
ffffdc83
f0c535c8 fffff805
6a805e69 : 000000000000000a ffffdf04
0e17eea5 00000000000000ff 00000000
0000007a : nt!KeBugCheckExffffdc83
f0c535d0 fffff805
6a802169 : fffff80579d81bb0 fffff805
6a707c63 000000000000002d 0001cd1c
ad3072d3 : nt!KiBugCheckDispatch+0x69ffffdc83
f0c53710 fffff805
79d8b2fc : fffff80579d8c025 ffffdf03
8e7a5200 ffffdf038e17ee90 ffffdf03
8e17ee90 : nt!KiPageFault+0x469ffffdc83
f0c538a8 fffff805
79d8c025 : ffffdf038e7a5200 ffffdf03
8e17ee90 ffffdf038e17ee90 ffffdc83
f0c53910 : amdppm!SelectPreferredIdleState+0x120ffffdc83
f0c538b0 fffff805
79d8bf86 : ffffdf038e7a51f8 00000000
00000000 0000000000000002 ffffdc83
f0c53a10 : amdppm!AcpiCStatePreselect+0x15ffffdc83
f0c538e0 fffff805
6a7093a1 : ffffffffffffffff ffffdc83
f0c53a10 00000000000004bb ffffffff
ffffffff : amdppm!AcpiCStateIdlePrepare+0x26ffffdc83
f0c53910 fffff805
6a706e67 : 0000000000000000 00001f80
00000000 0000000000000000 00000000
00000002 : nt!PpmIdlePrepare+0x3d1ffffdc83
f0c53af0 fffff805
6a7f79c4 : ffffffff00000000 ffffb781
8e0e9440 ffffdf039535d100 00000000
0000075f : nt!PoIdle+0x1f7ffffdc83
f0c53c60 00000000
00000000 : ffffdc83f0c54000 ffffdc83
f0c4e000 0000000000000000 00000000
00000000 : nt!KiIdleLoop+0x54SYMBOL_NAME: amdppm!SelectPreferredIdleState+120
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 120
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!SelectPreferredIdleState
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ee22d0b7-5b72-c774-5dde-952264627719}