• Happy holidays, folks! Thanks to each and every one of you for being part of the Tom's Hardware community!

Question BSOD - amdppm.sys, requesting help and attaching dump

Sep 13, 2020
9
0
10
Having a couple of BSODs randomly while playing different games, this one was the first of it's kind with amdppm.sys. I'm adding the WinDbg analysis below, any help on this is appreciated.


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffdf040e17eea5, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000007a, value 0 = read operation, 1 = write operation
Arg4: fffff80579d8b2fc, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4030

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-CTPCB6O

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 23194

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffdf040e17eea5

BUGCHECK_P2: ff

BUGCHECK_P3: 7a

BUGCHECK_P4: fffff80579d8b2fc

READ_ADDRESS: ffffdf040e17eea5 Nonpaged pool

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

TRAP_FRAME: ffffdc83f0c53710 -- (.trap 0xffffdc83f0c53710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000080000000 rbx=0000000000000000 rcx=0000000000000028
rdx=000000000000003c rsi=0000000000000000 rdi=0000000000000000
rip=fffff80579d8b2fc rsp=ffffdc83f0c538a8 rbp=ffffdc83f0c53a10
r8=0000000080000000 r9=0000000000000000 r10=ffffdf038e17ee90
r11=00000000000645ec r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
amdppm!SelectPreferredIdleState+0x120:
fffff80579d8b2fc 460fb65c1015 movzx r11d,byte ptr [rax+r10+15h] ds:ffffdf040e17eea5=??
Resetting default scope

STACK_TEXT:
ffffdc83f0c535c8 fffff8056a805e69 : 000000000000000a ffffdf040e17eea5 00000000000000ff 000000000000007a : nt!KeBugCheckEx
ffffdc83f0c535d0 fffff8056a802169 : fffff80579d81bb0 fffff8056a707c63 000000000000002d 0001cd1cad3072d3 : nt!KiBugCheckDispatch+0x69
ffffdc83f0c53710 fffff80579d8b2fc : fffff80579d8c025 ffffdf038e7a5200 ffffdf038e17ee90 ffffdf038e17ee90 : nt!KiPageFault+0x469
ffffdc83f0c538a8 fffff80579d8c025 : ffffdf038e7a5200 ffffdf038e17ee90 ffffdf038e17ee90 ffffdc83f0c53910 : amdppm!SelectPreferredIdleState+0x120
ffffdc83f0c538b0 fffff80579d8bf86 : ffffdf038e7a51f8 0000000000000000 0000000000000002 ffffdc83f0c53a10 : amdppm!AcpiCStatePreselect+0x15
ffffdc83f0c538e0 fffff8056a7093a1 : ffffffffffffffff ffffdc83f0c53a10 00000000000004bb ffffffffffffffff : amdppm!AcpiCStateIdlePrepare+0x26
ffffdc83f0c53910 fffff8056a706e67 : 0000000000000000 00001f8000000000 0000000000000000 0000000000000002 : nt!PpmIdlePrepare+0x3d1
ffffdc83f0c53af0 fffff8056a7f79c4 : ffffffff00000000 ffffb7818e0e9440 ffffdf039535d100 000000000000075f : nt!PoIdle+0x1f7
ffffdc83f0c53c60 0000000000000000 : ffffdc83f0c54000 ffffdc83f0c4e000 0000000000000000 0000000000000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME: amdppm!SelectPreferredIdleState+120

MODULE_NAME: amdppm

IMAGE_NAME: amdppm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 120

FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!SelectPreferredIdleState

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ee22d0b7-5b72-c774-5dde-952264627719}