Question Random freeze after load - random freeze during load.

Feb 27, 2019
27
0
30
0
Hi all,

ryzen 7 2700x
x470 Taichi
G.SKILL 16GB (2 x 8GB) Ripjaws V Series DDR4 PC4-25600 3200MHz Desktop Memory Model F4-3200C16D-16GVKB
gtx 1070ti
h115 aio
970 evo nvme 250 GB

win 10 - high usage on the nvme drive. 14 GB left of 250GB.

sometimes it goes into automatic repair, then freezes there always.

When I restart with win + F8 it gives me auto recovery option but fails.

Sometimes can boot into windows, sometimes freezes.

First happened while watching Orville from torrent on VLC.

Thinking just a fresh reinstall is best and backup what I can to secondary storage and or usb drive?

I'm just using out of the box Precision Boost Overdrive, with mobo settings for memory.
 

Quarkzquarkz

Honorable
Sep 18, 2013
439
18
10,965
69
When did this start happening? Have you tried a virus scan just to make sure it's not the crap you're downloading off torrent? Sometimes these days hidden scripts will be deployed behind the scenes and cause tons of damage such as file corruption, bsod, and other nefarious ways to steal information. Try running a good and reputable scanner and if all else fails, backup important files and try a fresh install, Good luck!
 
Feb 27, 2019
27
0
30
0
When did this start happening? Have you tried a virus scan just to make sure it's not the crap you're downloading off torrent? Sometimes these days hidden scripts will be deployed behind the scenes and cause tons of damage such as file corruption, bsod, and other nefarious ways to steal information. Try running a good and reputable scanner and if all else fails, backup important files and try a fresh install, Good luck!
Running Malwarebytes now. Will post update after.
 
Feb 27, 2019
27
0
30
0
Didn't solve the problem, I've copied the minidump file below "I think":


Microsoft (R) Windows Debugger Version 10.0.18317.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\041519-6468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17763 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff80502e19000 PsLoadedModuleList = 0xfffff80503234790
Debug session time: Mon Apr 15 16:18:12.661 2019 (UTC - 7:00)
System Uptime: 0 days 6:01:08.316
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff80502fcc730 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdd03ffac3480=000000000000000a
12: kd> !analyze -v
***
  • *
  • Bugcheck Analysis *
  • *
***

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000001a, value 0 = read operation, 1 = write operation
Arg4: fffff8035b4a35d1, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.60

BIOS_DATE: 11/09/2018

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: X470 Taichi

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 1a

BUGCHECK_P4: fffff8035b4a35d1

READ_ADDRESS: GetUlongFromAddress: unable to read from fffff805032e0540
fffff8050335b390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000

CURRENT_IRQL: 0

FAULTING_IP:
amdppm!ReadGenAddr+49
fffff8035b4a35d1 488bc2 mov rax,rdx

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BUGCHECK_STR: DISABLED_INTERRUPT_FAULT

CPU_COUNT: 10

CPU_MHZ: e74

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-RNEEC1T

ANALYSIS_SESSION_TIME: 04-15-2019 22:27:56.0740

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

TRAP_FRAME: ffffdd03ffac35c0 -- (.trap 0xffffdd03ffac35c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035b4a35d1 rsp=ffffdd03ffac3750 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffa70da5046f48
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
amdppm!ReadGenAddr+0x49:
fffff803
5b4a35d1 488bc2 mov rax,rdx
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80502fdde69 to fffff80502fcc730

STACK_TEXT:
ffffdd03ffac3478 fffff80502fdde69 : 000000000000000a 0000000000000000 00000000000000ff 000000000000001a : nt!KeBugCheckEx
ffffdd03ffac3480 fffff80502fda28e : fffffffffeced300 0000000000000000 0000000000000000 000000000000000a : nt!KiBugCheckDispatch+0x69
ffffdd03ffac35c0 fffff8035b4a35d1 : ffff7f8909569779 ffffdd03ffac3778 000000000000670d 00000000000041b5 : nt!KiPageFault+0x44e
ffffdd03ffac3750 fffff8035b4a4615 : 0000000000000000 0000000000000000 ffffa70d9f7faf20 fffff805030ecbbb : amdppm!ReadGenAddr+0x49
ffffdd03ffac3780 fffff8035b4a44d4 : ffffe10061e8f180 ffffa70da4352010 ffffe10061e8f180 ffffa70da4352010 : amdppm!C2Idle+0x85
ffffdd03ffac37b0 fffff80502effbbb : 0000000000000000 0000000000000001 0000000000000000 0000000000000024 : amdppm!AcpiCStateIdleExecute+0x24
ffffdd03ffac37e0 fffff80502eff36f : 0000000000000000 0000000000000002 0000000000000000 0000000000000008 : nt!PpmIdleExecuteTransition+0x6bb
ffffdd03ffac3b00 fffff80502fd011c : ffffffff00000000 ffffe10061e8f180 ffffe10061e9f400 ffffa70da9404080 : nt!PoIdle+0x33f
ffffdd03ffac3c60 0000000000000000 : ffffdd03ffac4000 ffffdd03ffabe000 0000000000000000 0000000000000000 : nt!KiIdleLoop+0x2c


THREAD_SHA1_HASH_MOD_FUNC: fc20f6700dbad761158bab1cb90b6142d379d241

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 88e072fc5c2e86142230263ce8199d8a7810b8b1

THREAD_SHA1_HASH_MOD: eeabd32674d15bac10d9e1443c453f53e952d7a0

FOLLOWUP_IP:
amdppm!ReadGenAddr+49
fffff803`5b4a35d1 488bc2 mov rax,rdx

FAULT_INSTR_CODE: 48c28b48

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: amdppm!ReadGenAddr+49

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME: amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 6bcef4d6

IMAGE_VERSION: 10.0.17763.379

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 49

FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!ReadGenAddr

BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!ReadGenAddr

PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!ReadGenAddr

TARGET_TIME: 2019-04-15T23:18:12.000Z

OSBUILD: 17763

OSSERVICEPACK: 437

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2005-12-01 23:58:59

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: 3687

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_amdppm!readgenaddr

FAILURE_ID_HASH: {d069edc7-ccfd-af02-f204-ddf57e0d26c5}

Followup: MachineOwner
---------
 

ASK THE COMMUNITY

TRENDING THREADS