*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80356772144, The address that the exception occurred at
Arg3: ffff810ba38aeee8, Exception Record Address
Arg4: ffff810ba38ae730, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Write
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DEVICE
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80356772144
BUGCHECK_P3: ffff810ba38aeee8
BUGCHECK_P4: ffff810ba38ae730
EXCEPTION_RECORD: ffff810ba38aeee8 -- (.exr 0xffff810ba38aeee8)
ExceptionAddress: fffff80356772144 (amdppm!WriteIoMemRaw+0x00000000000000a8)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: ffffffffffffffff
Attempt to write to address ffffffffffffffff
CONTEXT: ffff810ba38ae730 -- (.cxr 0xffff810ba38ae730)
rax=ffffe601c9715c10 rbx=ffffe601c96743c0 rcx=0000000000000044
rdx=0000000000000020 rsi=ffffe601c9674310 rdi=0000000000000001
rip=fffff80356772144 rsp=ffff810ba38af128 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000020 r10=ffffd4810d5c0008
r11=0000000000000020 r12=00000000000001c8 r13=0000000000000013
r14=0000000000000001 r15=0000000000000013
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
amdppm!WriteIoMemRaw+0xa8:
fffff803`56772144 46890411 mov dword ptr [rcx+r10],r8d ds:002b:ffffd481`0d5c004c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WRITE_ADDRESS: fffff80059b873b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80059a3e3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80059a3e3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
LOCK_ADDRESS: fffff80059a769e0 -- (!locks fffff80059a769e0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80059a769e0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80059a769e0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
ffff810b`a38af128 fffff803`56772275 : 00000000`00000000 fffff803`56791e9d 00000000`00000000 00000000`00000000 : amdppm!WriteIoMemRaw+0xa8
ffff810b`a38af130 fffff803`56772365 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe601`c96867d0 : amdppm!WriteGenAddr+0x6d
ffff810b`a38af160 fffff803`5679da42 : 00000000`00000000 00000000`000000d4 ffffe601`c9674310 00000000`00000000 : amdppm!WriteGenAddrMaybeHidden+0x1d
ffff810b`a38af190 fffff803`56796f84 : ffffe601`c9715c10 fffff803`5677f000 00000000`0007f077 00000000`00000000 : amdppm!InitAcpiCpc+0x2ce
ffff810b`a38af200 fffff803`5679009d : 000019fe`36979b18 000019fe`36979b18 ffff810b`a38af400 ffffe601`c96867d0 : amdppm!ProcLibDeviceStart+0x870
ffff810b`a38af340 fffff800`5a41fc27 : ffffe601`c67c2e58 ffff810b`a38af400 ffffe601`c67c2e58 ffffe601`c9686550 : amdppm!EvtDevicePrepareHardware+0xad
ffff810b`a38af380 fffff800`5a3b8892 : 00000000`00000000 fffff800`5a3ab130 00000000`00000000 ffff810b`a38af4a0 : Wdf01000!FxPnpDevicePrepareHardware::InvokeClient+0x27 [minkernel\wdf\framework\shared\irphandlers\pnp\pnpcallbacks.cpp @ 347]
ffff810b`a38af3d0 fffff800`5a41ed01 : 00000000`00000000 ffffe601`c96864e0 ffff810b`a38af4a0 ffffe601`c67c28b0 : Wdf01000!FxPrePostCallback::InvokeStateful+0x5a [minkernel\wdf\framework\shared\irphandlers\pnp\cxpnppowercallbacks.cpp @ 467]
ffff810b`a38af410 fffff800`5a41d891 : ffffe601`c67c2800 ffffe601`c67c28b0 ffff810b`a38af510 00000000`00000108 : Wdf01000!FxPkgPnp:
npPrepareHardware+0xfd [minkernel\wdf\framework\shared\irphandlers\pnp\pnpstatemachine.cpp @ 3601]
ffff810b`a38af460 fffff800`5a41d44b : ffffe601`c67c2801 00000000`00000100 ffffe601`c67c28b0 00000000`00000000 : Wdf01000!FxPkgPnp:
npEventHardwareAvailable+0x51 [minkernel\wdf\framework\shared\irphandlers\pnp\pnpstatemachine.cpp @ 1399]
ffff810b`a38af4a0 fffff800`5a41f1be : ffffe601`c67c28b0 00000000`00000004 ffffe601`c67c28b0 00000000`00000004 : Wdf01000!FxPkgPnp:
npEnterNewState+0x177 [minkernel\wdf\framework\shared\irphandlers\pnp\pnpstatemachine.cpp @ 1234]
ffff810b`a38af530 fffff800`5a41ef6e : 00000000`00000000 ffffe601`c67c2a10 ffffe601`c67c29e8 00000000`0000000c : Wdf01000!FxPkgPnp:
npProcessEventInner+0x1e6 [minkernel\wdf\framework\shared\irphandlers\pnp\pnpstatemachine.cpp @ 1152]
ffff810b`a38af5b0 fffff800`5a426ece : 00000000`00000000 ffffe601`c67c28b0 00000000`0000001b 00000000`00000288 : Wdf01000!FxPkgPnp:
npProcessEvent+0x19a [minkernel\wdf\framework\shared\irphandlers\pnp\pnpstatemachine.cpp @ 933]
ffff810b`a38af640 fffff800`5a3a3c53 : ffffe601`c67c28b0 00000000`0000001b 00000000`00000288 00000000`00000000 : Wdf01000!FxPkgPnp::_PnpStartDevice+0x1e [minkernel\wdf\framework\shared\irphandlers\pnp\fxpkgpnp.cpp @ 2025]
ffff810b`a38af670 fffff800`5a3aac82 : ffffe601`c9663460 ffffe601`c96864e0 ffffe601`c8152c00 ffffe601`c8152c00 : Wdf01000!FxPkgPnp:
ispatch+0xb3 [minkernel\wdf\framework\shared\irphandlers\pnp\fxpkgpnp.cpp @ 765]
ffff810b`a38af6e0 fffff800`596adeb9 : ffff810b`a38af860 ffffe601`c8152c00 00000000`00000001 ffffe601`c80b6840 : Wdf01000!FxDevice:
ispatchWithLock+0x112 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
ffff810b`a38af740 fffff800`59d2b556 : ffffe601`c4cc7570 ffffe601`c80b6840 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x59
ffff810b`a38af780 fffff800`596f4dce : ffffe601`c4cc7570 00000000`00000000 ffffe601`c80b6840 fffff800`00000000 : nt!PnpAsynchronousCall+0xea
ffff810b`a38af7c0 fffff800`5976b8ac : 00000000`00000000 ffffe601`c4cc7570 fffff800`59759200 fffff800`59759200 : nt!PnpSendIrp+0x5e
ffff810b`a38af830 fffff800`59d2a838 : 00000000`00000000 00000000`00000000 ffffe601`c80b6840 00000000`00000000 : nt!PnpStartDevice+0x88
ffff810b`a38af8c0 fffff800`59d2a707 : ffffe601`c4c913f0 00000000`00000000 00000000`00000001 fffff800`59759686 : nt!PnpStartDeviceNode+0xec
ffff810b`a38af950 fffff800`59d16888 : ffffe601`c4c913f0 ffff810b`a38afa18 00000000`00000001 00000000`00000001 : nt!PipProcessStartPhase1+0x6f
ffff810b`a38af9a0 fffff800`59d9d0f8 : ffffe601`c8623b00 ffff810b`a38afb01 ffff810b`a38afab0 fffff800`00000000 : nt!PipProcessDevNodeTree+0x3b0
ffff810b`a38afa60 fffff800`5977097e : 00000001`00000003 ffffe601`c8623bc0 ffffd481`00000000 ffffe601`c8623bc0 : nt!PiProcessStartSystemDevices+0x60
ffff810b`a38afab0 fffff800`59697945 : ffffe601`c65bd040 ffffe601`c4c8ecb0 fffff800`59a75280 ffffe601`c4c8ecb0 : nt!PnpDeviceActionWorker+0x45e
ffff810b`a38afb70 fffff800`59732135 : ffffe601`c65bd040 00000000`00000080 ffffe601`c4ccc300 00000000`00000001 : nt!ExpWorkerThread+0x105
ffff810b`a38afc10 fffff800`597dd9a8 : fffff800`57bfb180 ffffe601`c65bd040 fffff800`597320e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff810b`a38afc60 00000000`00000000 : ffff810b`a38b0000 ffff810b`a38aa000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: amdppm!WriteIoMemRaw+a8
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
IMAGE_VERSION: 10.0.18362.693
STACK_COMMAND: .cxr 0xffff810ba38ae730 ; kb
BUCKET_ID_FUNC_OFFSET: a8
FAILURE_BUCKET_ID: AV_amdppm!WriteIoMemRaw
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {05b9e458-6c10-43a8-4dc2-664f23edafb4}
Followup: MachineOwner
---------