Microsoft (R) Windows Debugger Version 10.0.18239.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\112018-6828-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 17134 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Kernel base = 0xfffff802`81aa7000 PsLoadedModuleList = 0xfffff802`81e55150 Debug session time: Tue Nov 20 16:45:39.917 2018 (UTC + 1:00) System Uptime: 0 days 0:09:53.659 Loading Kernel Symbols ............................................................... ................................................................ .......................................................... Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {fffff80280b0e070, 2, 0, fffff80281bc5806} Probably caused by : ntkrnlmp.exe ( nt!PpmPerfSelectDomainStates+56 ) Followup: MachineOwner --------- nt!KeBugCheckEx: fffff802`81c50690 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffed83`82a375a0=000000000000000a 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff80280b0e070, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80281bc5806, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: AB350-Gaming 3 SYSTEM_SKU: Default string SYSTEM_VERSION: Default string BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F23 BIOS_DATE: 08/08/2018 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: AB350-Gaming 3-CF BASEBOARD_VERSION: x.x DUMP_TYPE: 2 BUGCHECK_P1: fffff80280b0e070 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80281bc5806 READ_ADDRESS: fffff80281ef4388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80280b0e070 CURRENT_IRQL: 2 FAULTING_IP: nt!PpmPerfSelectDomainStates+56 fffff802`81bc5806 418b09 mov ecx,dword ptr [r9] CPU_COUNT: 4 CPU_MHZ: c16 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 1 CPU_STEPPING: 1 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: PATRIK ANALYSIS_SESSION_TIME: 11-20-2018 17:27:42.0982 ANALYSIS_VERSION: 10.0.18239.1000 amd64fre TRAP_FRAME: ffffed8382a376e0 -- (.trap 0xffffed8382a376e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000080afa0f8 rbx=0000000000000000 rcx=0000000080afa0f8 rdx=fffff80280af87f0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80281bc5806 rsp=ffffed8382a37870 rbp=ffffed8382a37a10 r8=0000000080af88b0 r9=fffff80280b0e070 r10=0000000080af8601 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!PpmPerfSelectDomainStates+0x56: fffff802`81bc5806 418b09 mov ecx,dword ptr [r9] ds:fffff802`80b0e070=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80281c61269 to fffff80281c50690 STACK_TEXT: ffffed83`82a37598 fffff802`81c61269 : 00000000`0000000a fffff802`80b0e070 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffed83`82a375a0 fffff802`81c5dee5 : 00000000`00000000 ffffc983`f4872f00 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffed83`82a376e0 fffff802`81bc5806 : 00000000`00000000 00000000`00000000 fffff802`81aa7000 00000000`00000000 : nt!KiPageFault+0x425 ffffed83`82a37870 fffff802`81bc1e20 : ffffb281`aa2d9f80 ffffed83`82a37a10 fffff802`81e50820 ffffc983`f8ee5a80 : nt!PpmPerfSelectDomainStates+0x56 ffffed83`82a378a0 fffff802`81b84327 : ffffed83`82a37968 ffffc983`f34b1000 ffffc983`f489fd88 ffffb281`00000002 : nt!PpmCheckRun+0x40 ffffed83`82a37910 fffff802`81b8397b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x2e7 ffffed83`82a37a50 fffff802`81c53dca : ffffffff`00000000 ffffb281`aa2d7180 00000000`00000000 ffffb281`aa2e7100 : nt!KiRetireDpcList+0x1db ffffed83`82a37c60 00000000`00000000 : ffffed83`82a38000 ffffed83`82a32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a THREAD_SHA1_HASH_MOD_FUNC: 5313c3781e633d3197cdd3c4c690c131953fd884 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 625a48f3e006dd63a3c2f570ffeb4582d35ec151 THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8 FOLLOWUP_IP: nt!PpmPerfSelectDomainStates+56 fffff802`81bc5806 418b09 mov ecx,dword ptr [r9] FAULT_INSTR_CODE: 3b098b41 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!PpmPerfSelectDomainStates+56 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 5bdaa393 IMAGE_VERSION: 10.0.17134.407 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 56 FAILURE_BUCKET_ID: AV_nt!PpmPerfSelectDomainStates BUCKET_ID: AV_nt!PpmPerfSelectDomainStates PRIMARY_PROBLEM_CLASS: AV_nt!PpmPerfSelectDomainStates TARGET_TIME: 2018-11-20T15:45:39.000Z OSBUILD: 17134 OSSERVICEPACK: 407 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-11-01 07:56:19 BUILDDATESTAMP_STR: 180410-1804 BUILDLAB_STR: rs4_release BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804 ANALYSIS_SESSION_ELAPSED_TIME: 5a7 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!ppmperfselectdomainstates FAILURE_ID_HASH: {a33f0ad5-48ae-3e04-bd98-cff856efb4e2} Followup: MachineOwner ---------