Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\051422-11359-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff805`47800000 PsLoadedModuleList = 0xfffff805`48429b90
Debug session time: Sat May 14 20:54:18.111 2022 (UTC + 8:00)
System Uptime: 1 days 1:38:25.791
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
...............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`47c16b40 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff805`45395ed0=00000000000000e6
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: ffff9a8625835060, Device Object of faulting device.
Arg3: 00000000000fef04, Faulting information (usually faulting physical address).
Arg4: 0000000000000006, Fault type (hardware specific).
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1640
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13398
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 60477
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
FILE_IN_CAB: 051422-11359-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: ffff9a8625835060
BUGCHECK_P3: fef04
BUGCHECK_P4: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: YuanShen.exe
STACK_TEXT:
fffff805`45395ec8 fffff805`47d2ad81 : 00000000`000000e6 00000000`00000026 ffff9a86`25835060 00000000`000fef04 : nt!KeBugCheckEx
fffff805`45395ed0 fffff805`47d13cab : fffff805`4844bc70 fffff805`4844bc70 ffffe001`ad487e00 00000000`0000007f : nt!IvtHandleInterrupt+0x1d1
fffff805`45395f20 fffff805`47adc270 : fffff805`484f7fd0 fffff805`484f8080 ffffe001`ad487e70 00000000`00000000 : nt!HalpIommuInterruptRoutine+0x4b
fffff805`45395f50 fffff805`47c1861c : ffffc880`e32b7aa0 fffff805`484f7fd0 000001cc`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa0
fffff805`45395f90 fffff805`47c18a57 : 0349c160`b7289d58 000001cb`130a0000 ffffc880`e32b7a38 00000000`00000000 : nt!KiInterruptSubDispatchNoLock+0x11c
ffffc880`e32b7a20 00007ff9`4baf6562 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLock+0x37
0000001f`c80f9aa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4baf6562
SYMBOL_NAME: nt!IvtHandleInterrupt+1d1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.675
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d1
FAILURE_BUCKET_ID: 0xE6_nt!IvtHandleInterrupt
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2cafa897-b47c-7b20-cee6-b1b68f30ec38}
Followup: MachineOwner
---------
|
|
|
|
评论
直达楼层