网页资讯视频图片知道文库贴吧地图采购
进入贴吧全吧搜索

 
 
 
日一二三四五六
       
       
       
       
       
       

签到排名:今日本吧第个签到,

本吧因你更精彩,明天继续来努力!

本吧签到人数:0

一键签到
成为超级会员,使用一键签到
一键签到
本月漏签0次!
0
成为超级会员,赠送8张补签卡
如何使用?
点击日历上漏签日期,即可进行补签。
连续签到:天  累计签到:天
0
超级会员单次开通12个月以上,赠送连续签到卡3张
使用连续签到卡
12月28日漏签0天
蓝屏吧 关注:28,530贴子:159,590
  • 看贴

  • 图片

  • 吧主推荐

  • 游戏

  • 11回复贴,共1页
<<返回蓝屏吧
>0< 加载中...

DRIVER_VERIFIER_DMA_VIOLATION蓝屏求助

  • 只看楼主
  • 收藏

  • 回复
  • 大胡子xxx
  • 抢个沙发
    2
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼

代码如下:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\110522-11890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`7be00000 PsLoadedModuleList = 0xfffff800`7ca2a270
Debug session time: Sat Nov 5 21:19:54.762 2022 (UTC + 8:00)
System Uptime: 0 days 0:08:23.438
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`7c1f90f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff800`828b3eb0=00000000000000e6
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: 0000000000000000, Device Object of faulting device.
Arg3: 0000000040422f65, Faulting information (usually faulting physical address).
Arg4: 0000000000000004, Fault type (hardware specific).
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3031
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 44641
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 17
Key : Analysis.Init.CPU.mSec
Value: 437
Key : Analysis.Init.Elapsed.mSec
Value: 100464
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0xe6
Key : Bugcheck.Code.Register
Value: 0xe6
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 110522-11890-01.dmp
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: 0
BUGCHECK_P3: 40422f65
BUGCHECK_P4: 4
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff800`828b3ea8 fffff800`7c2db817 : 00000000`000000e6 00000000`00000026 00000000`00000000 00000000`40422f65 : nt!KeBugCheckEx
fffff800`828b3eb0 fffff800`7c2c73eb : 00000000`00000000 00000000`00000000 fffff800`7ca49bd0 fffff800`7ca49bd0 : nt!IvtHandleInterrupt+0x1a7
fffff800`828b3f10 fffff800`7c008a45 : fffff800`7caf3b00 fffff800`828a4a90 fffff800`7caf3bb0 fffff800`7c008a45 : nt!HalpIommuInterruptRoutine+0x4b
fffff800`828b3f40 fffff800`7c1faa6c : fffff800`828a4a90 fffff800`7caf3b00 00000000`00000400 fffff800`7c1fab9a : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`828b3f90 fffff800`7c1fae77 : fffff800`7a172180 00000000`00000001 00000000`00040046 fffff800`7c0d3158 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff800`828a4a10 fffff800`7c1fcc4a : 00000000`00000000 00000000`00000000 fffff800`7cb27a00 00000000`00000400 : nt!KiInterruptDispatchNoLock+0x37
fffff800`828a4ba0 00000000`00000000 : fffff800`828a5000 fffff800`8289e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+1a7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2130
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a7
FAILURE_BUCKET_ID: 0xE6_26_nt!IvtHandleInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {11608481-d56e-58cc-4b64-17c92254d2f4}
Followup: MachineOwner
---------


  • BugChecks
  • 笑而不语
    12
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
蓝屏dmp文件发我分析故障


2025-12-28 10:41:37
广告
不感兴趣
开通SVIP免广告
  • 大胡子xxx
  • 抢个沙发
    2
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼



  • 贴吧用户_Q5QGNaE
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
解决了吗


  • 贴吧用户_QtM3G7t
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
楼主,你的问题解决了吗你?我的电脑也遇到同样的问题


  • 此夜曲中文折柳
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
楼主,你的问题解决了吗你?我的电脑也遇到了同样的问题


  • 王权富贵丶
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
同问问题解决了吗


  • 落幕昔年24
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
处理了吗?楼主


登录百度账号

扫二维码下载贴吧客户端

下载贴吧APP
看高清直播、视频!
  • 贴吧页面意见反馈
  • 违规贴吧举报反馈通道
  • 贴吧违规信息处理公示
  • 11回复贴,共1页
<<返回蓝屏吧
分享到:
©2025 Baidu贴吧协议|隐私政策|吧主制度|意见反馈|网络谣言警示