
代码如下:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\110522-11890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`7be00000 PsLoadedModuleList = 0xfffff800`7ca2a270
Debug session time: Sat Nov 5 21:19:54.762 2022 (UTC + 8:00)
System Uptime: 0 days 0:08:23.438
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`7c1f90f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff800`828b3eb0=00000000000000e6
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: 0000000000000000, Device Object of faulting device.
Arg3: 0000000040422f65, Faulting information (usually faulting physical address).
Arg4: 0000000000000004, Fault type (hardware specific).
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3031
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 44641
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 17
Key : Analysis.Init.CPU.mSec
Value: 437
Key : Analysis.Init.Elapsed.mSec
Value: 100464
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0xe6
Key : Bugcheck.Code.Register
Value: 0xe6
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 110522-11890-01.dmp
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: 0
BUGCHECK_P3: 40422f65
BUGCHECK_P4: 4
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff800`828b3ea8 fffff800`7c2db817 : 00000000`000000e6 00000000`00000026 00000000`00000000 00000000`40422f65 : nt!KeBugCheckEx
fffff800`828b3eb0 fffff800`7c2c73eb : 00000000`00000000 00000000`00000000 fffff800`7ca49bd0 fffff800`7ca49bd0 : nt!IvtHandleInterrupt+0x1a7
fffff800`828b3f10 fffff800`7c008a45 : fffff800`7caf3b00 fffff800`828a4a90 fffff800`7caf3bb0 fffff800`7c008a45 : nt!HalpIommuInterruptRoutine+0x4b
fffff800`828b3f40 fffff800`7c1faa6c : fffff800`828a4a90 fffff800`7caf3b00 00000000`00000400 fffff800`7c1fab9a : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`828b3f90 fffff800`7c1fae77 : fffff800`7a172180 00000000`00000001 00000000`00040046 fffff800`7c0d3158 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff800`828a4a10 fffff800`7c1fcc4a : 00000000`00000000 00000000`00000000 fffff800`7cb27a00 00000000`00000400 : nt!KiInterruptDispatchNoLock+0x37
fffff800`828a4ba0 00000000`00000000 : fffff800`828a5000 fffff800`8289e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+1a7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2130
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a7
FAILURE_BUCKET_ID: 0xE6_26_nt!IvtHandleInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {11608481-d56e-58cc-4b64-17c92254d2f4}
Followup: MachineOwner
---------


