Свежий дамп
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: 0000000000000000, Device Object of faulting device.
Arg3: 0000000000097668, Faulting information (usually faulting physical address).
Arg4: 0000000000000006, Fault type (hardware specific).
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 28653
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 10992
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: 0
BUGCHECK_P3: 97668
BUGCHECK_P4: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff807`1047dea8 fffff807`0d2db0b7 : 00000000`000000e6 00000000`00000026 00000000`00000000 00000000`00097668 : nt!KeBugCheckEx
fffff807`1047deb0 fffff807`0d2c6f7b : 00000000`00000000 00000000`00000000 fffff807`0da49af0 fffff807`0da49af0 : nt!IvtHandleInterrupt+0x1a7
fffff807`1047df10 fffff807`0d0de045 : fffff807`0daf39c0 fffff807`1046ea50 fffff807`0daf3a70 fffff807`0d0de045 : nt!HalpIommuInterruptRoutine+0x4b
fffff807`1047df40 fffff807`0d1f8b4c : fffff807`1046ea50 fffff807`0daf39c0 00000000`00000639 fffff807`0d1fdec0 : nt!KiCallInterruptServiceRoutine+0xa5
fffff807`1047df90 fffff807`0d1f8f57 : fffff807`07d2a180 00000000`00000001 00000000`00040046 fffff807`0d0172a8 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff807`1046e9d0 fffff807`0d1facfa : 00000000`00000000 00000000`00000000 fffff807`0db26a00 00000000`00000639 : nt!KiInterruptDispatchNoLock+0x37
fffff807`1046eb60 00000000`00000000 : fffff807`1046f000 fffff807`10468000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+1a7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a7
FAILURE_BUCKET_ID: 0xE6_nt!IvtHandleInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2cafa897-b47c-7b20-cee6-b1b68f30ec38}
Followup: MachineOwner
---------