DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: 0000000000000000, Device Object of faulting device.
Arg3: 000000000fc00000, Faulting information (usually faulting physical address).
Arg4: 0000000000000004, Fault type (hardware specific).
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x3aff59, File: 0x3ab4c9 - C:\ProgramData\Dbg\sym\dxgkrnl.sys\0F2DDF593aa000\dxgkrnl.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2390
Key : Analysis.Elapsed.mSec
Value: 13933
Key : Analysis.IO.Other.Mb
Value: 16
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 499
Key : Analysis.Init.Elapsed.mSec
Value: 15602
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.LegacyAPI
Value: 0xe6
Key : Failure.Bucket
Value: 0xE6_26_nt!IvtHandleInterrupt
Key : Failure.Hash
Value: {11608481-d56e-58cc-4b64-17c92254d2f4}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: 0
BUGCHECK_P3: fc00000
BUGCHECK_P4: 4
FILE_IN_CAB: 091923-9625-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80181b27a00 -- (.trap 0xfffff80181b27a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0002000200000000 rbp=fffff80181b27a00
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
STACK_TEXT:
fffff801`84684ea8 fffff801`812de7d7 : 00000000`000000e6 00000000`00000026 00000000`00000000 00000000`0fc00000 : nt!KeBugCheckEx
fffff801`84684eb0 fffff801`812ca66b : 00000000`00000000 00000000`00000000 fffff801`81a49c70 fffff801`81a49c70 : nt!IvtHandleInterrupt+0x1a7
fffff801`84684f10 fffff801`8113e965 : fffff801`81af3b80 fffff801`84675450 fffff801`81af3c30 fffff801`84675450 : nt!HalpIommuInterruptRoutine+0x4b
fffff801`84684f40 fffff801`811fdb0c : fffff801`84675450 fffff801`81af3b80 00000000`000002bc 00000078`f7c1c413 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`84684f90 fffff801`811fe047 : fffff801`846754f0 00000000`00000001 00000000`00040046 fffff801`81081ba8 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff801`846753d0 fffff801`8120055a : 00000000`00000000 00000000`00000000 fffff801`81b27a00 00000000`000002bc : nt!KiInterruptDispatchNoLock+0x37
fffff801`84675560 00000000`00000000 : fffff801`84676000 fffff801`8466f000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+1a7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a7
FAILURE_BUCKET_ID: 0xE6_26_nt!IvtHandleInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {11608481-d56e-58cc-4b64-17c92254d2f4}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: 0000000000000000, Device Object of faulting device.
Arg3: 000000000fc00000, Faulting information (usually faulting physical address).
Arg4: 0000000000000004, Fault type (hardware specific).
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x3aff59, File: 0x3ab4c9 - C:\ProgramData\Dbg\sym\dxgkrnl.sys\0F2DDF593aa000\dxgkrnl.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2296
Key : Analysis.Elapsed.mSec
Value: 2282
Key : Analysis.IO.Other.Mb
Value: 16
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 2890
Key : Analysis.Init.Elapsed.mSec
Value: 29537
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.LegacyAPI
Value: 0xe6
Key : Failure.Bucket
Value: 0xE6_26_nt!IvtHandleInterrupt
Key : Failure.Hash
Value: {11608481-d56e-58cc-4b64-17c92254d2f4}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: 0
BUGCHECK_P3: fc00000
BUGCHECK_P4: 4
FILE_IN_CAB: 091923-9625-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80181b27a00 -- (.trap 0xfffff80181b27a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0002000200000000 rbp=fffff80181b27a00
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
STACK_TEXT:
fffff801`84684ea8 fffff801`812de7d7 : 00000000`000000e6 00000000`00000026 00000000`00000000 00000000`0fc00000 : nt!KeBugCheckEx
fffff801`84684eb0 fffff801`812ca66b : 00000000`00000000 00000000`00000000 fffff801`81a49c70 fffff801`81a49c70 : nt!IvtHandleInterrupt+0x1a7
fffff801`84684f10 fffff801`8113e965 : fffff801`81af3b80 fffff801`84675450 fffff801`81af3c30 fffff801`84675450 : nt!HalpIommuInterruptRoutine+0x4b
fffff801`84684f40 fffff801`811fdb0c : fffff801`84675450 fffff801`81af3b80 00000000`000002bc 00000078`f7c1c413 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`84684f90 fffff801`811fe047 : fffff801`846754f0 00000000`00000001 00000000`00040046 fffff801`81081ba8 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff801`846753d0 fffff801`8120055a : 00000000`00000000 00000000`00000000 fffff801`81b27a00 00000000`000002bc : nt!KiInterruptDispatchNoLock+0x37
fffff801`84675560 00000000`00000000 : fffff801`84676000 fffff801`8466f000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+1a7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a7
FAILURE_BUCKET_ID: 0xE6_26_nt!IvtHandleInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {11608481-d56e-58cc-4b64-17c92254d2f4}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: 0000000000000000, Device Object of faulting device.
Arg3: 000000000fc00000, Faulting information (usually faulting physical address).
Arg4: 0000000000000004, Fault type (hardware specific).
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x3aff59, File: 0x3ab4c9 - C:\ProgramData\Dbg\sym\dxgkrnl.sys\0F2DDF593aa000\dxgkrnl.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2280
Key : Analysis.Elapsed.mSec
Value: 2283
Key : Analysis.IO.Other.Mb
Value: 16
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 5186
Key : Analysis.Init.Elapsed.mSec
Value: 31822
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Bugcheck.Code.LegacyAPI
Value: 0xe6
Key : Failure.Bucket
Value: 0xE6_26_nt!IvtHandleInterrupt
Key : Failure.Hash
Value: {11608481-d56e-58cc-4b64-17c92254d2f4}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: 0
BUGCHECK_P3: fc00000
BUGCHECK_P4: 4
FILE_IN_CAB: 091923-9625-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80181b27a00 -- (.trap 0xfffff80181b27a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0002000200000000 rbp=fffff80181b27a00
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
STACK_TEXT:
fffff801`84684ea8 fffff801`812de7d7 : 00000000`000000e6 00000000`00000026 00000000`00000000 00000000`0fc00000 : nt!KeBugCheckEx
fffff801`84684eb0 fffff801`812ca66b : 00000000`00000000 00000000`00000000 fffff801`81a49c70 fffff801`81a49c70 : nt!IvtHandleInterrupt+0x1a7
fffff801`84684f10 fffff801`8113e965 : fffff801`81af3b80 fffff801`84675450 fffff801`81af3c30 fffff801`84675450 : nt!HalpIommuInterruptRoutine+0x4b
fffff801`84684f40 fffff801`811fdb0c : fffff801`84675450 fffff801`81af3b80 00000000`000002bc 00000078`f7c1c413 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`84684f90 fffff801`811fe047 : fffff801`846754f0 00000000`00000001 00000000`00040046 fffff801`81081ba8 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff801`846753d0 fffff801`8120055a : 00000000`00000000 00000000`00000000 fffff801`81b27a00 00000000`000002bc : nt!KiInterruptDispatchNoLock+0x37
fffff801`84675560 00000000`00000000 : fffff801`84676000 fffff801`8466f000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+1a7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a7
FAILURE_BUCKET_ID: 0xE6_26_nt!IvtHandleInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {11608481-d56e-58cc-4b64-17c92254d2f4}
Followup: MachineOwner
---------