DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: 0000000000000000, Device Object of faulting device.
Arg3: 000000000007a58b, Faulting information (usually faulting physical address).
Arg4: 0000000000000005, Fault type (hardware specific).
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5155
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20674
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 1471
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: 0
BUGCHECK_P3: 7a58b
BUGCHECK_P4: 5
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff805`40c7bea8 fffff805`3e0db527 : 00000000`000000e6 00000000`00000026 00000000`00000000 00000000`0007a58b : nt!KeBugCheckEx
fffff805`40c7beb0 fffff805`3e0c744b : 00000000`00000000 00000000`00000000 fffff805`3e849b90 fffff805`3e849b90 : nt!IvtHandleInterrupt+0x1a7
fffff805`40c7bf10 fffff805`3de7e795 : fffff805`3e8f3ac0 fffff805`40c6db50 fffff805`3e8f3b70 fffff805`3de7e795 : nt!HalpIommuInterruptRoutine+0x4b
fffff805`40c7bf40 fffff805`3dff859c : fffff805`40c6db50 fffff805`3e8f3ac0 00000000`000003c9 fffff805`3dff86ca : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`40c7bf90 fffff805`3dff89a7 : fffff805`40c6dbf0 00000000`00000001 00000000`00040046 fffff805`3de172a8 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff805`40c6dad0 fffff805`3dffa74a : 00000000`00000000 fffff805`3e927a00 ffffd48c`41e48080 00000000`000003c9 : nt!KiInterruptDispatchNoLock+0x37
fffff805`40c6dc60 00000000`00000000 : fffff805`40c6e000 fffff805`40c68000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+1a7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a7
FAILURE_BUCKET_ID: 0xE6_nt!IvtHandleInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2cafa897-b47c-7b20-cee6-b1b68f30ec38}
Followup: MachineOwner
---------