Asilkaan
Hectopat
- Katılım
- 15 Mart 2021
- Mesajlar
- 453
- Çözümler
- 4
Daha fazla
- Cinsiyet
- Erkek
Herkese iyi sosyaller. Umarım sorunu çözebilirim denemediğim yol kalmadı.
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\asilk\OneDrive\Masaüstü\062824-18203-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff805`12812000 PsLoadedModuleList = 0xfffff805`13425150
Debug session time: Fri Jun 28 19:33:07.972 2024 (UTC + 3:00)
System Uptime: 0 days 0:01:17.608
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`12c2c240 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805`125c9e80=00000000000000e6
0: kd> !analyze -v
*******************************************************************************
*
Bugcheck Analysis *
*
*******************************************************************************
DRIVER_VERIFIER_DMA_VIOLATION (e6)
An illegal DMA operation was attempted by a driver being verified.
Arguments:
Arg1: 0000000000000026, IOMMU detected DMA violation.
Arg2: ffffe683a6342060, Device Object of faulting device.
Arg3: 00000000000fef04, Faulting information (usually faulting physical address).
Arg4: 0000000000000006, Fault type (hardware specific).
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1328
Key : Analysis.Elapsed.mSec
Value: 9746
Key : Analysis.IO.Other.Mb
Value: 6
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 15
Key : Analysis.Init.CPU.mSec
Value: 124
Key : Analysis.Init.Elapsed.mSec
Value: 27775
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.LegacyAPI
Value: 0xe6
Key : Bugcheck.Code.TargetModel
Value: 0xe6
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0xE6_26_nt!IvtHandleInterrupt
Key : Failure.Hash
Value: {11608481-d56e-58cc-4b64-17c92254d2f4}
BUGCHECK_CODE: e6
BUGCHECK_P1: 26
BUGCHECK_P2: ffffe683a6342060
BUGCHECK_P3: fef04
BUGCHECK_P4: 6
FILE_IN_CAB: 062824-18203-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe683c1e33080 -- (.trap 0xffffe683c1e33080)
Unable to read trap frame at ffffe683`c1e33080
STACK_TEXT:
fffff805`125c9e78 fffff805`12d3ce3d : 00000000`000000e6 00000000`00000026 ffffe683`a6342060 00000000`000fef04 : nt!KeBugCheckEx
fffff805`125c9e80 fffff805`12d2538b : fffff805`10e36100 fffff805`00000001 fffff805`00000000 00000000`00000000 : nt!IvtHandleInterrupt+0x26d
fffff805`125c9f20 fffff805`12b3377c : fffff805`1351f5d0 00000000`00000001 fffff805`1351f680 fffff805`1351f5d0 : nt!HalpIommuInterruptRoutine+0x4b
fffff805`125c9f50 fffff805`12c2e31c : fffff805`125baa70 fffff805`1351f5d0 ffffe683`c1e33080 fffff805`12c35a30 : nt!KiCallInterruptServiceRoutine+0x9c
fffff805`125c9f90 fffff805`12c2e8d7 : fffff805`10e36180 ffffe683`00000000 00000000`2e41f046 00000000`00000000 : nt!KiInterruptSubDispatchNoLock+0x11c
fffff805`125ba9f0 fffff805`12c3120a : 00000000`00000000 fffff805`1355e700 ffffe683`c1e33080 ffffe683`c86d5080 : nt!KiInterruptDispatchNoLock+0x37
fffff805`125bab80 00000000`00000000 : fffff805`125bb000 fffff805`125b4000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!IvtHandleInterrupt+26d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3733
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 26d
FAILURE_BUCKET_ID: 0xE6_26_nt!IvtHandleInterrupt
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {11608481-d56e-58cc-4b64-17c92254d2f4}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: