Neler Yeni

Mavi Ekran Mavi ekran minidump ekte

Emre Zengin

Moderatör
Katılım
22 Nisan 2021
Mesajlar
18,562
En İyi Cevap
18
Dahası  
Reaksiyon skoru
7,251
Konum
Çorlu/Tekirdağ
İsim
Emre Zengin

phopshen

80+ Bronze
Katılım
19 Temmuz 2022
Mesajlar
929
  • Konu Sahibi Konu Sahibi
  • #3
Aynı sorun. Bunla ilgili daha konu açmana gerek yok hocam. Donanımsal duruyor.
İçeriğini kendim okumayı bilmediğim için ne olduğunu bilmiyorum. İnt değil de başka bir şeydir diye düşünüyorum her seferinde. Yoksa konu açmam. Daha konu açmam o zaman mavi yiyince bu konuya paylaşayım bence
 

Emre Zengin

Moderatör
Katılım
22 Nisan 2021
Mesajlar
18,562
En İyi Cevap
18
Dahası  
Reaksiyon skoru
7,251
Konum
Çorlu/Tekirdağ
İsim
Emre Zengin
İçeriğini kendim okumayı bilmediğim için ne olduğunu bilmiyorum. İnt değil de başka bir şeydir diye düşünüyorum her seferinde. Yoksa konu açmam. Daha konu açmam o zaman mavi yiyince bu konuya paylaşayım bence
Olur hocam ama bir değişiklik olmaz. Sorun belli.
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : false
   AllowNugetExeUpdate : false
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : false
   AllowParallelInitializationOfLocalRepositories : true

   EnableRedirectToV8JsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Emre-PC\AppData\Local\Temp\1ef3a6f3-aaeb-43c3-a8c7-02b289bd92ed_042824-22312-01 (1).rar.2ed\042824-22312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff805`50400000 PsLoadedModuleList = 0xfffff805`5102a790
Debug session time: Sun Apr 28 16:16:46.880 2024 (UTC + 3:00)
System Uptime: 0 days 3:23:53.674
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000004f`3239a018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`507fda40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffad8a`722ec640=000000000000000a
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000100000010325, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8057e356afa, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 531

    Key  : Analysis.Elapsed.mSec
    Value: 3617

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 140

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1258

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Bugcheck.Code.TargetModel
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_L1C63x64!DmaCountSGList

    Key  : Failure.Hash
    Value: {0a777ef1-e8d7-83e3-601b-7bf102a85667}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 100000010325

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8057e356afa

FILE_IN_CAB:  042824-22312-01.dmp

READ_ADDRESS: fffff805510fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000100000010325

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TRACERT.EXE

TRAP_FRAME:  ffffad8a722ec780 -- (.trap 0xffffad8a722ec780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000005507 rbx=0000000000000000 rcx=0000000000000001
rdx=00001000000102fd rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057e356afa rsp=ffffad8a722ec918 rbp=ffffd706e4e71200
 r8=0000000000005507  r9=0000000000005506 r10=0000000000000fff
r11=ffffb4fa6dc00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
L1C63x64!DmaCountSGList+0x12:
fffff805`7e356afa 448b4a28        mov     r9d,dword ptr [rdx+28h] ds:00001000`00010325=????????
Resetting default scope

STACK_TEXT: 
ffffad8a`722ec638 fffff805`50812269     : 00000000`0000000a 00001000`00010325 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffad8a`722ec640 fffff805`5080dc34     : ffffd706`e7d488c0 fffff805`508b9c05 fffff805`508cdc60 ffffd706`e7330050 : nt!KiBugCheckDispatch+0x69
ffffad8a`722ec780 fffff805`7e356afa     : fffff805`7e357038 ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 : nt!KiPageFault+0x474
ffffad8a`722ec918 fffff805`7e357038     : ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 ffffd706`e4e71200 : L1C63x64!DmaCountSGList+0x12
ffffad8a`722ec920 fffff805`7e357512     : ffffd706`e7a5a000 ffffd706`eb661c00 ffffad8a`00000000 ffffd706`e7a5aa20 : L1C63x64!DmaSendNetBufferList+0x124
ffffad8a`722eca00 fffff805`53ea50ae     : 00000000`00000000 ffffd706`e73301a0 fffff805`53ea4f90 00000000`00000001 : L1C63x64!MiniportSendNetBufferLists+0x11e
ffffad8a`722eca40 fffff805`53ea4f9e     : fffff805`54461000 ffffd706`eb661c00 ffffd706`00000000 fffff805`53ea4f90 : ndis!ndisMSendNBLToMiniportInternal+0xfe
ffffad8a`722ecb10 fffff805`53ea58e8     : 00000000`00000001 ffffd706`eb661c00 ffffd706`e7db09a0 fffff805`5413b844 : ndis!ndisMSendNBLToMiniport+0xe
ffffad8a`722ecb50 fffff805`53ede291     : 00000000`00000000 ffffad8a`722ecc19 ffffd706`e73301a0 00000000`00000000 : ndis!ndisCallSendHandler+0x58
ffffad8a`722ecba0 fffff805`53ea25dd     : 00000000`00000000 ffffd706`e73301a0 ffffd706`e7dfd410 00000000`00000000 : ndis!ndisInvokeNextSendHandler+0x191
ffffad8a`722ecc70 fffff805`5417a29d     : ffffd706`e7118010 ffffd706`eb661c00 00000000`00000000 00000000`00000000 : ndis!NdisSendNetBufferLists+0x17d
ffffad8a`722ecd70 fffff805`54179fc7     : ffffd706`e707dd90 00000000`00000000 00000000`00000800 ffffd706`e7bd1400 : tcpip!FlpSendPacketsHelper+0x2bd
ffffad8a`722ece20 fffff805`541366a5     : 00000000`00000000 fffff805`542e9a70 ffffd706`e49b98a8 fffff805`541354dd : tcpip!FlSendPackets+0x57
ffffad8a`722ece50 fffff805`54135b5b     : ff01887f`00000004 00000000`00000000 fffff805`542e9a70 ffffd706`e49b995c : tcpip!IppFragmentPackets+0x2a5
ffffad8a`722ecf30 fffff805`541357e8     : ffffd706`e49b98a8 00000000`00000001 00000000`00000000 00000000`00004ff3 : tcpip!IppDispatchSendPacketHelper+0xbf
ffffad8a`722ed000 fffff805`54133f87     : ffffd706`e49b98a8 00000000`00000000 00000000`00000000 ffffd706`e49b98a8 : tcpip!IppPacketizeDatagrams+0x2e8
ffffad8a`722ed130 fffff805`54161bed     : ffffad8a`722ed400 00000000`00000000 fffff805`542e9a70 ffffd706`e4aa6bf0 : tcpip!IppSendDatagramsCommon+0x497
ffffad8a`722ed2b0 fffff805`5427e5ab     : fffff805`542e9a00 fffff805`542e9a70 ffffd706`eb661c00 ffffd706`ecd18a10 : tcpip!IppSendControl+0x105
ffffad8a`722ed360 fffff805`5427da37     : 00000000`00000000 fffff805`542e9a70 00000000`00000000 ffffd706`0000006c : tcpip!Ipv4SetEchoRequestCreate+0xb47
ffffad8a`722ed600 fffff805`540241b9     : 00000000`00000000 00000000`00000000 00000000`00000006 ffffd706`e4a81880 : tcpip!Ipv4SetAllEchoRequestParameters+0x147
ffffad8a`722ed640 fffff805`66651994     : 0000004f`320dea05 ffffd706`edd0d230 00000000`00000001 00000000`00000000 : NETIO!NsiSetAllParametersEx+0x139
ffffad8a`722ed720 fffff805`66652860     : 00000000`00000000 ffffd706`e4e9b390 ffffd706`e4e9b2c0 0000004f`320dead0 : nsiproxy!NsippSetAllParameters+0x1f4
ffffad8a`722ed8e0 fffff805`5062d935     : ffffd706`ee7662d0 00000000`00000000 00000000`00000000 00000000`00000000 : nsiproxy!NsippDispatch+0x200
ffffad8a`722ed930 fffff805`50a2e30c     : 00000000`00000002 00000000`00000000 ffffd706`ee7662d0 00000000`00000048 : nt!IofCallDriver+0x55
ffffad8a`722ed970 fffff805`50a2df5a     : 00000000`00000000 ffffad8a`722edcc0 00000000`00040800 00000000`00120013 : nt!IopSynchronousServiceTail+0x34c
ffffad8a`722eda10 fffff805`50a2d236     : 00000000`00000001 00000000`00000158 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xd0a
ffffad8a`722edb60 fffff805`508119c8     : ffffd706`eec17580 0000004f`320de938 ffffad8a`722edbe8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffad8a`722edbd0 00007ffa`ce50d0c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004f`320de9c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ce50d0c4


SYMBOL_NAME:  L1C63x64!DmaCountSGList+12

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  12

FAILURE_BUCKET_ID:  AV_L1C63x64!DmaCountSGList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0a777ef1-e8d7-83e3-601b-7bf102a85667}

Followup:     MachineOwner
---------

1: kd> lmvm L1C63x64
Browse full module list
start             end                 module name
fffff805`7e350000 fffff805`7e372000   L1C63x64   (pdb symbols)          C:\ProgramData\Dbg\sym\L1c63x64.pdb\DF9236FBD6744CE8A7D9FF5A931BF7271\L1c63x64.pdb
    Loaded symbol image file: L1C63x64.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\L1C63x64.sys\5158FBC522000\L1C63x64.sys
    Image path: \SystemRoot\System32\drivers\L1C63x64.sys
    Image name: L1C63x64.sys
    Browse all global symbols  functions  data
    Timestamp:        Mon Apr  1 06:15:17 2013 (5158FBC5)
    CheckSum:         0002612D
    ImageSize:        00022000
    File version:     2.1.0.16
    Product version:  2.1.0.16
    File flags:       8 (Mask 3F) Private
    File OS:          40004 NT Win32
    File type:        3.6 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Qualcomm Atheros Co., Ltd.
        ProductName:      Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
        InternalName:     L1c63x64.sys
        OriginalFilename: L1c63x64.sys
        ProductVersion:   2.1.0.16
        FileVersion:      2.1.0.16
        FileDescription:  Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
        LegalCopyright:   2001-2012 Qualcomm Atheros Co., Ltd. All Rights Reserved.
 

phopshen

80+ Bronze
Katılım
19 Temmuz 2022
Mesajlar
929
  • Konu Sahibi Konu Sahibi
  • #5
Olur hocam ama bir değişiklik olmaz. Sorun belli.
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : false
   AllowNugetExeUpdate : false
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : false
   AllowParallelInitializationOfLocalRepositories : true

   EnableRedirectToV8JsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Emre-PC\AppData\Local\Temp\1ef3a6f3-aaeb-43c3-a8c7-02b289bd92ed_042824-22312-01 (1).rar.2ed\042824-22312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff805`50400000 PsLoadedModuleList = 0xfffff805`5102a790
Debug session time: Sun Apr 28 16:16:46.880 2024 (UTC + 3:00)
System Uptime: 0 days 3:23:53.674
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000004f`3239a018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`507fda40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffad8a`722ec640=000000000000000a
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000100000010325, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8057e356afa, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 531

    Key  : Analysis.Elapsed.mSec
    Value: 3617

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 140

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1258

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Bugcheck.Code.TargetModel
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_L1C63x64!DmaCountSGList

    Key  : Failure.Hash
    Value: {0a777ef1-e8d7-83e3-601b-7bf102a85667}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 100000010325

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8057e356afa

FILE_IN_CAB:  042824-22312-01.dmp

READ_ADDRESS: fffff805510fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000100000010325

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TRACERT.EXE

TRAP_FRAME:  ffffad8a722ec780 -- (.trap 0xffffad8a722ec780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000005507 rbx=0000000000000000 rcx=0000000000000001
rdx=00001000000102fd rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057e356afa rsp=ffffad8a722ec918 rbp=ffffd706e4e71200
 r8=0000000000005507  r9=0000000000005506 r10=0000000000000fff
r11=ffffb4fa6dc00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
L1C63x64!DmaCountSGList+0x12:
fffff805`7e356afa 448b4a28        mov     r9d,dword ptr [rdx+28h] ds:00001000`00010325=????????
Resetting default scope

STACK_TEXT:
ffffad8a`722ec638 fffff805`50812269     : 00000000`0000000a 00001000`00010325 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffad8a`722ec640 fffff805`5080dc34     : ffffd706`e7d488c0 fffff805`508b9c05 fffff805`508cdc60 ffffd706`e7330050 : nt!KiBugCheckDispatch+0x69
ffffad8a`722ec780 fffff805`7e356afa     : fffff805`7e357038 ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 : nt!KiPageFault+0x474
ffffad8a`722ec918 fffff805`7e357038     : ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 ffffd706`e4e71200 : L1C63x64!DmaCountSGList+0x12
ffffad8a`722ec920 fffff805`7e357512     : ffffd706`e7a5a000 ffffd706`eb661c00 ffffad8a`00000000 ffffd706`e7a5aa20 : L1C63x64!DmaSendNetBufferList+0x124
ffffad8a`722eca00 fffff805`53ea50ae     : 00000000`00000000 ffffd706`e73301a0 fffff805`53ea4f90 00000000`00000001 : L1C63x64!MiniportSendNetBufferLists+0x11e
ffffad8a`722eca40 fffff805`53ea4f9e     : fffff805`54461000 ffffd706`eb661c00 ffffd706`00000000 fffff805`53ea4f90 : ndis!ndisMSendNBLToMiniportInternal+0xfe
ffffad8a`722ecb10 fffff805`53ea58e8     : 00000000`00000001 ffffd706`eb661c00 ffffd706`e7db09a0 fffff805`5413b844 : ndis!ndisMSendNBLToMiniport+0xe
ffffad8a`722ecb50 fffff805`53ede291     : 00000000`00000000 ffffad8a`722ecc19 ffffd706`e73301a0 00000000`00000000 : ndis!ndisCallSendHandler+0x58
ffffad8a`722ecba0 fffff805`53ea25dd     : 00000000`00000000 ffffd706`e73301a0 ffffd706`e7dfd410 00000000`00000000 : ndis!ndisInvokeNextSendHandler+0x191
ffffad8a`722ecc70 fffff805`5417a29d     : ffffd706`e7118010 ffffd706`eb661c00 00000000`00000000 00000000`00000000 : ndis!NdisSendNetBufferLists+0x17d
ffffad8a`722ecd70 fffff805`54179fc7     : ffffd706`e707dd90 00000000`00000000 00000000`00000800 ffffd706`e7bd1400 : tcpip!FlpSendPacketsHelper+0x2bd
ffffad8a`722ece20 fffff805`541366a5     : 00000000`00000000 fffff805`542e9a70 ffffd706`e49b98a8 fffff805`541354dd : tcpip!FlSendPackets+0x57
ffffad8a`722ece50 fffff805`54135b5b     : ff01887f`00000004 00000000`00000000 fffff805`542e9a70 ffffd706`e49b995c : tcpip!IppFragmentPackets+0x2a5
ffffad8a`722ecf30 fffff805`541357e8     : ffffd706`e49b98a8 00000000`00000001 00000000`00000000 00000000`00004ff3 : tcpip!IppDispatchSendPacketHelper+0xbf
ffffad8a`722ed000 fffff805`54133f87     : ffffd706`e49b98a8 00000000`00000000 00000000`00000000 ffffd706`e49b98a8 : tcpip!IppPacketizeDatagrams+0x2e8
ffffad8a`722ed130 fffff805`54161bed     : ffffad8a`722ed400 00000000`00000000 fffff805`542e9a70 ffffd706`e4aa6bf0 : tcpip!IppSendDatagramsCommon+0x497
ffffad8a`722ed2b0 fffff805`5427e5ab     : fffff805`542e9a00 fffff805`542e9a70 ffffd706`eb661c00 ffffd706`ecd18a10 : tcpip!IppSendControl+0x105
ffffad8a`722ed360 fffff805`5427da37     : 00000000`00000000 fffff805`542e9a70 00000000`00000000 ffffd706`0000006c : tcpip!Ipv4SetEchoRequestCreate+0xb47
ffffad8a`722ed600 fffff805`540241b9     : 00000000`00000000 00000000`00000000 00000000`00000006 ffffd706`e4a81880 : tcpip!Ipv4SetAllEchoRequestParameters+0x147
ffffad8a`722ed640 fffff805`66651994     : 0000004f`320dea05 ffffd706`edd0d230 00000000`00000001 00000000`00000000 : NETIO!NsiSetAllParametersEx+0x139
ffffad8a`722ed720 fffff805`66652860     : 00000000`00000000 ffffd706`e4e9b390 ffffd706`e4e9b2c0 0000004f`320dead0 : nsiproxy!NsippSetAllParameters+0x1f4
ffffad8a`722ed8e0 fffff805`5062d935     : ffffd706`ee7662d0 00000000`00000000 00000000`00000000 00000000`00000000 : nsiproxy!NsippDispatch+0x200
ffffad8a`722ed930 fffff805`50a2e30c     : 00000000`00000002 00000000`00000000 ffffd706`ee7662d0 00000000`00000048 : nt!IofCallDriver+0x55
ffffad8a`722ed970 fffff805`50a2df5a     : 00000000`00000000 ffffad8a`722edcc0 00000000`00040800 00000000`00120013 : nt!IopSynchronousServiceTail+0x34c
ffffad8a`722eda10 fffff805`50a2d236     : 00000000`00000001 00000000`00000158 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xd0a
ffffad8a`722edb60 fffff805`508119c8     : ffffd706`eec17580 0000004f`320de938 ffffad8a`722edbe8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffad8a`722edbd0 00007ffa`ce50d0c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004f`320de9c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ce50d0c4


SYMBOL_NAME:  L1C63x64!DmaCountSGList+12

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  12

FAILURE_BUCKET_ID:  AV_L1C63x64!DmaCountSGList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0a777ef1-e8d7-83e3-601b-7bf102a85667}

Followup:     MachineOwner
---------

1: kd> lmvm L1C63x64
Browse full module list
start             end                 module name
fffff805`7e350000 fffff805`7e372000   L1C63x64   (pdb symbols)          C:\ProgramData\Dbg\sym\L1c63x64.pdb\DF9236FBD6744CE8A7D9FF5A931BF7271\L1c63x64.pdb
    Loaded symbol image file: L1C63x64.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\L1C63x64.sys\5158FBC522000\L1C63x64.sys
    Image path: \SystemRoot\System32\drivers\L1C63x64.sys
    Image name: L1C63x64.sys
    Browse all global symbols  functions  data
    Timestamp:        Mon Apr  1 06:15:17 2013 (5158FBC5)
    CheckSum:         0002612D
    ImageSize:        00022000
    File version:     2.1.0.16
    Product version:  2.1.0.16
    File flags:       8 (Mask 3F) Private
    File OS:          40004 NT Win32
    File type:        3.6 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Qualcomm Atheros Co., Ltd.
        ProductName:      Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
        InternalName:     L1c63x64.sys
        OriginalFilename: L1c63x64.sys
        ProductVersion:   2.1.0.16
        FileVersion:      2.1.0.16
        FileDescription:  Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
        LegalCopyright:   2001-2012 Qualcomm Atheros Co., Ltd. All Rights Reserved.
nasıl böyle yazıya dökülüyor bidaki mavide yapayım bakayım aynısı mı diye. ve en sondaki yazıdan mı anlaşılıyor bu mavinin sebebi atheros ethernet falan
 

Emre Zengin

Moderatör
Katılım
22 Nisan 2021
Mesajlar
18,562
En İyi Cevap
18
Dahası  
Reaksiyon skoru
7,251
Konum
Çorlu/Tekirdağ
İsim
Emre Zengin
nasıl böyle yazıya dökülüyor bidaki mavide yapayım bakayım aynısı mı diye. ve en sondaki yazıdan mı anlaşılıyor bu mavinin sebebi atheros ethernet falan
WinDBG adlı programdan analizleri yapıyorum. IMAGE_NAME: L1C63x64.sys yazan yerin üstüne tıklayınca sorunun Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controllerda olduğunu söylüyor. Önceki Minidumpların da aynı.
 

phopshen

80+ Bronze
Katılım
19 Temmuz 2022
Mesajlar
929
  • Konu Sahibi Konu Sahibi
  • #7
@Emre Zengin yeni konu açmak istemediğim için yazıyorum buraya. arkadaşın sorunu var da :
bluetoohta bağlanmasına rağmen cihaz ses çıkışında gözükmüyor
 
Top Bottom