phopshen
80+ Bronze
- Katılım
- 19 Temmuz 2022
- Mesajlar
- 929
arkada oyun açılıyordu bi yandan da dcden video izliyordum
@Emre Zengin
042824-22312-01.rar
drive.google.com
Mesaj otomatik birleştirildi:
@Emre Zengin
Aynı sorun. Bunla ilgili daha konu açmana gerek yok hocam. Donanımsal duruyor.arkada oyun açılıyordu bi yandan da dcden video izliyordum
042824-22312-01.rar
drive.google.comMesaj otomatik birleştirildi:
@Emre Zengin
İçeriğini kendim okumayı bilmediğim için ne olduğunu bilmiyorum. İnt değil de başka bir şeydir diye düşünüyorum her seferinde. Yoksa konu açmam. Daha konu açmam o zaman mavi yiyince bu konuya paylaşayım benceAynı sorun. Bunla ilgili daha konu açmana gerek yok hocam. Donanımsal duruyor.
Olur hocam ama bir değişiklik olmaz. Sorun belli.İçeriğini kendim okumayı bilmediğim için ne olduğunu bilmiyorum. İnt değil de başka bir şeydir diye düşünüyorum her seferinde. Yoksa konu açmam. Daha konu açmam o zaman mavi yiyince bu konuya paylaşayım bence
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Emre-PC\AppData\Local\Temp\1ef3a6f3-aaeb-43c3-a8c7-02b289bd92ed_042824-22312-01 (1).rar.2ed\042824-22312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff805`50400000 PsLoadedModuleList = 0xfffff805`5102a790
Debug session time: Sun Apr 28 16:16:46.880 2024 (UTC + 3:00)
System Uptime: 0 days 3:23:53.674
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000004f`3239a018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`507fda40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad8a`722ec640=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000100000010325, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8057e356afa, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 531
Key : Analysis.Elapsed.mSec
Value: 3617
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 140
Key : Analysis.Init.Elapsed.mSec
Value: 1258
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Failure.Bucket
Value: AV_L1C63x64!DmaCountSGList
Key : Failure.Hash
Value: {0a777ef1-e8d7-83e3-601b-7bf102a85667}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 100000010325
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8057e356afa
FILE_IN_CAB: 042824-22312-01.dmp
READ_ADDRESS: fffff805510fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000100000010325
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TRACERT.EXE
TRAP_FRAME: ffffad8a722ec780 -- (.trap 0xffffad8a722ec780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000005507 rbx=0000000000000000 rcx=0000000000000001
rdx=00001000000102fd rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057e356afa rsp=ffffad8a722ec918 rbp=ffffd706e4e71200
r8=0000000000005507 r9=0000000000005506 r10=0000000000000fff
r11=ffffb4fa6dc00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
L1C63x64!DmaCountSGList+0x12:
fffff805`7e356afa 448b4a28 mov r9d,dword ptr [rdx+28h] ds:00001000`00010325=????????
Resetting default scope
STACK_TEXT:
ffffad8a`722ec638 fffff805`50812269 : 00000000`0000000a 00001000`00010325 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffad8a`722ec640 fffff805`5080dc34 : ffffd706`e7d488c0 fffff805`508b9c05 fffff805`508cdc60 ffffd706`e7330050 : nt!KiBugCheckDispatch+0x69
ffffad8a`722ec780 fffff805`7e356afa : fffff805`7e357038 ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 : nt!KiPageFault+0x474
ffffad8a`722ec918 fffff805`7e357038 : ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 ffffd706`e4e71200 : L1C63x64!DmaCountSGList+0x12
ffffad8a`722ec920 fffff805`7e357512 : ffffd706`e7a5a000 ffffd706`eb661c00 ffffad8a`00000000 ffffd706`e7a5aa20 : L1C63x64!DmaSendNetBufferList+0x124
ffffad8a`722eca00 fffff805`53ea50ae : 00000000`00000000 ffffd706`e73301a0 fffff805`53ea4f90 00000000`00000001 : L1C63x64!MiniportSendNetBufferLists+0x11e
ffffad8a`722eca40 fffff805`53ea4f9e : fffff805`54461000 ffffd706`eb661c00 ffffd706`00000000 fffff805`53ea4f90 : ndis!ndisMSendNBLToMiniportInternal+0xfe
ffffad8a`722ecb10 fffff805`53ea58e8 : 00000000`00000001 ffffd706`eb661c00 ffffd706`e7db09a0 fffff805`5413b844 : ndis!ndisMSendNBLToMiniport+0xe
ffffad8a`722ecb50 fffff805`53ede291 : 00000000`00000000 ffffad8a`722ecc19 ffffd706`e73301a0 00000000`00000000 : ndis!ndisCallSendHandler+0x58
ffffad8a`722ecba0 fffff805`53ea25dd : 00000000`00000000 ffffd706`e73301a0 ffffd706`e7dfd410 00000000`00000000 : ndis!ndisInvokeNextSendHandler+0x191
ffffad8a`722ecc70 fffff805`5417a29d : ffffd706`e7118010 ffffd706`eb661c00 00000000`00000000 00000000`00000000 : ndis!NdisSendNetBufferLists+0x17d
ffffad8a`722ecd70 fffff805`54179fc7 : ffffd706`e707dd90 00000000`00000000 00000000`00000800 ffffd706`e7bd1400 : tcpip!FlpSendPacketsHelper+0x2bd
ffffad8a`722ece20 fffff805`541366a5 : 00000000`00000000 fffff805`542e9a70 ffffd706`e49b98a8 fffff805`541354dd : tcpip!FlSendPackets+0x57
ffffad8a`722ece50 fffff805`54135b5b : ff01887f`00000004 00000000`00000000 fffff805`542e9a70 ffffd706`e49b995c : tcpip!IppFragmentPackets+0x2a5
ffffad8a`722ecf30 fffff805`541357e8 : ffffd706`e49b98a8 00000000`00000001 00000000`00000000 00000000`00004ff3 : tcpip!IppDispatchSendPacketHelper+0xbf
ffffad8a`722ed000 fffff805`54133f87 : ffffd706`e49b98a8 00000000`00000000 00000000`00000000 ffffd706`e49b98a8 : tcpip!IppPacketizeDatagrams+0x2e8
ffffad8a`722ed130 fffff805`54161bed : ffffad8a`722ed400 00000000`00000000 fffff805`542e9a70 ffffd706`e4aa6bf0 : tcpip!IppSendDatagramsCommon+0x497
ffffad8a`722ed2b0 fffff805`5427e5ab : fffff805`542e9a00 fffff805`542e9a70 ffffd706`eb661c00 ffffd706`ecd18a10 : tcpip!IppSendControl+0x105
ffffad8a`722ed360 fffff805`5427da37 : 00000000`00000000 fffff805`542e9a70 00000000`00000000 ffffd706`0000006c : tcpip!Ipv4SetEchoRequestCreate+0xb47
ffffad8a`722ed600 fffff805`540241b9 : 00000000`00000000 00000000`00000000 00000000`00000006 ffffd706`e4a81880 : tcpip!Ipv4SetAllEchoRequestParameters+0x147
ffffad8a`722ed640 fffff805`66651994 : 0000004f`320dea05 ffffd706`edd0d230 00000000`00000001 00000000`00000000 : NETIO!NsiSetAllParametersEx+0x139
ffffad8a`722ed720 fffff805`66652860 : 00000000`00000000 ffffd706`e4e9b390 ffffd706`e4e9b2c0 0000004f`320dead0 : nsiproxy!NsippSetAllParameters+0x1f4
ffffad8a`722ed8e0 fffff805`5062d935 : ffffd706`ee7662d0 00000000`00000000 00000000`00000000 00000000`00000000 : nsiproxy!NsippDispatch+0x200
ffffad8a`722ed930 fffff805`50a2e30c : 00000000`00000002 00000000`00000000 ffffd706`ee7662d0 00000000`00000048 : nt!IofCallDriver+0x55
ffffad8a`722ed970 fffff805`50a2df5a : 00000000`00000000 ffffad8a`722edcc0 00000000`00040800 00000000`00120013 : nt!IopSynchronousServiceTail+0x34c
ffffad8a`722eda10 fffff805`50a2d236 : 00000000`00000001 00000000`00000158 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xd0a
ffffad8a`722edb60 fffff805`508119c8 : ffffd706`eec17580 0000004f`320de938 ffffad8a`722edbe8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffad8a`722edbd0 00007ffa`ce50d0c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004f`320de9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ce50d0c4
SYMBOL_NAME: L1C63x64!DmaCountSGList+12
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 12
FAILURE_BUCKET_ID: AV_L1C63x64!DmaCountSGList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0a777ef1-e8d7-83e3-601b-7bf102a85667}
Followup: MachineOwner
---------
1: kd> lmvm L1C63x64
Browse full module list
start end module name
fffff805`7e350000 fffff805`7e372000 L1C63x64 (pdb symbols) C:\ProgramData\Dbg\sym\L1c63x64.pdb\DF9236FBD6744CE8A7D9FF5A931BF7271\L1c63x64.pdb
Loaded symbol image file: L1C63x64.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\L1C63x64.sys\5158FBC522000\L1C63x64.sys
Image path: \SystemRoot\System32\drivers\L1C63x64.sys
Image name: L1C63x64.sys
Browse all global symbols functions data
Timestamp: Mon Apr 1 06:15:17 2013 (5158FBC5)
CheckSum: 0002612D
ImageSize: 00022000
File version: 2.1.0.16
Product version: 2.1.0.16
File flags: 8 (Mask 3F) Private
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Qualcomm Atheros Co., Ltd.
ProductName: Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
InternalName: L1c63x64.sys
OriginalFilename: L1c63x64.sys
ProductVersion: 2.1.0.16
FileVersion: 2.1.0.16
FileDescription: Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
LegalCopyright: 2001-2012 Qualcomm Atheros Co., Ltd. All Rights Reserved.
nasıl böyle yazıya dökülüyor bidaki mavide yapayım bakayım aynısı mı diye. ve en sondaki yazıdan mı anlaşılıyor bu mavinin sebebi atheros ethernet falanOlur hocam ama bir değişiklik olmaz. Sorun belli.
Kod:************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : false AllowNugetExeUpdate : false NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : false AllowParallelInitializationOfLocalRepositories : true EnableRedirectToV8JsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41 Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Emre-PC\AppData\Local\Temp\1ef3a6f3-aaeb-43c3-a8c7-02b289bd92ed_042824-22312-01 (1).rar.2ed\042824-22312-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff805`50400000 PsLoadedModuleList = 0xfffff805`5102a790 Debug session time: Sun Apr 28 16:16:46.880 2024 (UTC + 3:00) System Uptime: 0 days 3:23:53.674 Loading Kernel Symbols ............................................................... ................................................................ ............................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 0000004f`3239a018). Type ".hh dbgerr001" for details Loading unloaded module list ......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`507fda40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad8a`722ec640=000000000000000a 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000100000010325, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8057e356afa, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 531 Key : Analysis.Elapsed.mSec Value: 3617 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 140 Key : Analysis.Init.Elapsed.mSec Value: 1258 Key : Analysis.Memory.CommitPeak.Mb Value: 99 Key : Bugcheck.Code.LegacyAPI Value: 0xd1 Key : Bugcheck.Code.TargetModel Value: 0xd1 Key : Failure.Bucket Value: AV_L1C63x64!DmaCountSGList Key : Failure.Hash Value: {0a777ef1-e8d7-83e3-601b-7bf102a85667} Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: d1 BUGCHECK_P1: 100000010325 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8057e356afa FILE_IN_CAB: 042824-22312-01.dmp READ_ADDRESS: fffff805510fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000100000010325 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: TRACERT.EXE TRAP_FRAME: ffffad8a722ec780 -- (.trap 0xffffad8a722ec780) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000005507 rbx=0000000000000000 rcx=0000000000000001 rdx=00001000000102fd rsi=0000000000000000 rdi=0000000000000000 rip=fffff8057e356afa rsp=ffffad8a722ec918 rbp=ffffd706e4e71200 r8=0000000000005507 r9=0000000000005506 r10=0000000000000fff r11=ffffb4fa6dc00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc L1C63x64!DmaCountSGList+0x12: fffff805`7e356afa 448b4a28 mov r9d,dword ptr [rdx+28h] ds:00001000`00010325=???????? Resetting default scope STACK_TEXT: ffffad8a`722ec638 fffff805`50812269 : 00000000`0000000a 00001000`00010325 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffad8a`722ec640 fffff805`5080dc34 : ffffd706`e7d488c0 fffff805`508b9c05 fffff805`508cdc60 ffffd706`e7330050 : nt!KiBugCheckDispatch+0x69 ffffad8a`722ec780 fffff805`7e356afa : fffff805`7e357038 ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 : nt!KiPageFault+0x474 ffffad8a`722ec918 fffff805`7e357038 : ffffd706`e7a5a000 ffffd706`e7a5a000 ffffd706`e7ce5608 ffffd706`e4e71200 : L1C63x64!DmaCountSGList+0x12 ffffad8a`722ec920 fffff805`7e357512 : ffffd706`e7a5a000 ffffd706`eb661c00 ffffad8a`00000000 ffffd706`e7a5aa20 : L1C63x64!DmaSendNetBufferList+0x124 ffffad8a`722eca00 fffff805`53ea50ae : 00000000`00000000 ffffd706`e73301a0 fffff805`53ea4f90 00000000`00000001 : L1C63x64!MiniportSendNetBufferLists+0x11e ffffad8a`722eca40 fffff805`53ea4f9e : fffff805`54461000 ffffd706`eb661c00 ffffd706`00000000 fffff805`53ea4f90 : ndis!ndisMSendNBLToMiniportInternal+0xfe ffffad8a`722ecb10 fffff805`53ea58e8 : 00000000`00000001 ffffd706`eb661c00 ffffd706`e7db09a0 fffff805`5413b844 : ndis!ndisMSendNBLToMiniport+0xe ffffad8a`722ecb50 fffff805`53ede291 : 00000000`00000000 ffffad8a`722ecc19 ffffd706`e73301a0 00000000`00000000 : ndis!ndisCallSendHandler+0x58 ffffad8a`722ecba0 fffff805`53ea25dd : 00000000`00000000 ffffd706`e73301a0 ffffd706`e7dfd410 00000000`00000000 : ndis!ndisInvokeNextSendHandler+0x191 ffffad8a`722ecc70 fffff805`5417a29d : ffffd706`e7118010 ffffd706`eb661c00 00000000`00000000 00000000`00000000 : ndis!NdisSendNetBufferLists+0x17d ffffad8a`722ecd70 fffff805`54179fc7 : ffffd706`e707dd90 00000000`00000000 00000000`00000800 ffffd706`e7bd1400 : tcpip!FlpSendPacketsHelper+0x2bd ffffad8a`722ece20 fffff805`541366a5 : 00000000`00000000 fffff805`542e9a70 ffffd706`e49b98a8 fffff805`541354dd : tcpip!FlSendPackets+0x57 ffffad8a`722ece50 fffff805`54135b5b : ff01887f`00000004 00000000`00000000 fffff805`542e9a70 ffffd706`e49b995c : tcpip!IppFragmentPackets+0x2a5 ffffad8a`722ecf30 fffff805`541357e8 : ffffd706`e49b98a8 00000000`00000001 00000000`00000000 00000000`00004ff3 : tcpip!IppDispatchSendPacketHelper+0xbf ffffad8a`722ed000 fffff805`54133f87 : ffffd706`e49b98a8 00000000`00000000 00000000`00000000 ffffd706`e49b98a8 : tcpip!IppPacketizeDatagrams+0x2e8 ffffad8a`722ed130 fffff805`54161bed : ffffad8a`722ed400 00000000`00000000 fffff805`542e9a70 ffffd706`e4aa6bf0 : tcpip!IppSendDatagramsCommon+0x497 ffffad8a`722ed2b0 fffff805`5427e5ab : fffff805`542e9a00 fffff805`542e9a70 ffffd706`eb661c00 ffffd706`ecd18a10 : tcpip!IppSendControl+0x105 ffffad8a`722ed360 fffff805`5427da37 : 00000000`00000000 fffff805`542e9a70 00000000`00000000 ffffd706`0000006c : tcpip!Ipv4SetEchoRequestCreate+0xb47 ffffad8a`722ed600 fffff805`540241b9 : 00000000`00000000 00000000`00000000 00000000`00000006 ffffd706`e4a81880 : tcpip!Ipv4SetAllEchoRequestParameters+0x147 ffffad8a`722ed640 fffff805`66651994 : 0000004f`320dea05 ffffd706`edd0d230 00000000`00000001 00000000`00000000 : NETIO!NsiSetAllParametersEx+0x139 ffffad8a`722ed720 fffff805`66652860 : 00000000`00000000 ffffd706`e4e9b390 ffffd706`e4e9b2c0 0000004f`320dead0 : nsiproxy!NsippSetAllParameters+0x1f4 ffffad8a`722ed8e0 fffff805`5062d935 : ffffd706`ee7662d0 00000000`00000000 00000000`00000000 00000000`00000000 : nsiproxy!NsippDispatch+0x200 ffffad8a`722ed930 fffff805`50a2e30c : 00000000`00000002 00000000`00000000 ffffd706`ee7662d0 00000000`00000048 : nt!IofCallDriver+0x55 ffffad8a`722ed970 fffff805`50a2df5a : 00000000`00000000 ffffad8a`722edcc0 00000000`00040800 00000000`00120013 : nt!IopSynchronousServiceTail+0x34c ffffad8a`722eda10 fffff805`50a2d236 : 00000000`00000001 00000000`00000158 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xd0a ffffad8a`722edb60 fffff805`508119c8 : ffffd706`eec17580 0000004f`320de938 ffffad8a`722edbe8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56 ffffad8a`722edbd0 00007ffa`ce50d0c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000004f`320de9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ce50d0c4 SYMBOL_NAME: L1C63x64!DmaCountSGList+12 MODULE_NAME: L1C63x64 IMAGE_NAME: L1C63x64.sys IMAGE_VERSION: 2.1.0.16 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 12 FAILURE_BUCKET_ID: AV_L1C63x64!DmaCountSGList OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {0a777ef1-e8d7-83e3-601b-7bf102a85667} Followup: MachineOwner --------- 1: kd> lmvm L1C63x64 Browse full module list start end module name fffff805`7e350000 fffff805`7e372000 L1C63x64 (pdb symbols) C:\ProgramData\Dbg\sym\L1c63x64.pdb\DF9236FBD6744CE8A7D9FF5A931BF7271\L1c63x64.pdb Loaded symbol image file: L1C63x64.sys Mapped memory image file: C:\ProgramData\Dbg\sym\L1C63x64.sys\5158FBC522000\L1C63x64.sys Image path: \SystemRoot\System32\drivers\L1C63x64.sys Image name: L1C63x64.sys Browse all global symbols functions data Timestamp: Mon Apr 1 06:15:17 2013 (5158FBC5) CheckSum: 0002612D ImageSize: 00022000 File version: 2.1.0.16 Product version: 2.1.0.16 File flags: 8 (Mask 3F) Private File OS: 40004 NT Win32 File type: 3.6 Driver File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Qualcomm Atheros Co., Ltd. ProductName: Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller InternalName: L1c63x64.sys OriginalFilename: L1c63x64.sys ProductVersion: 2.1.0.16 FileVersion: 2.1.0.16 FileDescription: Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller LegalCopyright: 2001-2012 Qualcomm Atheros Co., Ltd. All Rights Reserved.
WinDBG adlı programdan analizleri yapıyorum. IMAGE_NAME: L1C63x64.sys yazan yerin üstüne tıklayınca sorunun Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controllerda olduğunu söylüyor. Önceki Minidumpların da aynı.nasıl böyle yazıya dökülüyor bidaki mavide yapayım bakayım aynısı mı diye. ve en sondaki yazıdan mı anlaşılıyor bu mavinin sebebi atheros ethernet falan