Arduino ile çalışırken mavi ekran hatası

psychothinker

Megapat
Katılım
24 Şubat 2015
Mesajlar
672
Çözümler
1
Yer
Antalya
Daha fazla  
Sistem Özellikleri
11th Gen Intel(R) Core(TM) i5-11400H @ 2.70GHz (2.69 GHz)
16,0 GB
RTX 3050Ti
Samsung 980 Pro 1TB
Cinsiyet
Erkek
Meslek
Elektrik-Elektronik Mühendisi
Arduino bağlı çalışırken mavi ekran aldım. WinDbg ile analiz sonrası çıktı:

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit.
 UseExperimentalFeatureForNugetShare : true.
 AllowNugetExeUpdate : true.
 NonInteractiveNuget : true.
 AllowNugetMSCredentialProviderInstall : true.
 AllowParallelInitializationOfLocalRepositories : true.
 EnableRedirectToChakraJsProvider : false.

 -- Configuring repositories.
 ----> Repository : LocalInstalled, Enabled: true.
 ----> Repository : UserExtensions, Enabled: true.

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds.

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds.
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 42.

Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\gokha\OneDrive\Masaüstü\121424-23625-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Kernel base = 0xfffff800`a9800000 PsLoadedModuleList = 0xfffff800`aa6f4850
Debug session time: Sat Dec 14 18:17:29.438 2024 (UTC + 3:00)
System Uptime: 3 days 5:33:15.768
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
......................................
Loading User Symbols.

Loading unloaded module list.
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`a9cb85d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb706`87f27760=000000000000000a
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8005df748a1, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1437.

 Key : Analysis.Elapsed.mSec
 Value: 1959.

 Key : Analysis.IO.Other.Mb
 Value: 18.

 Key : Analysis.IO.Read.Mb
 Value: 1

 Key : Analysis.IO.Write.Mb
 Value: 22.

 Key : Analysis.Init.CPU.mSec
 Value: 671.

 Key : Analysis.Init.Elapsed.mSec
 Value: 39407.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 87.

 Key : Analysis.Version.DbgEng
 Value: 10.0.27725.1000

 Key : Analysis.Version.Description
 Value: 10.2408.27.01 amd64fre.

 Key : Analysis.Version.Ext
 Value: 1.2408.27.1

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Bugcheck.Code.TargetModel
 Value: 0xd1.

 Key : Dump.Attributes.AsUlong
 Value: 21808.

 Key : Dump.Attributes.DiagDataWrittenToHeader
 Value: 1

 Key : Dump.Attributes.ErrorCode
 Value: 0

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : Dump.Attributes.LastLine
 Value: Dump completed successfully.

 Key : Dump.Attributes.ProgressPercentage
 Value: 0

 Key : Failure.Bucket
 Value: AV_CH341S64!unknown_function

 Key : Failure.Hash
 Value: {5da1b365-fc5a-210d-9f24-c039064caf12}

 Key : Hypervisor.Enlightenments.ValueHex
 Value: 7417df84.

 Key : Hypervisor.Flags.AnyHypervisorPresent
 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened
 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable
 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint
 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested
 Value: 0

 Key : Hypervisor.Flags.CpuManager
 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi
 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled
 Value: 1

 Key : Hypervisor.Flags.Epf
 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks
 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable
 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber
 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl
 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush
 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing
 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone
 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos
 Value: 0

 Key : Hypervisor.Flags.RootScheduler
 Value: 0

 Key : Hypervisor.Flags.SynicAvailable
 Value: 1

 Key : Hypervisor.Flags.UseQpcBias
 Value: 0

 Key : Hypervisor.Flags.Value
 Value: 55185662.

 Key : Hypervisor.Flags.ValueHex
 Value: 34a10fe.

 Key : Hypervisor.Flags.VpAssistPage
 Value: 1

 Key : Hypervisor.Flags.VsmAvailable
 Value: 1

 Key : Hypervisor.RootFlags.AccessStats
 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor
 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading
 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync
 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV
 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt
 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened
 Value: 1

 Key : Hypervisor.RootFlags.Nested
 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor
 Value: 1

 Key : Hypervisor.RootFlags.Value
 Value: 1015.

 Key : Hypervisor.RootFlags.ValueHex
 Value: 3f7.

 Key : Stack.Pointer
 Value: NMI.

BUGCHECK_CODE: d1.

BUGCHECK_P1: 38.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8005df748a1.

FILE_IN_CAB: 121424-23625-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.

DUMP_FILE_ATTRIBUTES: 0x21808.
 Kernel Generated Triage Dump.

FAULTING_THREAD: ffffe183647e7040.

READ_ADDRESS: fffff800aa7c34b0: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 0000000000000038.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

DPC_STACK_BASE: FFFFB70687F27FB0.

TRAP_FRAME: ffffb70687f278a0 -- (.trap 0xffffb70687f278a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000fffffffe rbx=0000000000000000 rcx=00000000ffffffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005df748a1 rsp=ffffb70687f27a30 rbp=0000000000007ffc
 r8=ffffe18363717ab0 r9=0000000000000000 r10=1fffff000bbee9a6
r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
CH341S64+0x48a1:
fffff800`5df748a1 48837a3800 cmp qword ptr [rdx+38h],0 ds:00000000`00000038=????????????????
Resetting default scope.

STACK_TEXT:
ffffb706`87f27758 fffff800`a9e8dce9 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb706`87f27760 fffff800`a9e88fa8 : fffffe02`ead25dbc 00000000`00000000 00000000`00000000 fffff800`55691be6 : nt!KiBugCheckDispatch+0x69
ffffb706`87f278a0 fffff800`5df748a1 : ffffe183`6b5ea1c0 00000000`00007ffc 00000000`00000002 ffffe183`63717f28 : nt!KiPageFault+0x468
ffffb706`87f27a30 ffffe183`6b5ea1c0 : 00000000`00007ffc 00000000`00000002 ffffe183`63717f28 00000000`00000000 : CH341S64+0x48a1
ffffb706`87f27a38 00000000`00007ffc : 00000000`00000002 ffffe183`63717f28 00000000`00000000 00000000`00000000 : 0xffffe183`6b5ea1c0
ffffb706`87f27a40 00000000`00000002 : ffffe183`63717f28 00000000`00000000 00000000`00000000 ffffe183`6b533948 : 0x7ffc.
ffffb706`87f27a48 ffffe183`63717f28 : 00000000`00000000 00000000`00000000 ffffe183`6b533948 ffffa381`402a2180 : 0x2.
ffffb706`87f27a50 00000000`00000000 : 00000000`00000000 ffffe183`6b533948 ffffa381`402a2180 00000000`00000001 : 0xffffe183`63717f28

SYMBOL_NAME: CH341S64+48a1

MODULE_NAME: CH341S64.

IMAGE_NAME: CH341S64.SYS

STACK_COMMAND: .process /r /p 0xffffe1834351a040; .thread 0xffffe183647e7040 ; kb.

BUCKET_ID_FUNC_OFFSET: 48a1.

FAILURE_BUCKET_ID: AV_CH341S64!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {5da1b365-fc5a-210d-9f24-c039064caf12}

Followup: MachineOwner.
---------

Bilgisayar, Monster Abra A5 v17.2
 

Technopat Haberler

Yeni konular

Geri
Yukarı