psychothinker
Megapat
Daha fazla
- Sistem Özellikleri
- 11th Gen Intel(R) Core(TM) i5-11400H @ 2.70GHz (2.69 GHz)
16,0 GB
RTX 3050Ti
Samsung 980 Pro 1TB
- Cinsiyet
- Erkek
- Meslek
- Elektrik-Elektronik Mühendisi
Arduino bağlı çalışırken mavi ekran aldım. WinDbg ile analiz sonrası çıktı:
Bilgisayar, Monster Abra A5 v17.2
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit.
UseExperimentalFeatureForNugetShare : true.
AllowNugetExeUpdate : true.
NonInteractiveNuget : true.
AllowNugetMSCredentialProviderInstall : true.
AllowParallelInitializationOfLocalRepositories : true.
EnableRedirectToChakraJsProvider : false.
-- Configuring repositories.
----> Repository : LocalInstalled, Enabled: true.
----> Repository : UserExtensions, Enabled: true.
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds.
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds.
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42.
Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\gokha\OneDrive\Masaüstü\121424-23625-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Kernel base = 0xfffff800`a9800000 PsLoadedModuleList = 0xfffff800`aa6f4850
Debug session time: Sat Dec 14 18:17:29.438 2024 (UTC + 3:00)
System Uptime: 3 days 5:33:15.768
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
......................................
Loading User Symbols.
Loading unloaded module list.
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`a9cb85d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb706`87f27760=000000000000000a
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8005df748a1, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1437.
Key : Analysis.Elapsed.mSec
Value: 1959.
Key : Analysis.IO.Other.Mb
Value: 18.
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 22.
Key : Analysis.Init.CPU.mSec
Value: 671.
Key : Analysis.Init.Elapsed.mSec
Value: 39407.
Key : Analysis.Memory.CommitPeak.Mb
Value: 87.
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre.
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1.
Key : Bugcheck.Code.TargetModel
Value: 0xd1.
Key : Dump.Attributes.AsUlong
Value: 21808.
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_CH341S64!unknown_function
Key : Failure.Hash
Value: {5da1b365-fc5a-210d-9f24-c039064caf12}
Key : Hypervisor.Enlightenments.ValueHex
Value: 7417df84.
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 55185662.
Key : Hypervisor.Flags.ValueHex
Value: 34a10fe.
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015.
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7.
Key : Stack.Pointer
Value: NMI.
BUGCHECK_CODE: d1.
BUGCHECK_P1: 38.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8005df748a1.
FILE_IN_CAB: 121424-23625-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.
DUMP_FILE_ATTRIBUTES: 0x21808.
Kernel Generated Triage Dump.
FAULTING_THREAD: ffffe183647e7040.
READ_ADDRESS: fffff800aa7c34b0: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
0000000000000038.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
DPC_STACK_BASE: FFFFB70687F27FB0.
TRAP_FRAME: ffffb70687f278a0 -- (.trap 0xffffb70687f278a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000fffffffe rbx=0000000000000000 rcx=00000000ffffffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005df748a1 rsp=ffffb70687f27a30 rbp=0000000000007ffc
r8=ffffe18363717ab0 r9=0000000000000000 r10=1fffff000bbee9a6
r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
CH341S64+0x48a1:
fffff800`5df748a1 48837a3800 cmp qword ptr [rdx+38h],0 ds:00000000`00000038=????????????????
Resetting default scope.
STACK_TEXT:
ffffb706`87f27758 fffff800`a9e8dce9 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb706`87f27760 fffff800`a9e88fa8 : fffffe02`ead25dbc 00000000`00000000 00000000`00000000 fffff800`55691be6 : nt!KiBugCheckDispatch+0x69
ffffb706`87f278a0 fffff800`5df748a1 : ffffe183`6b5ea1c0 00000000`00007ffc 00000000`00000002 ffffe183`63717f28 : nt!KiPageFault+0x468
ffffb706`87f27a30 ffffe183`6b5ea1c0 : 00000000`00007ffc 00000000`00000002 ffffe183`63717f28 00000000`00000000 : CH341S64+0x48a1
ffffb706`87f27a38 00000000`00007ffc : 00000000`00000002 ffffe183`63717f28 00000000`00000000 00000000`00000000 : 0xffffe183`6b5ea1c0
ffffb706`87f27a40 00000000`00000002 : ffffe183`63717f28 00000000`00000000 00000000`00000000 ffffe183`6b533948 : 0x7ffc.
ffffb706`87f27a48 ffffe183`63717f28 : 00000000`00000000 00000000`00000000 ffffe183`6b533948 ffffa381`402a2180 : 0x2.
ffffb706`87f27a50 00000000`00000000 : 00000000`00000000 ffffe183`6b533948 ffffa381`402a2180 00000000`00000001 : 0xffffe183`63717f28
SYMBOL_NAME: CH341S64+48a1
MODULE_NAME: CH341S64.
IMAGE_NAME: CH341S64.SYS
STACK_COMMAND: .process /r /p 0xffffe1834351a040; .thread 0xffffe183647e7040 ; kb.
BUCKET_ID_FUNC_OFFSET: 48a1.
FAILURE_BUCKET_ID: AV_CH341S64!unknown_function
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {5da1b365-fc5a-210d-9f24-c039064caf12}
Followup: MachineOwner.
---------
Bilgisayar, Monster Abra A5 v17.2