ASUS Prime B350M-A kmode_exceptıon_not_handle hatası

DrumO

Zeptopat
Katılım
20 Eylül 2022
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Merhaba,

Artık 8 GB RAM yetmediği için geçen günlerde RAM değişimine gittim. RAM değişimi yapmışken BIOS güncellemesini de aradan çıkarmak istedim. Bu iki olayı gerçekleştirdiğim günden beri bilgisayarın resmen iki yakası bir araya gelmedi. Şu an bile bilgisayarı açamadığım için sizlere minidump dosyalarını gönderemiyorum. Windows açılış ekranında şifre yazdığım an çeşitli mavi ekran hataları vermeye başlıyor ya da siyah ekrana düşerek tepkisizliğe giriyor. Aldığım hatalardan bazıları söyle:

Kmode_exceptıon_not_handle
SYSTEM_SERVICE_EXCEPTION
PAGE_FAULT_IN_NONPAGED_AREA

Öncelikle sorunun yeni aldığım RAM'lerden kaynaklı olduğunu düşünerek eski kullandığım RAM'e geri dönüş yaptım ama maalesef hiçbir şekilde düzelme olmadı. BIOS güncellemesini anakartımın özelliğinden faydalanarak arayüz üzerinden yapmıştım. Sorun bundan kaynaklı ortaya çıkmış olabilir mi? Sizlerden yardımlarınızı bekliyorum.

Anakart: ASUS Prime B350M-A
Güncel BIOS sürümüm: Version 5606.

Bilgisayarı yine BIOS pilini çıkarıp, bekleyip taktıktan sonra açabildim. Aldığım minidump hatalarını inceleyip yorumlayabilirseniz çok sevinirim.

 
Son düzenleme:
Merhaba,

Bu yüklediğiniz 3 dökümde de BIOS sürümünüz 5603 olarak gözüküyor.

Kod:
BiosVersion = 5603
BiosReleaseDate = 07/28/2020
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B350M-A

En güncel sürüm 6042 sürümü. Bu sürüme güncelleyebilirsiniz.


Liste: PRIME B350M-A|Anakart|ASUS Türkiye

Güncel BIOS: https://dlcdnets.asus.com/pub/ASUS/mb/BIOS/PRIME-B350M-A-ASUS-6042.zip


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffe890aa164f4, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80724e2c145, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 2796

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9477

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13176

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 144

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092022-5156-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: fffffe890aa164f4

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80724e2c145

BUGCHECK_P4: 2

READ_ADDRESS: fffff807258fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffffe890aa164f4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  services.exe

TRAP_FRAME:  fffffe890aa0c340 -- (.trap 0xfffffe890aa0c340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd539eff604fa rbx=0000000000000000 rcx=0000000000000000
rdx=ffff820fff26d8f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80724e2c145 rsp=fffffe890aa0c4d0 rbp=0000000000000000
 r8=0000000000000002  r9=0000000000000000 r10=fffff80724e2c100
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!FsRtlCheckOplockEx2+0x45:
fffff807`24e2c145 48898c24a0000000 mov     qword ptr [rsp+0A0h],rcx ss:0018:fffffe89`0aa0c570=0000000053c80000
Resetting default scope

STACK_TEXT:
fffffe89`0aa0c098 fffff807`25031a9d     : 00000000`00000050 fffffe89`0aa164f4 00000000`00000002 fffffe89`0aa0c340 : nt!KeBugCheckEx
fffffe89`0aa0c0a0 fffff807`24e399e0     : fffffe89`0aa0c598 00000000`00000002 fffffe89`0aa0c3c0 00000000`00000000 : nt!MiSystemFault+0x1da08d
fffffe89`0aa0c1a0 fffff807`2500715e     : ffff820f`00000000 ffffd539`eff6019a ffff820f`00000080 00000000`00000000 : nt!MmAccessFault+0x400
fffffe89`0aa0c340 fffff807`24e2c145     : 00000000`00000000 00000000`00000080 ffff820f`fca9e4c0 00000000`00000000 : nt!KiPageFault+0x35e
fffffe89`0aa0c4d0 fffff807`2a86bb2a     : ffff820f`ff26dc48 fffffe89`0aa0d0e8 fffffe89`0aa0d0f0 ffff9a8e`53c80170 : nt!FsRtlCheckOplockEx2+0x45
fffffe89`0aa0c640 fffff807`2a86960a     : ffff820f`fc00aa28 ffff820f`ff26dc48 ffff820f`f9ab7100 ffff9a8e`53c80470 : Ntfs!NtfsOpenAttribute+0x70a
fffffe89`0aa0c7e0 fffff807`2a869177     : 00000000`00000080 00000000`00000008 fffffe89`0aa0d080 ffff9a8e`00000024 : Ntfs!NtfsOpenExistingAttr+0x1fa
fffffe89`0aa0c8a0 fffff807`2a867b8a     : fffffe89`0aa0d080 ffff9a8e`4ee33690 ffff9a8e`53c80010 ffff9a8e`53c80010 : Ntfs!NtfsOpenAttributeInExistingFile+0xae7
fffffe89`0aa0ca90 fffff807`2a81f6ff     : ffff820f`fc00aa28 ffff820f`f9ab84f0 ffff9a8e`4ed1d170 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x22a
fffffe89`0aa0cba0 fffff807`2a820600     : ffff820f`fc00aa28 ffff820f`ff26d8f0 ffff820f`fc00aa28 fffffe89`0aa0ce40 : Ntfs!NtfsFindStartingNode+0x3ff
fffffe89`0aa0cc90 fffff807`2a81be9b     : ffff820f`ff26d8f0 fffffe89`0aa0d080 ffff820f`ff26d8f0 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
fffffe89`0aa0cf70 fffff807`24e2a6b5     : ffff820f`f9ab7030 ffff820f`ff26d8f0 fffffe89`0aa0d200 ffff820f`feca1b50 : Ntfs!NtfsFsdCreate+0x1db
fffffe89`0aa0d1f0 fffff807`248470cf     : ffff820f`feca1b00 fffffe89`0aa0d2e0 fffffe89`0aa0d2e9 fffff807`24845f3a : nt!IofCallDriver+0x55
fffffe89`0aa0d230 fffff807`24879f54     : fffffe89`0aa0d2e0 ffff820f`feca1ba8 ffff820f`f99a4d20 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffe89`0aa0d2a0 fffff807`24e2a6b5     : ffff820f`feca1b00 ffff820f`f999a8f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
fffffe89`0aa0d350 fffff807`24e2bcb4     : 00000000`00000000 ffff820f`ff26d8f0 ffff820f`f9a6a700 ffff820f`f99a4d20 : nt!IofCallDriver+0x55
fffffe89`0aa0d390 fffff807`25215f5d     : fffffe89`0aa0d650 ffff820f`f999a8f0 ffff820f`feca1be8 fffffe89`00000001 : nt!IoCallDriverWithTracing+0x34
fffffe89`0aa0d3e0 fffff807`251ff2fe     : ffff820f`f999a8f0 00000000`00000000 ffff820f`fca9e4a0 ffff820f`fca9e401 : nt!IopParseDevice+0x117d
fffffe89`0aa0d550 fffff807`25228b2a     : ffff820f`fca9e400 fffffe89`0aa0d7b8 ffff820f`00000040 ffff820f`f66f3bc0 : nt!ObpLookupObjectName+0x3fe
fffffe89`0aa0d720 fffff807`252738a5     : fffffe89`00000000 00000070`3151d7e0 00000070`3151dd01 00000070`3151d7b0 : nt!ObOpenObjectByNameEx+0x1fa
fffffe89`0aa0d850 fffff807`2500a9b8     : 00000000`00000000 ffff820f`fe734080 ffff820f`fe7da080 000001a1`239be7e0 : nt!NtQueryAttributesFile+0x1c5
fffffe89`0aa0db00 00007ff9`e3acd7a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000070`3151d738 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e3acd7a4


SYMBOL_NAME:  nt!FsRtlCheckOplockEx2+45

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  45

FAILURE_BUCKET_ID:  AV_W_(null)_nt!FsRtlCheckOplockEx2

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c8ac082d-2685-4e94-039f-f7b11bce9de0}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80754c0ec54, Address of the instruction which caused the BugCheck
Arg3: ffff87822c67cb20, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1796

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6020

    Key  : Analysis.Init.CPU.mSec
    Value: 390

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5990

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 127

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092022-6015-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80754c0ec54

BUGCHECK_P3: ffff87822c67cb20

BUGCHECK_P4: 0

CONTEXT:  ffff87822c67cb20 -- (.cxr 0xffff87822c67cb20)
rax=ffff87822c67d630 rbx=0000000000000001 rcx=0001000000000000
rdx=0000000000000000 rsi=0001000000000000 rdi=0000000000000000
rip=fffff80754c0ec54 rsp=ffff87822c67d520 rbp=ffff91090d6170f0
 r8=ffff91090d6170f0  r9=ffff91091014a000 r10=ffff9109155bc6a0
r11=ffff87822c67d5c0 r12=0000000000000000 r13=0000000000000000
r14=ffff87822c67d920 r15=ffff91091014a000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ObfReferenceObject+0x24:
fffff807`54c0ec54 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx ds:002b:0000ffff`ffffffd0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
ffff8782`2c67d520 fffff807`5509e80f     : 00010000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfReferenceObject+0x24
ffff8782`2c67d560 fffff807`55156123     : 00010000`00000000 00000000`00000000 ffffa68e`b8318690 fffff807`54c0e61b : nt!CmpTransReferenceTransaction+0x3f
ffff8782`2c67d590 fffff807`5509e675     : 00000000`00000000 ffff8782`2c67d688 ffff8782`2c67d730 00000000`00000000 : nt!CmpTransSearchAddTrans+0x37
ffff8782`2c67d5f0 fffff807`54ff8751     : 00000000`00000000 ffff9109`155bc6a0 00000000`00000000 00000000`00000000 : nt!CmpTransSearchAddTransFromKeyBody+0x91
ffff8782`2c67d630 fffff807`5502a3e2     : 00000000`00000000 00000000`0000001a 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x5e1
ffff8782`2c67d790 fffff807`54e0a9b8     : 00000000`00020019 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryValueKey+0x5f2
ffff8782`2c67da90 00007ffd`f1a8d2e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000031`b747d088 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`f1a8d2e4


SYMBOL_NAME:  nt!CmpTransReferenceTransaction+3f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr 0xffff87822c67cb20 ; kb

BUCKET_ID_FUNC_OFFSET:  3f

FAILURE_BUCKET_ID:  AV_nt!CmpTransReferenceTransaction

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {13ff74b6-2a87-f97f-b112-811157223f06}

Followup:     MachineOwner
---------


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff805d53cc0d9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80605813205, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3635

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 4291

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 137

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092022-5484-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff805d53cc0d9

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80605813205

READ_ADDRESS: fffff806062fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff805d53cc0d9

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffff8003ca5e9190 -- (.trap 0xffff8003ca5e9190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff80605600000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80605813205 rsp=ffff8003ca5e9320 rbp=6000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiSwapThread+0x655:
fffff806`05813205 488b94d1c0dccf00 mov     rdx,qword ptr [rcx+rdx*8+0CFDCC0h] ds:fffff806`062fdcc8=ffffc700d7aa1180
Resetting default scope

STACK_TEXT:
ffff8003`ca5e9048 fffff806`05a0af69     : 00000000`0000000a fffff805`d53cc0d9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8003`ca5e9050 fffff806`05a07269     : 00000000`10000001 00040001`00010000 00040000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8003`ca5e9190 fffff806`05813205     : ffffc700`d7d89180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8003`ca5e9320 fffff806`058125df     : 00000001`00000005 00000000`00000001 ffff8003`ca5e94e0 00000000`00000000 : nt!KiSwapThread+0x655
ffff8003`ca5e93d0 fffff806`05811e83     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd708`98cd61c0 : nt!KiCommitThreadWait+0x14f
ffff8003`ca5e9470 fffff806`0588cdcd     : ffffd708`98cd6360 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff8003`ca5e9560 fffff806`05815679     : 00000000`00000000 ffffd708`98cd6080 ffffd708`98cd6308 ffffd708`98cd6118 : nt!KiSchedulerApc+0x3bd
ffff8003`ca5e9690 fffff806`059fd330     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9
ffff8003`ca5e9740 fffff806`05c33f68     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x2f0
ffff8003`ca5e98d0 fffff806`05a00998     : ffffc700`d7d89180 ffffd708`98cd6080 ffffc700`d7d94240 00000000`00000000 : nt!PspUserThreadStartup+0x48
ffff8003`ca5e99c0 fffff806`05a00900     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28
ffff8003`ca5e9b00 00007ffe`49b02680     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
000000fe`284ffa38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`49b02680


SYMBOL_NAME:  nt!KiSwapThread+655

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  655

FAILURE_BUCKET_ID:  AV_nt!KiSwapThread

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}

Followup:     MachineOwner
---------
 
Merhaba,

Bu yüklediğiniz 3 dökümde de BIOS sürümünüz 5603 olarak gözüküyor.

Kod:
BiosVersion = 5603.
BiosReleaseDate = 07/28/2020
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B350M-A

En güncel sürüm 6042 sürümü. Bu sürüme güncelleyebilirsiniz.

Liste: PRIME B350M-A|Anakart|ASUS Türkiye

Güncel BIOS: https://dlcdnets.asus.com/pub/ASUS/mb/BIOS/PRIME-B350M-A-ASUS-6042.zip

Dökümler:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffe890aa164f4, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
 bit 1 is set if the fault was due to a write, clear if a read.
 bit 3 is set if the processor decided the fault was due to a corrupted PTE.
 bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
 - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
 bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80724e2c145, If non-zero, the instruction address which referenced the bad memory.
 address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : AV.Type
 Value: Write.

 Key : Analysis.CPU.mSec
 Value: 2796.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 9477.

 Key : Analysis.Init.CPU.mSec
 Value: 374.

 Key : Analysis.Init.Elapsed.mSec
 Value: 13176.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 144.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x50.

 Key : Bugcheck.Code.Register
 Value: 0x50.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092022-5156-01.dmp

BUGCHECK_CODE: 50.

BUGCHECK_P1: fffffe890aa164f4.

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80724e2c145.

BUGCHECK_P4: 2

READ_ADDRESS: fffff807258fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 fffffe890aa164f4.

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: services.exe

TRAP_FRAME: fffffe890aa0c340 -- (.trap 0xfffffe890aa0c340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd539eff604fa rbx=0000000000000000 rcx=0000000000000000
rdx=ffff820fff26d8f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80724e2c145 rsp=fffffe890aa0c4d0 rbp=0000000000000000
 r8=0000000000000002 r9=0000000000000000 r10=fffff80724e2c100
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc.
nt!FsRtlCheckOplockEx2+0x45:
fffff807`24e2c145 48898c24a0000000 mov qword ptr [rsp+0A0h],rcx ss:0018:fffffe89`0aa0c570=0000000053c80000
Resetting default scope.

STACK_TEXT:
fffffe89`0aa0c098 fffff807`25031a9d : 00000000`00000050 fffffe89`0aa164f4 00000000`00000002 fffffe89`0aa0c340 : nt!KeBugCheckEx
fffffe89`0aa0c0a0 fffff807`24e399e0 : fffffe89`0aa0c598 00000000`00000002 fffffe89`0aa0c3c0 00000000`00000000 : nt!MiSystemFault+0x1da08d
fffffe89`0aa0c1a0 fffff807`2500715e : ffff820f`00000000 ffffd539`eff6019a ffff820f`00000080 00000000`00000000 : nt!MmAccessFault+0x400
fffffe89`0aa0c340 fffff807`24e2c145 : 00000000`00000000 00000000`00000080 ffff820f`fca9e4c0 00000000`00000000 : nt!KiPageFault+0x35e
fffffe89`0aa0c4d0 fffff807`2a86bb2a : ffff820f`ff26dc48 fffffe89`0aa0d0e8 fffffe89`0aa0d0f0 ffff9a8e`53c80170 : nt!FsRtlCheckOplockEx2+0x45
fffffe89`0aa0c640 fffff807`2a86960a : ffff820f`fc00aa28 ffff820f`ff26dc48 ffff820f`f9ab7100 ffff9a8e`53c80470 : Ntfs!NtfsOpenAttribute+0x70a
fffffe89`0aa0c7e0 fffff807`2a869177 : 00000000`00000080 00000000`00000008 fffffe89`0aa0d080 ffff9a8e`00000024 : Ntfs!NtfsOpenExistingAttr+0x1fa
fffffe89`0aa0c8a0 fffff807`2a867b8a : fffffe89`0aa0d080 ffff9a8e`4ee33690 ffff9a8e`53c80010 ffff9a8e`53c80010 : Ntfs!NtfsOpenAttributeInExistingFile+0xae7
fffffe89`0aa0ca90 fffff807`2a81f6ff : ffff820f`fc00aa28 ffff820f`f9ab84f0 ffff9a8e`4ed1d170 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x22a
fffffe89`0aa0cba0 fffff807`2a820600 : ffff820f`fc00aa28 ffff820f`ff26d8f0 ffff820f`fc00aa28 fffffe89`0aa0ce40 : Ntfs!NtfsFindStartingNode+0x3ff
fffffe89`0aa0cc90 fffff807`2a81be9b : ffff820f`ff26d8f0 fffffe89`0aa0d080 ffff820f`ff26d8f0 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
fffffe89`0aa0cf70 fffff807`24e2a6b5 : ffff820f`f9ab7030 ffff820f`ff26d8f0 fffffe89`0aa0d200 ffff820f`feca1b50 : Ntfs!NtfsFsdCreate+0x1db
fffffe89`0aa0d1f0 fffff807`248470cf : ffff820f`feca1b00 fffffe89`0aa0d2e0 fffffe89`0aa0d2e9 fffff807`24845f3a : nt!IofCallDriver+0x55
fffffe89`0aa0d230 fffff807`24879f54 : fffffe89`0aa0d2e0 ffff820f`feca1ba8 ffff820f`f99a4d20 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffe89`0aa0d2a0 fffff807`24e2a6b5 : ffff820f`feca1b00 ffff820f`f999a8f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
fffffe89`0aa0d350 fffff807`24e2bcb4 : 00000000`00000000 ffff820f`ff26d8f0 ffff820f`f9a6a700 ffff820f`f99a4d20 : nt!IofCallDriver+0x55
fffffe89`0aa0d390 fffff807`25215f5d : fffffe89`0aa0d650 ffff820f`f999a8f0 ffff820f`feca1be8 fffffe89`00000001 : nt!IoCallDriverWithTracing+0x34
fffffe89`0aa0d3e0 fffff807`251ff2fe : ffff820f`f999a8f0 00000000`00000000 ffff820f`fca9e4a0 ffff820f`fca9e401 : nt!IopParseDevice+0x117d
fffffe89`0aa0d550 fffff807`25228b2a : ffff820f`fca9e400 fffffe89`0aa0d7b8 ffff820f`00000040 ffff820f`f66f3bc0 : nt!ObpLookupObjectName+0x3fe
fffffe89`0aa0d720 fffff807`252738a5 : fffffe89`00000000 00000070`3151d7e0 00000070`3151dd01 00000070`3151d7b0 : nt!ObOpenObjectByNameEx+0x1fa
fffffe89`0aa0d850 fffff807`2500a9b8 : 00000000`00000000 ffff820f`fe734080 ffff820f`fe7da080 000001a1`239be7e0 : nt!NtQueryAttributesFile+0x1c5
fffffe89`0aa0db00 00007ff9`e3acd7a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000070`3151d738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e3acd7a4

SYMBOL_NAME: nt!FsRtlCheckOplockEx2+45

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.2006

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 45.

FAILURE_BUCKET_ID: AV_W_(null)_nt!FsRtlCheckOplockEx2

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c8ac082d-2685-4e94-039f-f7b11bce9de0}

Followup: MachineOwner.
---------

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80754c0ec54, Address of the instruction which caused the BugCheck.
Arg3: ffff87822c67cb20, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1796.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 6020.

 Key : Analysis.Init.CPU.mSec
 Value: 390.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5990.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 127.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x3b.

 Key : Bugcheck.Code.Register
 Value: 0x3b.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092022-6015-01.dmp

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80754c0ec54.

BUGCHECK_P3: ffff87822c67cb20.

BUGCHECK_P4: 0

CONTEXT: ffff87822c67cb20 -- (.cxr 0xffff87822c67cb20)
rax=ffff87822c67d630 rbx=0000000000000001 rcx=0001000000000000
rdx=0000000000000000 rsi=0001000000000000 rdi=0000000000000000
rip=fffff80754c0ec54 rsp=ffff87822c67d520 rbp=ffff91090d6170f0
 r8=ffff91090d6170f0 r9=ffff91091014a000 r10=ffff9109155bc6a0
r11=ffff87822c67d5c0 r12=0000000000000000 r13=0000000000000000
r14=ffff87822c67d920 r15=ffff91091014a000
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ObfReferenceObject+0x24:
fffff807`54c0ec54 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:002b:0000ffff`ffffffd0=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Registry.

STACK_TEXT:
ffff8782`2c67d520 fffff807`5509e80f : 00010000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfReferenceObject+0x24
ffff8782`2c67d560 fffff807`55156123 : 00010000`00000000 00000000`00000000 ffffa68e`b8318690 fffff807`54c0e61b : nt!CmpTransReferenceTransaction+0x3f
ffff8782`2c67d590 fffff807`5509e675 : 00000000`00000000 ffff8782`2c67d688 ffff8782`2c67d730 00000000`00000000 : nt!CmpTransSearchAddTrans+0x37
ffff8782`2c67d5f0 fffff807`54ff8751 : 00000000`00000000 ffff9109`155bc6a0 00000000`00000000 00000000`00000000 : nt!CmpTransSearchAddTransFromKeyBody+0x91
ffff8782`2c67d630 fffff807`5502a3e2 : 00000000`00000000 00000000`0000001a 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x5e1
ffff8782`2c67d790 fffff807`54e0a9b8 : 00000000`00020019 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryValueKey+0x5f2
ffff8782`2c67da90 00007ffd`f1a8d2e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000031`b747d088 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`f1a8d2e4

SYMBOL_NAME: nt!CmpTransReferenceTransaction+3f

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.2006

STACK_COMMAND: .cxr 0xffff87822c67cb20 ; kb.

BUCKET_ID_FUNC_OFFSET: 3f.

FAILURE_BUCKET_ID: AV_nt!CmpTransReferenceTransaction

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {13ff74b6-2a87-f97f-b112-811157223f06}

Followup: MachineOwner.
---------

Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff805d53cc0d9, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation.
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80605813205, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1671.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 3635.

 Key : Analysis.Init.CPU.mSec
 Value: 358.

 Key : Analysis.Init.Elapsed.mSec
 Value: 4291.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 137.

 Key : Bugcheck.Code.DumpHeader
 Value: 0xa.

 Key : Bugcheck.Code.Register
 Value: 0xa.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 092022-5484-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: fffff805d53cc0d9.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80605813205.

READ_ADDRESS: fffff806062fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 fffff805d53cc0d9.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

TRAP_FRAME: ffff8003ca5e9190 -- (.trap 0xffff8003ca5e9190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff80605600000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80605813205 rsp=ffff8003ca5e9320 rbp=6000000000000000
 r8=0000000000000000 r9=0000000000000000 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc.
nt!KiSwapThread+0x655:
fffff806`05813205 488b94d1c0dccf00 mov rdx,qword ptr [rcx+rdx*8+0CFDCC0h] ds:fffff806`062fdcc8=ffffc700d7aa1180
Resetting default scope.

STACK_TEXT:
ffff8003`ca5e9048 fffff806`05a0af69 : 00000000`0000000a fffff805`d53cc0d9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8003`ca5e9050 fffff806`05a07269 : 00000000`10000001 00040001`00010000 00040000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8003`ca5e9190 fffff806`05813205 : ffffc700`d7d89180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8003`ca5e9320 fffff806`058125df : 00000001`00000005 00000000`00000001 ffff8003`ca5e94e0 00000000`00000000 : nt!KiSwapThread+0x655
ffff8003`ca5e93d0 fffff806`05811e83 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd708`98cd61c0 : nt!KiCommitThreadWait+0x14f
ffff8003`ca5e9470 fffff806`0588cdcd : ffffd708`98cd6360 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff8003`ca5e9560 fffff806`05815679 : 00000000`00000000 ffffd708`98cd6080 ffffd708`98cd6308 ffffd708`98cd6118 : nt!KiSchedulerApc+0x3bd
ffff8003`ca5e9690 fffff806`059fd330 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9
ffff8003`ca5e9740 fffff806`05c33f68 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x2f0
ffff8003`ca5e98d0 fffff806`05a00998 : ffffc700`d7d89180 ffffd708`98cd6080 ffffc700`d7d94240 00000000`00000000 : nt!PspUserThreadStartup+0x48
ffff8003`ca5e99c0 fffff806`05a00900 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28
ffff8003`ca5e9b00 00007ffe`49b02680 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
000000fe`284ffa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`49b02680

SYMBOL_NAME: nt!KiSwapThread+655

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.2006

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 655.

FAILURE_BUCKET_ID: AV_nt!KiSwapThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}

Followup: MachineOwner.
---------

Cevabınız için çok teşekkür ederim. Sorunum BIOS kaynaklı mı acaba? Update yaptığım zaman düzelir mi? Ne zaman BIOS pilini çıkarıp beklesem sorunsuz olarak sistemi kullanabiliyorum. Konuyu açtıktan kısa bir süre sonra yine aynı işlemi uyguladım ve şu an sıkıntısız olarak kullanıyorum ama gece kapatıp sabah açmaya çalıştığım zaman yine başa dönüp aynı sorunları yaşamaya başlıyorum.
 
Cevabınız için çok teşekkür ederim. Sorunum BIOS kaynaklı mı acaba?
Rica ederim, dökümlerden net bir şey çıkaramadım. Atladığım ve bilmediğim bazı detaylar olabiliyor; bazen de her mavi ekranın kaynağı kesin belli olmuyor. Sizin aldıklarınız da o yönde sanki.

Sistem dosyaları onarma, Memtest86 ile arızalı RAM kontrolü gibi çözümler öneriliyor bu tip genel mavi ekranlar için. Ama BIOS ile alakalı bazı problemlerle karşılaştığınız için onun üzerinden gitmek daha mantıklı olur diye düşündüm.

BIOS güncelleme için bu videoyu mu takip ettiniz bilmiyorum ama yardımcı olabilir:
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Videoda BIOS dosyasını USB belleğe atma işlemi gösterilmiyor tabii önce indirip doğru dosyayı belleğe atarsınız, daha önce yaptığınız gibi.

6042 BIOS: https://dlcdnets.asus.com/pub/ASUS/mb/BIOS/PRIME-B350M-A-ASUS-6042.zip
 
Cevabınız için tekrardan teşekkür ederim.

@Recep Baltaş @Enes3078 sizlerin de bakma şansı var mı acaba? Ben sorunun RAM'lerin 3200 MHz'de çalışmaya başladığı zaman bu hatayı vermesinden şüpheleniyorum. Şu an 2400'de çalışıyorlar ve sabahtan beri herhangi bir mavi ekran hatası gelmedi. Sabitleyebilirsem sanırım sorunum çözülecek gibi duruyor.
 
Ben sorunun RAM'lerin 3200 MHz'de çalışmaya zorlandığı zaman bu hatayı vermesinden şüpheleniyorum. Şu an 2400'de çalışıyorlar ve sabahtan beri herhangi bir mavi ekran hatası gelmedi.
Evet yüksek ihtimalle problem bu. XMP profili açıyorsunuz sanırım.

Bir ara zaman bulunca mutlaka Memtest86 ile test yapın: Memtest86 USB'den Çalışan RAM Test Programı

Testten bir şey çıkmazsa yapacak bir şey yok gibi. Her RAM her anakart ve işlemciyle stabil çalışamıyor, hele XMP profili açıkken stabilite problemleri artıyor.

Ayrıca siz yeni RAM aldığınızdan bahsetmişsiniz. Böyle bir etken de var. Ama yeni RAM'i çıkartıp eskisiyle de mavi ekran aldığınızı söylediniz. Eski RAM için BIOS'tan XMP açık mıydı?

Yine Memtest86'ya çıkıyor kapı.

Ama önce bir BIOS güncelleyin, belki sisteme bazı iyileştirmeler sağlar ve sorununuzu çözebilir.
 

Technopat Haberler

Geri
Yukarı