BiosVersion = 5603
BiosReleaseDate = 07/28/2020
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B350M-A
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffe890aa164f4, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80724e2c145, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9477
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 13176
Key : Analysis.Memory.CommitPeak.Mb
Value: 144
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092022-5156-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffe890aa164f4
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80724e2c145
BUGCHECK_P4: 2
READ_ADDRESS: fffff807258fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffffe890aa164f4
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: services.exe
TRAP_FRAME: fffffe890aa0c340 -- (.trap 0xfffffe890aa0c340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd539eff604fa rbx=0000000000000000 rcx=0000000000000000
rdx=ffff820fff26d8f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80724e2c145 rsp=fffffe890aa0c4d0 rbp=0000000000000000
r8=0000000000000002 r9=0000000000000000 r10=fffff80724e2c100
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!FsRtlCheckOplockEx2+0x45:
fffff807`24e2c145 48898c24a0000000 mov qword ptr [rsp+0A0h],rcx ss:0018:fffffe89`0aa0c570=0000000053c80000
Resetting default scope
STACK_TEXT:
fffffe89`0aa0c098 fffff807`25031a9d : 00000000`00000050 fffffe89`0aa164f4 00000000`00000002 fffffe89`0aa0c340 : nt!KeBugCheckEx
fffffe89`0aa0c0a0 fffff807`24e399e0 : fffffe89`0aa0c598 00000000`00000002 fffffe89`0aa0c3c0 00000000`00000000 : nt!MiSystemFault+0x1da08d
fffffe89`0aa0c1a0 fffff807`2500715e : ffff820f`00000000 ffffd539`eff6019a ffff820f`00000080 00000000`00000000 : nt!MmAccessFault+0x400
fffffe89`0aa0c340 fffff807`24e2c145 : 00000000`00000000 00000000`00000080 ffff820f`fca9e4c0 00000000`00000000 : nt!KiPageFault+0x35e
fffffe89`0aa0c4d0 fffff807`2a86bb2a : ffff820f`ff26dc48 fffffe89`0aa0d0e8 fffffe89`0aa0d0f0 ffff9a8e`53c80170 : nt!FsRtlCheckOplockEx2+0x45
fffffe89`0aa0c640 fffff807`2a86960a : ffff820f`fc00aa28 ffff820f`ff26dc48 ffff820f`f9ab7100 ffff9a8e`53c80470 : Ntfs!NtfsOpenAttribute+0x70a
fffffe89`0aa0c7e0 fffff807`2a869177 : 00000000`00000080 00000000`00000008 fffffe89`0aa0d080 ffff9a8e`00000024 : Ntfs!NtfsOpenExistingAttr+0x1fa
fffffe89`0aa0c8a0 fffff807`2a867b8a : fffffe89`0aa0d080 ffff9a8e`4ee33690 ffff9a8e`53c80010 ffff9a8e`53c80010 : Ntfs!NtfsOpenAttributeInExistingFile+0xae7
fffffe89`0aa0ca90 fffff807`2a81f6ff : ffff820f`fc00aa28 ffff820f`f9ab84f0 ffff9a8e`4ed1d170 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x22a
fffffe89`0aa0cba0 fffff807`2a820600 : ffff820f`fc00aa28 ffff820f`ff26d8f0 ffff820f`fc00aa28 fffffe89`0aa0ce40 : Ntfs!NtfsFindStartingNode+0x3ff
fffffe89`0aa0cc90 fffff807`2a81be9b : ffff820f`ff26d8f0 fffffe89`0aa0d080 ffff820f`ff26d8f0 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
fffffe89`0aa0cf70 fffff807`24e2a6b5 : ffff820f`f9ab7030 ffff820f`ff26d8f0 fffffe89`0aa0d200 ffff820f`feca1b50 : Ntfs!NtfsFsdCreate+0x1db
fffffe89`0aa0d1f0 fffff807`248470cf : ffff820f`feca1b00 fffffe89`0aa0d2e0 fffffe89`0aa0d2e9 fffff807`24845f3a : nt!IofCallDriver+0x55
fffffe89`0aa0d230 fffff807`24879f54 : fffffe89`0aa0d2e0 ffff820f`feca1ba8 ffff820f`f99a4d20 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffe89`0aa0d2a0 fffff807`24e2a6b5 : ffff820f`feca1b00 ffff820f`f999a8f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
fffffe89`0aa0d350 fffff807`24e2bcb4 : 00000000`00000000 ffff820f`ff26d8f0 ffff820f`f9a6a700 ffff820f`f99a4d20 : nt!IofCallDriver+0x55
fffffe89`0aa0d390 fffff807`25215f5d : fffffe89`0aa0d650 ffff820f`f999a8f0 ffff820f`feca1be8 fffffe89`00000001 : nt!IoCallDriverWithTracing+0x34
fffffe89`0aa0d3e0 fffff807`251ff2fe : ffff820f`f999a8f0 00000000`00000000 ffff820f`fca9e4a0 ffff820f`fca9e401 : nt!IopParseDevice+0x117d
fffffe89`0aa0d550 fffff807`25228b2a : ffff820f`fca9e400 fffffe89`0aa0d7b8 ffff820f`00000040 ffff820f`f66f3bc0 : nt!ObpLookupObjectName+0x3fe
fffffe89`0aa0d720 fffff807`252738a5 : fffffe89`00000000 00000070`3151d7e0 00000070`3151dd01 00000070`3151d7b0 : nt!ObOpenObjectByNameEx+0x1fa
fffffe89`0aa0d850 fffff807`2500a9b8 : 00000000`00000000 ffff820f`fe734080 ffff820f`fe7da080 000001a1`239be7e0 : nt!NtQueryAttributesFile+0x1c5
fffffe89`0aa0db00 00007ff9`e3acd7a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000070`3151d738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e3acd7a4
SYMBOL_NAME: nt!FsRtlCheckOplockEx2+45
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 45
FAILURE_BUCKET_ID: AV_W_(null)_nt!FsRtlCheckOplockEx2
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c8ac082d-2685-4e94-039f-f7b11bce9de0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80754c0ec54, Address of the instruction which caused the BugCheck
Arg3: ffff87822c67cb20, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6020
Key : Analysis.Init.CPU.mSec
Value: 390
Key : Analysis.Init.Elapsed.mSec
Value: 5990
Key : Analysis.Memory.CommitPeak.Mb
Value: 127
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092022-6015-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80754c0ec54
BUGCHECK_P3: ffff87822c67cb20
BUGCHECK_P4: 0
CONTEXT: ffff87822c67cb20 -- (.cxr 0xffff87822c67cb20)
rax=ffff87822c67d630 rbx=0000000000000001 rcx=0001000000000000
rdx=0000000000000000 rsi=0001000000000000 rdi=0000000000000000
rip=fffff80754c0ec54 rsp=ffff87822c67d520 rbp=ffff91090d6170f0
r8=ffff91090d6170f0 r9=ffff91091014a000 r10=ffff9109155bc6a0
r11=ffff87822c67d5c0 r12=0000000000000000 r13=0000000000000000
r14=ffff87822c67d920 r15=ffff91091014a000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ObfReferenceObject+0x24:
fffff807`54c0ec54 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:002b:0000ffff`ffffffd0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffff8782`2c67d520 fffff807`5509e80f : 00010000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfReferenceObject+0x24
ffff8782`2c67d560 fffff807`55156123 : 00010000`00000000 00000000`00000000 ffffa68e`b8318690 fffff807`54c0e61b : nt!CmpTransReferenceTransaction+0x3f
ffff8782`2c67d590 fffff807`5509e675 : 00000000`00000000 ffff8782`2c67d688 ffff8782`2c67d730 00000000`00000000 : nt!CmpTransSearchAddTrans+0x37
ffff8782`2c67d5f0 fffff807`54ff8751 : 00000000`00000000 ffff9109`155bc6a0 00000000`00000000 00000000`00000000 : nt!CmpTransSearchAddTransFromKeyBody+0x91
ffff8782`2c67d630 fffff807`5502a3e2 : 00000000`00000000 00000000`0000001a 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x5e1
ffff8782`2c67d790 fffff807`54e0a9b8 : 00000000`00020019 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryValueKey+0x5f2
ffff8782`2c67da90 00007ffd`f1a8d2e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000031`b747d088 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`f1a8d2e4
SYMBOL_NAME: nt!CmpTransReferenceTransaction+3f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr 0xffff87822c67cb20 ; kb
BUCKET_ID_FUNC_OFFSET: 3f
FAILURE_BUCKET_ID: AV_nt!CmpTransReferenceTransaction
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {13ff74b6-2a87-f97f-b112-811157223f06}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff805d53cc0d9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80605813205, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1671
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3635
Key : Analysis.Init.CPU.mSec
Value: 358
Key : Analysis.Init.Elapsed.mSec
Value: 4291
Key : Analysis.Memory.CommitPeak.Mb
Value: 137
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092022-5484-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: fffff805d53cc0d9
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80605813205
READ_ADDRESS: fffff806062fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff805d53cc0d9
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff8003ca5e9190 -- (.trap 0xffff8003ca5e9190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff80605600000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80605813205 rsp=ffff8003ca5e9320 rbp=6000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSwapThread+0x655:
fffff806`05813205 488b94d1c0dccf00 mov rdx,qword ptr [rcx+rdx*8+0CFDCC0h] ds:fffff806`062fdcc8=ffffc700d7aa1180
Resetting default scope
STACK_TEXT:
ffff8003`ca5e9048 fffff806`05a0af69 : 00000000`0000000a fffff805`d53cc0d9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8003`ca5e9050 fffff806`05a07269 : 00000000`10000001 00040001`00010000 00040000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8003`ca5e9190 fffff806`05813205 : ffffc700`d7d89180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8003`ca5e9320 fffff806`058125df : 00000001`00000005 00000000`00000001 ffff8003`ca5e94e0 00000000`00000000 : nt!KiSwapThread+0x655
ffff8003`ca5e93d0 fffff806`05811e83 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd708`98cd61c0 : nt!KiCommitThreadWait+0x14f
ffff8003`ca5e9470 fffff806`0588cdcd : ffffd708`98cd6360 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff8003`ca5e9560 fffff806`05815679 : 00000000`00000000 ffffd708`98cd6080 ffffd708`98cd6308 ffffd708`98cd6118 : nt!KiSchedulerApc+0x3bd
ffff8003`ca5e9690 fffff806`059fd330 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9
ffff8003`ca5e9740 fffff806`05c33f68 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x2f0
ffff8003`ca5e98d0 fffff806`05a00998 : ffffc700`d7d89180 ffffd708`98cd6080 ffffc700`d7d94240 00000000`00000000 : nt!PspUserThreadStartup+0x48
ffff8003`ca5e99c0 fffff806`05a00900 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28
ffff8003`ca5e9b00 00007ffe`49b02680 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
000000fe`284ffa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`49b02680
SYMBOL_NAME: nt!KiSwapThread+655
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 655
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
Merhaba,
Bu yüklediğiniz 3 dökümde de BIOS sürümünüz 5603 olarak gözüküyor.
Kod:BiosVersion = 5603. BiosReleaseDate = 07/28/2020 BaseBoardManufacturer = ASUSTeK COMPUTER INC. BaseBoardProduct = PRIME B350M-A
En güncel sürüm 6042 sürümü. Bu sürüme güncelleyebilirsiniz.
Liste: PRIME B350M-A|Anakart|ASUS Türkiye
Güncel BIOS: https://dlcdnets.asus.com/pub/ASUS/mb/BIOS/PRIME-B350M-A-ASUS-6042.zip
Dökümler:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffe890aa164f4, memory referenced. Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE. bit 1 is set if the fault was due to a write, clear if a read. bit 3 is set if the processor decided the fault was due to a corrupted PTE. bit 4 is set if the fault was due to attempted execute of a no-execute PTE. - ARM64: bit 1 is set if the fault was due to a write, clear if a read. bit 3 is set if the fault was due to attempted execute of a no-execute PTE. Arg3: fffff80724e2c145, If non-zero, the instruction address which referenced the bad memory. address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Type Value: Write. Key : Analysis.CPU.mSec Value: 2796. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 9477. Key : Analysis.Init.CPU.mSec Value: 374. Key : Analysis.Init.Elapsed.mSec Value: 13176. Key : Analysis.Memory.CommitPeak.Mb Value: 144. Key : Bugcheck.Code.DumpHeader Value: 0x50. Key : Bugcheck.Code.Register Value: 0x50. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092022-5156-01.dmp BUGCHECK_CODE: 50. BUGCHECK_P1: fffffe890aa164f4. BUGCHECK_P2: 2 BUGCHECK_P3: fffff80724e2c145. BUGCHECK_P4: 2 READ_ADDRESS: fffff807258fb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse fffffe890aa164f4. MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: services.exe TRAP_FRAME: fffffe890aa0c340 -- (.trap 0xfffffe890aa0c340) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffd539eff604fa rbx=0000000000000000 rcx=0000000000000000 rdx=ffff820fff26d8f0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80724e2c145 rsp=fffffe890aa0c4d0 rbp=0000000000000000 r8=0000000000000002 r9=0000000000000000 r10=fffff80724e2c100 r11=0000000000000001 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc. nt!FsRtlCheckOplockEx2+0x45: fffff807`24e2c145 48898c24a0000000 mov qword ptr [rsp+0A0h],rcx ss:0018:fffffe89`0aa0c570=0000000053c80000 Resetting default scope. STACK_TEXT: fffffe89`0aa0c098 fffff807`25031a9d : 00000000`00000050 fffffe89`0aa164f4 00000000`00000002 fffffe89`0aa0c340 : nt!KeBugCheckEx fffffe89`0aa0c0a0 fffff807`24e399e0 : fffffe89`0aa0c598 00000000`00000002 fffffe89`0aa0c3c0 00000000`00000000 : nt!MiSystemFault+0x1da08d fffffe89`0aa0c1a0 fffff807`2500715e : ffff820f`00000000 ffffd539`eff6019a ffff820f`00000080 00000000`00000000 : nt!MmAccessFault+0x400 fffffe89`0aa0c340 fffff807`24e2c145 : 00000000`00000000 00000000`00000080 ffff820f`fca9e4c0 00000000`00000000 : nt!KiPageFault+0x35e fffffe89`0aa0c4d0 fffff807`2a86bb2a : ffff820f`ff26dc48 fffffe89`0aa0d0e8 fffffe89`0aa0d0f0 ffff9a8e`53c80170 : nt!FsRtlCheckOplockEx2+0x45 fffffe89`0aa0c640 fffff807`2a86960a : ffff820f`fc00aa28 ffff820f`ff26dc48 ffff820f`f9ab7100 ffff9a8e`53c80470 : Ntfs!NtfsOpenAttribute+0x70a fffffe89`0aa0c7e0 fffff807`2a869177 : 00000000`00000080 00000000`00000008 fffffe89`0aa0d080 ffff9a8e`00000024 : Ntfs!NtfsOpenExistingAttr+0x1fa fffffe89`0aa0c8a0 fffff807`2a867b8a : fffffe89`0aa0d080 ffff9a8e`4ee33690 ffff9a8e`53c80010 ffff9a8e`53c80010 : Ntfs!NtfsOpenAttributeInExistingFile+0xae7 fffffe89`0aa0ca90 fffff807`2a81f6ff : ffff820f`fc00aa28 ffff820f`f9ab84f0 ffff9a8e`4ed1d170 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x22a fffffe89`0aa0cba0 fffff807`2a820600 : ffff820f`fc00aa28 ffff820f`ff26d8f0 ffff820f`fc00aa28 fffffe89`0aa0ce40 : Ntfs!NtfsFindStartingNode+0x3ff fffffe89`0aa0cc90 fffff807`2a81be9b : ffff820f`ff26d8f0 fffffe89`0aa0d080 ffff820f`ff26d8f0 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580 fffffe89`0aa0cf70 fffff807`24e2a6b5 : ffff820f`f9ab7030 ffff820f`ff26d8f0 fffffe89`0aa0d200 ffff820f`feca1b50 : Ntfs!NtfsFsdCreate+0x1db fffffe89`0aa0d1f0 fffff807`248470cf : ffff820f`feca1b00 fffffe89`0aa0d2e0 fffffe89`0aa0d2e9 fffff807`24845f3a : nt!IofCallDriver+0x55 fffffe89`0aa0d230 fffff807`24879f54 : fffffe89`0aa0d2e0 ffff820f`feca1ba8 ffff820f`f99a4d20 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f fffffe89`0aa0d2a0 fffff807`24e2a6b5 : ffff820f`feca1b00 ffff820f`f999a8f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324 fffffe89`0aa0d350 fffff807`24e2bcb4 : 00000000`00000000 ffff820f`ff26d8f0 ffff820f`f9a6a700 ffff820f`f99a4d20 : nt!IofCallDriver+0x55 fffffe89`0aa0d390 fffff807`25215f5d : fffffe89`0aa0d650 ffff820f`f999a8f0 ffff820f`feca1be8 fffffe89`00000001 : nt!IoCallDriverWithTracing+0x34 fffffe89`0aa0d3e0 fffff807`251ff2fe : ffff820f`f999a8f0 00000000`00000000 ffff820f`fca9e4a0 ffff820f`fca9e401 : nt!IopParseDevice+0x117d fffffe89`0aa0d550 fffff807`25228b2a : ffff820f`fca9e400 fffffe89`0aa0d7b8 ffff820f`00000040 ffff820f`f66f3bc0 : nt!ObpLookupObjectName+0x3fe fffffe89`0aa0d720 fffff807`252738a5 : fffffe89`00000000 00000070`3151d7e0 00000070`3151dd01 00000070`3151d7b0 : nt!ObOpenObjectByNameEx+0x1fa fffffe89`0aa0d850 fffff807`2500a9b8 : 00000000`00000000 ffff820f`fe734080 ffff820f`fe7da080 000001a1`239be7e0 : nt!NtQueryAttributesFile+0x1c5 fffffe89`0aa0db00 00007ff9`e3acd7a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000070`3151d738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e3acd7a4 SYMBOL_NAME: nt!FsRtlCheckOplockEx2+45 MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.2006 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 45. FAILURE_BUCKET_ID: AV_W_(null)_nt!FsRtlCheckOplockEx2 OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c8ac082d-2685-4e94-039f-f7b11bce9de0} Followup: MachineOwner. ---------
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck. Arg2: fffff80754c0ec54, Address of the instruction which caused the BugCheck. Arg3: ffff87822c67cb20, Address of the context record for the exception that caused the BugCheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1796. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 6020. Key : Analysis.Init.CPU.mSec Value: 390. Key : Analysis.Init.Elapsed.mSec Value: 5990. Key : Analysis.Memory.CommitPeak.Mb Value: 127. Key : Bugcheck.Code.DumpHeader Value: 0x3b. Key : Bugcheck.Code.Register Value: 0x3b. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092022-6015-01.dmp BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff80754c0ec54. BUGCHECK_P3: ffff87822c67cb20. BUGCHECK_P4: 0 CONTEXT: ffff87822c67cb20 -- (.cxr 0xffff87822c67cb20) rax=ffff87822c67d630 rbx=0000000000000001 rcx=0001000000000000 rdx=0000000000000000 rsi=0001000000000000 rdi=0000000000000000 rip=fffff80754c0ec54 rsp=ffff87822c67d520 rbp=ffff91090d6170f0 r8=ffff91090d6170f0 r9=ffff91091014a000 r10=ffff9109155bc6a0 r11=ffff87822c67d5c0 r12=0000000000000000 r13=0000000000000000 r14=ffff87822c67d920 r15=ffff91091014a000 iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!ObfReferenceObject+0x24: fffff807`54c0ec54 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:002b:0000ffff`ffffffd0=???????????????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Registry. STACK_TEXT: ffff8782`2c67d520 fffff807`5509e80f : 00010000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfReferenceObject+0x24 ffff8782`2c67d560 fffff807`55156123 : 00010000`00000000 00000000`00000000 ffffa68e`b8318690 fffff807`54c0e61b : nt!CmpTransReferenceTransaction+0x3f ffff8782`2c67d590 fffff807`5509e675 : 00000000`00000000 ffff8782`2c67d688 ffff8782`2c67d730 00000000`00000000 : nt!CmpTransSearchAddTrans+0x37 ffff8782`2c67d5f0 fffff807`54ff8751 : 00000000`00000000 ffff9109`155bc6a0 00000000`00000000 00000000`00000000 : nt!CmpTransSearchAddTransFromKeyBody+0x91 ffff8782`2c67d630 fffff807`5502a3e2 : 00000000`00000000 00000000`0000001a 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x5e1 ffff8782`2c67d790 fffff807`54e0a9b8 : 00000000`00020019 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryValueKey+0x5f2 ffff8782`2c67da90 00007ffd`f1a8d2e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000031`b747d088 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`f1a8d2e4 SYMBOL_NAME: nt!CmpTransReferenceTransaction+3f MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.2006 STACK_COMMAND: .cxr 0xffff87822c67cb20 ; kb. BUCKET_ID_FUNC_OFFSET: 3f. FAILURE_BUCKET_ID: AV_nt!CmpTransReferenceTransaction OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {13ff74b6-2a87-f97f-b112-811157223f06} Followup: MachineOwner. ---------
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff805d53cc0d9, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80605813205, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1671. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 3635. Key : Analysis.Init.CPU.mSec Value: 358. Key : Analysis.Init.Elapsed.mSec Value: 4291. Key : Analysis.Memory.CommitPeak.Mb Value: 137. Key : Bugcheck.Code.DumpHeader Value: 0xa. Key : Bugcheck.Code.Register Value: 0xa. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092022-5484-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: fffff805d53cc0d9. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80605813205. READ_ADDRESS: fffff806062fb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. unable to get nt!MmSpecialPagesInUse fffff805d53cc0d9. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe TRAP_FRAME: ffff8003ca5e9190 -- (.trap 0xffff8003ca5e9190) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=fffff80605600000 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80605813205 rsp=ffff8003ca5e9320 rbp=6000000000000000 r8=0000000000000000 r9=0000000000000000 r10=0000000000000005 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc. nt!KiSwapThread+0x655: fffff806`05813205 488b94d1c0dccf00 mov rdx,qword ptr [rcx+rdx*8+0CFDCC0h] ds:fffff806`062fdcc8=ffffc700d7aa1180 Resetting default scope. STACK_TEXT: ffff8003`ca5e9048 fffff806`05a0af69 : 00000000`0000000a fffff805`d53cc0d9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff8003`ca5e9050 fffff806`05a07269 : 00000000`10000001 00040001`00010000 00040000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffff8003`ca5e9190 fffff806`05813205 : ffffc700`d7d89180 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469 ffff8003`ca5e9320 fffff806`058125df : 00000001`00000005 00000000`00000001 ffff8003`ca5e94e0 00000000`00000000 : nt!KiSwapThread+0x655 ffff8003`ca5e93d0 fffff806`05811e83 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd708`98cd61c0 : nt!KiCommitThreadWait+0x14f ffff8003`ca5e9470 fffff806`0588cdcd : ffffd708`98cd6360 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x233 ffff8003`ca5e9560 fffff806`05815679 : 00000000`00000000 ffffd708`98cd6080 ffffd708`98cd6308 ffffd708`98cd6118 : nt!KiSchedulerApc+0x3bd ffff8003`ca5e9690 fffff806`059fd330 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9 ffff8003`ca5e9740 fffff806`05c33f68 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x2f0 ffff8003`ca5e98d0 fffff806`05a00998 : ffffc700`d7d89180 ffffd708`98cd6080 ffffc700`d7d94240 00000000`00000000 : nt!PspUserThreadStartup+0x48 ffff8003`ca5e99c0 fffff806`05a00900 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28 ffff8003`ca5e9b00 00007ffe`49b02680 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn 000000fe`284ffa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`49b02680 SYMBOL_NAME: nt!KiSwapThread+655 MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.2006 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 655. FAILURE_BUCKET_ID: AV_nt!KiSwapThread OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda} Followup: MachineOwner. ---------
Rica ederim, dökümlerden net bir şey çıkaramadım. Atladığım ve bilmediğim bazı detaylar olabiliyor; bazen de her mavi ekranın kaynağı kesin belli olmuyor. Sizin aldıklarınız da o yönde sanki.Cevabınız için çok teşekkür ederim. Sorunum BIOS kaynaklı mı acaba?
Evet yüksek ihtimalle problem bu. XMP profili açıyorsunuz sanırım.Ben sorunun RAM'lerin 3200 MHz'de çalışmaya zorlandığı zaman bu hatayı vermesinden şüpheleniyorum. Şu an 2400'de çalışıyorlar ve sabahtan beri herhangi bir mavi ekran hatası gelmedi.