Blue Screen durch RAM ?

rob!N

Enthusiast
Thread Starter
Mitglied seit
23.12.2007
Beiträge
203
Ort
NRW
Hi,
ich hatte die letzten tage unregelmäßig Bluescreens. Die Crash Dumps habe ich debugged:
(Hardware siehe Signatur, Hauptrechner)

Erster
Code:
Microsoft (R) Windows Debugger  Version 6.4.0007.2
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini071709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt
Built by: 2600.xpsp_sp3_gdr.080814-1236
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Jul 17 16:28:17.656 2009 (GMT+2)
System Uptime: 0 days 1:23:07.270
Loading Kernel Symbols
.........................................................................................................................................................
Loading unloaded module list
...........
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 3516aa, 0, 0}

Probably caused by : memory_corruption ( nt!MiDecrementShareCount+3a )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 003516aa, page frame number
Arg3: 00000000, current page state
Arg4: 00000000, 0

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x4E

LAST_CONTROL_TRANSFER:  from 80522ddc to 804f9f43

STACK_TEXT:  
b03d4c88 80522ddc 0000004e 00000099 003516aa nt!KeBugCheckEx+0x1b
b03d4cb8 80524338 c0600128 c0025f80 00000000 nt!MiDecrementShareCount+0x3a
b03d4cf8 805204bb 04bf0000 00000030 0013e64c nt!MiCopyOnWrite+0x1e6
b03d4d4c 80544588 00000001 04bf0000 00000001 nt!MmAccessFault+0xae9
b03d4d4c 606aaaf0 00000001 04bf0000 00000001 nt!KiTrap0E+0xd0
WARNING: Frame IP not in any known module. Following frames may be wrong.
0013e624 00000000 00000000 00000000 00000000 0x606aaaf0


FOLLOWUP_IP: 
nt!MiDecrementShareCount+3a
80522ddc ff4e08           dec     dword ptr [esi+0x8]

SYMBOL_STACK_INDEX:  1

FOLLOWUP_NAME:  MachineOwner

SYMBOL_NAME:  nt!MiDecrementShareCount+3a

MODULE_NAME:  nt

DEBUG_FLR_IMAGE_TIMESTAMP:  48a3fbd9

STACK_COMMAND:  kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0x4E_nt!MiDecrementShareCount+3a

BUCKET_ID:  0x4E_nt!MiDecrementShareCount+3a

Followup: MachineOwner
---------

Zweiter
Code:
Microsoft (R) Windows Debugger  Version 6.4.0007.2
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini072409-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.080814-1236
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Jul 24 16:16:14.312 2009 (GMT+2)
System Uptime: 0 days 3:32:58.059
Loading Kernel Symbols
........................................................................................................................................................
Loading unloaded module list
.............
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {fe1f3f80, 1, 8053708f, 0}


Could not read faulting driver name
Probably caused by : memory_corruption

Followup: memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fe1f3f80, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 8053708f, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS:  fe1f3f80 

FAULTING_IP: 
nt!ExAllocatePoolWithQuotaTag+5
8053708f 088b4004ff75     or      [ebx+0x75ff0440],cl

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x50

LAST_CONTROL_TRANSFER:  from af40dcd1 to 8053708f

STACK_TEXT:  
ab330b54 af40dcd1 00000000 00000028 7070534b nt!ExAllocatePoolWithQuotaTag+0x5
ab330bb8 af40ded9 88203b40 00000003 ac345a30 ks!KspPropertyHandler+0xab
ab330bdc ac34728c 88203b40 00000003 ac345a30 ks!KsPropertyHandler+0x19
ab330c30 af40df95 88a1e030 88203b40 ab330c64 sysaudio!CPinInstance::PinDispatchIoControl+0x115
ab330c40 804ef19f 88a1e030 88203b40 806e7410 ks!DispatchDeviceIoControl+0x28
ab330c50 8057f982 88203c88 887e6028 88203b40 nt!IopfCallDriver+0x31
ab330c64 805807f7 88a1e030 88203b40 887e6028 nt!IopSynchronousServiceTail+0x70
ab330d00 80579274 0000044c 00000344 00000000 nt!IopXxxControlFile+0x5c5
ab330d34 8054162c 0000044c 00000344 00000000 nt!NtDeviceIoControlFile+0x2a
ab330d34 7c91e4f4 0000044c 00000344 00000000 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
03acfde4 7c91d26c 7c8016c2 0000044c 00000344 0x7c91e4f4
03acfe48 73e721a2 0000044c 002f0003 03acfeb0 0x7c91d26c
03acfe80 73e72bf4 0000044c 002f0003 03acfeb0 0x73e721a2
03acfec8 73e72b7d 0000044c 73e72ba0 00000005 0x73e72bf4
03acfefc 73e727cd 03acff40 03acff3c 00000000 0x73e72b7d
03acff18 73e7df8e 03acff40 03acff3c 00000000 0x73e727cd
03acff44 73e7e220 00000000 03acff98 76af4e4f 0x73e7df8e
03acff5c 00820961 011d6798 00000000 03acff98 0x73e7e220
03acffa0 00820bd1 00820c1c 0013f9e8 011d6000 0x820961
03acffec 00000000 00820bd7 00000000 00000000 0x820bd1


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    80537080-805370bf  64 bytes - nt!ExAllocatePoolWithTagPriority+5a
	[ 5d c2 10 00 cc cc cc cc:15 0c 41 55 80 ff 75 f8 ]
64 errors : !nt (80537080-805370bf)

MODULE_NAME:  memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE_64

STACK_COMMAND:  kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE_64

BUCKET_ID:  MEMORY_CORRUPTION_LARGE_64

Followup: memory_corruption
---------

Was hat das zu bedeuten ?
Wie kann ich das Problem fixen ?
:confused:
Memtest habe ich schon 2 mal durch laufen lassen mit 0 errors.
 
Wenn Du diese Anzeige nicht sehen willst, registriere Dich und/oder logge Dich ein.
Ich würde sagen ja.

Ich hatte das gleiche in der letzten Zeit. Vor 2 Monaten ist mein Mainboard in Rauch aufgegangen und hat ein RAM-Päärchen mitgenommen.

RAM raus neues Board her, neuen RAM rein.........Bluescreens.

Es waren Corsair Dominator 1066 bei 2.1Volt. Sogar im Idlebetrieb oder Surfen kam der Bluescreen mit dem Fehler:
PAGE_FAULT_IN_NONPAGED_AREA :shot:

Alte heiles RAM-Päärchen rein Mushkin Black Ascent:hail: bei 2.04 Volt kein Problem.

Egal ob Zocken oder Surfen.
 
Ich habe auf alle Komponenten noch Garantie...Bist du sicher das Ram sowie Mainboard einen defekt haben ? Gibt es Programme die das erkennen ? Memtest hat nach 2 Test durchläufen nichts gefunden.
 
Jo, hatte letztens auch nette Blue-Screens, also RAMs können das durchaus verursachen, habe 4GB 1066er Kingston HyperX und die laufen nur mit 800MHz stabil (bei 400MHz FSB), wenn ich den FSB auf 266 belasse, dann laufen die auch mit 1066 stabil. Problem ist nur, damals hat mein Memtest auch 0 Errors gezeigt (also FSB 400 und 1066MHz). Naja kann man jetzt aufs Board schieben oder auf den RAM.
 
Ich bau den RAM von meiner Schwester mal ein und Teste...Kann ich denn den RAM und das Mainboard einfach nach Alternate schicken und sagen das ich Bluescreens bekommen und ich was neues will ? (Das Mainboard weißt sowieso Mechanische Mängel auf)
 
hab wie schon gesagt einen anderen Ram eingebaut:



Hatte aber nach einigen Tagen mal wieder einen Bluescreen, welcher noch nicht bekannt ist ;) :p memory_corruption ist es immer noch aber eine andere "Meldung" wenn man das so nennen kann (rot,fett markiert).

Microsoft (R) Windows Debugger Version 6.4.0007.2
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini080609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.080814-1236
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Aug 6 20:29:42.656 2009 (GMT+2)
System Uptime: 0 days 0:10:07.418
Loading Kernel Symbols
.................................................. .................................................. .................................................. ...
Loading unloaded module list
.........
Loading User Symbols
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {d, 0, 0, 0}

Probably caused by : memory_corruption

Followup: memory_corruption
---------

1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_d

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: CODE_CORRUPTION

LAST_CONTROL_TRANSFER: from bf8524cd to bf813cc0

STACK_TEXT:
a608d968 bf8524cd b9fd4a18 00000084 00000000 win32k!SfnDWORD+0x4d
a608d9ac bf83c682 6d2f5cce 7e3a6568 00000000 win32k!xxxHkCallHook+0x196
a608da24 bf83c855 03fd50b8 00000000 00000000 win32k!xxxCallHook2+0x25d
a608da40 bf813fbc 00000000 00000000 00000000 win32k!xxxCallHook+0x26
a608da80 bf80ec46 b9fd4a18 00000084 00000000 win32k!xxxSendMessageTimeout+0x15a
a608daa4 bf820ce7 b9fd4a18 00000084 00000000 win32k!xxxSendMessage+0x1b
a608dad8 bf820d5e b9fd4a18 00000390 00000282 win32k!xxxWindowHitTest2+0x139
a608db08 bf820ca1 b9fd4a18 00000390 00000282 win32k!xxxWindowHitTest+0x41
a608db40 bf820d5e b9fb06e8 00000390 00000282 win32k!xxxWindowHitTest2+0xfd
a608db70 bf821a59 b9fb06e8 00000390 00000282 win32k!xxxWindowHitTest+0x41
a608dc94 bf801e3f 00000200 a608dd14 00000000 win32k!xxxScanSysQueue+0x450
a608dce8 bf80366c a608dd14 000025ff 00000000 win32k!xxxRealInternalGetMessage+0x335
a608dd48 8054162c 0013b37c 00000000 00000000 win32k!NtUserPeekMessage+0x40
a608dd48 7c91e4f4 0013b37c 00000000 00000000 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0013b300 00000000 00000000 00000000 00000000 0x7c91e4f4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
bf813cc0-bf813cee 47 bytes - win32k!SfnDWORD+4d
[ 8b 70 28 89 75 b0 8d 75:ff 59 8d 44 00 02 0f 84 ]
bf813cf0-bf813cff 16 bytes - win32k!SfnDWORD+7d (+0x30)
[ 11 89 10 85 c9 74 06 8b:ff 55 8b ec 8b 45 0c 85 ]
63 errors : !win32k (bf813cc0-bf813cff)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: LARGE_64

STACK_COMMAND: kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_64

BUCKET_ID: MEMORY_CORRUPTION_LARGE_64

Followup: memory_corruption
---------
 
cpu war OCed, ist jetzt wieder auf Standard.

Hatte eben wieder n Bluescreen, beim email schreiben :hmm:

Microsoft (R) Windows Debugger Version 6.4.0007.2
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini080709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.080814-1236
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Aug 7 13:11:02.187 2009 (GMT+2)
System Uptime: 0 days 0:15:20.923
Loading Kernel Symbols
.......................................................................................................................................................
Loading unloaded module list
............
Loading User Symbols
Unable to load image IDSxpx86.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for IDSxpx86.sys
*** ERROR: Module load completed but symbols could not be loaded for IDSxpx86.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {14, 2, 0, a650264b}

Unable to load image SYMIDS.SYS, Win32 error 2
*** WARNING: Unable to verify timestamp for SYMIDS.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMIDS.SYS
Unable to load image SYMTDI.SYS, Win32 error 2
*** WARNING: Unable to verify timestamp for SYMTDI.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMTDI.SYS
Unable to load image SymIM.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for SymIM.sys
*** ERROR: Module load completed but symbols could not be loaded for SymIM.sys
Unable to load image NVENETFD.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for NVENETFD.sys
*** ERROR: Module load completed but symbols could not be loaded for NVENETFD.sys
Unable to load image NVNRM.SYS, Win32 error 2
*** WARNING: Unable to verify timestamp for NVNRM.SYS
*** ERROR: Module load completed but symbols could not be loaded for NVNRM.SYS
Probably caused by : IDSxpx86.sys ( IDSxpx86+2064b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: a650264b, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: NAVEX15

READ_ADDRESS: 00000014

CURRENT_IRQL: 2

FAULTING_IP:
IDSxpx86+2064b
a650264b 8b4014 mov eax,[eax+0x14]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

LAST_CONTROL_TRANSFER: from a6503fe8 to a650264b

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
b84c77b8 a6503fe8 88533c84 88533cac b84c7838 IDSxpx86+0x2064b
b84c7814 a6504683 88533c84 b84c7838 00000001 IDSxpx86+0x21fe8
b84c78a8 a65014ab 88533c84 00000001 8846a080 IDSxpx86+0x22683
b84c78d8 a64ff3b8 8846a1c4 8846a8a4 8846a078 IDSxpx86+0x1f4ab
b84c78f0 a64fcaca b84c7980 00000000 8846a008 IDSxpx86+0x1d3b8
b84c7920 a64fce7c b84c7980 00000000 894cb8c8 IDSxpx86+0x1aaca
b84c793c a64fbb00 00000001 b84c7980 00000000 IDSxpx86+0x1ae7c
b84c7958 a64e6636 8846a008 00000001 b84c7980 IDSxpx86+0x19b00
b84c79b8 a64eff41 8846a008 b84c7a20 00000001 IDSxpx86+0x4636
b84c79dc a64efd17 b84c7a20 00000001 894cb8c8 IDSxpx86+0xdf41
b84c7a08 a64ed2a0 b84c7a20 00000001 894cb8c8 IDSxpx86+0xdd17
b84c7a2c b8452789 8a0e6d08 894cb8c8 00000001 IDSxpx86+0xb2a0
b84c7a48 a658dd78 8899f9d0 884ab9e8 894e27c8 SYMIDS+0x2789
b84c7a74 a658df0c 8899f9d0 885d3008 898460ea SYMTDI+0x3d78
b84c7ae0 a65c086c 8849dcd0 00000016 b84c7b60 SYMTDI+0x3f0c
b84c7b7c a65cad35 8847b858 01b2a8c0 00003500 tcpip!UDPDeliver+0x1be
b84c7bd4 a65bfef5 8a14a300 02b2a8c0 01b2a8c0 tcpip!UDPRcv+0x164
b84c7c34 a65bfb19 00000020 8a14a300 a65c0592 tcpip!DeliverToUser+0x18e
b84c7cb0 a65bf836 a65ff8e0 8a14a300 898460ce tcpip!DeliverToUserEx+0x95e
b84c7d68 a65be928 8a14a300 898460e2 0000006a tcpip!IPRcvPacket+0x6cb
b84c7da8 a65be853 00000000 888f15d0 898460c0 tcpip!ARPRcvIndicationNew+0x149
b84c7de4 b7c94b9f 89885700 00000000 b5b14b40 tcpip!ARPRcvPacket+0x68
b84c7e38 b5b0f01d 00d55880 8a20e160 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x1c2
b84c7e4c b5b0f1b4 8a2abad0 8a20e160 00000001 psched!PsFlushReceiveQueue+0x15
b84c7e70 b5b0f5f9 8a0f1010 00000000 8a2abad0 psched!PsEnqueueReceivePacket+0xda
b84c7e88 b7c94c40 8a0f1008 8993e130 8a295130 psched!ClReceiveComplete+0x13
b84c7ed8 b8408f43 00d55880 b84c7f04 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x5a4
b84c7ef8 b7c94b9f 010ad370 8990c058 89939eb4 SymIM+0xf43
b84c7f4c b031b4ae 00d55880 89939eb4 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x1c2
b84c7f8c b5bf2b8d 00000001 89d22630 b5c05260 NVENETFD+0x34ae
b84c7fac b5bf5226 00000001 ffdff000 89722008 NVNRM+0xbb8d
b84c7fcc 80545e7f 89d225b4 89d22008 00000000 NVNRM+0xe226
b84c7ff4 805459eb a5a02d44 00000000 00000000 nt!KiRetireDpcList+0x61


FOLLOWUP_IP:
IDSxpx86+2064b
a650264b 8b4014 mov eax,[eax+0x14]

SYMBOL_STACK_INDEX: 0

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: IDSxpx86+2064b

MODULE_NAME: IDSxpx86

IMAGE_NAME: IDSxpx86.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a553e66

STACK_COMMAND: kb

FAILURE_BUCKET_ID: 0xD1_IDSxpx86+2064b

BUCKET_ID: 0xD1_IDSxpx86+2064b

Followup: MachineOwner
---------
 
war nur auf 2,60 GHz von normal 2,33GHz getaktet. Vcore war ca. 1,2V. FSB 371,4 MHz Standard: 333,4 MHz Multiplikator 7. Memory Fequenz bischen unter 800 MHz (hat sich quasi automatisch so getaktet) Die OC hatte ich aber noch nicht lange laufen...habe auch geprimed (test) ohne Prob. Könnte es denn am Mainboard liegen ?
 
Zuletzt bearbeitet:
wenn du bis auf jetzt keine probleme hattest ists auch iwie komisch :|
haste iwas neues instlliert die letzte zeit?
 
eigentlich nicht. Kann es sein das ich den rechner formatieren müsste damit die Blue screen serie aufhört ? System läuft schon "relativ" lange (1 Jahr).

Wieder neuer Blue screen beim Viren Überprüfung (Norton Internet Securety Online):

Microsoft (R) Windows Debugger Version 6.4.0007.2
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini080709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*e:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.080814-1236
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Aug 7 13:11:02.187 2009 (GMT+2)
System Uptime: 0 days 0:15:20.923
Loading Kernel Symbols
.......................................................................................................................................................
Loading unloaded module list
............
Loading User Symbols
Unable to load image IDSxpx86.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for IDSxpx86.sys
*** ERROR: Module load completed but symbols could not be loaded for IDSxpx86.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {14, 2, 0, a650264b}

Unable to load image SYMIDS.SYS, Win32 error 2
*** WARNING: Unable to verify timestamp for SYMIDS.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMIDS.SYS
Unable to load image SYMTDI.SYS, Win32 error 2
*** WARNING: Unable to verify timestamp for SYMTDI.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMTDI.SYS
Unable to load image SymIM.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for SymIM.sys
*** ERROR: Module load completed but symbols could not be loaded for SymIM.sys
Unable to load image NVENETFD.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for NVENETFD.sys
*** ERROR: Module load completed but symbols could not be loaded for NVENETFD.sys
Unable to load image NVNRM.SYS, Win32 error 2
*** WARNING: Unable to verify timestamp for NVNRM.SYS
*** ERROR: Module load completed but symbols could not be loaded for NVNRM.SYS
Probably caused by : IDSxpx86.sys ( IDSxpx86+2064b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: a650264b, address which referenced memory

Debugging Details:
------------------


OVERLAPPED_MODULE: NAVEX15

READ_ADDRESS: 00000014

CURRENT_IRQL: 2

FAULTING_IP:
IDSxpx86+2064b
a650264b 8b4014 mov eax,[eax+0x14]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

LAST_CONTROL_TRANSFER: from a6503fe8 to a650264b

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
b84c77b8 a6503fe8 88533c84 88533cac b84c7838 IDSxpx86+0x2064b
b84c7814 a6504683 88533c84 b84c7838 00000001 IDSxpx86+0x21fe8
b84c78a8 a65014ab 88533c84 00000001 8846a080 IDSxpx86+0x22683
b84c78d8 a64ff3b8 8846a1c4 8846a8a4 8846a078 IDSxpx86+0x1f4ab
b84c78f0 a64fcaca b84c7980 00000000 8846a008 IDSxpx86+0x1d3b8
b84c7920 a64fce7c b84c7980 00000000 894cb8c8 IDSxpx86+0x1aaca
b84c793c a64fbb00 00000001 b84c7980 00000000 IDSxpx86+0x1ae7c
b84c7958 a64e6636 8846a008 00000001 b84c7980 IDSxpx86+0x19b00
b84c79b8 a64eff41 8846a008 b84c7a20 00000001 IDSxpx86+0x4636
b84c79dc a64efd17 b84c7a20 00000001 894cb8c8 IDSxpx86+0xdf41
b84c7a08 a64ed2a0 b84c7a20 00000001 894cb8c8 IDSxpx86+0xdd17
b84c7a2c b8452789 8a0e6d08 894cb8c8 00000001 IDSxpx86+0xb2a0
b84c7a48 a658dd78 8899f9d0 884ab9e8 894e27c8 SYMIDS+0x2789
b84c7a74 a658df0c 8899f9d0 885d3008 898460ea SYMTDI+0x3d78
b84c7ae0 a65c086c 8849dcd0 00000016 b84c7b60 SYMTDI+0x3f0c
b84c7b7c a65cad35 8847b858 01b2a8c0 00003500 tcpip!UDPDeliver+0x1be
b84c7bd4 a65bfef5 8a14a300 02b2a8c0 01b2a8c0 tcpip!UDPRcv+0x164
b84c7c34 a65bfb19 00000020 8a14a300 a65c0592 tcpip!DeliverToUser+0x18e
b84c7cb0 a65bf836 a65ff8e0 8a14a300 898460ce tcpip!DeliverToUserEx+0x95e
b84c7d68 a65be928 8a14a300 898460e2 0000006a tcpip!IPRcvPacket+0x6cb
b84c7da8 a65be853 00000000 888f15d0 898460c0 tcpip!ARPRcvIndicationNew+0x149
b84c7de4 b7c94b9f 89885700 00000000 b5b14b40 tcpip!ARPRcvPacket+0x68
b84c7e38 b5b0f01d 00d55880 8a20e160 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x1c2
b84c7e4c b5b0f1b4 8a2abad0 8a20e160 00000001 psched!PsFlushReceiveQueue+0x15
b84c7e70 b5b0f5f9 8a0f1010 00000000 8a2abad0 psched!PsEnqueueReceivePacket+0xda
b84c7e88 b7c94c40 8a0f1008 8993e130 8a295130 psched!ClReceiveComplete+0x13
b84c7ed8 b8408f43 00d55880 b84c7f04 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x5a4
b84c7ef8 b7c94b9f 010ad370 8990c058 89939eb4 SymIM+0xf43
b84c7f4c b031b4ae 00d55880 89939eb4 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x1c2
b84c7f8c b5bf2b8d 00000001 89d22630 b5c05260 NVENETFD+0x34ae
b84c7fac b5bf5226 00000001 ffdff000 89722008 NVNRM+0xbb8d
b84c7fcc 80545e7f 89d225b4 89d22008 00000000 NVNRM+0xe226
b84c7ff4 805459eb a5a02d44 00000000 00000000 nt!KiRetireDpcList+0x61


FOLLOWUP_IP:
IDSxpx86+2064b
a650264b 8b4014 mov eax,[eax+0x14]

SYMBOL_STACK_INDEX: 0

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: IDSxpx86+2064b

MODULE_NAME: IDSxpx86

IMAGE_NAME: IDSxpx86.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a553e66

STACK_COMMAND: kb

FAILURE_BUCKET_ID: 0xD1_IDSxpx86+2064b

BUCKET_ID: 0xD1_IDSxpx86+2064b

Followup: MachineOwner
---------

Gibts her keinen der die debuggeten Blue screens lesen kann (Daraus müsste die Uhrsache doch hervor gehen)?
 
Hardwareluxx setzt keine externen Werbe- und Tracking-Cookies ein. Auf unserer Webseite finden Sie nur noch Cookies nach berechtigtem Interesse (Art. 6 Abs. 1 Satz 1 lit. f DSGVO) oder eigene funktionelle Cookies. Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir diese Cookies setzen. Mehr Informationen und Möglichkeiten zur Einstellung unserer Cookies finden Sie in unserer Datenschutzerklärung.


Zurück
Oben Unten refresh