Mniej więcej w zeszłym tygodniu podkręciłem nieco procesor. Zrobiłem wszystko zgodnie z instrukcjami i nie przesadzałem z wysokością OC ani napięcia. Wczoraj pojawił się pierwszy niepokojący problem związany z nie wybudzaniem się monitora z trybu czuwania wraz z momentem włączenia komputera, lecz restart załatwiał sprawę i było wszystko ok. Niestety dzisiaj wyskoczył BSOD, którego log umieszczam w linku oraz w cytacie. Podpowiem tylko, że przywrócenie ustawień bios nie pomogło i za każdym razem jak chwilę posłucham iTunesa to system pada. Będę wdzięczny za pomoc, ponieważ nie jestem pewien czy jest to problem związany z OC czy dziwny zbieg okoliczności?
Plik minidump - Dostępne tylko dla zarejestrowanych użytkowników
Jednoczesnie chciałbym zaznaczyć, że temperatury kontrolowałem i dla procesora wynosiła ona około 45 stopni w stresie, a dla karty graficznej około 71 stopni w stresie.
Mój sprzęt:
Asus P5K C2D 7300 @ 3.0 ghz, vcore 1,28V
OCZ Platinium Rev. 2 4GB 800mhz 4-4-4-15 vcore 2.1V
GeForce 450GTS 512MB
Seagate 7200.10 320GB
Chieftec GPS-450A
Będę wdzięczny za pomoc.
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\123114-26551-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18526.amd64fre.win7sp1_gdr.140706-1506
Machine Name:
Kernel base = 0xfffff800`0320d000 PsLoadedModuleList = 0xfffff800`03450890
Debug session time: Wed Dec 31 11:54:49.293 2014 (UTC + 1:00)
System Uptime: 0 days 0:01:04.947
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff80003add240, 0, fffff80003280b03, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiGeneralProtectionFault+c3 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80003add240, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80003280b03, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034ba100
GetUlongFromAddress: unable to read from fffff800034ba1c0
fffff80003add240 Nonpaged pool
FAULTING_IP:
nt!KiGeneralProtectionFault+c3
fffff800`03280b03 8b0537c71f00 mov eax,dword ptr [nt!KiCodePatchCycle (fffff800`0347d240)]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
TRAP_FRAME: fffff880029a6a90 -- (.trap 0xfffff880029a6a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=9f000000779e3ec0 rbx=0000000000000000 rcx=0000000000000036
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003280b03 rsp=fffff880029a6c20 rbp=fffff880029a6ca0
r8=0000000002dfe030 r9=0000000002dfe038 r10=fffffa8006551060
r11=0000000000000206 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiGeneralProtectionFault+0xc3:
fffff800`03280b03 8b0537c71f00 mov eax,dword ptr [nt!KiCodePatchCycle (fffff800`0347d240)] ds:fffff800`0347d240=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032ff5e4 to fffff80003282bc0
STACK_TEXT:
fffff880`029a6928 fffff800`032ff5e4 : 00000000`00000050 fffff800`03add240 00000000`00000000 fffff880`029a6a90 : nt!KeBugCheckEx
fffff880`029a6930 fffff800`03280cee : 00000000`00000000 fffff800`03add240 fffff8a0`0128a300 00000000`00000036 : nt! ?? ::FNODOBFM::`string'+0x43836
fffff880`029a6a90 fffff800`03280b03 : fffffa80`06551060 fffff880`029a6ca0 000007fe`fc17d688 fffffa80`0734e280 : nt!KiPageFault+0x16e
fffff880`029a6c20 00000000`778f79d5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xc3
00000000`02dfdf88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778f79d5
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiGeneralProtectionFault+c3
fffff800`03280b03 8b0537c71f00 mov eax,dword ptr [nt!KiCodePatchCycle (fffff800`0347d240)]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiGeneralProtectionFault+c3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53b9f073
IMAGE_VERSION: 6.1.7601.18526
FAILURE_BUCKET_ID: X64_0x50_nt!KiGeneralProtectionFault+c3
BUCKET_ID: X64_0x50_nt!KiGeneralProtectionFault+c3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_nt!kigeneralprotectionfault+c3
FAILURE_ID_HASH: {1efeceb4-d501-0135-198a-71bd119b076e}
Followup: MachineOwner
---------
1: kd> k
Child-SP RetAddr Call Site
fffff880`029a6928 fffff800`032ff5e4 nt!KeBugCheckEx
fffff880`029a6930 fffff800`03280cee nt! ?? ::FNODOBFM::`string'+0x43836
fffff880`029a6a90 fffff800`03280b03 nt!KiPageFault+0x16e
fffff880`029a6c20 00000000`778f79d5 nt!KiGeneralProtectionFault+0xc3
00000000`02dfdf88 00000000`00000000 0x778f79d5
1: kd> d
fffff800`03282bc0 48 89 4c 24 08 48 89 54-24 10 4c 89 44 24 18 4c H.L$.H.T$.L.D$.L
fffff800`03282bd0 89 4c 24 20 9c 48 83 ec-30 fa 65 48 8b 0c 25 20 .L$ .H..0.eH..%
fffff800`03282be0 00 00 00 48 8b 89 d8 4b-00 00 e8 61 06 00 00 65 ...H...K...a...e
fffff800`03282bf0 48 8b 0c 25 20 00 00 00-48 83 c1 40 e8 ef 02 00 H..% ...H..@....
fffff800`03282c00 00 65 4c 8b 14 25 20 00-00 00 4d 8b 92 d8 4b 00 .eL..% ...M...K.
fffff800`03282c10 00 48 8b 44 24 40 49 89-82 80 00 00 00 48 8b 44 .H.D$@I......H.D
fffff800`03282c20 24 30 49 89 42 44 48 8d-05 6c ff ff ff 48 3b 44 $0I.BDH..l...H;D
fffff800`03282c30 24 38 75 0e 4c 8d 44 24-68 4c 8d 0d 50 ff ff ff $8u.L.D$hL..P...
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols