Gå til innhold

SpeEn

Medlemmer
  • Innlegg

    12
  • Ble med

  • Besøkte siden sist

Innlegg skrevet av SpeEn

  1. Trenger hjelp til å analysere disse dmp filene.

     

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    PFN_LIST_CORRUPT (4e)

    Typically caused by drivers passing bad memory descriptor lists (ie: calling

    MmUnlockPages twice with the same list, etc). If a kernel debugger is

    available get the stack trace.

    Arguments:

    Arg1: 0000008f, The free or zeroed page listhead is corrupt

    Arg2: 00021808, new page

    Arg3: 0002187b, old page

    Arg4: 00000000, 0

     

    Debugging Details:

    ------------------

     

     

     

     

    BUGCHECK_STR: 0x4E_8f

     

    CUSTOMER_CRASH_COUNT: 1

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    PROCESS_NAME: System

     

    LAST_CONTROL_TRANSFER: from 8051bd12 to 804f9c37

     

    STACK_TEXT:

    f79f77f8 8051bd12 0000004e 0000008f 00021808 nt!KeBugCheckEx+0x1b

    f79f7840 80696b94 865c4618 00000000 00000044 nt!MmZeroPageThread+0x250

    f79f7dac 805ce794 80087000 00000000 00000000 nt!Phase1Initialization+0x1288

    f79f7ddc 805450ce 8069590c 80087000 00000000 nt!PspSystemThreadStartup+0x34

    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    nt!MmZeroPageThread+250

    8051bd12 cc int 3

     

    SYMBOL_STACK_INDEX: 1

     

    SYMBOL_NAME: nt!MmZeroPageThread+250

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: nt

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 41107b0d

     

    IMAGE_NAME: memory_corruption

     

    FAILURE_BUCKET_ID: 0x4E_8f_nt!MmZeroPageThread+250

     

    BUCKET_ID: 0x4E_8f_nt!MmZeroPageThread+250

     

    Followup: MachineOwner

    ---------

     

     

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)

    This means a trap occurred in kernel mode, and it's a trap of a kind

    that the kernel isn't allowed to have/catch (bound trap) or that

    is always instant death (double fault). The first number in the

    bugcheck params is the number of the trap (8 = double fault, etc)

    Consult an Intel x86 family manual to learn more about what these

    traps are. Here is a *portion* of those codes:

    If kv shows a taskGate

    use .tss on the part before the colon, then kv.

    Else if kv shows a trapframe

    use .trap on that value

    Else

    .trap on the appropriate frame will show where the trap was taken

    (on x86, this will be the ebp that goes with the procedure KiTrap)

    Endif

    kb will then show the corrected stack.

    Arguments:

    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT

    Arg2: 80042000

    Arg3: 00000000

    Arg4: 00000000

     

    Debugging Details:

    ------------------

     

     

     

     

    BUGCHECK_STR: 0x7f_8

     

    CUSTOMER_CRASH_COUNT: 2

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    PROCESS_NAME: iw3mp.exe

     

    LAST_CONTROL_TRANSFER: from 00000030 to 8054371b

     

    STACK_TEXT:

    ba8e2084 00000030 00000000 80001118 00000000 nt!KiTrap0E+0x23

    WARNING: Frame IP not in any known module. Following frames may be wrong.

    ba8e20f4 80001118 ba8e215c 00000000 8051ee33 0x30

    00000000 00000000 00000000 00000000 00000000 0x80001118

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    nt!KiTrap0E+23

    8054371b 1e push ds

     

    SYMBOL_STACK_INDEX: 0

     

    SYMBOL_NAME: nt!KiTrap0E+23

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: nt

     

    IMAGE_NAME: ntkrpamp.exe

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d

     

    FAILURE_BUCKET_ID: 0x7f_8_nt!KiTrap0E+23

     

    BUCKET_ID: 0x7f_8_nt!KiTrap0E+23

     

    Followup: MachineOwner

     

     

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)

    This means a trap occurred in kernel mode, and it's a trap of a kind

    that the kernel isn't allowed to have/catch (bound trap) or that

    is always instant death (double fault). The first number in the

    bugcheck params is the number of the trap (8 = double fault, etc)

    Consult an Intel x86 family manual to learn more about what these

    traps are. Here is a *portion* of those codes:

    If kv shows a taskGate

    use .tss on the part before the colon, then kv.

    Else if kv shows a trapframe

    use .trap on that value

    Else

    .trap on the appropriate frame will show where the trap was taken

    (on x86, this will be the ebp that goes with the procedure KiTrap)

    Endif

    kb will then show the corrected stack.

    Arguments:

    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT

    Arg2: 80042000

    Arg3: 00000000

    Arg4: 00000000

     

    Debugging Details:

    ------------------

     

     

     

     

    BUGCHECK_STR: 0x7f_8

     

    CUSTOMER_CRASH_COUNT: 2

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    PROCESS_NAME: WoW.exe

     

    TRAP_FRAME: b9a041e4 -- (.trap 0xffffffffb9a041e4)

    ErrCode = 00000000

    eax=00000000 ebx=b9a042f4 ecx=101e07c0 edx=00000000 esi=ba000003 edi=00000000

    eip=8051ecae esp=b9a04258 ebp=b9a0426c iopl=0 nv up ei pl zr na pe nc

    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246

    nt!MmAccessFault:

    8051ecae 8bff mov edi,edi

    Resetting default scope

     

    LAST_CONTROL_TRANSFER: from 8051ecae to 8054371b

     

    STACK_TEXT:

    b9a0404c 8051ecae badb0d00 00000000 00000000 nt!KiTrap0E+0x23

    b9a040bc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a040bc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04144 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04144 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a041cc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a041cc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04254 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04254 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a042dc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a042dc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04364 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04364 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a043ec 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a043ec 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04474 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04474 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a044fc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a044fc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04584 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04584 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a0460c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a0460c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04694 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04694 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a0471c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a0471c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a047a4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a047a4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a0482c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a0482c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a048b4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a048b4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a0493c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a0493c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a049c4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a049c4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04a4c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04a4c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04ad4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04ad4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04b5c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04b5c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04be4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04be4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04c6c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04c6c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04cf4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04cf4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04d7c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04d7c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04e04 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04e04 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04e8c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04e8c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04f14 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04f14 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a04f9c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a04f9c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a05024 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a05024 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a050ac 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a050ac 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a05134 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a05134 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a051bc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a051bc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a05244 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a05244 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a052cc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a052cc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a05354 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a05354 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

    b9a053dc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

    b9a053dc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

     

     

    STACK_COMMAND: kb

     

    MODULE_NAME: nt

     

    IMAGE_NAME: ntkrpamp.exe

     

    FOLLOWUP_NAME: MachineOwner

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d

     

    FOLLOWUP_IP:

    nt!KiTrap0E+23

    8054371b 1e push ds

     

    SYMBOL_STACK_INDEX: 0

     

    SYMBOL_NAME: nt!KiTrap0E+23

     

    FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION

     

    BUCKET_ID: TRAP_FRAME_RECURSION

     

    Followup: MachineOwner

    ------------------

     

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    BAD_POOL_CALLER (c2)

    The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.

    Arguments:

    Arg1: 00000002, Pool header has been corrupted

    Arg2: 866cd440, Pointer to pool header

    Arg3: 866cd000, First part of pool header contents

    Arg4: 86452b40, 0

     

    Debugging Details:

    ------------------

     

     

     

     

    BUGCHECK_STR: 0xc2_2

     

    CUSTOMER_CRASH_COUNT: 1

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    PROCESS_NAME: Idle

     

    LAST_CONTROL_TRANSFER: from f4706da5 to 804f9deb

     

    STACK_TEXT:

    80550048 f4706da5 000000c2 00000002 866cd440 nt!KeBugCheckEx+0x1b

    80550074 f46dcd36 86452b00 805500bc 85c754c8 tcpip!MdpAllocateAtDpcLevel+0xeb

    80550088 f46dd74f 805500bc 85c754c8 00000000 tcpip!GetTCPHeaderAtDpcLevel+0x15

    8055009c f46dd449 805500bc 85c754cc 8673d4d8 tcpip!GetTCPHeader+0x17

    805500c0 f46e1247 85c754c8 00000000 00000000 tcpip!SendACK+0x1f

    805500e0 f46d9a08 00000002 00000002 8055010c tcpip!ProcessPerCpuTCBDelayQ+0xc6

    80550114 f46d994f 00000002 f46d9901 f46d93d6 tcpip!ProcessTCBDelayQ+0xc4

    80550120 f46d93d6 00000000 865df208 f46d97f2 tcpip!TCPRcvComplete+0x20

    8055012c f46d97f2 f735ed40 865d0968 f6a32b40 tcpip!IPRcvComplete+0x21

    80550130 f735ed40 865d0968 f6a32b40 86548670 tcpip!ARPRcvComplete+0x5

    80550180 f6a2d01d 016b5800 8647d2e8 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x5a4

    80550194 f6a2d1b4 865df208 8647d2e8 00000001 psched!PsFlushReceiveQueue+0x15

    805501b8 f6a2d5f9 86548678 00000000 865df208 psched!PsEnqueueReceivePacket+0xda

    805501d0 f735ed40 86548670 00000001 861ac394 psched!ClReceiveComplete+0x13

    80550220 f6b1f93c 006b5800 80550240 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x5a4

    WARNING: Stack unwind information not available. Following frames may be wrong.

    805503d8 f6b19017 861ac004 861ac394 865adad0 yk51x86+0xf93c

    80550404 f6b1a608 601ac004 80550428 f7354f09 yk51x86+0x9017

    80550410 f7354f09 861ac004 8055b0a0 ffdff9c0 yk51x86+0xa608

    80550428 805450bf 861ac094 861ac080 00000000 NDIS!ndisMDpcX+0x21

    80550440 8055ae40 ffdffc50 00000000 8055ae40 nt!KiRetireDpcList+0x61

    80550450 80544fa4 00000000 0000000e 00000000 nt!KiIdleThread0

    80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    yk51x86+f93c

    f6b1f93c ?? ???

     

    SYMBOL_STACK_INDEX: f

     

    SYMBOL_NAME: yk51x86+f93c

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: yk51x86

     

    IMAGE_NAME: yk51x86.sys

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 454a1b09

     

    FAILURE_BUCKET_ID: 0xc2_2_yk51x86+f93c

     

    BUCKET_ID: 0xc2_2_yk51x86+f93c

     

    Followup: MachineOwner

    ---------

  2. Noen som får noe fornuftig ut av disse to dmp filene? Står driver feil. Men kan dette være pga rammen?

     

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    PFN_LIST_CORRUPT (4e)

    Typically caused by drivers passing bad memory descriptor lists (ie: calling

    MmUnlockPages twice with the same list, etc). If a kernel debugger is

    available get the stack trace.

    Arguments:

    Arg1: 0000008f, The free or zeroed page listhead is corrupt

    Arg2: 00021808, new page

    Arg3: 0002187b, old page

    Arg4: 00000000, 0

     

    Debugging Details:

    ------------------

     

     

     

     

    BUGCHECK_STR: 0x4E_8f

     

    CUSTOMER_CRASH_COUNT: 1

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    PROCESS_NAME: System

     

    LAST_CONTROL_TRANSFER: from 8051bd12 to 804f9c37

     

    STACK_TEXT:

    f79f77f8 8051bd12 0000004e 0000008f 00021808 nt!KeBugCheckEx+0x1b

    f79f7840 80696b94 865c4618 00000000 00000044 nt!MmZeroPageThread+0x250

    f79f7dac 805ce794 80087000 00000000 00000000 nt!Phase1Initialization+0x1288

    f79f7ddc 805450ce 8069590c 80087000 00000000 nt!PspSystemThreadStartup+0x34

    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    nt!MmZeroPageThread+250

    8051bd12 cc int 3

     

    SYMBOL_STACK_INDEX: 1

     

    SYMBOL_NAME: nt!MmZeroPageThread+250

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: nt

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 41107b0d

     

    IMAGE_NAME: memory_corruption

     

    FAILURE_BUCKET_ID: 0x4E_8f_nt!MmZeroPageThread+250

     

    BUCKET_ID: 0x4E_8f_nt!MmZeroPageThread+250

     

    Followup: MachineOwner

    ---------

     

     

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)

    This means a trap occurred in kernel mode, and it's a trap of a kind

    that the kernel isn't allowed to have/catch (bound trap) or that

    is always instant death (double fault). The first number in the

    bugcheck params is the number of the trap (8 = double fault, etc)

    Consult an Intel x86 family manual to learn more about what these

    traps are. Here is a *portion* of those codes:

    If kv shows a taskGate

    use .tss on the part before the colon, then kv.

    Else if kv shows a trapframe

    use .trap on that value

    Else

    .trap on the appropriate frame will show where the trap was taken

    (on x86, this will be the ebp that goes with the procedure KiTrap)

    Endif

    kb will then show the corrected stack.

    Arguments:

    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT

    Arg2: 80042000

    Arg3: 00000000

    Arg4: 00000000

     

    Debugging Details:

    ------------------

     

     

     

     

    BUGCHECK_STR: 0x7f_8

     

    CUSTOMER_CRASH_COUNT: 2

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    PROCESS_NAME: iw3mp.exe

     

    LAST_CONTROL_TRANSFER: from 00000030 to 8054371b

     

    STACK_TEXT:

    ba8e2084 00000030 00000000 80001118 00000000 nt!KiTrap0E+0x23

    WARNING: Frame IP not in any known module. Following frames may be wrong.

    ba8e20f4 80001118 ba8e215c 00000000 8051ee33 0x30

    00000000 00000000 00000000 00000000 00000000 0x80001118

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    nt!KiTrap0E+23

    8054371b 1e push ds

     

    SYMBOL_STACK_INDEX: 0

     

    SYMBOL_NAME: nt!KiTrap0E+23

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: nt

     

    IMAGE_NAME: ntkrpamp.exe

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d

     

    FAILURE_BUCKET_ID: 0x7f_8_nt!KiTrap0E+23

     

    BUCKET_ID: 0x7f_8_nt!KiTrap0E+23

     

    Followup: MachineOwner

    ---------

  3. Hvis du leser Denne tråden så vil du kanskje forstå hvorfor jeg må ha 1.9v for mine ram, men spør også SNIPPSAT om råd, han har mye erfaringer innefor raminstillinger.

     

    Kjørte memtest igjen med først ene brikken som ga errors ganske fort. Den andre har kjørt 3 passes nå uten errors... Da er vel saken klar? Selv om jeg gjerne skulle ha testet med riktige BIOS settings. Som jeg har null peiling på hva skal være =/

  4. Kjøpte nylig følgende hardware:

     

    * 1 Corsair Powersupply 750W Black, ATX/EPS, 140mm Fan, 8xSATA, SLI

    * 1 Asus P5E, X38, Socket-775, DDR2, ATX, Firewire, GbLAN, 2xPCI-Ex(2.0)x16

    * 1 Intel Core 2 Duo E6850 3.0GHz 1333Mhz Socket LGA775, 4MB, BOXED m/vifte

    * 1 Corsair Dominator TWIN2X8500C5D 2048MB, DDR2,2x1GB(KIT),DHX,E.P.P, CL5-5-5-15-2T

    * 1 Western Digital Raptor 150GB SATA 16MB 10000RPM

    * 1 XFX GeForce 8800GTX 570M 768MB GDDR3, PCI-Express, 2xDVI/HDTV/HDCP, 384-bit

     

    Sliter med bluescreens og at spill hopper ut i windows igjen (nvlddmkm stopped responding). Har oppdatert BIOSen på hovedkortet. Ikke gjort det på skjermkortet enda. Har ikke fått surra meg til å installere en floppy enda. Testet både med XP og Vista. Bluescreens hagler i hytt og pine uansett.

     

    Noen som har driver tips e.l som kan hjelpe? Jeg har en lei følelse av at det kan være RAMen som er DoA eller BIOS instillingene som er feil. Når jeg sjekker minidumps er det alle mulige typer feil. DRIVER_IRQL_NOT_LESS_OR_EQUAL, PAGE_FAULT_IN_NON_PAGE_AREA, MEMORY_MANAGEMENT o.l Har sikkert fått andre typer også.

     

    Setter pris på alle mulige løsninger

  5. Opplever mye hakking i spill, folk klager over at jeg hakker på ventrilo osv.

     

    Når jeg tar tracert til diverse hoster får jeg noe sånn som dette:

     

    Til Uninett:

    1 <10 ms <10 ms <10 ms 10.0.0.240

    2 177 ms 199 ms 199 ms 192.168.0.1

    3 16 ms 16 ms 16 ms 1.80-202-19.nextgentel.com [80.202.19.1]

    4 17 ms 16 ms 17 ms 217-13-14-42.dd.nextgentel.com [217.13.14.42]

    5 18 ms 16 ms 17 ms trd-gw.uninett.no [193.156.93.1]

    6 17 ms 18 ms 18 ms teknobyen-gw.uninett.no [128.39.46.174]

    7 18 ms 18 ms 18 ms uninett-gw.uninett.no [128.39.47.90]

    8 18 ms 16 ms 17 ms freia.uninett.no [158.38.62.25]

     

    Til NTNU:

    1 <10 ms <10 ms <10 ms 10.0.0.240

    2 62 ms 199 ms 199 ms 192.168.0.1

    3 17 ms 17 ms 16 ms 1.80-202-19.nextgentel.com [80.202.19.1]

    4 17 ms 17 ms 16 ms 217-13-14-42.dd.nextgentel.com [217.13.14.42]

    5 17 ms 17 ms 17 ms trd-gw.uninett.no [193.156.93.1]

    6 17 ms 17 ms 17 ms ntnu-gsw.ntnu.no [158.38.0.222]

    7 17 ms 16 ms 17 ms semper1.stud.ntnu.no [129.241.56.60]

     

    Det er samme regla hele tiden. 2 hoppet (evt 1 hoppet hvis jeg kobler maskinen rett i modemet) har latterlig høy latency.

     

    Modemet er en Speedtouch 516.

    Linjen er fra nextgentel.

     

    Noen som opplever noe lignende?

×
×
  • Opprett ny...