Salta al contenuto
  • Categorie
  • Recenti
  • Tag
  • Popolare
  • Utenti
  • Gruppi
Collassa
Logo del marchio
  1. Home
  2. SOS veloce
  3. Problemi Hardware
  4. 3 BSOD in Game...

3 BSOD in Game...

Pianificato Fissato Bloccato Spostato Problemi Hardware
22 Post 0 Autori 2.9k Visualizzazioni
  • Da Vecchi a Nuovi
  • Da Nuovi a Vecchi
  • Più Voti
Rispondi
  • Risposta alla discussione
Effettua l'accesso per rispondere
Questa discussione è stata eliminata. Solo gli utenti con diritti di gestione possono vederla.
  • P Non in linea
    P Non in linea
    pasta
    scritto su ultima modifica di
    #1

    in tre sessioni lunghe di gioco (40-50 min.) ho avuto tre BSOD. Ram testate e OC testato con un ora e mezza di prime blend.

    I BSOD

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:WindowsMinidump120911-17238-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:Windowssymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`03a62000 PsLoadedModuleList = 0xfffff800`03ca7670
    Debug session time: Fri Dec  9 01:02:41.288 2011 (UTC + 1:00)
    System Uptime: 0 days 1:34:53.132
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {a1e06, d, 1, fffff80003ae9468}
    
    Unable to load image SystemRootsystem32DRIVERSintelppm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for intelppm.sys
    *** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000a1e06, memory referenced
    Arg2: 000000000000000d, IRQL
    Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003ae9468, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003d11100
    00000000000a1e06 
    
    CURRENT_IRQL:  d
    
    FAULTING_IP: 
    nt!KeUpdateSystemTime+348
    fffff800`03ae9468 483b8c3a18240000 cmp     rcx,qword ptr [rdx+rdi+2418h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff80005690840 -- (.trap 0xfffff80005690840)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=000000000000918e
    rdx=00000000000011a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003ae9468 rsp=fffff800056909d0 rbp=fffff78000000320
    r8=000000000005918d  r9=000000000005918e r10=0000000000000000
    r11=fffff80005690a20 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    nt!KeUpdateSystemTime+0x348:
    fffff800`03ae9468 483b8c3a18240000 cmp     rcx,qword ptr [rdx+rdi+2418h] ds:00000000`000035b8=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003ade1e9 to fffff80003adec40
    
    STACK_TEXT:  
    fffff800`056906f8 fffff800`03ade1e9 : 00000000`0000000a 00000000`000a1e06 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
    fffff800`05690700 fffff800`03adce60 : 00000000`00000000 00000000`0000000f 00000000`00000000 00000000`0005918f : nt!KiBugCheckDispatch+0x69
    fffff800`05690840 fffff800`03ae9468 : 00000000`00000000 fffff800`03c54e80 00000000`00000001 fffff800`03c54e80 : nt!KiPageFault+0x260
    fffff800`056909d0 fffff800`03a23895 : fffff800`03a49460 fffff800`05690b80 fffff800`03a49460 fffffa80`00000000 : nt!KeUpdateSystemTime+0x348
    fffff800`05690ad0 fffff800`03adb173 : 00000000`00000000 fffff800`05690b80 00000000`00000001 fffffa80`0792df10 : hal!HalpHpetClockInterrupt+0x8d
    fffff800`05690b00 fffff880`04d309c2 : fffff800`03ae84a9 00000000`0038c5ce fffffa80`0792f938 fffff800`03c62cc0 : nt!KiInterruptDispatchNoLock+0x163
    fffff800`05690c98 fffff800`03ae84a9 : 00000000`0038c5ce fffffa80`0792f938 fffff800`03c62cc0 00000000`00000001 : intelppm+0x39c2
    fffff800`05690ca0 fffff800`03ad693c : fffff800`03c54e80 fffff800`00000000 00000000`00000000 fffff880`060b352c : nt!PoIdle+0x52a
    fffff800`05690d80 00000000`00000000 : fffff800`05691000 fffff800`0568b000 fffff800`05690d40 00000000`00000000 : nt!KiIdleLoop+0x2c
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiPageFault+260
    fffff800`03adce60 440f20c0        mov     rax,cr8
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+260
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    BUCKET_ID:  X64_0xA_nt!KiPageFault+260
    
    Followup: MachineOwner
    ---------
    
    

    20111210161653_Immagine.jpg

    II BSOD

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:WindowsMinidump121011-19016-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:Windowssymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`03a5b000 PsLoadedModuleList = 0xfffff800`03ca0670
    Debug session time: Sat Dec 10 00:59:42.703 2011 (UTC + 1:00)
    System Uptime: 0 days 0:41:47.546
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................................................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {4, 2, 0, fffff80003ae35dc}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiProcessTimerDpcTable+4c )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000004, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003ae35dc, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003d0a100
    0000000000000004 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiProcessTimerDpcTable+4c
    fffff800`03ae35dc 458b4d04        mov     r9d,dword ptr [r13+4]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff8800371b360 -- (.trap 0xfffff8800371b360)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff880009f2180
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003ae35dc rsp=fffff8800371b4f0 rbp=0000000000000000
    r8=fffff8800371b580  r9=00000000009f2180 r10=fffff80003a5b000
    r11=fffff8800371b530 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiProcessTimerDpcTable+0x4c:
    fffff800`03ae35dc 458b4d04        mov     r9d,dword ptr [r13+4] ds:b520:00000000`00000004=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003ad71e9 to fffff80003ad7c40
    
    STACK_TEXT:  
    fffff880`0371b218 fffff800`03ad71e9 : 00000000`0000000a 00000000`00000004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0371b220 fffff800`03ad5e60 : 00000000`00000000 fffffa80`0c2c8120 fffffa80`0a5c2b40 fffff880`0371b580 : nt!KiBugCheckDispatch+0x69
    fffff880`0371b360 fffff800`03ae35dc : fffffa80`0a5c2b40 fffffa80`0419b2f8 00000003`0419b200 00000000`0000000d : nt!KiPageFault+0x260
    fffff880`0371b4f0 fffff800`03ae3496 : fffffa80`0c2c8168 fffffa80`0c2c8168 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x4c
    fffff880`0371b560 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiProcessExpiredTimerList+0xc6
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiProcessTimerDpcTable+4c
    fffff800`03ae35dc 458b4d04        mov     r9d,dword ptr [r13+4]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KiProcessTimerDpcTable+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiProcessTimerDpcTable+4c
    
    BUCKET_ID:  X64_0xA_nt!KiProcessTimerDpcTable+4c
    
    Followup: MachineOwner
    ---------
    
    

    20111210161804_Immagine2.jpg

    III BSOD

    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:WindowsMinidump121011-17487-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:Windowssymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
    Machine Name:
    Kernel base = 0xfffff800`03a04000 PsLoadedModuleList = 0xfffff800`03c49670
    Debug session time: Sat Dec 10 16:02:25.752 2011 (UTC + 1:00)
    System Uptime: 0 days 4:10:45.596
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {24, 2, 0, fffff80003a896cb}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiTimerWaitTest+22b )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000024, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003a896cb, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003cb3100
    0000000000000024 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiTimerWaitTest+22b
    fffff800`03a896cb 418b4624        mov     eax,dword ptr [r14+24h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff8800371b350 -- (.trap 0xfffff8800371b350)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8007777aa0 rbx=0000000000000000 rcx=fffffa800ad94100
    rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003a896cb rsp=fffff8800371b4e8 rbp=fffffa800985d9a8
    r8=fffff880009f4301  r9=0000000000000002 r10=0000000000000067
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiTimerWaitTest+0x22b:
    fffff800`03a896cb 418b4624        mov     eax,dword ptr [r14+24h] ds:5000:00000000`00000024=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003a801e9 to fffff80003a80c40
    
    STACK_TEXT:  
    fffff880`0371b208 fffff800`03a801e9 : 00000000`0000000a 00000000`00000024 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0371b210 fffff800`03a7ee60 : 00000000`0038c5c4 fffffa80`09faf000 00000000`00000000 fffffa80`0985d9a8 : nt!KiBugCheckDispatch+0x69
    fffff880`0371b350 fffff800`03a896cb : 00000000`0000000f fffffa80`08eb4010 fffffa80`0ae95948 fffffa80`0ae95948 : nt!KiPageFault+0x260
    fffff880`0371b4e8 fffffa80`0ae95948 : fffffa80`0985d9a0 00000000`00000000 fffffa80`08eb4218 00000000`00000102 : nt!KiTimerWaitTest+0x22b
    fffff880`0371b568 fffffa80`0985d9a0 : 00000000`00000000 fffffa80`08eb4218 00000000`00000102 fffffa80`09f917a8 : 0xfffffa80`0ae95948
    fffff880`0371b570 00000000`00000000 : fffffa80`08eb4218 00000000`00000102 fffffa80`09f917a8 00000000`00000002 : 0xfffffa80`0985d9a0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiTimerWaitTest+22b
    fffff800`03a896cb 418b4624        mov     eax,dword ptr [r14+24h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KiTimerWaitTest+22b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+22b
    
    BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+22b
    
    Followup: MachineOwner
    ---------
    
    

    20111210161915_Immagine3.jpg

    Sapreste dirmi cosa ha causato questi crash in ogniuna di quesrte 3 situazioni?

     

    Inoltre sapreste dirmi poi come agire per eliminare il problema?

    1 Risposta Ultima Risposta
    0
    • P Non in linea
      P Non in linea
      pasta
      scritto su ultima modifica di
      #2

      in tre sessioni lunghe di gioco (40-50 min.) ho avuto tre BSOD. Ram testate e OC testato con un ora e mezza di prime blend.

      I BSOD

      Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
      Copyright (c) Microsoft Corporation. All rights reserved.
      
      
      Loading Dump File [C:WindowsMinidump120911-17238-01.dmp]
      Mini Kernel Dump File: Only registers and stack trace are available
      
      Symbol search path is: SRV*c:Windowssymbols*http://msdl.microsoft.com/download/symbols
      Executable search path is: 
      Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
      Product: WinNt, suite: TerminalServer SingleUserTS
      Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
      Machine Name:
      Kernel base = 0xfffff800`03a62000 PsLoadedModuleList = 0xfffff800`03ca7670
      Debug session time: Fri Dec  9 01:02:41.288 2011 (UTC + 1:00)
      System Uptime: 0 days 1:34:53.132
      Loading Kernel Symbols
      ...............................................................
      ................................................................
      .........................................................
      Loading User Symbols
      Loading unloaded module list
      .....
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
      
      Use !analyze -v to get detailed debugging information.
      
      BugCheck A, {a1e06, d, 1, fffff80003ae9468}
      
      Unable to load image SystemRootsystem32DRIVERSintelppm.sys, Win32 error 0n2
      *** WARNING: Unable to verify timestamp for intelppm.sys
      *** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
      Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
      
      Followup: MachineOwner
      ---------
      
      0: kd> !analyze -v
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
      
      IRQL_NOT_LESS_OR_EQUAL (a)
      An attempt was made to access a pageable (or completely invalid) address at an
      interrupt request level (IRQL) that is too high.  This is usually
      caused by drivers using improper addresses.
      If a kernel debugger is available get the stack backtrace.
      Arguments:
      Arg1: 00000000000a1e06, memory referenced
      Arg2: 000000000000000d, IRQL
      Arg3: 0000000000000001, bitfield :
      bit 0 : value 0 = read operation, 1 = write operation
      bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
      Arg4: fffff80003ae9468, address which referenced memory
      
      Debugging Details:
      ------------------
      
      
      WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003d11100
      00000000000a1e06 
      
      CURRENT_IRQL:  d
      
      FAULTING_IP: 
      nt!KeUpdateSystemTime+348
      fffff800`03ae9468 483b8c3a18240000 cmp     rcx,qword ptr [rdx+rdi+2418h]
      
      CUSTOMER_CRASH_COUNT:  1
      
      DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
      
      BUGCHECK_STR:  0xA
      
      PROCESS_NAME:  System
      
      TRAP_FRAME:  fffff80005690840 -- (.trap 0xfffff80005690840)
      NOTE: The trap frame does not contain all registers.
      Some register values may be zeroed or incorrect.
      rax=0000000000000000 rbx=0000000000000000 rcx=000000000000918e
      rdx=00000000000011a0 rsi=0000000000000000 rdi=0000000000000000
      rip=fffff80003ae9468 rsp=fffff800056909d0 rbp=fffff78000000320
      r8=000000000005918d  r9=000000000005918e r10=0000000000000000
      r11=fffff80005690a20 r12=0000000000000000 r13=0000000000000000
      r14=0000000000000000 r15=0000000000000000
      iopl=0         nv up ei ng nz na pe cy
      nt!KeUpdateSystemTime+0x348:
      fffff800`03ae9468 483b8c3a18240000 cmp     rcx,qword ptr [rdx+rdi+2418h] ds:00000000`000035b8=????????????????
      Resetting default scope
      
      LAST_CONTROL_TRANSFER:  from fffff80003ade1e9 to fffff80003adec40
      
      STACK_TEXT:  
      fffff800`056906f8 fffff800`03ade1e9 : 00000000`0000000a 00000000`000a1e06 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
      fffff800`05690700 fffff800`03adce60 : 00000000`00000000 00000000`0000000f 00000000`00000000 00000000`0005918f : nt!KiBugCheckDispatch+0x69
      fffff800`05690840 fffff800`03ae9468 : 00000000`00000000 fffff800`03c54e80 00000000`00000001 fffff800`03c54e80 : nt!KiPageFault+0x260
      fffff800`056909d0 fffff800`03a23895 : fffff800`03a49460 fffff800`05690b80 fffff800`03a49460 fffffa80`00000000 : nt!KeUpdateSystemTime+0x348
      fffff800`05690ad0 fffff800`03adb173 : 00000000`00000000 fffff800`05690b80 00000000`00000001 fffffa80`0792df10 : hal!HalpHpetClockInterrupt+0x8d
      fffff800`05690b00 fffff880`04d309c2 : fffff800`03ae84a9 00000000`0038c5ce fffffa80`0792f938 fffff800`03c62cc0 : nt!KiInterruptDispatchNoLock+0x163
      fffff800`05690c98 fffff800`03ae84a9 : 00000000`0038c5ce fffffa80`0792f938 fffff800`03c62cc0 00000000`00000001 : intelppm+0x39c2
      fffff800`05690ca0 fffff800`03ad693c : fffff800`03c54e80 fffff800`00000000 00000000`00000000 fffff880`060b352c : nt!PoIdle+0x52a
      fffff800`05690d80 00000000`00000000 : fffff800`05691000 fffff800`0568b000 fffff800`05690d40 00000000`00000000 : nt!KiIdleLoop+0x2c
      
      
      STACK_COMMAND:  kb
      
      FOLLOWUP_IP: 
      nt!KiPageFault+260
      fffff800`03adce60 440f20c0        mov     rax,cr8
      
      SYMBOL_STACK_INDEX:  2
      
      SYMBOL_NAME:  nt!KiPageFault+260
      
      FOLLOWUP_NAME:  MachineOwner
      
      MODULE_NAME: nt
      
      IMAGE_NAME:  ntkrnlmp.exe
      
      DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
      
      FAILURE_BUCKET_ID:  X64_0xA_nt!KiPageFault+260
      
      BUCKET_ID:  X64_0xA_nt!KiPageFault+260
      
      Followup: MachineOwner
      ---------
      
      

      20111210161653_Immagine.jpg

      II BSOD

      Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
      Copyright (c) Microsoft Corporation. All rights reserved.
      
      
      Loading Dump File [C:WindowsMinidump121011-19016-01.dmp]
      Mini Kernel Dump File: Only registers and stack trace are available
      
      Symbol search path is: SRV*c:Windowssymbols*http://msdl.microsoft.com/download/symbols
      Executable search path is: 
      Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
      Product: WinNt, suite: TerminalServer SingleUserTS
      Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
      Machine Name:
      Kernel base = 0xfffff800`03a5b000 PsLoadedModuleList = 0xfffff800`03ca0670
      Debug session time: Sat Dec 10 00:59:42.703 2011 (UTC + 1:00)
      System Uptime: 0 days 0:41:47.546
      Loading Kernel Symbols
      ...............................................................
      ................................................................
      ........................................................
      Loading User Symbols
      Loading unloaded module list
      .....
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
      
      Use !analyze -v to get detailed debugging information.
      
      BugCheck A, {4, 2, 0, fffff80003ae35dc}
      
      Probably caused by : ntkrnlmp.exe ( nt!KiProcessTimerDpcTable+4c )
      
      Followup: MachineOwner
      ---------
      
      1: kd> !analyze -v
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
      
      IRQL_NOT_LESS_OR_EQUAL (a)
      An attempt was made to access a pageable (or completely invalid) address at an
      interrupt request level (IRQL) that is too high.  This is usually
      caused by drivers using improper addresses.
      If a kernel debugger is available get the stack backtrace.
      Arguments:
      Arg1: 0000000000000004, memory referenced
      Arg2: 0000000000000002, IRQL
      Arg3: 0000000000000000, bitfield :
      bit 0 : value 0 = read operation, 1 = write operation
      bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
      Arg4: fffff80003ae35dc, address which referenced memory
      
      Debugging Details:
      ------------------
      
      
      READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003d0a100
      0000000000000004 
      
      CURRENT_IRQL:  2
      
      FAULTING_IP: 
      nt!KiProcessTimerDpcTable+4c
      fffff800`03ae35dc 458b4d04        mov     r9d,dword ptr [r13+4]
      
      CUSTOMER_CRASH_COUNT:  1
      
      DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
      
      BUGCHECK_STR:  0xA
      
      PROCESS_NAME:  System
      
      TRAP_FRAME:  fffff8800371b360 -- (.trap 0xfffff8800371b360)
      NOTE: The trap frame does not contain all registers.
      Some register values may be zeroed or incorrect.
      rax=0000000000000000 rbx=0000000000000000 rcx=fffff880009f2180
      rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
      rip=fffff80003ae35dc rsp=fffff8800371b4f0 rbp=0000000000000000
      r8=fffff8800371b580  r9=00000000009f2180 r10=fffff80003a5b000
      r11=fffff8800371b530 r12=0000000000000000 r13=0000000000000000
      r14=0000000000000000 r15=0000000000000000
      iopl=0         nv up ei pl zr na po nc
      nt!KiProcessTimerDpcTable+0x4c:
      fffff800`03ae35dc 458b4d04        mov     r9d,dword ptr [r13+4] ds:b520:00000000`00000004=????????
      Resetting default scope
      
      LAST_CONTROL_TRANSFER:  from fffff80003ad71e9 to fffff80003ad7c40
      
      STACK_TEXT:  
      fffff880`0371b218 fffff800`03ad71e9 : 00000000`0000000a 00000000`00000004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
      fffff880`0371b220 fffff800`03ad5e60 : 00000000`00000000 fffffa80`0c2c8120 fffffa80`0a5c2b40 fffff880`0371b580 : nt!KiBugCheckDispatch+0x69
      fffff880`0371b360 fffff800`03ae35dc : fffffa80`0a5c2b40 fffffa80`0419b2f8 00000003`0419b200 00000000`0000000d : nt!KiPageFault+0x260
      fffff880`0371b4f0 fffff800`03ae3496 : fffffa80`0c2c8168 fffffa80`0c2c8168 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x4c
      fffff880`0371b560 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiProcessExpiredTimerList+0xc6
      
      
      STACK_COMMAND:  kb
      
      FOLLOWUP_IP: 
      nt!KiProcessTimerDpcTable+4c
      fffff800`03ae35dc 458b4d04        mov     r9d,dword ptr [r13+4]
      
      SYMBOL_STACK_INDEX:  3
      
      SYMBOL_NAME:  nt!KiProcessTimerDpcTable+4c
      
      FOLLOWUP_NAME:  MachineOwner
      
      MODULE_NAME: nt
      
      IMAGE_NAME:  ntkrnlmp.exe
      
      DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
      
      FAILURE_BUCKET_ID:  X64_0xA_nt!KiProcessTimerDpcTable+4c
      
      BUCKET_ID:  X64_0xA_nt!KiProcessTimerDpcTable+4c
      
      Followup: MachineOwner
      ---------
      
      

      20111210161804_Immagine2.jpg

      III BSOD

      Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
      Copyright (c) Microsoft Corporation. All rights reserved.
      
      
      Loading Dump File [C:WindowsMinidump121011-17487-01.dmp]
      Mini Kernel Dump File: Only registers and stack trace are available
      
      Symbol search path is: SRV*c:Windowssymbols*http://msdl.microsoft.com/download/symbols
      Executable search path is: 
      Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
      Product: WinNt, suite: TerminalServer SingleUserTS
      Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
      Machine Name:
      Kernel base = 0xfffff800`03a04000 PsLoadedModuleList = 0xfffff800`03c49670
      Debug session time: Sat Dec 10 16:02:25.752 2011 (UTC + 1:00)
      System Uptime: 0 days 4:10:45.596
      Loading Kernel Symbols
      ...............................................................
      ................................................................
      ...........................................................
      Loading User Symbols
      Loading unloaded module list
      .........
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
      
      Use !analyze -v to get detailed debugging information.
      
      BugCheck A, {24, 2, 0, fffff80003a896cb}
      
      Probably caused by : ntkrnlmp.exe ( nt!KiTimerWaitTest+22b )
      
      Followup: MachineOwner
      ---------
      
      1: kd> !analyze -v
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
      
      IRQL_NOT_LESS_OR_EQUAL (a)
      An attempt was made to access a pageable (or completely invalid) address at an
      interrupt request level (IRQL) that is too high.  This is usually
      caused by drivers using improper addresses.
      If a kernel debugger is available get the stack backtrace.
      Arguments:
      Arg1: 0000000000000024, memory referenced
      Arg2: 0000000000000002, IRQL
      Arg3: 0000000000000000, bitfield :
      bit 0 : value 0 = read operation, 1 = write operation
      bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
      Arg4: fffff80003a896cb, address which referenced memory
      
      Debugging Details:
      ------------------
      
      
      READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003cb3100
      0000000000000024 
      
      CURRENT_IRQL:  2
      
      FAULTING_IP: 
      nt!KiTimerWaitTest+22b
      fffff800`03a896cb 418b4624        mov     eax,dword ptr [r14+24h]
      
      CUSTOMER_CRASH_COUNT:  1
      
      DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
      
      BUGCHECK_STR:  0xA
      
      PROCESS_NAME:  System
      
      TRAP_FRAME:  fffff8800371b350 -- (.trap 0xfffff8800371b350)
      NOTE: The trap frame does not contain all registers.
      Some register values may be zeroed or incorrect.
      rax=fffffa8007777aa0 rbx=0000000000000000 rcx=fffffa800ad94100
      rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
      rip=fffff80003a896cb rsp=fffff8800371b4e8 rbp=fffffa800985d9a8
      r8=fffff880009f4301  r9=0000000000000002 r10=0000000000000067
      r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
      r14=0000000000000000 r15=0000000000000000
      iopl=0         nv up ei pl zr na po nc
      nt!KiTimerWaitTest+0x22b:
      fffff800`03a896cb 418b4624        mov     eax,dword ptr [r14+24h] ds:5000:00000000`00000024=????????
      Resetting default scope
      
      LAST_CONTROL_TRANSFER:  from fffff80003a801e9 to fffff80003a80c40
      
      STACK_TEXT:  
      fffff880`0371b208 fffff800`03a801e9 : 00000000`0000000a 00000000`00000024 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
      fffff880`0371b210 fffff800`03a7ee60 : 00000000`0038c5c4 fffffa80`09faf000 00000000`00000000 fffffa80`0985d9a8 : nt!KiBugCheckDispatch+0x69
      fffff880`0371b350 fffff800`03a896cb : 00000000`0000000f fffffa80`08eb4010 fffffa80`0ae95948 fffffa80`0ae95948 : nt!KiPageFault+0x260
      fffff880`0371b4e8 fffffa80`0ae95948 : fffffa80`0985d9a0 00000000`00000000 fffffa80`08eb4218 00000000`00000102 : nt!KiTimerWaitTest+0x22b
      fffff880`0371b568 fffffa80`0985d9a0 : 00000000`00000000 fffffa80`08eb4218 00000000`00000102 fffffa80`09f917a8 : 0xfffffa80`0ae95948
      fffff880`0371b570 00000000`00000000 : fffffa80`08eb4218 00000000`00000102 fffffa80`09f917a8 00000000`00000002 : 0xfffffa80`0985d9a0
      
      
      STACK_COMMAND:  kb
      
      FOLLOWUP_IP: 
      nt!KiTimerWaitTest+22b
      fffff800`03a896cb 418b4624        mov     eax,dword ptr [r14+24h]
      
      SYMBOL_STACK_INDEX:  3
      
      SYMBOL_NAME:  nt!KiTimerWaitTest+22b
      
      FOLLOWUP_NAME:  MachineOwner
      
      MODULE_NAME: nt
      
      IMAGE_NAME:  ntkrnlmp.exe
      
      DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
      
      FAILURE_BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+22b
      
      BUCKET_ID:  X64_0xA_nt!KiTimerWaitTest+22b
      
      Followup: MachineOwner
      ---------
      
      

      20111210161915_Immagine3.jpg

      Sapreste dirmi cosa ha causato questi crash in ogniuna di quesrte 3 situazioni?

       

      Inoltre sapreste dirmi poi come agire per eliminare il problema?

      1 Risposta Ultima Risposta
      0
      • T Non in linea
        T Non in linea
        tom1
        scritto su ultima modifica di
        #3

        sono tutti bsod dovuti a corruzione di driver uno directx, uno del pannello di controllo nei servizi ed uno del pannello di ati

        1 Risposta Ultima Risposta
        0
        • P Non in linea
          P Non in linea
          principe andry
          scritto su ultima modifica di
          #4

          Li hai avuti con lo stesso gioco recentemente installato?

          Aggiorna i driver ed il BIOS.

          ciao

          1 Risposta Ultima Risposta
          0
          • P Non in linea
            P Non in linea
            pasta
            scritto su ultima modifica di
            #5

            no, con 2 giochi diversi e bios aggiornato...quindi inizio dai drivers video e vediamo...grazie, se si ripresentano aggiorno il thread

            1 Risposta Ultima Risposta
            0
            • T Non in linea
              T Non in linea
              tom1
              scritto su ultima modifica di
              #6

              perfetto

              1 Risposta Ultima Risposta
              0
              • P Non in linea
                P Non in linea
                pasta
                scritto su ultima modifica di
                #7
                Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
                Copyright (c) Microsoft Corporation. All rights reserved.
                
                
                Loading Dump File [C:WindowsMinidump121611-16816-01.dmp]
                Mini Kernel Dump File: Only registers and stack trace are available
                
                Symbol search path is: SRV*c:Windowssymbols*http://msdl.microsoft.com/download/symbols
                Executable search path is: 
                Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
                Product: WinNt, suite: TerminalServer SingleUserTS
                Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
                Machine Name:
                Kernel base = 0xfffff800`03a56000 PsLoadedModuleList = 0xfffff800`03c9b670
                Debug session time: Fri Dec 16 02:37:25.686 2011 (UTC + 1:00)
                System Uptime: 0 days 1:43:47.904
                Loading Kernel Symbols
                ...............................................................
                ................................................................
                ..........................................................
                Loading User Symbols
                Loading unloaded module list
                ....
                *******************************************************************************
                *                                                                             *
                *                        Bugcheck Analysis                                    *
                *                                                                             *
                *******************************************************************************
                
                Use !analyze -v to get detailed debugging information.
                
                BugCheck 1E, {0, 0, 0, 0}
                
                Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
                
                Followup: MachineOwner
                ---------
                
                0: kd> !analyze -v
                *******************************************************************************
                *                                                                             *
                *                        Bugcheck Analysis                                    *
                *                                                                             *
                *******************************************************************************
                
                KMODE_EXCEPTION_NOT_HANDLED (1e)
                This is a very common bugcheck.  Usually the exception address pinpoints
                the driver/function that caused the problem.  Always note this address
                as well as the link date of the driver/image that contains this address.
                Arguments:
                Arg1: 0000000000000000, The exception code that was not handled
                Arg2: 0000000000000000, The address that the exception occurred at
                Arg3: 0000000000000000, Parameter 0 of the exception
                Arg4: 0000000000000000, Parameter 1 of the exception
                
                Debugging Details:
                ------------------
                
                
                EXCEPTION_CODE: (Win32) 0 (0) - Operazione completata.
                
                FAULTING_IP: 
                +6238643366333963
                00000000`00000000 ??              ???
                
                EXCEPTION_PARAMETER1:  0000000000000000
                
                EXCEPTION_PARAMETER2:  0000000000000000
                
                ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
                
                BUGCHECK_STR:  0x1E_0
                
                CUSTOMER_CRASH_COUNT:  1
                
                DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
                
                PROCESS_NAME:  System
                
                CURRENT_IRQL:  2
                
                EXCEPTION_RECORD:  fffff80005685328 -- (.exr 0xfffff80005685328)
                ExceptionAddress: fffffa8007698efe
                ExceptionCode: c000001d (Illegal instruction)
                ExceptionFlags: 00000000
                NumberParameters: 0
                
                TRAP_FRAME:  fffff800056853d0 -- (.trap 0xfffff800056853d0)
                NOTE: The trap frame does not contain all registers.
                Some register values may be zeroed or incorrect.
                rax=fffffa8009ec4c80 rbx=0000000000000000 rcx=0000000000000000
                rdx=fffffa8009ec4cc0 rsi=0000000000000000 rdi=0000000000000000
                rip=fffffa8007698efe rsp=fffff80005685568 rbp=0000000000000001
                r8=fffff80003c4b001  r9=0000000000000002 r10=0000000000000076
                r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
                r14=0000000000000000 r15=0000000000000000
                iopl=0         nv up di ng nz na po nc
                fffffa80`07698efe ??              ???
                Resetting default scope
                
                LAST_CONTROL_TRANSFER:  from fffff80003aca5fe to fffff80003ad2c10
                
                STACK_TEXT:  
                fffff800`05684408 fffff800`03aca5fe : fffff800`05685600 fffff800`05686000 fffff800`05684b80 fffff800`03afe830 : nt!KeBugCheck
                fffff800`05684410 fffff800`03afe4fd : fffff800`03cdc71c fffff800`03c19c30 fffff800`03a56000 fffff800`05685328 : nt!KiKernelCalloutExceptionHandler+0xe
                fffff800`05684440 fffff800`03afd2d5 : fffff800`03c1d0fc fffff800`056844b8 fffff800`05685328 fffff800`03a56000 : nt!RtlpExecuteHandlerForException+0xd
                fffff800`05684470 fffff800`03b0e361 : fffff800`05685328 fffff800`05684b80 fffff800`00000000 fffffa80`09ec4cc0 : nt!RtlDispatchException+0x415
                fffff800`05684b50 fffff800`03ad22c2 : fffff800`05685328 fffffa80`09ec4cc0 fffff800`056853d0 fffffa80`09ec4c80 : nt!KiDispatchException+0x135
                fffff800`056851f0 fffff800`03ad041f : fffff800`056853d0 00000000`00000002 fffffa80`099da300 fffffa80`00000000 : nt!KiExceptionDispatch+0xc2
                fffff800`056853d0 fffffa80`07698efe : fffffa80`09ec4cc0 00000000`00000000 fffffa80`07698ef0 00000000`40760000 : nt!KiInvalidOpcodeFault+0x11f
                fffff800`05685568 fffffa80`09ec4cc0 : 00000000`00000000 fffffa80`07698ef0 00000000`40760000 00000000`00000009 : 0xfffffa80`07698efe
                fffff800`05685570 00000000`00000000 : fffffa80`07698ef0 00000000`40760000 00000000`00000009 00000000`00000000 : 0xfffffa80`09ec4cc0
                
                
                STACK_COMMAND:  kb
                
                FOLLOWUP_IP: 
                nt!KiKernelCalloutExceptionHandler+e
                fffff800`03aca5fe 90              nop
                
                SYMBOL_STACK_INDEX:  1
                
                SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e
                
                FOLLOWUP_NAME:  MachineOwner
                
                MODULE_NAME: nt
                
                IMAGE_NAME:  ntkrnlmp.exe
                
                DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
                
                FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
                
                BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
                
                Followup: MachineOwner
                ---------
                
                

                th_20111216124504_Immagine.jpg

                Quindi anche i nuovi drivers non hanno risolto.....si tratta sempre della stessa causa?....come dovrei procedere ora?

                1 Risposta Ultima Risposta
                0
                • T Non in linea
                  T Non in linea
                  tom1
                  scritto su ultima modifica di
                  #8

                  no ora è dovuto ad una corruzione di un file kernel di windows

                  1 Risposta Ultima Risposta
                  0
                  • P Non in linea
                    P Non in linea
                    pasta
                    scritto su ultima modifica di
                    #9

                    tom1 ha scritto:

                    no ora è dovuto ad una corruzione di un file kernel di windows

                    possibili azioni?

                    1 Risposta Ultima Risposta
                    0
                    • T Non in linea
                      T Non in linea
                      tom1
                      scritto su ultima modifica di
                      #10

                      formattare o sostuirlo dal dvd di installazione

                      1 Risposta Ultima Risposta
                      0
                      • P Non in linea
                        P Non in linea
                        pasta
                        scritto su ultima modifica di
                        #11

                        tom1 ha scritto:

                        formattare o sostuirlo dal dvd di installazione

                        come posso attuare la seconda via ? :cheazz:

                        1 Risposta Ultima Risposta
                        0
                        • T Non in linea
                          T Non in linea
                          tom1
                          scritto su ultima modifica di
                          #12

                          inserisci il dvd e cerchi il file

                          1 Risposta Ultima Risposta
                          0
                          • G Non in linea
                            G Non in linea
                            Giovanni Franchitto
                            scritto su ultima modifica di
                            #13

                            sistema instabile per overclock

                            1 Risposta Ultima Risposta
                            0
                            • P Non in linea
                              P Non in linea
                              pasta
                              scritto su ultima modifica di
                              #14

                              tom1 ha scritto:

                              inserisci il dvd e cerchi il file

                              bene inizio con questo allora e vediamo se si ripresenta...il file da sostituire è ntoskrnl.exe?

                              edit: se il file è quello non c'è nel dvd

                              Gi@n ha scritto:

                              sistema instabile per overclock

                              l'ho testato con un ora e mezza di prime blend (oltre ad aver testato singolarmente le ram col test da dos)

                              ....c'è un modo piu affidabile per testare l'oc e sapere se il problema è quello?

                              1 Risposta Ultima Risposta
                              0
                              • T Non in linea
                                T Non in linea
                                tom1
                                scritto su ultima modifica di
                                #15

                                no ha testato nel modo corretto

                                1 Risposta Ultima Risposta
                                0
                                • G Non in linea
                                  G Non in linea
                                  Giovanni Franchitto
                                  scritto su ultima modifica di
                                  #16

                                  pasta ha scritto:

                                  bene inizio con questo allora e vediamo se si ripresenta...il file da sostituire è ntoskrnl.exe?

                                  edit: se il file è quello non c'è nel dvd

                                  l'ho testato con un ora e mezza di prime blend (oltre ad aver testato singolarmente le ram col test da dos)

                                  ....c'è un modo piu affidabile per testare l'oc e sapere se il problema è quello?

                                  si, un gioco pesante

                                  1 Risposta Ultima Risposta
                                  0
                                  • T Non in linea
                                    T Non in linea
                                    tom1
                                    scritto su ultima modifica di
                                    #17

                                    novità

                                    1 Risposta Ultima Risposta
                                    0
                                    • P Non in linea
                                      P Non in linea
                                      pasta
                                      scritto su ultima modifica di
                                      #18

                                      devo trovare quel file, nel dvd non c'è (a meno che si debba estrarre da qualche altro file, non so)

                                      1 Risposta Ultima Risposta
                                      0
                                      • T Non in linea
                                        T Non in linea
                                        tom1
                                        scritto su ultima modifica di
                                        #19

                                        allora vai di rispristino sistema

                                        1 Risposta Ultima Risposta
                                        0
                                        • P Non in linea
                                          P Non in linea
                                          pasta
                                          scritto su ultima modifica di
                                          #20

                                          tom1 ha scritto:

                                          allora vai di rispristino sistema

                                          intendi ripristinare un punto precedente del sistema operativo o lanciare qualche sorta di utility col dvd di windows?

                                          1 Risposta Ultima Risposta
                                          0

                                          Ciao! Sembra che tu sia interessato a questa conversazione, ma non hai ancora un account.

                                          Stanco di dover scorrere gli stessi post a ogni visita? Quando registri un account, tornerai sempre esattamente dove eri rimasto e potrai scegliere di essere avvisato delle nuove risposte (tramite email o notifica push). Potrai anche salvare segnalibri e votare i post per mostrare il tuo apprezzamento agli altri membri della comunità.

                                          Con il tuo contributo, questo post potrebbe essere ancora migliore 💗

                                          Registrati Accedi
                                          Rispondi
                                          • Risposta alla discussione
                                          Effettua l'accesso per rispondere
                                          • Da Vecchi a Nuovi
                                          • Da Nuovi a Vecchi
                                          • Più Voti


                                          • Accedi

                                          • Non hai un account? Registrati

                                          • Accedi o registrati per effettuare la ricerca.
                                          Powered by NodeBB Contributors
                                          • Primo post
                                            Ultimo post
                                          0
                                          • Categorie
                                          • Recenti
                                          • Tag
                                          • Popolare
                                          • Utenti
                                          • Gruppi