Ja bym jednak próbował podmienić te pamięci na inne sztuki zgodne z QVL dla tej płyty głównej. Chociażby na jedną czy dwie sztuki pożyczyć na sprawdzenie. Jakaś przyczyna musi być, że sprzęt nie wstał i dopiero po wyjęciu ruszył. Znam takie przypadki a potem znowu problemy.
Memtest86 niestety nie jest w 100% wiarygodny. Nie wiem nawet jak długo te testy przeprowadzałeś
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G: \Downloads\091112-16052-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`03264000 PsLoadedModuleList = 0xfffff800`034a8670
Debug session time: Tue Sep 11 21: 03: 45.374 2012 (UTC + 2: 00)
System Uptime: 0 days 0: 53: 26.090
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8804e409715, 0, fffff800032bbc4c, 5}
Could not read faulting driver name
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8804e409715, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800032bbc4c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003512100
fffff8804e409715
FAULTING_IP:
nt!RtlFxToFnFrame+c8
fffff800`032bbc4c 0fb7bb89430848 movzx edi,word ptr [rbx+48084389h]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: WarGame.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88006384c30 -- (.trap 0xfffff88006384c30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000004012 rbx=0000000000000000 rcx=000000000000ffff
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032bbc4c rsp=fffff88006384dc0 rbp=fffff88006384e70
r8=00000000015c0023 r9=fffff880063853f8 r10=fffff88006385010
r11=fffff88006385400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlFxToFnFrame+0xc8:
fffff800`032bbc4c 0fb7bb89430848 movzx edi,word ptr [rbx+48084389h] ds: 4b70: 00000000`48084389=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003289f0f to fffff800032e31c0
STACK_TEXT:
fffff880`06384ac8 fffff800`03289f0f : 00000000`00000050 fffff880`4e409715 00000000`00000000 fffff880`06384c30 : nt!KeBugCheckEx
fffff880`06384ad0 fffff800`032e12ee : 00000000`00000000 fffff880`4e409715 fffff880`06384c00 fffff880`0638538c : nt! ? : FNODOBFM: `string'+0x43d51
fffff880`06384c30 fffff800`032bbc4c : fffff880`06385370 fffff880`0638563c 00000000`00000023 fffff800`0359d1b2 : nt!KiPageFault+0x16e
fffff880`06384dc0 fffff800`0359d1b2 : fffff880`06385370 fffff880`06384e70 00000000`0001003f fffff880`06384e70 : nt!RtlFxToFnFrame+0xc8
fffff880`06384de0 fffff800`0359d3d1 : fffff880`06385370 fffff880`06384e70 fffff880`063856b4 00000000`0008db01 : nt!RtlpWow64CtxFromAmd64+0x21a
fffff880`06384e10 fffff800`0359c7f7 : fffff880`06384e70 fffff880`06385660 00000000`0001003f 00000000`0008db20 : nt!RtlpWow64GetContextOnAmd64+0x4d
fffff880`06384e40 fffff800`035cc33a : 00000000`00000000 00000000`00000008 00000000`000002cc 00000000`00000001 : nt!PspWow64GetContextThreadOnAmd64+0x1d7
fffff880`063859e0 fffff800`032e2453 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryInformationThread+0x255
fffff880`06385bb0 00000000`7739156a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008dab8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7739156a
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
8 errors : !nt (fffff800032bbc46-fffff800032bbc7e)
fffff800032bbc40 24 28 48 8b 74 24 *80 48 8b 7c 24 38 0f b7 *bb 89 $(H.t$.H.|$8....
fffff800032bbc50 43 08 48 8b 5c 24 *2f 41 5e 41 5d 41 5c c3 *00 90 C.H.\$/A^A]A\...
fffff800032bbc60 90 90 90 90 33 d2 *00 89 11 0f b7 05 7c 64 *00 00 ....3.......|d..
fffff800032bbc70 66 89 41 02 0f b7 *00 cd 65 25 00 66 89 41 *81 66 f.A.....e%.f.A.f
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------