Check alle échte Black Friday-deals Ook zo moe van nepaanbiedingen? Wij laten alleen échte deals zien

  • lujo
  • Registratie: Januari 2004
  • Laatst online: 03-09-2023
- Gygabyte GA-MA74GM-S2H (rev. 2.0)
- AMD Athlon II X2 245e Boxed
- 2 x 1GB
- 5 x 1,5TB (ik dacht 3xWD en 2xSamsung = alleemaal Greens)
- TBS 6922 dvb-s2 kaartje
- TVSource 4.5.2

Op dit moment ben ik memtest aan het draaien.

Het vage is dat ik dit probleem sinds kort heb zonder dat ik iets aan hardware heb veranderd. TVSource 4.5.2 heb ik al verwijderd en opnieuw geinstalleeerd om te kijken of het niet toevallig daaraan lag.... (Dit voornamelijk vanwege "PROCESS_NAME: tvs_plugin_host").

In welke richting zouden jullie zoeken? Graag meer tips?

Minidump van net heb ik uitgelezen:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
[b]Datum: 14 March 2013, 13:04:07[/b]
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini031413-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: Server, suite: SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS WHServer
Built by: 3790.srv03_sp2_gdr.130106-1434
Machine Name:
Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
Debug session time: Thu Mar 14 13:00:56.109 2013 (UTC + 1:00)
System Uptime: 0 days 23:50:32.781
Loading Kernel Symbols
...............................................................
................................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 9C, {0, f772d2c0, b6004000, 15000135}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MACHINE_CHECK_EXCEPTION (9c)
A fatal Machine Check Exception has occurred.
KeBugCheckEx parameters;
    x86 Processors
        If the processor has ONLY MCE feature available (For example Intel
        Pentium), the parameters are:
        1 - Low  32 bits of P5_MC_TYPE MSR
        2 - Address of MCA_EXCEPTION structure
        3 - High 32 bits of P5_MC_ADDR MSR
        4 - Low  32 bits of P5_MC_ADDR MSR
        If the processor also has MCA feature available (For example Intel
        Pentium Pro), the parameters are:
        1 - Bank number
        2 - Address of MCA_EXCEPTION structure
        3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
        4 - Low  32 bits of MCi_STATUS MSR for the MCA bank that had the error
    IA64 Processors
        1 - Bugcheck Type
            1 - MCA_ASSERT
            2 - MCA_GET_STATEINFO
                SAL returned an error for SAL_GET_STATEINFO while processing MCA.
            3 - MCA_CLEAR_STATEINFO
                SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
            4 - MCA_FATAL
                FW reported a fatal MCA.
            5 - MCA_NONFATAL
                SAL reported a recoverable MCA and we don't support currently
                support recovery or SAL generated an MCA and then couldn't
                produce an error record.
            0xB - INIT_ASSERT
            0xC - INIT_GET_STATEINFO
                  SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
            0xD - INIT_CLEAR_STATEINFO
                  SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
            0xE - INIT_FATAL
                  Not used.
        2 - Address of log
        3 - Size of log
        4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
    AMD64 Processors
        1 - Bank number
        2 - Address of MCA_EXCEPTION structure
        3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
        4 - Low  32 bits of MCi_STATUS MSR for the MCA bank that had the error
Arguments:
Arg1: 00000000
Arg2: f772d2c0
Arg3: b6004000
Arg4: 15000135

Debugging Details:
------------------

   NOTE:  This is a hardware error.  This error was reported by the CPU
   via Interrupt 18.  This analysis will provide more information about
   the specific error.  Please contact the manufacturer for additional
   information about this error and troubleshooting assistance.

   This error is documented in the following publication:

      - Bios and Kernel Developers Guid for AMD Athlon(r) 64 and AMD Opteron(r) Processors
   Bit Mask:

       MA                           Model Specific       MCA
    O  ID      Other Information      Error Code     Error Code
   VV  SDP ___________|____________ _______|_______ _______|______
   AEUECRC|                        |               |              |
   LRCNVVC|                        |               |              |
   ^^^^^^^|                        |               |              |
      6         5         4         3         2         1
   3210987654321098765432109876543210987654321098765432109876543210
   ----------------------------------------------------------------
   1011011000000000010000000000000000010101000000000000000100110101


VAL   - MCi_STATUS register is valid
        Indicates that the information contained within the IA32_MCi_STATUS
        register is valid.  When this flag is set, the processor follows the
        rules given for the OVER flag in the IA32_MCi_STATUS register when
        overwriting previously valid entries.  The processor sets the VAL 
        flag and software is responsible for clearing it.

UC    - Error Uncorrected
        Indicates that the processor did not or was not able to correct the 
        error condition.  When clear, this flag indicates that the processor
        was able to correct the error condition.

EN    - Error Enabled
        Indicates that the error was enabled by the associated EEj bit of the
        IA32_MCi_CTL register.

ADDRV - IA32_MCi_ADDR register valid
        Indicates that the IA32_MCi_ADDR register contains the address where
        the error occurred.

PCC   - Processor Context Corrupt
        Indicates that the state of the processor might have been corrupted
        by the error condition detected and that reliable restarting of the
        processor may not be possible.

MEMHIRERR - Memory Hierarchy Error   {TT}CACHE{LL}_{RRRR}_ERR
        These errors match the format 0000 0001 RRRR TTLL


   Concatenated Error Code:
   --------------------------
   _VAL_UC_EN_ADDRV_PCC_MEMHIRERR_35

   This error code can be reported back to the manufacturer.
   They may be able to provide additional information based upon
   this error.  All questions regarding STOP 0x9C should be
   directed to the hardware manufacturer.

BUGCHECK_STR:  0x9C_AuthenticAMD

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

PROCESS_NAME:  tvs_plugin_host

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 80a64154 to 80827cb3

STACK_TEXT:  
f772d290 80a64154 0000009c 00000000 f772d2c0 nt!KeBugCheckEx+0x1b
f772d3c4 80a5b86f f7727fe0 00000000 00000000 hal!HalpMcaExceptionHandler+0x11e
f772d3c4 00000000 f7727fe0 00000000 00000000 hal!HalpMcaExceptionHandlerWrapper+0x77


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  0x9C_AuthenticAMD_ANALYSIS_INCONCLUSIVE

BUCKET_ID:  0x9C_AuthenticAMD_ANALYSIS_INCONCLUSIVE

Followup: MachineOwner
---------

  • ThinkPad
  • Registratie: Juni 2005
  • Laatst online: 18:42
Kan niet heel veel soeps van je minidump verhaal maken (tip, zet het volgende keer even in [code] tags, of zet het op pastebin o.i.d., maakt het een stuk leesbaarder).

Ik zou je geheugen even testen met Memtest :) En dan niet een kwartiertje ofzo, maar minstens een hele nacht bijvoorbeeld. Verder temperaturen en voltages even checken.

[ Voor 22% gewijzigd door ThinkPad op 19-03-2013 19:36 ]


  • Jeroen_ae92
  • Registratie: April 2012
  • Laatst online: 28-11 14:17
MEMHIRERR = Memory Hierarchy Error

Lijkt me een memory issue. Ben benieuwt wat een paar uurtjes aan memtest doet voor je.

U+


  • lujo
  • Registratie: Januari 2004
  • Laatst online: 03-09-2023
Heb memtest 24 uur gedraaid met 0 errors. Ik ben nu aan het kijken of bovenstaand probleem zich gaat herhalen.

  • lujo
  • Registratie: Januari 2004
  • Laatst online: 03-09-2023
Vandaag heb ik dus een niewe vastloper gehad. Mijn server draait normaal gesproken zonder aangesloten monitor. Maar om memtest te draaien heb ik nu een monitor aangesloten. Nadat ik weer een vastloper heb gehad kon ik dit op de monitor zien: http://youtu.be/pXHweNFq844

Ik verdenk dus mijn onboard videokaart maar mijn minidump zegt iets anders, zie beneden.

Wat denken jullie?

code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini032013-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: Server, suite: SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS WHServer
Built by: 3790.srv03_sp2_gdr.130106-1434
Machine Name:
Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
Debug session time: Wed Mar 20 01:55:05.812 2013 (UTC + 1:00)
System Uptime: 2 days 2:15:19.409
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, f7727fe0, 0, 0}

Probably caused by : ntkrpamp.exe ( nt!KiDispatchException+75 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: f7727fe0
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

CURRENT_IRQL:  0

EXCEPTION_RECORD:  a6d278a8 -- (.exr 0xffffffffa6d278a8)
ExceptionAddress: 80a60459 (hal!KfLowerIrql+0x00000065)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 3
   Parameter[0]: 00000000
   Parameter[1]: 89371640
   Parameter[2]: 00000000

TRAP_FRAME:  a6d273c4 -- (.trap 0xffffffffa6d273c4)
ErrCode = 00000000
eax=00000000 ebx=a6d278fc ecx=00010000 edx=00000000 esi=a6d278a8 edi=00000000
eip=80a6045a esp=a6d27438 ebp=a6d2743c iopl=0         nv up di ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00000086
hal!KfLowerIrql+0x66:
80a6045a cc              int     3
Resetting default scope

LAST_CONTROL_TRANSFER:  from 8088a31a to 8082d53b

STACK_TEXT:  
a6d263ac 8088a31a a6d263c8 00000000 a6d2641c nt!KiDispatchException+0x75
a6d26414 8088aab4 a6d26494 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d26414 80a6045a a6d26494 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d26494 8082cfa0 a6d26954 00c08400 5b5e5f71 hal!KfLowerIrql+0x66
a6d26528 8082d542 a6d26954 00000000 a6d265fc nt!KeContextFromKframes+0x2b4
a6d268e4 8088a31a a6d26900 00000000 a6d26954 nt!KiDispatchException+0x7c
a6d2694c 8088aab4 a6d269cc 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d2694c 80a6045a a6d269cc 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d269cc 8082cfa0 a6d26e8c 00741847 0024648d hal!KfLowerIrql+0x66
a6d26a60 8082d542 a6d26e8c 00000000 a6d26b34 nt!KeContextFromKframes+0x2b4
a6d26e1c 8088a31a a6d26e38 00000000 a6d26e8c nt!KiDispatchException+0x7c
a6d26e84 8088aab4 a6d26f04 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d26e84 80a6045a a6d26f04 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d26f04 8082cfa0 a6d273c4 00a364f4 8b000000 hal!KfLowerIrql+0x66
a6d26f98 8082d542 a6d273c4 00000000 a6d2706c nt!KeContextFromKframes+0x2b4
a6d27354 8088a31a a6d27370 00000000 a6d273c4 nt!KiDispatchException+0x7c
a6d273bc 8088aab4 a6d2743c 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d273bc 80a6045a a6d2743c 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d2743c 8082cfa0 a6d278fc 00ffffff a3d815ff hal!KfLowerIrql+0x66
a6d274d0 8082d542 a6d278fc 00000000 a6d275a4 nt!KeContextFromKframes+0x2b4
a6d2788c 8088a31a a6d278a8 00000000 a6d278fc nt!KiDispatchException+0x7c
a6d278f4 8088aab4 a6d27974 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d278f4 80a6045a a6d27974 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d27974 8082cfa0 a6d27e34 00ce8bf0 06a20415 hal!KfLowerIrql+0x66
a6d27a08 8082d542 a6d27e34 00000000 a6d27adc nt!KeContextFromKframes+0x2b4
a6d27dc4 8088a31a a6d27de0 00000000 a6d27e34 nt!KiDispatchException+0x7c
a6d27e2c 8088aab4 a6d27eac 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d27e2c 80a6045a a6d27eac 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d27eac 8082cfa0 a6d2836c 008b3889 0ff6852c hal!KfLowerIrql+0x66
a6d27f40 8082d542 a6d2836c 00000000 a6d28014 nt!KeContextFromKframes+0x2b4
a6d282fc 8088a31a a6d28318 00000000 a6d2836c nt!KiDispatchException+0x7c
a6d28364 8088aab4 a6d283e4 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d28364 80a6045a a6d283e4 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d283e4 8082cfa0 a6d288a4 00ec8b55 eb4568ff hal!KfLowerIrql+0x66
a6d28478 8082d542 a6d288a4 00000000 a6d2854c nt!KeContextFromKframes+0x2b4
a6d28834 8088a31a a6d28850 00000000 a6d288a4 nt!KiDispatchException+0x7c
a6d2889c 8088aab4 a6d2891c 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d2889c 80a6045a a6d2891c 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d2891c 8082cfa0 a6d28ddc 0000107e 06a1d03d hal!KfLowerIrql+0x66
a6d289b0 8082d542 a6d28ddc 00000000 a6d28a84 nt!KeContextFromKframes+0x2b4
a6d28d6c 8088a31a a6d28d88 00000000 a6d28ddc nt!KiDispatchException+0x7c
a6d28dd4 8088aab4 a6d28e54 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d28dd4 80a6045a a6d28e54 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d28e54 8082cfa0 a6d29314 00000000 00000000 hal!KfLowerIrql+0x66
a6d28ee8 8082d542 a6d29314 00000000 a6d28fbc nt!KeContextFromKframes+0x2b4
a6d292a4 8088a31a a6d292c0 00000000 a6d29314 nt!KiDispatchException+0x7c
a6d2930c 8088aab4 a6d2938c 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d2930c 80a6045a a6d2938c 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d2938c 8082cfa0 a6d2984c 00000004 00000000 hal!KfLowerIrql+0x66
a6d29420 8082d542 a6d2984c 00000000 a6d294f4 nt!KeContextFromKframes+0x2b4
a6d297dc 8088a31a a6d297f8 00000000 a6d2984c nt!KiDispatchException+0x7c
a6d29844 8088aab4 a6d298c4 80a6045a badb0d00 nt!CommonDispatchException+0x4a
a6d29844 80a6045a a6d298c4 80a6045a badb0d00 nt!KiTrap03+0xb0
a6d298c4 80a5e56d 8087d0a6 a6d29bb0 a6d29b64 hal!KfLowerIrql+0x66
a6d298c8 8087d0a6 a6d29bb0 a6d29b64 bd68092e hal!KeReleaseQueuedSpinLock+0x2d
a6d298e8 808c57e9 808a48c0 00000001 808da087 nt!ExAcquireResourceSharedLite+0xd4
a6d298f4 808da087 e27bbc88 00000000 a6d29bd4 nt!CmpLockRegistry+0x25
a6d29a8c 808da244 e27bbc88 a6d29b64 a6d29b6c nt!CmpBuildHashStackAndLookupCache+0x43
a6d29b90 809375b3 e27bbc88 00000000 8779cdf0 nt!CmpParseKey+0x110
a6d29c10 80933b78 0000003c a6d29c50 00000040 nt!ObpLookupObjectName+0x11f
a6d29c64 808bb477 00000000 8a18ae70 80934701 nt!ObOpenObjectByName+0xea
a6d29d50 8088983c 046bf5b0 00020019 046bf520 nt!NtOpenKey+0x1ad
a6d29d50 7c82845c 046bf5b0 00020019 046bf520 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
046bf560 00000000 00000000 00000000 00000000 0x7c82845c


STACK_COMMAND:  kb

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

FOLLOWUP_NAME:  MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP:  50ea1ab7

FOLLOWUP_IP: 
nt!KiDispatchException+75
8082d53b 57              push    edi

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiDispatchException+75

FAILURE_BUCKET_ID:  TRAP_FRAME_RECURSION

BUCKET_ID:  TRAP_FRAME_RECURSION

Followup: MachineOwner
---------