Windows instabil, Linux funktioniert

Genau, aber WARUM kommt Checkdisk? Windows macht doch keine Routineprüfungen oder? HDTune zeigt mir einen Reallocated Sector an, was aber noch unter dem Schwellenwert von 5 liegt.

Ansonsten immer noch keine Probleme :)
Falls es wirklich die Command Rate war (was ich hoffe), frage ich mich nur wieso Linux nie reklamiert hat.
 
Wenn deine Festplatte schon 5 Reservesektoren verbraucht hat, ist das kein gutes Zeichen. Die Ausfallwahrscheinlichkeit erhöht sich, sobald dieser Wert größer Null ist. Ich würde zumindest eine Sicherung der wichtigsten Daten vornehmen.
Dass bereits Reservesektoren verbraucht wurden deutet auf Oberflächenprobleme der Platte hin und erklärt auch warum Chkdsk:
CHDSK is recovering lost files.
Diese mussten (vermutlich) durch den Ausfall eines Sektors wiederhergestellt werden. Windows hat den Ausfall erkannt und beim Neustart aus diesem Grund Chkdsk laufen lassen.

Falls es wirklich die Command Rate war (was ich hoffe), frage ich mich nur wieso Linux nie reklamiert hat
Windows 7 Pro 64bit und Ubuntu 9.10 32bit

Das liegt am 64-bit Betriebssystem (ganz grob gesagt). Dadurch kann mehr Speicher zugewiesen/angesprochen werden, wodurch fehlerhafte/ungünstige RAM Einstellungen (oder auch Kompatibilitätsprobleme) erst auffallen, die bei einem 32-bit System nicht aufgefallen wären, bzw. auffällig sind.
 
Zuletzt bearbeitet:
Hm, nicht gut. Dann wird wohl auch bald eine neue HDD fällig sein..Gesichert habe ich zum Glück alles.

Das liegt am 64-bit Betriebssystem
Das würde in meinem Fall das Problem nicht erklären, weil ich seit einiger Zeit ja mit WinXP 32bit und Ubuntu 10.04 64bit arbeite. Also genau verkehrt herum.

Jedenfalls bisher immer noch keine Probleme mit Windows :)
 
Shoutbox schrieb:
Das würde in meinem Fall das Problem nicht erklären, weil ich seit einiger Zeit ja mit WinXP 32bit und Ubuntu 10.04 64bit arbeite. Also genau verkehrt herum.

Ja dann :D ... gehe ich noch einen Schritt weiter und schiebe das Win7 in die Schuhe (zumindest ein bisschen). Ich hatte es im letzten Post schon geschrieben, aber auch gleich wieder herauseditiert: Win7 ist besonders sensibel in Bezug auf den RAM, zumindest ist das mein Eindruck. Auf vielen Systemen, auf die ich schon Win7 installiert habe, traten oft RAM-Probleme auf, die vorher (XP, Vista) nicht in Erscheinung traten. Mir kommt es daher so vor, als ob das Memory Management von Win7 entweder verbessert wurde (mehr RAM kommt zum Einsatz als bei anderen 64-Bit OS ???), oder evtl. doch etwas anfälliger ist. (Da ich das nur vermute und nicht belegen kann, hatte ich das vorhin wieder rausgestrichen. Und da ich es nicht belegen kann, möchte ich das Thema nicht weiter ausführen - ist nur mein Eindruck).

Shoutbox schrieb:
Jedenfalls bisher immer noch keine Probleme mit Windows :)

Das ist schön :)
 
Zuletzt bearbeitet:
Bluescreen unter Windows XP!

0x10000050, PAGE_FAULT_IN_NONPAGED_AREA

BlueScreenView markiert zwei Files rot: Ntfs.sys und ntoskrnl.exe

Ebenfalls mit dem BlueScreenView habe ich eben festgestellt, dass offenbar doch bereits vorher 2 Bluescreens auftraten, die ich verpasst haben muss (weil ich ja behauptet hatte dass ich unter WinXP bisher keine BSODs gehabt hätte).

*0x1000000a, IRQL_NOT_LESS_OR_EQUAL
*0x1000008e, KERNEL_MODE_EXCEPTION_NOT_HANDLED

CPUZ zeigt für die Command Rate immer noch 2T an, an dem kann es also nicht liegen..

Wer weiss Rat?
 
Für den ersten Bluescreen von heute:



Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini092510-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Sep 25 12:02:28.156 2010 (UTC + 2:00)
System Uptime: 0 days 0:01:27.126
Loading Kernel Symbols
...............................................................
..................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {e2acc150, 0, 8054c023, 1}


Could not read faulting driver name
Probably caused by : ntkrpamp.exe ( nt!ExAllocatePoolWithTag+6bb )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e2acc150, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 8054c023, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000001, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: e2acc150

FAULTING_IP:
nt!ExAllocatePoolWithTag+6bb
8054c023 668b11 mov dx,word ptr [ecx]

MM_INTERNAL_CODE: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x50

PROCESS_NAME: svchost.exe

LAST_CONTROL_TRANSFER: from b7e66a92 to 8054c023

STACK_TEXT:
b3dc448c b7e66a92 00000001 e2acc150 3066744e nt!ExAllocatePoolWithTag+0x6bb
b3dc44a4 b7e6a4ec 8a4487e0 e2ef58e8 0000004a Ntfs!NtfsInsertHashEntry+0x15
b3dc457c b7e6a6f5 b3dc47f8 897f86a8 897f885c Ntfs!NtfsOpenFile+0x53b
b3dc47d4 b7e5a042 b3dc47f8 897f86a8 b3dc4928 Ntfs!NtfsCommonCreate+0x134a
b3dc4980 b7ee0f70 897f86a8 b3dc4c00 8a448020 Ntfs!NtfsNetworkOpenCreate+0x8a
b3dc49a0 b7eee0e8 897f86a8 b3dc4c00 8a44cba8 sr!SrFastIoQueryOpen+0x40
b3dc49c0 b7efac27 000000f2 00000000 b3dc49f8 fltmgr!FltpPerformFastIoCall+0x300
b3dc4a18 805830fe 897f86a8 b3dc4c00 8a37f208 fltmgr!FltpFastIoQueryOpen+0xa1
b3dc4b04 805bf434 8a4a3030 00000000 8a0643c0 nt!IopParseDevice+0x916
b3dc4b7c 805bb9c0 00000000 b3dc4bbc 00000040 nt!ObpLookupObjectName+0x53c
b3dc4bd0 80576fc7 00000000 00000000 e56c6901 nt!ObOpenObjectByName+0xea
b3dc4d54 8054164c 01b3fb4c 01b3fb88 01b3fb6c nt!NtQueryAttributesFile+0xf1
b3dc4d54 7c90e514 01b3fb4c 01b3fb88 01b3fb6c nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
01b3fb6c 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+6bb
8054c023 668b11 mov dx,word ptr [ecx]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!ExAllocatePoolWithTag+6bb

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8

FAILURE_BUCKET_ID: 0x50_nt!ExAllocatePoolWithTag+6bb

BUCKET_ID: 0x50_nt!ExAllocatePoolWithTag+6bb

Followup: MachineOwner
---------



-------------------------------------------------------------------------------------------------------------------------
Für den zweiten Bluescreen von heute:



Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini092510-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Sep 25 13:06:13.203 2010 (UTC + 2:00)
System Uptime: 0 days 1:03:03.176
Loading Kernel Symbols
...............................................................
.................................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {c0004800, 2, 0, 8051192c}

Probably caused by : memory_corruption ( nt!MiDeleteValidAddress+2e )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: c0004800, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8051192c, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: c0004800

CURRENT_IRQL: 2

FAULTING_IP:
nt!MiDeleteValidAddress+2e
8051192c 8b0f mov ecx,dword ptr [edi]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: avwsc.exe

LAST_CONTROL_TRANSFER: from 805b0233 to 8051192c

STACK_TEXT:
b42f2c14 805b0233 00900201 8a23a020 007ffff8 nt!MiDeleteValidAddress+0x2e
b42f2c34 80513517 8a23a020 8a23a158 8a23a020 nt!MiDeleteAddressesInWorkingSet+0x65
b42f2c68 805d26ea 0023a020 89668da8 89668ff0 nt!MmCleanProcessAddressSpace+0x193
b42f2d08 805d28ac 00000000 89668da8 00000000 nt!PspExitThread+0x680
b42f2d28 805d2a87 89668da8 00000000 b42f2d64 nt!PspTerminateThreadByPointer+0x52
b42f2d54 8054164c 00000000 00000000 0012fec0 nt!NtTerminateProcess+0x105
b42f2d54 7c90e514 00000000 00000000 0012fec0 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012fec0 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiDeleteValidAddress+2e
8051192c 8b0f mov ecx,dword ptr [edi]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiDeleteValidAddress+2e

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0xA_nt!MiDeleteValidAddress+2e

BUCKET_ID: 0xA_nt!MiDeleteValidAddress+2e

Followup: MachineOwner
---------




-------------------------------------------------------------------------------------------------------------------------
Für den ersten Bluescreen vom 5.9.2010


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini090510-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sun Sep 5 20:53:01.421 2010 (UTC + 2:00)
System Uptime: 0 days 0:00:25.375
Loading Kernel Symbols
...............................................................
.......................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 8054bfcb, b8317820, 0}

Probably caused by : ntkrpamp.exe ( nt!ExAllocatePoolWithTag+663 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8054bfcb, The address that the exception occurred at
Arg3: b8317820, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!ExAllocatePoolWithTag+663
8054bfcb 8b06 mov eax,dword ptr [esi]

TRAP_FRAME: b8317820 -- (.trap 0xffffffffb8317820)
ErrCode = 00000000
eax=8a5532e8 ebx=8a553078 ecx=8a5532e8 edx=00000003 esi=017f0660 edi=000001ff
eip=8054bfcb esp=b8317894 ebp=b83178e8 iopl=0 nv up ei pl nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010217
nt!ExAllocatePoolWithTag+0x663:
8054bfcb 8b06 mov eax,dword ptr [esi] ds:0023:017f0660=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x8E

PROCESS_NAME: lsass.exe

LAST_CONTROL_TRANSFER: from 805bfdc1 to 8054bfcb

STACK_TEXT:
b83178e8 805bfdc1 00000001 00000001 7153624f nt!ExAllocatePoolWithTag+0x663
b831790c 805c0174 e2022d68 b8317938 b831792c nt!ObpGetObjectSecurity+0x53
b831793c 8062e967 e2022d68 8a0a2be8 00000001 nt!ObCheckObjectAccess+0x2c
b8317988 8062f608 e19c2758 00000868 00000000 nt!CmpDoOpen+0x2d5
b8317b88 805bf011 00000868 00000000 8a0a2be8 nt!CmpParseKey+0x5a6
b8317c00 805bb9c0 000000f4 b8317c40 00000040 nt!ObpLookupObjectName+0x119
b8317c54 80624d6e 00000000 8a51c210 805bc401 nt!ObOpenObjectByName+0xea
b8317d50 8054164c 000be984 0002001f 0099f848 nt!NtOpenKey+0x1c8
b8317d50 7c90e514 000be984 0002001f 0099f848 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0099f830 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+663
8054bfcb 8b06 mov eax,dword ptr [esi]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!ExAllocatePoolWithTag+663

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8

FAILURE_BUCKET_ID: 0x8E_nt!ExAllocatePoolWithTag+663

BUCKET_ID: 0x8E_nt!ExAllocatePoolWithTag+663

Followup: MachineOwner
---------



-------------------------------------------------------------------------------------------------------------------------
Für den zweiten Bluescreen vom 5.9.2010


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini090510-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100427-1636
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sun Sep 5 20:57:01.609 2010 (UTC + 2:00)
System Uptime: 0 days 0:03:23.188
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {1c, 2, 1, 805257c1}

Probably caused by : memory_corruption ( nt!MiDecrementCloneBlockReference+b )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000001c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 805257c1, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 0000001c

CURRENT_IRQL: 2

FAULTING_IP:
nt!MiDecrementCloneBlockReference+b
805257c1 ff4b1c dec dword ptr [ebx+1Ch]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: avgnt.exe

LAST_CONTROL_TRANSFER: from 80523d54 to 805257c1

STACK_TEXT:
b3be7a7c 80523d54 00000000 ffdfffff 8976a768 nt!MiDecrementCloneBlockReference+0xb
b3be7ab8 80523fd8 00000000 00333000 00000000 nt!MiDeletePte+0x392
b3be7b80 8051a1fd e14e2698 00335fff 00000000 nt!MiDeleteVirtualAddresses+0x164
b3be7c30 80513583 8976a768 898739b8 8976a8a0 nt!MiRemoveMappedView+0x237
b3be7c68 805d26ea 0176a768 89765268 897654b0 nt!MmCleanProcessAddressSpace+0x1ff
b3be7d08 805d28ac 00000000 89765268 00000000 nt!PspExitThread+0x680
b3be7d28 805d2a87 89765268 00000000 b3be7d64 nt!PspTerminateThreadByPointer+0x52
b3be7d54 8054164c 00000000 00000000 0012fec0 nt!NtTerminateProcess+0x105
b3be7d54 7c90e514 00000000 00000000 0012fec0 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012fec0 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiDecrementCloneBlockReference+b
805257c1 ff4b1c dec dword ptr [ebx+1Ch]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiDecrementCloneBlockReference+b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4bd6e0e8

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: 0xA_nt!MiDecrementCloneBlockReference+b

BUCKET_ID: 0xA_nt!MiDecrementCloneBlockReference+b

Followup: MachineOwner
---------
 
Zuletzt bearbeitet:
Danke, werde ich machen! edit: Spannung erhöht auf 1.608V!

Ich poste hier noch die Auswertungen einiger Bluescreens mit Windows7 Pro 64bit. Die kann ich doch auch unter WinXP analysieren oder? Meinst du die Fehler weisen auf dasselbe Problem hin?

------------------------------------------------------------------------------------------------------------
Bluescreen vom 19.6.2010

Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\Veit\Desktop\Probleme\Windows7 Minidumps\061910-15990-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02801000 PsLoadedModuleList = 0xfffff800`02a3ee50
Debug session time: Sat Jun 19 15:22:37.215 2010 (UTC + 2:00)
System Uptime: 0 days 0:02:47.245
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff88006f11228, fffff88006f10a90, fffff80002867f2e}

Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+bae )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88006f11228
Arg3: fffff88006f10a90
Arg4: fffff80002867f2e

Debugging Details:
------------------


EXCEPTION_RECORD: fffff88006f11228 -- (.exr 0xfffff88006f11228)
ExceptionAddress: fffff80002867f2e (nt!ExAcquireResourceSharedLite+0x000000000000004e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff88006f10a90 -- (.cxr 0xfffff88006f10a90)
rax=0000000000000000 rbx=ffdffa8003fcbef0 rcx=ffdffa8003fcbef0
rdx=fffffa8004dd3101 rsi=fffff8a006559e00 rdi=fffff88002fd3180
rip=fffff80002867f2e rsp=fffff88006f11460 rbp=0000000000000000
r8=0000000000000000 r9=0000000000008000 r10=fffffa8003fe2fb0
r11=fffff88006f116a8 r12=fffffa800405a630 r13=0000000000000001
r14=0000000000000001 r15=fffff88006f116a0
iopl=0 nv up di pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010046
nt!ExAcquireResourceSharedLite+0x4e:
fffff800`02867f2e f0480fba696000 lock bts qword ptr [rcx+60h],0 ds:002b:ffdffa80`03fcbf50=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: WerFault.exe

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aa90e0
ffffffffffffffff

FOLLOWUP_IP:
Ntfs!NtfsCommonRead+bae
fffff880`0126392e 84c0 test al,al

FAULTING_IP:
nt!ExAcquireResourceSharedLite+4e
fffff800`02867f2e f0480fba696000 lock bts qword ptr [rcx+60h],0

BUGCHECK_STR: 0x24

LAST_CONTROL_TRANSFER: from fffff8800126392e to fffff80002867f2e

STACK_TEXT:
fffff880`06f11460 fffff880`0126392e : 00000000`00000001 fffff8a0`06559c70 fffff880`06f117f0 fffffa80`03eb6c10 : nt!ExAcquireResourceSharedLite+0x4e
fffff880`06f114d0 fffff880`01265f78 : fffff880`06f116a0 fffffa80`03fe2c10 fffff880`06f11701 fffffa80`04c57a01 : Ntfs!NtfsCommonRead+0xbae
fffff880`06f11670 fffff880`0107523f : fffffa80`03fe2fb0 fffffa80`03fe2c10 fffffa80`04c57a90 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`06f11870 fffff880`010736df : fffffa80`04c0ab60 fffffa80`03fe2c10 fffffa80`04c0ab00 fffffa80`03fe2c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`06f11900 fffff800`028630f2 : fffffa80`03fe2c30 fffffa80`03fd3b40 00000000`00000043 fffff680`000072c0 : fltmgr!FltpDispatch+0xcf
fffff880`06f11960 fffff800`028633f5 : 00000000`00000001 00000000`00000001 fffff880`06f11a60 fffffa80`03eb6810 : nt!IoPageRead+0x252
fffff880`06f119f0 fffff800`0288c79b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff800`00000000 : nt!MiIssueHardFault+0x255
fffff880`06f11ac0 fffff800`0286f6ee : 00000000`00000000 00000000`00000000 00000000`7efdb001 ffffffff`ffffffff : nt!MmAccessFault+0x14bb
fffff880`06f11c20 00000000`75352edf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`001dd6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75352edf


SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: Ntfs!NtfsCommonRead+bae

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f

STACK_COMMAND: .cxr 0xfffff88006f10a90 ; kb

FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonRead+bae

BUCKET_ID: X64_0x24_Ntfs!NtfsCommonRead+bae

Followup: MachineOwner
---------




------------------------------------------------------------------------------------------------------------
Bluescreen vom 2.7.2010



Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\Veit\Desktop\Probleme\Windows7 Minidumps\070210-16052-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02816000 PsLoadedModuleList = 0xfffff800`02a53e50
Debug session time: Sat Jun 19 15:24:56.119 2010 (UTC + 2:00)
System Uptime: 0 days 0:01:21.539
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880047a7818, fffff880047a7080, fffff8000288e7c4}

Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireExclusiveFcb+73 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880047a7818
Arg3: fffff880047a7080
Arg4: fffff8000288e7c4

Debugging Details:
------------------


EXCEPTION_RECORD: fffff880047a7818 -- (.exr 0xfffff880047a7818)
ExceptionAddress: fffff8000288e7c4 (nt!ExAcquireResourceExclusiveLite+0x0000000000000054)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: fffff880047a7080 -- (.cxr 0xfffff880047a7080)
rax=0000000000000001 rbx=ffdffa8004f65050 rcx=ffdffa8004f65050
rdx=fffff8a007104b01 rsi=0000000000000000 rdi=fffff80002a00e80
rip=fffff8000288e7c4 rsp=fffff880047a7a50 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000009 r10=0000000000000004
r11=fffff8a007104c70 r12=0000000000000000 r13=00000000c00000d8
r14=fffffa8005c95b60 r15=0000000000010001
iopl=0 nv up di pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010046
nt!ExAcquireResourceExclusiveLite+0x54:
fffff800`0288e7c4 f0480fba696000 lock bts qword ptr [rcx+60h],0 ds:002b:ffdffa80`04f650b0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abe0e0
ffffffffffffffff

FOLLOWUP_IP:
Ntfs!NtfsAcquireExclusiveFcb+73
fffff880`012265d3 84c0 test al,al

FAULTING_IP:
nt!ExAcquireResourceExclusiveLite+54
fffff800`0288e7c4 f0480fba696000 lock bts qword ptr [rcx+60h],0

BUGCHECK_STR: 0x24

LAST_CONTROL_TRANSFER: from fffff880012265d3 to fffff8000288e7c4

STACK_TEXT:
fffff880`047a7a50 fffff880`012265d3 : 00000000`c00000d8 fffff8a0`07104b40 fffffa80`065e8010 fffffa80`00000001 : nt!ExAcquireResourceExclusiveLite+0x54
fffff880`047a7ac0 fffff880`012c2560 : fffffa80`065e8010 fffff800`02a2b5a0 fffff8a0`07104b40 00000000`00000009 : Ntfs!NtfsAcquireExclusiveFcb+0x73
fffff880`047a7b10 fffff880`0129c38f : fffffa80`065e8010 fffff8a0`07104c70 fffff8a0`07104b40 fffffa80`04db3180 : Ntfs!NtfsCommonClose+0xa0
fffff880`047a7be0 fffff800`02893861 : 00000000`00000000 fffff880`0129c200 fffffa80`05c95b01 00000000`00000002 : Ntfs!NtfsFspClose+0x15f
fffff880`047a7cb0 fffff800`02b2ba86 : 00000000`04dd7ed7 fffffa80`05c95b60 00000000`00000080 fffffa80`03c719e0 : nt!ExpWorkerThread+0x111
fffff880`047a7d40 fffff800`02864b06 : fffff880`02fd3180 fffffa80`05c95b60 fffffa80`05cb2b60 fffff880`01229bf0 : nt!PspSystemThreadStartup+0x5a
fffff880`047a7d80 00000000`00000000 : fffff880`047a8000 fffff880`047a2000 fffff880`047a79f0 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: Ntfs!NtfsAcquireExclusiveFcb+73

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f

STACK_COMMAND: .cxr 0xfffff880047a7080 ; kb

FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+73

BUCKET_ID: X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+73

Followup: MachineOwner
---------



------------------------------------------------------------------------------------------------------------
Bluescreen vom 17.7.2010


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Documents and Settings\Veit\Desktop\Probleme\Windows7 Minidumps\071710-15709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02813000 PsLoadedModuleList = 0xfffff800`02a50e50
Debug session time: Sat Jul 17 11:35:09.173 2010 (UTC + 2:00)
System Uptime: 0 days 0:01:12.593
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41790, fffffa800167d720, ffff, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa800167d720
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR: 0x1a_41790

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: WerFault.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff800028f6ede to fffff80002883600

STACK_TEXT:
fffff880`06364828 fffff800`028f6ede : 00000000`0000001a 00000000`00041790 fffffa80`0167d720 00000000`0000ffff : nt!KeBugCheckEx
fffff880`06364830 fffff800`028b6cc9 : 00000000`00000000 00000000`018c6fff fffff880`00000000 fffffa80`00000000 : nt! ?? ::FNODOBFM::`string'+0x33946
fffff880`063649f0 fffff800`02b9d170 : fffffa80`050409a0 0007ffff`00000000 fffffa80`04e1a3a0 fffffa80`04e1a3a0 : nt!MiRemoveMappedView+0xd9
fffff880`06364b10 fffff800`02b9d57b : 00000980`00000000 00000000`017d0000 fffffa80`00000001 00000000`0019b301 : nt!MiUnmapViewOfSection+0x1b0
fffff880`06364bd0 fffff800`02882853 : 00000000`00000000 00000000`018507fc fffffa80`067d7970 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`06364c20 00000000`775dfffa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0019a728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775dfffa


STACK_COMMAND: kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33946
fffff800`028f6ede cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb

FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946

BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946

Followup: MachineOwner
---------
 
Zuletzt bearbeitet:
Die ersten Beiden deuten auf einen Dateisystemfehler hin. Dies könnte mit Chkdsk repariert werden -> Eingabekonsole als Admin starten und: chkdsk /f /r eingeben. Sofern mehrere Partitionen/Fesplatten vorhanden sind, den Befehl für jede Partition wiederholen (bsp: chkdsk d: /f /r).

Der letzte Fehler deutet jedoch wieder auf fehlerhaftes Speichermanagement hin (möglicherweise durch RAM, wie oben beschrieben). Dieses Problem kann ebenfalls für die anderen beiden Fehlermeldungen ursächlich sein.
 
Letztes Wochenende die neuen Komponenten eingebaut:

* Hitachi Deskstar 7K1000.C
* Enermax PRO-82+ Netzteil - 525 Watt
* Gainward GTX-460 768MB

Alles wunderbar! Die Woche war ich dann nicht hier, gestern Win7 gebootet: BSOD! Heute unter XP eine Fehlermeldung von Avira: The application module (...) cannot be found or has been modified or destroyed. The AVGNT.EXE cannot be started. Please check your installation!" Beim Herunterfahren kam dann folgender Bluescreen:


2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 805e159d, The address that the exception occurred at
Arg3: b3c0bbc0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!RtlFreeHeap+2d
805e159d 0b4e10 or ecx,dword ptr [esi+10h]

TRAP_FRAME: b3c0bbc0 -- (.trap 0xffffffffb3c0bbc0)
ErrCode = 00000000
eax=ba1421f8 ebx=00000000 ecx=00000000 edx=00000010 esi=00000000 edi=00000000
eip=805e159d esp=b3c0bc34 ebp=b3c0bca4 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
nt!RtlFreeHeap+0x2d:
805e159d 0b4e10 or ecx,dword ptr [esi+10h] ds:0023:00000010=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x8E

PROCESS_NAME: wuauclt.exe

LAST_CONTROL_TRANSFER: from bf80d99f to 805e159d

STACK_TEXT:
b3c0bca4 bf80d99f 00000000 00000000 ba1421f8 nt!RtlFreeHeap+0x2d
b3c0bcb8 bf81fa1c 00000000 ba1421f8 b3c0bce4 win32k!Win32HeapFree+0x13
b3c0bcc8 bf81fada 8a18ad90 ba1421f8 e2b1ecb0 win32k!ClassFree+0x1e
b3c0bce4 bf81fcfa ba142218 b3c0bd64 0007fae8 win32k!DestroyClass+0xa9
b3c0bcf8 bf81fc2b 0007fae8 773d0000 b3c0bd18 win32k!_UnregisterClass+0x80
b3c0bd50 8054164c 0007fad8 773d0000 0007facc win32k!NtUserUnregisterClass+0x72
b3c0bd50 7c90e514 0007fad8 773d0000 0007facc nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0007fcec 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!Win32HeapFree+13
bf80d99f 0fb6c0 movzx eax,al

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: win32k!Win32HeapFree+13

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4c220f9a

FAILURE_BUCKET_ID: 0x8E_win32k!Win32HeapFree+13

BUCKET_ID: 0x8E_win32k!Win32HeapFree+13

Followup: MachineOwner
---------
 
Immer noch 7-7-7-24-60 2T
Spannung hab ich ja vor einiger Zeit auf 1.608V gesetzt und nicht mehr geändert.
 
Gut, werde ich machen!
Mit den neuen Komponenten habe ich das noch nicht genau testen können. Davor traten die Abstürze allerdings immer direkt nach dem Systemstart auf! Nur Rebooten half dabei meist nichts, die Probleme bestanden weiter. Ein komplettes Herunterfahren inklusive Trennen der Stromzufuhr schien zu helfen. Wenn der PC mal 5 Minuten ohne Fehler überstanden hatte, konnte ich ihn stundenlang problemlos benutzen.

PS: werde den PC von jetzt an normalerweise nur am Wochenende benutzen können. Es kann deshalb jeweils etwas dauern, bis ich die Tipps umsetzen kann.
 
Kein Problem, du gibst das Tempo vor ;)

Achte bitte darauf, ob die Probleme nur beim Kaltstart auftreten, oder ob diese auch auftreten, nachdem der PC (nach einigen Neustarts) "warm gelaufen" ist.

Zu den Bluescreenauswertungen hatte ich noch vergessen zu Fragen, welche Sicherheitssoftware (Virenschutz, Firewall) du nutzt, da in den Stacks Fehler beim Filtermanager auftauchen (diese können durch Sicherheitssoftware auftreten). Gebe bitte auch noch an, ob und welche System-Tools (z.B. TuneUp, DaemonTools, etc.) du installiert hast.
 
Also, die Probleme treten auch nach mehrmaligem hochfahren->Bluescreen->Reboot auf. Memtest zeigt mir ja nach einem BSOD-Neustart Speicherfehler an. Diese findet er auch nach mehrmaligem Rebooten, wenna also der PC warm sein sollte. Erst nach einem kompletten Herunterfahren und vom Strom trennen verschwinden sie wieder!

Virenschutz: AntiVir Personal. Firewall ist die von Windows. Abgesehen davon hab ich keine Systemtools installiert.

Noch was: seit kurzem habe ich auch unter Linux Probleme! Der Bildschirm friert plötzlich ein, dann geht gar nichts mehr. Das Problem trat mit der alten Hardware 2-3 mal auf (dachte es liegt vielleich an der HDD), dann kam ja der Hardware-Wechsel und mit der neuen Hardware ist mir Ubuntu (10.10 64bit) heute zweimal während der Installation eingefroren (Speicher war wie von dir vorgeschlagen auf 2T 8-8-8-24-60 eingestellt)! Sowas hatte ich vorher NIE!
 
Netzteil habe ich ja erst vor kurzem getauscht (alt: Be Quiet Blackline BQT P4-400W, neu Enermax PRO-82+ Netzteil - 525 Watt) . Das Verhalten ist mit beiden das selbe. Ich denke also eher nicht, dass es an dem liegt.
Heute hatte ich jetzt auch erstmals unter Linux Firefox-Abstürze, mit genau demselben Schema wie bisher schon unter Windows XP.
 
Zurück
Oben