System service exception (3b) BSOD

Specksan

Commendable
Dec 31, 2016
17
0
1,510
I've been having some annoying issues with my PC lately. It has thrown random BSOD's at me at random times. I've tried ignoring it but it's starting to annoy me. Please help me fix this issue. Thank you in advance.

Specs:

CPU: AMD FX-8350

Motherboard: Asus M5A97 LE R2.0 ATX AM3+

Memory: G.Skill Ripjaws X Series 8GB (2 x 4GB) DDR3-2133

Video Card: EVGA GeForce GTX 1060 Dual OC 6GB

Power Supply: Corsair CSM 450W 80+ Gold Certified Semi-Modular ATX



Dump file:

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801cf239be2, Address of the instruction which caused the bugcheck
Arg3: ffffaa80054e4f60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)

SYSTEM_MANUFACTURER: To be filled by O.E.M.

SYSTEM_PRODUCT_NAME: To be filled by O.E.M.

SYSTEM_SKU: SKU

SYSTEM_VERSION: To be filled by O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2701

BIOS_DATE: 03/24/2016

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: M5A97 LE R2.0

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff801cf239be2

BUGCHECK_P3: ffffaa80054e4f60

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - K sky osoitteessa 0x%p viittasi muistiin osoitteessa 0x%p. Muisti ei voinut olla %s.

FAULTING_IP:
nt!KxWaitForLockOwnerShipWithIrql+12
fffff801`cf239be2 48890a mov qword ptr [rdx],rcx

CONTEXT: ffffaa80054e4f60 -- (.cxr 0xffffaa80054e4f60)
rax=0000000000000000 rbx=ffffe401ec7d10d0 rcx=ffffaa80054e59c0
rdx=0008000000000000 rsi=0000000000000000 rdi=ffffaa80054e59c0
rip=fffff801cf239be2 rsp=ffffaa80054e5970 rbp=ffffaa80054e5a00
r8=ffffaa80054e5a30 r9=0000000000000020 r10=00000000ca7eaa8f
r11=00000000005e9000 r12=00000000005e9000 r13=00000000076bfda0
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up di ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010082
nt!KxWaitForLockOwnerShipWithIrql+0x12:
fffff801`cf239be2 48890a mov qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: 10ee

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 2

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: Discord.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: CUSTOMPC

ANALYSIS_SESSION_TIME: 01-20-2017 21:32:16.0031

ANALYSIS_VERSION: 10.0.14321.1024 x86fre

LAST_CONTROL_TRANSFER: from fffff801cf3003c8 to fffff801cf239be2

STACK_TEXT:
ffffaa80`054e5970 fffff801`cf3003c8 : ffffe401`ec7d10d0 ffffaa80`054e5a28 ffffe401`e978ccd0 ffffe401`e9a19701 : nt!KxWaitForLockOwnerShipWithIrql+0x12
ffffaa80`054e59a0 fffff801`cf23a57b : 00000000`00000002 00000005`07b07520 ffffe401`ed0d1cd0 00000000`00000000 : nt!ExAcquireResourceSharedLite+0x88
ffffaa80`054e5a30 ffff9355`7e9a6881 : ffffe401`ed0d1cd0 00000000`00da7a64 00000000`00000001 00000000`076bfda0 : nt!ExEnterCriticalRegionAndAcquireResourceShared+0x1b
ffffaa80`054e5a60 ffff9355`7e6d2f3e : ffffe401`eae18800 ffffaa80`054e5b80 00000000`00000020 00000000`0d92f77c : win32kbase!EnterSharedCrit+0x41
ffffaa80`054e5aa0 fffff801`cf371393 : ffffe401`eae18800 00000000`00000020 00000000`00da7a64 00000000`00000206 : win32kfull!NtUserGetAsyncKeyState+0x1e
ffffaa80`054e5b00 00000000`5cbb222c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`076bec08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x5cbb222c


THREAD_SHA1_HASH_MOD_FUNC: d746442cfb2c9149fc8cc72d6245119852cbb26b

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0bf29debeb37e921d9a3239496d85ecd43fc3164

THREAD_SHA1_HASH_MOD: d38a0e80e29ac41d6c27da3d0bc8db7d9656fb38

FOLLOWUP_IP:
win32kbase!EnterSharedCrit+41
ffff9355`7e9a6881 4885c0 test rax,rax

FAULT_INSTR_CODE: 74c08548

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: win32kbase!EnterSharedCrit+41

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5850c90b

IMAGE_VERSION: 10.0.14393.594

STACK_COMMAND: .cxr 0xffffaa80054e4f60 ; kb

BUCKET_ID_FUNC_OFFSET: 41

FAILURE_BUCKET_ID: 0x3B_win32kbase!EnterSharedCrit

BUCKET_ID: 0x3B_win32kbase!EnterSharedCrit

PRIMARY_PROBLEM_CLASS: 0x3B_win32kbase!EnterSharedCrit

TARGET_TIME: 2017-01-20T18:53:21.000Z

OSBUILD: 14393

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2016-12-21 08:50:57

BUILDDATESTAMP_STR: 161220-1747

BUILDLAB_STR: rs1_release

BUILDOSVER_STR: 10.0.14393.693

ANALYSIS_SESSION_ELAPSED_TIME: a8f

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_win32kbase!entersharedcrit

FAILURE_ID_HASH: {ff5fe9cc-0a4c-1094-4816-66b27f913d63}

Followup: MachineOwner
---------

2: kd> lmvm win32kbase
Browse full module list
start end module name
ffff9355`7e990000 ffff9355`7eb10000 win32kbase (pdb symbols) c:\temp\win32kbase.pdb\7F11BE3D0349423498439C1B125B8D981\win32kbase.pdb
Loaded symbol image file: win32kbase.sys
Mapped memory image file: c:\temp\win32kbase.sys\5850C90B180000\win32kbase.sys
Image path: \SystemRoot\System32\win32kbase.sys
Image name: win32kbase.sys
Browse all global symbols functions data
Timestamp: Wed Dec 14 06:22:35 2016 (5850C90B)
CheckSum: 00172414
ImageSize: 00180000
File version: 10.0.14393.594
Product version: 10.0.14393.594
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: win32kbase.sys
OriginalFilename: win32kbase.sys
ProductVersion: 10.0.14393.594
FileVersion: 10.0.14393.594 (rs1_release_inmarket.161213-1754)
FileDescription: Base Win32k Kernel Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.





Windows 10
 
Solution
bad memory address passed to a windows function while running
discord.exe Hammer & Chisel, Inc gaming communication software

I would look for a update to discord.exe

Specksan

Commendable
Dec 31, 2016
17
0
1,510


I'll try that. I will inform you later if there are any problems or if my issue has been fixed.
Thank you for your response.

UPDATE: New BSOD

Dump file:

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801266da0e4, The address that the exception occurred at
Arg3: ffffde00e3697558, Exception Record Address
Arg4: ffffde00e3696d80, Context Record Address

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 10.0.14393.693 (rs1_release.161220-1747)

SYSTEM_MANUFACTURER: To be filled by O.E.M.

SYSTEM_PRODUCT_NAME: To be filled by O.E.M.

SYSTEM_SKU: SKU

SYSTEM_VERSION: To be filled by O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 2701

BIOS_DATE: 03/24/2016

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: M5A97 LE R2.0

BASEBOARD_VERSION: Rev 1.xx

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff801266da0e4

BUGCHECK_P3: ffffde00e3697558

BUGCHECK_P4: ffffde00e3696d80

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - K sky osoitteessa 0x%p viittasi muistiin osoitteessa 0x%p. Muisti ei voinut olla %s.

FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff801`266da0e4 48890a mov qword ptr [rdx],rcx

EXCEPTION_RECORD: ffffde00e3697558 -- (.exr 0xffffde00e3697558)
ExceptionAddress: fffff801266da0e4 (nt!KxWaitForLockOwnerShip+0x0000000000000014)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffde00e3696d80 -- (.cxr 0xffffde00e3696d80)
rax=00000000001aae26 rbx=0000000000000000 rcx=ffffde00e36977f8
rdx=0808000000000000 rsi=fffff8012693ec60 rdi=ffffde00e36977f8
rip=fffff801266da0e4 rsp=ffffde00e3697790 rbp=ffffde00e3697838
r8=0000000000000004 r9=0220000000211361 r10=0000000000000000
r11=ffffa30000000000 r12=8000000000000000 r13=ffffde00e3697968
r14=0000000000000000 r15=ffffa37c014885b8
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KxWaitForLockOwnerShip+0x14:
fffff801`266da0e4 48890a mov qword ptr [rdx],rcx ds:002b:08080000`00000000=????????????????
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: 10ee

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 15

CPU_MODEL: 2

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: CODE_CORRUPTION

PROCESS_NAME: System

CURRENT_IRQL: 2

ERROR_CODE: (NTSTATUS) 0xc0000005 - K sky osoitteessa 0x%p viittasi muistiin osoitteessa 0x%p. Muisti ei voinut olla %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+14
fffff801`266da0e4 48890a mov qword ptr [rdx],rcx

READ_ADDRESS: fffff801269c1338: Unable to get MiVisibleState
ffffffffffffffff

BUGCHECK_STR: AV

ANALYSIS_SESSION_HOST: CUSTOMPC

ANALYSIS_SESSION_TIME: 01-25-2017 14:59:36.0955

ANALYSIS_VERSION: 10.0.14321.1024 x86fre

LOCK_ADDRESS: fffff801269378e0 -- (!locks fffff801269378e0)

Resource @ nt!PiEngineLock (0xfffff801269378e0) Available

WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.


WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.

1 total locks

PNP_TRIAGE:
Lock address : 0xfffff801269378e0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0

LAST_CONTROL_TRANSFER: from fffff801266fc3ab to fffff801266da0e4

STACK_TEXT:
ffffde00`e3697790 fffff801`266fc3ab : ffff9800`063b1db0 ffffa37c`014885b8 00000000`00000002 fffff801`2693cf88 : nt!KxWaitForLockOwnerShip+0x14
ffffde00`e36977c0 fffff801`266fc758 : fffff802`00000002 fffff801`00000004 00000000`00000000 fffff801`2693e480 : nt!MiInsertPageInList+0x50b
ffffde00`e3697860 fffff801`266ce43c : 00000000`00000000 ffff9800`063b1db0 00000000`00000000 fffff802`910b7000 : nt!MiPfnShareCountIsZero+0x108
ffffde00`e36978a0 fffff801`266d0178 : fffff802`910b7000 fffff801`2693cf88 00000000`00000009 ffffa37c`014885b8 : nt!MiDeleteValidSystemPage+0x17c
ffffde00`e3697920 fffff801`2669d0be : ffffb98f`00000004 ffffb98f`b29168a0 ffffb98f`b29168a0 ffffa37c`01488480 : nt!MiRemoveMappedPtes+0x288
ffffde00`e3697aa0 fffff801`26accd8d : 00000000`00000000 00000000`00000000 00000000`00000001 ffffde00`e3697c80 : nt!MiRemoveFromSystemSpace+0x1aa
ffffde00`e3697b80 fffff801`26ace511 : fffff802`91090000 00000000`00000037 ffffde00`e3697e19 00000000`0000000c : nt!MiUnmapImageInSystemSpace+0x31
ffffde00`e3697bb0 fffff801`26ad0c64 : 00000000`00000000 ffffb98f`b28c7550 ffffde00`e3697e19 00000000`00000000 : nt!MiRelocateImage+0x4e1
ffffde00`e3697d20 fffff801`26ae2545 : 00000000`00000422 00000000`01000000 ffffffff`ffffffff 00000000`00000080 : nt!MiCreateNewSection+0x33c
ffffde00`e3697e50 fffff801`26628026 : ffffde00`e36980e8 ffffde00`e3698110 ffffa607`0050004e ffffde00`e3698180 : nt!MiCreateSection+0x915
ffffde00`e3698030 fffff801`26a29dda : 00000000`00100000 ffffde00`e3698109 ffffde00`e36983b8 00000000`00000000 : nt!MmCreateSystemSection+0x7e
ffffde00`e36980b0 fffff801`26a792b2 : ffffffff`80000ca4 fffff801`26b075fe 00000000`00000000 fffff801`00000012 : nt!MiCreateSectionForDriver+0x102
ffffde00`e3698170 fffff801`26a7947b : ffffde00`e36983b8 ffffde00`e36982c0 00000000`00000000 00000000`00000000 : nt!MiObtainSectionForDriver+0x96
ffffde00`e36981c0 fffff801`26b14a4d : ffffde00`e36983b8 00000000`00000000 00000000`00000000 ffffde00`00000000 : nt!MmLoadSystemImage+0xaf
ffffde00`e3698360 fffff801`26b3e81e : 00000000`00000000 00000000`00000000 00000000`00000004 ffffa607`00000004 : nt!IopLoadDriver+0x251
ffffde00`e3698530 fffff801`26b17cc1 : ffffde00`e3698a01 ffffde00`e36986c8 00000000`c0000000 ffffde00`e36986a4 : nt!PipCallDriverAddDeviceQueryRoutine+0x1b6
ffffde00`e36985d0 fffff801`26b176bf : 00000000`00000000 00000000`0000000e 00000000`c0000034 ffffb98f`b211cd30 : nt!PnpCallDriverQueryServiceHelper+0xbd
ffffde00`e3698640 fffff801`26b16a69 : ffffb98f`b211cd30 ffffde00`e36988e0 ffffb98f`b211cd30 00000000`00000000 : nt!PipCallDriverAddDevice+0x317
ffffde00`e36987e0 fffff801`26b11322 : ffffb98f`b26231b0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x1cd
ffffde00`e3698a60 fffff801`2665770a : ffffb901`00000003 00000000`00000000 00000000`00000000 00000000`00000006 : nt!PiProcessReenumeration+0xa6
ffffde00`e3698ab0 fffff801`266b11b9 : ffffb98f`b034e040 fffff801`26936380 fffff801`269d7280 ffffb98f`af88ed38 : nt!PnpDeviceActionWorker+0x166
ffffde00`e3698b80 fffff801`2661c729 : ffffde00`e3040180 00000000`00000080 ffffb98f`ad61f6c0 ffffb98f`b034e040 : nt!ExpWorkerThread+0xe9
ffffde00`e3698c10 fffff801`26769bb6 : ffffde00`e3040180 ffffb98f`b034e040 fffff801`2661c6e8 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffffde00`e3698c60 00000000`00000000 : ffffde00`e3699000 ffffde00`e3693000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff801266ce510-fffff801266ce511 2 bytes - nt!MiDeleteValidSystemPage+250
[ 80 f6:00 a3 ]
fffff801266ce52d-fffff801266ce52e 2 bytes - nt!MiDeleteValidSystemPage+26d (+0x1d)
[ 80 fa:00 98 ]
fffff801266d0188-fffff801266d0189 2 bytes - nt!MiRemoveMappedPtes+298 (+0x1c5b)
[ 80 fa:00 98 ]
fffff801266da2b8-fffff801266da2b9 2 bytes - nt!RemoveListHeadPte+8c (+0xa130)
[ 80 f6:00 a3 ]
fffff801266da321-fffff801266da322 2 bytes - nt!MiSystemFault+31 (+0x69)
[ 80 f6:00 a3 ]
fffff801266da4ad-fffff801266da4af 3 bytes - nt!MiSystemFault+1bd (+0x18c)
[ 40 fb f6:80 51 a3 ]
fffff801266da4dc-fffff801266da4de 3 bytes - nt!MiSystemFault+1ec (+0x2f)
[ 40 fb f6:80 51 a3 ]
fffff801266da841-fffff801266da842 2 bytes - nt!MiSystemFault+551 (+0x365)
[ ff f6:7f a3 ]
fffff801266da8f4-fffff801266da8f5 2 bytes - nt!MiSystemFault+604 (+0xb3)
[ ff f6:7f a3 ]
fffff801266fc7e2-fffff801266fc7e4 3 bytes - nt!MiPfnShareCountIsZero+192 (+0x21eee)
[ 40 fb f6:80 51 a3 ]
fffff801266fc806-fffff801266fc807 2 bytes - nt!MiPfnShareCountIsZero+1b6 (+0x24)
[ 80 f6:00 a3 ]
fffff801266fc826-fffff801266fc829 4 bytes - nt!MiPfnShareCountIsZero+1d6 (+0x20)
[ a0 7d fb f6:c0 a8 51 a3 ]
fffff801266fc838-fffff801266fc83c 5 bytes - nt!MiPfnShareCountIsZero+1e8 (+0x12)
[ d0 be 7d fb f6:60 d4 a8 51 a3 ]
fffff8012672804d-fffff8012672804e 2 bytes - nt!MiPurgeZeroList+6d (+0x2b815)
[ 80 fa:00 98 ]
36 errors : !nt (fffff801266ce510-fffff8012672804e)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr 0xffffde00e3696d80 ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

BUCKET_ID: MEMORY_CORRUPTION_LARGE

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE

TARGET_TIME: 2017-01-25T12:47:40.000Z

OSBUILD: 14393

OSSERVICEPACK: 693

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2016-12-21 08:50:57

BUILDDATESTAMP_STR: 161220-1747

BUILDLAB_STR: rs1_release

BUILDOSVER_STR: 10.0.14393.693

ANALYSIS_SESSION_ELAPSED_TIME: 3564

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_large

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 

TRENDING THREADS