Hello. I just got BSoD. From what i can make out of it it's related to "win32kbase.sys" which does not tell me anything.
I ran memtest84+ and it shows no errors.
WhoCrashed says this.
Windows version: Windows 10 , 10.0, build: 17134
Windows dir: C:\WINDOWS
Hardware: ASUSTeK COMPUTER INC., SABERTOOTH 990FX R2.0
CPU: AuthenticAMD AMD FX(tm)-8350 Eight-Core Processor AMD586, level: 21
8 logical processors, active mask: 255
RAM: 17072918528 bytes total
Crash Dump Analysis
Crash dumps are enabled on your computer.
Crash dump directories:
C:\WINDOWS
C:\WINDOWS\Minidump
On Sun 2018-06-24 23:00:37 your computer crashed or a problem was reported
crash dump file: C:\WINDOWS\Minidump\062418-9781-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x198330)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF800DEE928A2, 0xFFFFF980D8B86ED0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\WINDOWS\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
On Sun 2018-06-24 23:00:37 your computer crashed or a problem was reported
crash dump file: C:\WINDOWS\MEMORY.DMP
This was probably caused by the following module: ntkrnlmp.exe (nt!setjmpex+0x73C9)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF800DEE928A2, 0xFFFFF980D8B86ED0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
Also WinDbg says this.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff800`dee8c000 PsLoadedModuleList = 0xfffff800`df2461f0
Debug session time: Sun Jun 24 23:00:37.244 2018 (UTC + 2:00)
System Uptime: 0 days 2:00:25.989
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`046dc018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800dee928a2, fffff980d8b86ed0, 0}
Probably caused by : win32kbase.sys ( win32kbase!EnterSharedCrit+41 )
Followup: MachineOwner
---------
nt!KeBugCheckEx:
fffff800`df024330 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff980`d8b86600=000000000000003b
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800dee928a2, Address of the instruction which caused the bugcheck
Arg3: fffff980d8b86ed0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2901
BIOS_DATE: 05/04/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: SABERTOOTH 990FX R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 1
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800dee928a2
BUGCHECK_P3: fffff980d8b86ed0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p 0x%p refererade till minnet p 0x%p. Minnet kunde inte vara %s.
FAULTING_IP:
nt!KxWaitForLockOwnerShipWithIrql+12
fffff800`dee928a2 48890a mov qword ptr [rdx],rcx
CONTEXT: fffff980d8b86ed0 -- (.cxr 0xfffff980d8b86ed0)
rax=0000000000000000 rbx=ffffe505b4cc24a0 rcx=fffff980d8b87928
rdx=0800000000000000 rsi=ffffe505b6cb7700 rdi=fffff980d8b87928
rip=fffff800dee928a2 rsp=fffff980d8b878c0 rbp=fffff980d8b87958
r8=fffff980d8b87980 r9=0000000000000006 r10=0000000000000004
r11=ffffe505b6cb7700 r12=0000000000000002 r13=0000000000000000
r14=000000000000ff00 r15=ffffe505b4cc2500
iopl=0 nv up di ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010082
nt!KxWaitForLockOwnerShipWithIrql+0x12:
fffff800`dee928a2 48890a mov qword ptr [rdx],rcx ds:002b:08000000`00000000=????????????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: 10ee
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: OLIVER
ANALYSIS_SESSION_TIME: 06-24-2018 23:06:05.0827
ANALYSIS_VERSION: 10.0.17674.1000 amd64fre
LAST_CONTROL_TRANSFER: from fffff800deeffe73 to fffff800dee928a2
STACK_TEXT:
fffff980`d8b878c0 fffff800`deeffe73 : ffffe505`b4cc24a0 00000000`00000000 00000000`00000001 fffff800`def145a0 : nt!KxWaitForLockOwnerShipWithIrql+0x12
fffff980`d8b878f0 fffff800`def2081d : ffff88b0`00000002 00000000`00000000 fffff980`d9699930 00000000`00000000 : nt!ExpApplyPriorityBoost+0x533
fffff980`d8b87980 fffff800`def11712 : ffffe505`b4cc24a0 ffffe505`b6cb7700 00000000`00000000 ffff88b0`026f1be0 : nt!ExpApplyPrewaitBoost+0x8d
fffff980`d8b879b0 fffff800`def8ae9a : 00000000`00000002 ffffe505`b4cc24a0 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceSharedLite+0x3a2
fffff980`d8b87a50 ffff888b`69a6a4b1 : 00000000`00000000 00000000`00000000 00000000`004096b6 ffff888b`00000001 : nt!ExEnterCriticalRegionAndAcquireResourceShared+0x4a
fffff980`d8b87a90 ffff888b`6a41fa8f : 00000000`00000040 fffff980`d8b87b80 00000000`77a85300 00000000`00000020 : win32kbase!EnterSharedCrit+0x41
fffff980`d8b87ad0 fffff800`df034943 : ffffe505`b6cb7700 ffffe505`b6cb7700 fffff980`d8b87b80 00000000`00000000 : win32kfull!NtUserCallOneParam+0x1f
fffff980`d8b87b00 00000000`77a8f304 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d1ded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a8f304
THREAD_SHA1_HASH_MOD_FUNC: 73fa94a78ed156cddf0e33ca0b49bf6a63e0457a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 27f1ac4d966042c027cb6a60f5a4981e178655c6
THREAD_SHA1_HASH_MOD: a1065c0f1e29b9ea5565121504105574f7d99b4b
FOLLOWUP_IP:
win32kbase!EnterSharedCrit+41
ffff888b`69a6a4b1 4885c0 test rax,rax
FAULT_INSTR_CODE: 74c08548
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32kbase!EnterSharedCrit+41
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17134.112
STACK_COMMAND: .cxr 0xfffff980d8b86ed0 ; kb
BUCKET_ID_FUNC_OFFSET: 41
FAILURE_BUCKET_ID: 0x3B_win32kbase!EnterSharedCrit
BUCKET_ID: 0x3B_win32kbase!EnterSharedCrit
PRIMARY_PROBLEM_CLASS: 0x3B_win32kbase!EnterSharedCrit
TARGET_TIME: 2018-06-24T21:00:37.000Z
OSBUILD: 17134
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-06-08 11:00:00
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 60b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_win32kbase!entersharedcrit
FAILURE_ID_HASH: {ff5fe9cc-0a4c-1094-4816-66b27f913d63}
Followup: MachineOwner
Link to dump file: https://1drv.ms/f/s!Av0v4dUc625OjxtDvsHpo0SBrH3J
I'm out of ideas.
I ran memtest84+ and it shows no errors.
WhoCrashed says this.
Windows version: Windows 10 , 10.0, build: 17134
Windows dir: C:\WINDOWS
Hardware: ASUSTeK COMPUTER INC., SABERTOOTH 990FX R2.0
CPU: AuthenticAMD AMD FX(tm)-8350 Eight-Core Processor AMD586, level: 21
8 logical processors, active mask: 255
RAM: 17072918528 bytes total
Crash Dump Analysis
Crash dumps are enabled on your computer.
Crash dump directories:
C:\WINDOWS
C:\WINDOWS\Minidump
On Sun 2018-06-24 23:00:37 your computer crashed or a problem was reported
crash dump file: C:\WINDOWS\Minidump\062418-9781-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x198330)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF800DEE928A2, 0xFFFFF980D8B86ED0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\WINDOWS\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
On Sun 2018-06-24 23:00:37 your computer crashed or a problem was reported
crash dump file: C:\WINDOWS\MEMORY.DMP
This was probably caused by the following module: ntkrnlmp.exe (nt!setjmpex+0x73C9)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF800DEE928A2, 0xFFFFF980D8B86ED0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
Also WinDbg says this.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff800`dee8c000 PsLoadedModuleList = 0xfffff800`df2461f0
Debug session time: Sun Jun 24 23:00:37.244 2018 (UTC + 2:00)
System Uptime: 0 days 2:00:25.989
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`046dc018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800dee928a2, fffff980d8b86ed0, 0}
Probably caused by : win32kbase.sys ( win32kbase!EnterSharedCrit+41 )
Followup: MachineOwner
---------
nt!KeBugCheckEx:
fffff800`df024330 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff980`d8b86600=000000000000003b
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800dee928a2, Address of the instruction which caused the bugcheck
Arg3: fffff980d8b86ed0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2901
BIOS_DATE: 05/04/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: SABERTOOTH 990FX R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 1
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800dee928a2
BUGCHECK_P3: fffff980d8b86ed0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruktionen p 0x%p refererade till minnet p 0x%p. Minnet kunde inte vara %s.
FAULTING_IP:
nt!KxWaitForLockOwnerShipWithIrql+12
fffff800`dee928a2 48890a mov qword ptr [rdx],rcx
CONTEXT: fffff980d8b86ed0 -- (.cxr 0xfffff980d8b86ed0)
rax=0000000000000000 rbx=ffffe505b4cc24a0 rcx=fffff980d8b87928
rdx=0800000000000000 rsi=ffffe505b6cb7700 rdi=fffff980d8b87928
rip=fffff800dee928a2 rsp=fffff980d8b878c0 rbp=fffff980d8b87958
r8=fffff980d8b87980 r9=0000000000000006 r10=0000000000000004
r11=ffffe505b6cb7700 r12=0000000000000002 r13=0000000000000000
r14=000000000000ff00 r15=ffffe505b4cc2500
iopl=0 nv up di ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010082
nt!KxWaitForLockOwnerShipWithIrql+0x12:
fffff800`dee928a2 48890a mov qword ptr [rdx],rcx ds:002b:08000000`00000000=????????????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: 10ee
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: OLIVER
ANALYSIS_SESSION_TIME: 06-24-2018 23:06:05.0827
ANALYSIS_VERSION: 10.0.17674.1000 amd64fre
LAST_CONTROL_TRANSFER: from fffff800deeffe73 to fffff800dee928a2
STACK_TEXT:
fffff980`d8b878c0 fffff800`deeffe73 : ffffe505`b4cc24a0 00000000`00000000 00000000`00000001 fffff800`def145a0 : nt!KxWaitForLockOwnerShipWithIrql+0x12
fffff980`d8b878f0 fffff800`def2081d : ffff88b0`00000002 00000000`00000000 fffff980`d9699930 00000000`00000000 : nt!ExpApplyPriorityBoost+0x533
fffff980`d8b87980 fffff800`def11712 : ffffe505`b4cc24a0 ffffe505`b6cb7700 00000000`00000000 ffff88b0`026f1be0 : nt!ExpApplyPrewaitBoost+0x8d
fffff980`d8b879b0 fffff800`def8ae9a : 00000000`00000002 ffffe505`b4cc24a0 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceSharedLite+0x3a2
fffff980`d8b87a50 ffff888b`69a6a4b1 : 00000000`00000000 00000000`00000000 00000000`004096b6 ffff888b`00000001 : nt!ExEnterCriticalRegionAndAcquireResourceShared+0x4a
fffff980`d8b87a90 ffff888b`6a41fa8f : 00000000`00000040 fffff980`d8b87b80 00000000`77a85300 00000000`00000020 : win32kbase!EnterSharedCrit+0x41
fffff980`d8b87ad0 fffff800`df034943 : ffffe505`b6cb7700 ffffe505`b6cb7700 fffff980`d8b87b80 00000000`00000000 : win32kfull!NtUserCallOneParam+0x1f
fffff980`d8b87b00 00000000`77a8f304 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d1ded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a8f304
THREAD_SHA1_HASH_MOD_FUNC: 73fa94a78ed156cddf0e33ca0b49bf6a63e0457a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 27f1ac4d966042c027cb6a60f5a4981e178655c6
THREAD_SHA1_HASH_MOD: a1065c0f1e29b9ea5565121504105574f7d99b4b
FOLLOWUP_IP:
win32kbase!EnterSharedCrit+41
ffff888b`69a6a4b1 4885c0 test rax,rax
FAULT_INSTR_CODE: 74c08548
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32kbase!EnterSharedCrit+41
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17134.112
STACK_COMMAND: .cxr 0xfffff980d8b86ed0 ; kb
BUCKET_ID_FUNC_OFFSET: 41
FAILURE_BUCKET_ID: 0x3B_win32kbase!EnterSharedCrit
BUCKET_ID: 0x3B_win32kbase!EnterSharedCrit
PRIMARY_PROBLEM_CLASS: 0x3B_win32kbase!EnterSharedCrit
TARGET_TIME: 2018-06-24T21:00:37.000Z
OSBUILD: 17134
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-06-08 11:00:00
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 60b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_win32kbase!entersharedcrit
FAILURE_ID_HASH: {ff5fe9cc-0a4c-1094-4816-66b27f913d63}
Followup: MachineOwner
Link to dump file: https://1drv.ms/f/s!Av0v4dUc625OjxtDvsHpo0SBrH3J
I'm out of ideas.