Overclock.net › Forums › Software, Programming and Coding › Operating Systems › Windows › Crash Analysis and Debugging › [SOLVED] "Same" BSOD every time 0x3b
New Posts  All Forums:Forum Nav:

[SOLVED] "Same" BSOD every time 0x3b

post #1 of 3
Thread Starter 
Hi,
i'm getting multiple BSOD's with 0x3b 0xc5 ...
BlueScreenView say every time ntoskrnl.exe SYSTEM_SERVICE_EXCEPTION.
I have done 6 Passes (ca. 10hours) with memtest86+ (NO ERRORS).
The Seagate tool say my HDD is "GOOD".
With Driver Verifier i have killed some Drivers but through this i only increased the random bsod to one primary bsod (0x3b 0xc5 ...).
Today i play 8hours without any problem, i left the pc alone and when i come back there is a bsod (while "playing" BF3)
In the most case the dump say Process_Name: FireFox.exe or bf3.exe but i think he place the name of the used last process in the dump...
Here are the last 2 crash dumps (analyzed by windbg)
Please help me. I spend the last 2 Weeks to get this working and the BSOD's continue...

(I'm from germany and not so good in english, so i hope you can forgive me for this english massacre)
Warning: Spoiler! (Click to show)
Symbol search path is: srv*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18205.amd64fre.win7sp1_gdr.130708-1532
Machine Name:
Kernel base = 0xfffff800`03205000 PsLoadedModuleList = 0xfffff800`034486d0
Debug session time: Sat Aug 24 18:46:31.505 2013 (GMT+2)
System Uptime: 0 days 6:09:09.661
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000326d4e4, fffff8800b9ef060, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiDeliverApc+d4 )

Followup: MachineOwner

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000326d4e4, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800b9ef060, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
nt!KiDeliverApc+d4
fffff800`0326d4e4 498b4a30 mov rcx,qword ptr [r10+30h]

CONTEXT: fffff8800b9ef060 -- (.cxr 0xfffff8800b9ef060)
rax=0000000000000002 rbx=fffffa8007450b50 rcx=0000000000000001
rdx=0000000000000000 rsi=fffffa8007450ba0 rdi=fffffa8007450b50
rip=fffff8000326d4e4 rsp=fffff8800b9efa40 rbp=0000000000000000
r8=f7fffa8007450ba0 r9=0000000000000000 r10=f7fffa8007450b90
r11=0000000000100003 r12=0000000000000001 r13=0000000000000300
r14=fffffa8006d166a0 r15=fffff8800b9efc20
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!KiDeliverApc+0xd4:
fffff800`0326d4e4 498b4a30 mov rcx,qword ptr [r10+30h] ds:002b:f7fffa80`07450bc0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: firefox.exe

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80003228ea5 to fffff8000326d4e4

STACK_TEXT:
fffff880`0b9efa40 fffff800`03228ea5 : 00000000`00000000 00000000`00000000 fffff880`0b9efca0 fffff800`0327dc9f : nt!KiDeliverApc+0xd4
fffff880`0b9efac0 fffff800`0357246e : fffffa80`072c11e0 00000000`00000000 00000000`00000000 fffff800`0328199f : nt!KiCheckForKernelApcDelivery+0x25
fffff880`0b9efaf0 fffff800`03564755 : 00000000`00000000 00000000`00000002 fffffa80`06b209b0 fffff880`0b9efc01 : nt!ObReferenceObjectByHandleWithTag+0x3ce
fffff880`0b9efbc0 fffff800`03279e13 : fffffa80`07450b50 00000000`00000c70 00000000`00000000 fffffa80`099c8480 : nt!NtSetEvent+0x75
fffff880`0b9efc20 00000000`723c2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`12c3eb48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x723c2e09


FOLLOWUP_IP:
nt!KiDeliverApc+d4
fffff800`0326d4e4 498b4a30 mov rcx,qword ptr [r10+30h]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KiDeliverApc+d4

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 51db806a

STACK_COMMAND: .cxr 0xfffff8800b9ef060 ; kb

FAILURE_BUCKET_ID: X64_0x3B_nt!KiDeliverApc+d4

BUCKET_ID: X64_0x3B_nt!KiDeliverApc+d4

Followup: MachineOwner
Warning: Spoiler! (Click to show)
Symbol search path is: srv*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18205.amd64fre.win7sp1_gdr.130708-1532
Machine Name:
Kernel base = 0xfffff800`0320f000 PsLoadedModuleList = 0xfffff800`034526d0
Debug session time: Fri Aug 23 22:11:56.472 2013 (GMT+2)
System Uptime: 0 days 2:47:31.675
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000328ae61, fffff880063a1fd0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiSignalSynchronizationObject+51 )

Followup: MachineOwner

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000328ae61, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880063a1fd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
nt!KiSignalSynchronizationObject+51
fffff800`0328ae61 48894108 mov qword ptr [rcx+8],rax

CONTEXT: fffff880063a1fd0 -- (.cxr 0xfffff880063a1fd0)
rax=fffffa8006c0c2e8 rbx=fffffa8006c0c2e8 rcx=f7fffa8006c0c2e8
rdx=fffffa8006c0c2e0 rsi=fffffa8006c0c2e0 rdi=f7fffa8006c0c2e8
rip=fffff8000328ae61 rsp=fffff880063a29b0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffffffffffffd
r11=00000000002f6d00 r12=fffffa8006c49168 r13=fffff880009ec180
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!KiSignalSynchronizationObject+0x51:
fffff800`0328ae61 48894108 mov qword ptr [rcx+8],rax ds:002b:f7fffa80`06c0c2f0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000328ae61

STACK_TEXT:
fffff880`063a29b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSignalSynchronizationObject+0x51


FOLLOWUP_IP:
nt!KiSignalSynchronizationObject+51
fffff800`0328ae61 48894108 mov qword ptr [rcx+8],rax

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KiSignalSynchronizationObject+51

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 51db806a

STACK_COMMAND: .cxr 0xfffff880063a1fd0 ; kb

FAILURE_BUCKET_ID: X64_0x3B_nt!KiSignalSynchronizationObject+51

BUCKET_ID: X64_0x3B_nt!KiSignalSynchronizationObject+51

Followup: MachineOwner

Edited by BSODREPEATER - 8/24/13 at 11:43am
post #2 of 3
Thread Starter 
Problem found. It was the graphics card (gtx560 ti) which was getting too hot (100° after some seconds in furmark). With the fan on 100% and reduced game settings (Ultra -> Low) i can play for hours. So next HW replacement is the graphic card.
post #3 of 3
Thanks for providing what the issue was.

Regards,

Patrick
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Crash Analysis and Debugging
Overclock.net › Forums › Software, Programming and Coding › Operating Systems › Windows › Crash Analysis and Debugging › [SOLVED] "Same" BSOD every time 0x3b