SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff801f0d3ad5b, Address of the instruction which caused the BugCheck
Arg3: ffffd000230dfd90, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for AndroidKernelX64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10555
Key : Analysis.Init.CPU.mSec
Value: 1124
Key : Analysis.Init.Elapsed.mSec
Value: 2465
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081021-28828-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff801f0d3ad5b
BUGCHECK_P3: ffffd000230dfd90
BUGCHECK_P4: 0
CONTEXT: ffffd000230dfd90 -- (.cxr 0xffffd000230dfd90)
rax=00000000f0014000 rbx=ffffe001af245000 rcx=0000000000000000
rdx=fffff801f0cec000 rsi=0000000000001000 rdi=ffffe001bccfe180
rip=fffff801f0d3ad5b rsp=ffffd000230e07c0 rbp=000000000ffff000
r8=0000000000001000 r9=0000000010000000 r10=0000000000001000
r11=000000000ffff000 r12=0000000010000000 r13=ffffe001bd19d420
r14=000000000ffff000 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00200286
AndroidKernelX64+0x4ed5b:
fffff801`f0d3ad5b cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd000`230e07c0 ffffe001`bccfe180 : ffffe001`af245000 ffffe001`af245000 06663ced`ffffffff ffffd000`230e07ac : AndroidKernelX64+0x4ed5b
ffffd000`230e07c8 ffffe001`af245000 : ffffe001`af245000 06663ced`ffffffff ffffd000`230e07ac 00000000`00222000 : 0xffffe001`bccfe180
ffffd000`230e07d0 ffffe001`af245000 : 06663ced`ffffffff ffffd000`230e07ac 00000000`00222000 00000000`002a8388 : 0xffffe001`af245000
ffffd000`230e07d8 06663ced`ffffffff : ffffd000`230e07ac 00000000`00222000 00000000`002a8388 ffffe001`b9b55310 : 0xffffe001`af245000
ffffd000`230e07e0 ffffd000`230e07ac : 00000000`00222000 00000000`002a8388 ffffe001`b9b55310 00000000`00222000 : 0x06663ced`ffffffff
ffffd000`230e07e8 00000000`00222000 : 00000000`002a8388 ffffe001`b9b55310 00000000`00222000 00000000`002a8388 : 0xffffd000`230e07ac
ffffd000`230e07f0 00000000`002a8388 : ffffe001`b9b55310 00000000`00222000 00000000`002a8388 00000000`00000000 : 0x222000
ffffd000`230e07f8 ffffe001`b9b55310 : 00000000`00222000 00000000`002a8388 00000000`00000000 ffffe001`b9b55310 : 0x2a8388
ffffd000`230e0800 00000000`00222000 : 00000000`002a8388 00000000`00000000 ffffe001`b9b55310 00000000`000000db : 0xffffe001`b9b55310
ffffd000`230e0808 00000000`002a8388 : 00000000`00000000 ffffe001`b9b55310 00000000`000000db fffff801`f0da316d : 0x222000
ffffd000`230e0810 00000000`00000000 : ffffe001`b9b55310 00000000`000000db fffff801`f0da316d ffffd000`230e0950 : 0x2a8388
SYMBOL_NAME: AndroidKernelX64+4ed5b
MODULE_NAME: AndroidKernelX64
IMAGE_NAME: AndroidKernelX64.sys
STACK_COMMAND: .cxr 0xffffd000230dfd90 ; kb
BUCKET_ID_FUNC_OFFSET: 4ed5b
FAILURE_BUCKET_ID: 0x3B_80000003_AndroidKernelX64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {4c6e4447-626e-1920-83c9-302fc6764f8f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff801d5067d5b, Address of the instruction which caused the BugCheck
Arg3: ffffd00165be5d90, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for AndroidKernelX64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12617
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 2483
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081021-23375-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff801d5067d5b
BUGCHECK_P3: ffffd00165be5d90
BUGCHECK_P4: 0
CONTEXT: ffffd00165be5d90 -- (.cxr 0xffffd00165be5d90)
rax=00000000f0014000 rbx=ffffe000e39dc000 rcx=0000000000000000
rdx=fffff801d5019000 rsi=0000000000001000 rdi=ffffe000eced7b90
rip=fffff801d5067d5b rsp=ffffd00165be67c0 rbp=000000000ffff000
r8=0000000000001000 r9=0000000010000000 r10=0000000000001000
r11=000000000ffff000 r12=0000000010000000 r13=ffffe000ecea7010
r14=000000000ffff000 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00200286
AndroidKernelX64+0x4ed5b:
fffff801`d5067d5b cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd001`65be67c0 ffffe000`eced7b90 : ffffe000`e39dc000 ffffe000`e39dc000 06663ced`000004f7 ffffd001`65be67ac : AndroidKernelX64+0x4ed5b
ffffd001`65be67c8 ffffe000`e39dc000 : ffffe000`e39dc000 06663ced`000004f7 ffffd001`65be67ac 00000000`00222000 : 0xffffe000`eced7b90
ffffd001`65be67d0 ffffe000`e39dc000 : 06663ced`000004f7 ffffd001`65be67ac 00000000`00222000 00000000`002d7b50 : 0xffffe000`e39dc000
ffffd001`65be67d8 06663ced`000004f7 : ffffd001`65be67ac 00000000`00222000 00000000`002d7b50 ffffe000`ec39c850 : 0xffffe000`e39dc000
ffffd001`65be67e0 ffffd001`65be67ac : 00000000`00222000 00000000`002d7b50 ffffe000`ec39c850 00000000`00222000 : 0x06663ced`000004f7
ffffd001`65be67e8 00000000`00222000 : 00000000`002d7b50 ffffe000`ec39c850 00000000`00222000 00000000`002d7b50 : 0xffffd001`65be67ac
ffffd001`65be67f0 00000000`002d7b50 : ffffe000`ec39c850 00000000`00222000 00000000`002d7b50 00000000`00000000 : 0x222000
ffffd001`65be67f8 ffffe000`ec39c850 : 00000000`00222000 00000000`002d7b50 00000000`00000000 ffffe000`ec39c850 : 0x2d7b50
ffffd001`65be6800 00000000`00222000 : 00000000`002d7b50 00000000`00000000 ffffe000`ec39c850 00000000`000000db : 0xffffe000`ec39c850
ffffd001`65be6808 00000000`002d7b50 : 00000000`00000000 ffffe000`ec39c850 00000000`000000db fffff801`d50d016d : 0x222000
ffffd001`65be6810 00000000`00000000 : ffffe000`ec39c850 00000000`000000db fffff801`d50d016d ffffd001`65be6950 : 0x2d7b50
SYMBOL_NAME: AndroidKernelX64+4ed5b
MODULE_NAME: AndroidKernelX64
IMAGE_NAME: AndroidKernelX64.sys
STACK_COMMAND: .cxr 0xffffd00165be5d90 ; kb
BUCKET_ID_FUNC_OFFSET: 4ed5b
FAILURE_BUCKET_ID: 0x3B_80000003_AndroidKernelX64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {4c6e4447-626e-1920-83c9-302fc6764f8f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff80089345d5b, Address of the instruction which caused the BugCheck
Arg3: ffffd00024105d90, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for AndroidKernelX64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1812
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5496
Key : Analysis.Init.CPU.mSec
Value: 1265
Key : Analysis.Init.Elapsed.mSec
Value: 4113
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081021-27765-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff80089345d5b
BUGCHECK_P3: ffffd00024105d90
BUGCHECK_P4: 0
CONTEXT: ffffd00024105d90 -- (.cxr 0xffffd00024105d90)
rax=00000000f0068000 rbx=ffffe00083400000 rcx=0000000000000000
rdx=fffff800892f7000 rsi=0000000000001000 rdi=ffffe0008aa25710
rip=fffff80089345d5b rsp=ffffd000241067c0 rbp=000000000ff9f000
r8=0000000000001000 r9=000000000ffa0000 r10=0000000000001000
r11=000000000ff9f000 r12=000000000ffa0000 r13=ffffe0008b592c80
r14=000000000ff9f000 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00200286
AndroidKernelX64+0x4ed5b:
fffff800`89345d5b cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd000`241067c0 ffffe000`8aa25710 : ffffe000`83400000 ffffe000`83400000 00000000`000004f7 ffffd000`241067ac : AndroidKernelX64+0x4ed5b
ffffd000`241067c8 ffffe000`83400000 : ffffe000`83400000 00000000`000004f7 ffffd000`241067ac 00000000`00222000 : 0xffffe000`8aa25710
ffffd000`241067d0 ffffe000`83400000 : 00000000`000004f7 ffffd000`241067ac 00000000`00222000 00000000`005816b0 : 0xffffe000`83400000
ffffd000`241067d8 00000000`000004f7 : ffffd000`241067ac 00000000`00222000 00000000`005816b0 ffffe000`8ac76a50 : 0xffffe000`83400000
ffffd000`241067e0 ffffd000`241067ac : 00000000`00222000 00000000`005816b0 ffffe000`8ac76a50 00000000`00222000 : 0x4f7
ffffd000`241067e8 00000000`00222000 : 00000000`005816b0 ffffe000`8ac76a50 00000000`00222000 00000000`005816b0 : 0xffffd000`241067ac
ffffd000`241067f0 00000000`005816b0 : ffffe000`8ac76a50 00000000`00222000 00000000`005816b0 00000000`00000000 : 0x222000
ffffd000`241067f8 ffffe000`8ac76a50 : 00000000`00222000 00000000`005816b0 00000000`00000000 ffffe000`8ac76a50 : 0x5816b0
ffffd000`24106800 00000000`00222000 : 00000000`005816b0 00000000`00000000 ffffe000`8ac76a50 00000000`000000db : 0xffffe000`8ac76a50
ffffd000`24106808 00000000`005816b0 : 00000000`00000000 ffffe000`8ac76a50 00000000`000000db fffff800`893ae16d : 0x222000
ffffd000`24106810 00000000`00000000 : ffffe000`8ac76a50 00000000`000000db fffff800`893ae16d ffffd000`24106950 : 0x5816b0
SYMBOL_NAME: AndroidKernelX64+4ed5b
MODULE_NAME: AndroidKernelX64
IMAGE_NAME: AndroidKernelX64.sys
STACK_COMMAND: .cxr 0xffffd00024105d90 ; kb
BUCKET_ID_FUNC_OFFSET: 4ed5b
FAILURE_BUCKET_ID: 0x3B_80000003_AndroidKernelX64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {4c6e4447-626e-1920-83c9-302fc6764f8f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff800aa2f7d5b, Address of the instruction which caused the BugCheck
Arg3: ffffd000207c0d90, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for AndroidKernelX64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2093
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11051
Key : Analysis.Init.CPU.mSec
Value: 1108
Key : Analysis.Init.Elapsed.mSec
Value: 2454
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081121-27281-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff800aa2f7d5b
BUGCHECK_P3: ffffd000207c0d90
BUGCHECK_P4: 0
CONTEXT: ffffd000207c0d90 -- (.cxr 0xffffd000207c0d90)
rax=00000000f0014000 rbx=ffffe00114e02000 rcx=0000000000000000
rdx=fffff800aa2a9000 rsi=0000000000001000 rdi=ffffe0011df1d7a0
rip=fffff800aa2f7d5b rsp=ffffd000207c17c0 rbp=000000000ffff000
r8=0000000000001000 r9=0000000010000000 r10=0000000000001000
r11=000000000ffff000 r12=0000000010000000 r13=ffffe00119c3bc80
r14=000000000ffff000 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00200286
AndroidKernelX64+0x4ed5b:
fffff800`aa2f7d5b cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd000`207c17c0 ffffe001`1df1d7a0 : ffffe001`14e02000 ffffe001`14e02000 06663ced`ffffffff ffffd000`207c17ac : AndroidKernelX64+0x4ed5b
ffffd000`207c17c8 ffffe001`14e02000 : ffffe001`14e02000 06663ced`ffffffff ffffd000`207c17ac 00000000`00222000 : 0xffffe001`1df1d7a0
ffffd000`207c17d0 ffffe001`14e02000 : 06663ced`ffffffff ffffd000`207c17ac 00000000`00222000 00000000`005a7bd0 : 0xffffe001`14e02000
ffffd000`207c17d8 06663ced`ffffffff : ffffd000`207c17ac 00000000`00222000 00000000`005a7bd0 ffffe001`1a78f010 : 0xffffe001`14e02000
ffffd000`207c17e0 ffffd000`207c17ac : 00000000`00222000 00000000`005a7bd0 ffffe001`1a78f010 00000000`00222000 : 0x06663ced`ffffffff
ffffd000`207c17e8 00000000`00222000 : 00000000`005a7bd0 ffffe001`1a78f010 00000000`00222000 00000000`005a7bd0 : 0xffffd000`207c17ac
ffffd000`207c17f0 00000000`005a7bd0 : ffffe001`1a78f010 00000000`00222000 00000000`005a7bd0 00000000`00000000 : 0x222000
ffffd000`207c17f8 ffffe001`1a78f010 : 00000000`00222000 00000000`005a7bd0 00000000`00000000 ffffe001`1a78f010 : 0x5a7bd0
ffffd000`207c1800 00000000`00222000 : 00000000`005a7bd0 00000000`00000000 ffffe001`1a78f010 00000000`000000db : 0xffffe001`1a78f010
ffffd000`207c1808 00000000`005a7bd0 : 00000000`00000000 ffffe001`1a78f010 00000000`000000db fffff800`aa36016d : 0x222000
ffffd000`207c1810 00000000`00000000 : ffffe001`1a78f010 00000000`000000db fffff800`aa36016d ffffd000`207c1950 : 0x5a7bd0
SYMBOL_NAME: AndroidKernelX64+4ed5b
MODULE_NAME: AndroidKernelX64
IMAGE_NAME: AndroidKernelX64.sys
STACK_COMMAND: .cxr 0xffffd000207c0d90 ; kb
BUCKET_ID_FUNC_OFFSET: 4ed5b
FAILURE_BUCKET_ID: 0x3B_80000003_AndroidKernelX64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {4c6e4447-626e-1920-83c9-302fc6764f8f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff8012c0cfd5b, Address of the instruction which caused the BugCheck
Arg3: ffffd00023d75d90, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for AndroidKernelX64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1921
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12061
Key : Analysis.Init.CPU.mSec
Value: 1015
Key : Analysis.Init.Elapsed.mSec
Value: 2333
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081021-30140-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff8012c0cfd5b
BUGCHECK_P3: ffffd00023d75d90
BUGCHECK_P4: 0
CONTEXT: ffffd00023d75d90 -- (.cxr 0xffffd00023d75d90)
rax=0000000057088000 rbx=ffffe00096c00000 rcx=0000000000000000
rdx=fffff8012c081000 rsi=0000000000001000 rdi=ffffe000a0148880
rip=fffff8012c0cfd5b rsp=ffffd00023d767c0 rbp=00000000a8f7f000
r8=0000000000001000 r9=00000000a8f80000 r10=0000000000001000
r11=00000000a8f7f000 r12=00000000a8f80000 r13=ffffe000a106a7a0
r14=00000000a8f7f000 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00200286
AndroidKernelX64+0x4ed5b:
fffff801`2c0cfd5b cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd000`23d767c0 ffffe000`a0148880 : ffffe000`96c00000 ffffe000`96c00000 00000000`00000000 00000000`00000000 : AndroidKernelX64+0x4ed5b
ffffd000`23d767c8 ffffe000`96c00000 : ffffe000`96c00000 00000000`00000000 00000000`00000000 00000000`00222000 : 0xffffe000`a0148880
ffffd000`23d767d0 ffffe000`96c00000 : 00000000`00000000 00000000`00000000 00000000`00222000 00000000`001d0a80 : 0xffffe000`96c00000
ffffd000`23d767d8 00000000`00000000 : 00000000`00000000 00000000`00222000 00000000`001d0a80 ffffe000`a0d6a010 : 0xffffe000`96c00000
SYMBOL_NAME: AndroidKernelX64+4ed5b
MODULE_NAME: AndroidKernelX64
IMAGE_NAME: AndroidKernelX64.sys
STACK_COMMAND: .cxr 0xffffd00023d75d90 ; kb
BUCKET_ID_FUNC_OFFSET: 4ed5b
FAILURE_BUCKET_ID: 0x3B_80000003_AndroidKernelX64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {4c6e4447-626e-1920-83c9-302fc6764f8f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff801bc0b6d5b, Address of the instruction which caused the BugCheck
Arg3: ffffd0002178cd90, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for AndroidKernelX64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2061
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11325
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 2430
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081021-23421-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff801bc0b6d5b
BUGCHECK_P3: ffffd0002178cd90
BUGCHECK_P4: 0
CONTEXT: ffffd0002178cd90 -- (.cxr 0xffffd0002178cd90)
rax=00000000f0014000 rbx=ffffe0001e8b9000 rcx=0000000000000000
rdx=fffff801bc068000 rsi=0000000000001000 rdi=ffffe0002a099550
rip=fffff801bc0b6d5b rsp=ffffd0002178d7c0 rbp=000000000ffff000
r8=0000000000001000 r9=0000000010000000 r10=0000000000001000
r11=000000000ffff000 r12=0000000010000000 r13=ffffe00023a81c80
r14=000000000ffff000 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00200286
AndroidKernelX64+0x4ed5b:
fffff801`bc0b6d5b cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd000`2178d7c0 ffffe000`2a099550 : ffffe000`1e8b9000 ffffe000`1e8b9000 fffff801`ffffffff ffffe000`21a2c490 : AndroidKernelX64+0x4ed5b
ffffd000`2178d7c8 ffffe000`1e8b9000 : ffffe000`1e8b9000 fffff801`ffffffff ffffe000`21a2c490 00000000`00222000 : 0xffffe000`2a099550
ffffd000`2178d7d0 ffffe000`1e8b9000 : fffff801`ffffffff ffffe000`21a2c490 00000000`00222000 00000000`00557b50 : 0xffffe000`1e8b9000
ffffd000`2178d7d8 fffff801`ffffffff : ffffe000`21a2c490 00000000`00222000 00000000`00557b50 ffffe000`226b8700 : 0xffffe000`1e8b9000
ffffd000`2178d7e0 ffffe000`21a2c490 : 00000000`00222000 00000000`00557b50 ffffe000`226b8700 00000000`00222000 : 0xfffff801`ffffffff
ffffd000`2178d7e8 00000000`00222000 : 00000000`00557b50 ffffe000`226b8700 00000000`00222000 00000000`00557b50 : 0xffffe000`21a2c490
ffffd000`2178d7f0 00000000`00557b50 : ffffe000`226b8700 00000000`00222000 00000000`00557b50 00000000`00000000 : 0x222000
ffffd000`2178d7f8 ffffe000`226b8700 : 00000000`00222000 00000000`00557b50 00000000`00000000 ffffe000`226b8700 : 0x557b50
ffffd000`2178d800 00000000`00222000 : 00000000`00557b50 00000000`00000000 ffffe000`226b8700 00000000`000000db : 0xffffe000`226b8700
ffffd000`2178d808 00000000`00557b50 : 00000000`00000000 ffffe000`226b8700 00000000`000000db fffff801`bc11f16d : 0x222000
ffffd000`2178d810 00000000`00000000 : ffffe000`226b8700 00000000`000000db fffff801`bc11f16d ffffd000`2178d950 : 0x557b50
SYMBOL_NAME: AndroidKernelX64+4ed5b
MODULE_NAME: AndroidKernelX64
IMAGE_NAME: AndroidKernelX64.sys
STACK_COMMAND: .cxr 0xffffd0002178cd90 ; kb
BUCKET_ID_FUNC_OFFSET: 4ed5b
FAILURE_BUCKET_ID: 0x3B_80000003_AndroidKernelX64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {4c6e4447-626e-1920-83c9-302fc6764f8f}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005002, The subtype of the BugCheck.
Arg2: fffff58010804000
Arg3: 0000000000029b24
Arg4: 00e03d366ffffffe
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12321
Key : Analysis.Init.CPU.mSec
Value: 1109
Key : Analysis.Init.Elapsed.mSec
Value: 2334
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081121-21406-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 5002
BUGCHECK_P2: fffff58010804000
BUGCHECK_P3: 29b24
BUGCHECK_P4: e03d366ffffffe
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd001`675b98f8 fffff801`1de17d49 : 00000000`0000001a 00000000`00005002 fffff580`10804000 00000000`00029b24 : nt!KeBugCheckEx
ffffd001`675b9900 fffff801`1dd34578 : ffffe000`00000000 00000000`00000002 00000000`00000002 ffffd001`675b99c0 : nt! ?? ::FNODOBFM::`string'+0x31e99
ffffd001`675b9960 fffff801`1dcdd030 : 00000000`00000001 00000000`1d667000 ffffd001`675b9c40 fffff680`000eb338 : nt!MiResolveDemandZeroFault+0x428
ffffd001`675b9a80 fffff801`1dddfc2f : 00000000`00000001 00000000`00000086 00000000`00000001 00000000`89f15000 : nt!MmAccessFault+0x4e0
ffffd001`675b9c40 00000000`aa875e85 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
00000000`29362ac0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xaa875e85
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+31e99
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 31e99
FAILURE_BUCKET_ID: 0x1a_5002_nt!_??_::FNODOBFM::_string_
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {ca800c2c-630f-3b10-0692-a6eb1a088d34}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc0016759cf10, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8032a6404e8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 2202
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8442
Key : Analysis.Init.CPU.mSec
Value: 1280
Key : Analysis.Init.Elapsed.mSec
Value: 6422
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 022422-33703-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc0016759cf10
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8032a6404e8
BUGCHECK_P4: 0
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8032a56d298
GetUlongPtrFromAddress: unable to read from fffff8032a56d520
ffffc0016759cf10 Paged pool
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd0006b3547d0 -- (.trap 0xffffd0006b3547d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe000f14528f8 rbx=0000000000000000 rcx=0000000000020000
rdx=ffffc001674ad000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032a6404e8 rsp=ffffd0006b354960 rbp=000000000001e000
r8=ffffc0016759cf10 r9=ffffe000f14528f8 r10=ffffc001675ad000
r11=ffffd0006b354930 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MmHardFaultBytesRequired+0x50:
fffff803`2a6404e8 498b00 mov rax,qword ptr [r8] ds:ffffc001`6759cf10=????????????????
Resetting default scope
STACK_TEXT:
ffffd000`6b354568 fffff803`2a388bd2 : 00000000`00000050 ffffc001`6759cf10 00000000`00000000 ffffd000`6b3547d0 : nt!KeBugCheckEx
ffffd000`6b354570 fffff803`2a2622b9 : 00000000`00000000 ffffe000`ed9b4900 ffffd000`6b3547d0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x1dd22
ffffd000`6b354610 fffff803`2a364c2f : 00000000`00000000 00000000`0000001e ffffe000`00000000 ffffe000`ee5e5880 : nt!MmAccessFault+0x769
ffffd000`6b3547d0 fffff803`2a6404e8 : 00000000`0001dfe2 00000000`00000000 00000000`0000001e 00000000`0001e000 : nt!KiPageFault+0x12f
ffffd000`6b354960 fffff803`2a2c04e9 : 00000000`0001dfe2 ffffe000`ef289600 ffffe000`f1586df0 00000000`00000001 : nt!MmHardFaultBytesRequired+0x50
ffffd000`6b354990 fffff803`2a64030f : 00000000`c00000d8 00000000`0003e000 ffffe000`ef289600 ffffd000`6b354a80 : nt!CcFetchDataForRead+0x71
ffffd000`6b3549e0 fffff803`2a259423 : ffffe000`ef289600 00000000`1dfe2000 00000000`0001e000 00000000`00000005 : nt!CcMapAndCopyFromCache+0xc7
ffffd000`6b354a70 fffff803`2a256d57 : 01d829b1`09d5d700 ffffe000`eedd0520 01d829b1`09d5d700 ffffe000`eedd0520 : nt!CcPerformReadAhead+0x3a3
ffffd000`6b354be0 fffff803`2a2a638c : fffff800`3dde6b00 ffffe000`ee5e5900 fffff803`2a4f23b0 00000000`00000000 : nt!CcWorkerThread+0x28b
ffffd000`6b354c90 fffff803`2a30bc70 : 488d74ff`38830018 ffffe000`ee5e5880 00000000`00000080 ffffe000`ee5e5880 : nt!ExpWorkerThread+0x28c
ffffd000`6b354d40 fffff803`2a360fc6 : ffffd000`6af8e180 ffffe000`ee5e5880 ffffe000`eda77040 415f41e3`8b49307b : nt!PspSystemThreadStartup+0x58
ffffd000`6b354da0 00000000`00000000 : ffffd000`6b355000 ffffd000`6b34f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: nt!MmHardFaultBytesRequired+50
MODULE_NAME: nt
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 50
FAILURE_BUCKET_ID: AV_R_(null)_nt!MmHardFaultBytesRequired
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {b90cb2f2-5667-6228-98ca-83c88a2b972f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff80095269d5b, Address of the instruction which caused the BugCheck
Arg3: ffffd000fe553d90, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for AndroidKernelX64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1937
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12166
Key : Analysis.Init.CPU.mSec
Value: 1140
Key : Analysis.Init.Elapsed.mSec
Value: 2436
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
FILE_IN_CAB: 081021-24078-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff80095269d5b
BUGCHECK_P3: ffffd000fe553d90
BUGCHECK_P4: 0
CONTEXT: ffffd000fe553d90 -- (.cxr 0xffffd000fe553d90)
rax=00000000f0010000 rbx=ffffe00165000000 rcx=0000000000000000
rdx=fffff8009521b000 rsi=0000000000001000 rdi=ffffe0016d041b90
rip=fffff80095269d5b rsp=ffffd000fe5547c0 rbp=000000000ffff000
r8=0000000000001000 r9=0000000010000000 r10=0000000000001000
r11=000000000ffff000 r12=0000000010000000 r13=ffffe0016d1b1460
r14=000000000ffff000 r15=ffffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00200286
AndroidKernelX64+0x4ed5b:
fffff800`95269d5b cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AndroidProcess
STACK_TEXT:
ffffd000`fe5547c0 ffffe001`6d041b90 : ffffe001`65000000 ffffe001`65000000 00000000`000004f7 ffffd000`fe5547ac : AndroidKernelX64+0x4ed5b
ffffd000`fe5547c8 ffffe001`65000000 : ffffe001`65000000 00000000`000004f7 ffffd000`fe5547ac 00000000`00222000 : 0xffffe001`6d041b90
ffffd000`fe5547d0 ffffe001`65000000 : 00000000`000004f7 ffffd000`fe5547ac 00000000`00222000 00000000`002b1730 : 0xffffe001`65000000
ffffd000`fe5547d8 00000000`000004f7 : ffffd000`fe5547ac 00000000`00222000 00000000`002b1730 ffffe001`6d5d3830 : 0xffffe001`65000000
ffffd000`fe5547e0 ffffd000`fe5547ac : 00000000`00222000 00000000`002b1730 ffffe001`6d5d3830 00000000`00222000 : 0x4f7
ffffd000`fe5547e8 00000000`00222000 : 00000000`002b1730 ffffe001`6d5d3830 00000000`00222000 00000000`002b1730 : 0xffffd000`fe5547ac
ffffd000`fe5547f0 00000000`002b1730 : ffffe001`6d5d3830 00000000`00222000 00000000`002b1730 00000000`00000000 : 0x222000
ffffd000`fe5547f8 ffffe001`6d5d3830 : 00000000`00222000 00000000`002b1730 00000000`00000000 ffffe001`6d5d3830 : 0x2b1730
ffffd000`fe554800 00000000`00222000 : 00000000`002b1730 00000000`00000000 ffffe001`6d5d3830 00000000`000000db : 0xffffe001`6d5d3830
ffffd000`fe554808 00000000`002b1730 : 00000000`00000000 ffffe001`6d5d3830 00000000`000000db fffff800`952d216d : 0x222000
ffffd000`fe554810 00000000`00000000 : ffffe001`6d5d3830 00000000`000000db fffff800`952d216d ffffd000`fe554950 : 0x2b1730
SYMBOL_NAME: AndroidKernelX64+4ed5b
MODULE_NAME: AndroidKernelX64
IMAGE_NAME: AndroidKernelX64.sys
STACK_COMMAND: .cxr 0xffffd000fe553d90 ; kb
BUCKET_ID_FUNC_OFFSET: 4ed5b
FAILURE_BUCKET_ID: 0x3B_80000003_AndroidKernelX64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {4c6e4447-626e-1920-83c9-302fc6764f8f}
Followup: MachineOwner
---------