*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000006001, The subtype of the bugcheck.
Arg2: ffffffffc0000022
Arg3: 000002455d580000
Arg4: ffffb081859810d0
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 30506
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 19615
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 6001
BUGCHECK_P2: ffffffffc0000022
BUGCHECK_P3: 2455d580000
BUGCHECK_P4: ffffb081859810d0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffff8600`da1cb9d8 fffff802`6d49af3a : 00000000`0000001a 00000000`00006001 ffffffff`c0000022 00000245`5d580000 : nt!KeBugCheckEx
ffff8600`da1cb9e0 fffff802`6d30a2b9 : 00000000`00040000 fffff802`6d24a31a ffffb081`7ddd48d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0x15568e
ffff8600`da1cbaf0 fffff802`6d30939c : 00000000`00040000 ffff8600`da1cbb60 ffff8600`da1cbb60 ffffb081`7ddd4918 : nt!SmKmProbeAndLockAddress+0x5d
ffff8600`da1cbb20 fffff802`6d309271 : 00000000`00040000 00000000`00000004 00000245`5d580000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
ffff8600`da1cbb90 fffff802`6d317e85 : ffffb081`7da25080 00000000`00000080 fffff802`6d309210 00000000`00000001 : nt!SmKmStoreHelperWorker+0x61
ffff8600`da1cbc10 fffff802`6d3fd408 : ffffc081`d3fe3180 ffffb081`7da25080 fffff802`6d317e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8600`da1cbc60 00000000`00000000 : ffff8600`da1cc000 ffff8600`da1c6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MmStoreProbeAndLockPages+15568e
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.906
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 15568e
FAILURE_BUCKET_ID: 0x1a_6001_nt!MmStoreProbeAndLockPages
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3e15d39b-3f7d-fc20-9139-c8a8ddc08425}
Followup: MachineOwner
---------
3: kd> !error 0xc0000022
Error code: (NTSTATUS) 0xc0000022 (3221225506) - {Erişim Yok} Bir işlem bir nesneye erişmek istedi, ancak istediği erişimin hakları kendisine verilmiş değil.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8040ee9ea02, Address of the instruction which caused the bugcheck
Arg3: ffffb584ec9f6c20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7827
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 41209
Key : Analysis.Init.CPU.mSec
Value: 999
Key : Analysis.Init.Elapsed.mSec
Value: 30604
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff8040ee9ea02
BUGCHECK_P3: ffffb584ec9f6c20
BUGCHECK_P4: 0
CONTEXT: ffffb584ec9f6c20 -- (.cxr 0xffffb584ec9f6c20)
rax=0000000000000000 rbx=ffffb584ec9f76b0 rcx=0000000000000007
rdx=0000000001c2bbe8 rsi=0000000000000000 rdi=ffff91031dfe4000
rip=fffff8040ee9ea02 rsp=ffffb584ec9f7628 rbp=ffffb584ec9f7730
r8=000000000000001c r9=ffffd90e159eb080 r10=000001f1c5facbe8
r11=0000000000000be8 r12=000001f1c61ea804 r13=ffff91031dfe4000
r14=ffffb584ec9f7920 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!HvpGetCellPaged+0xa2:
fffff804`0ee9ea02 418b02 mov eax,dword ptr [r10] ds:002b:000001f1`c5facbe8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffb584`ec9f7628 fffff804`0ee20b04 : 00000000`00000060 00000000`00000004 ffffb584`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
ffffb584`ec9f7630 fffff804`0edecbc2 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284
ffffb584`ec9f7790 fffff804`0ec077b8 : 00000000`0000c2ac 000000c1`9c2fb8a8 00000000`00000000 00000267`00000000 : nt!NtQueryValueKey+0x5f2
ffffb584`ec9f7a90 00007ff8`a72acef4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c1`9c2fbb58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a72acef4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.906
STACK_COMMAND: .cxr 0xffffb584ec9f6c20 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------