Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Minidump\090622-10343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800
Debug session time: Tue Sep 6 21:11:07.114 2022 (UTC + 3:00)
System Uptime: 0 days 7:16:28.450
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800
0: kd> !analyze -v
***
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: ffffe004974c3080, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: ffffffffffffffff, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This BugCheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the object's reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5671
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 57540
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 18665
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Bugcheck.Code.DumpHeader
Value: 0x18
Key : Bugcheck.Code.Register
Value: 0x18
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 090622-10343-01.dmp
BUGCHECK_CODE: 18
BUGCHECK_P1: 0
BUGCHECK_P2: ffffe004974c3080
BUGCHECK_P3: 2
BUGCHECK_P4: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
LOCK_ADDRESS: fffff8001ec44b00 -- (!locks fffff8001ec44b00)
Resource @ nt!PiEngineLock (0xfffff8001ec44b00) Exclusively owned
Contention Count = 39
NumberOfExclusiveWaiters = 1
Threads: ffffe004a229b080-01<*>
Threads Waiting On Exclusive Access:
ffffe004993f3040
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8001ec44b00
Thread Count : 1
Thread address: 0xffffe004a229b080
Thread wait : 0x19931c
STACK_TEXT:
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
fffffb0d
SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+1f15b3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1826
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1f15b3
FAILURE_BUCKET_ID: 0x18_OVER_DEREFERENCE_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4139309c-4e9f-52f0-ac5e-4041e7a86a20}
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Minidump\090622-10343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800
1e000000 PsLoadedModuleList = 0xfffff800
1ec2a230Debug session time: Tue Sep 6 21:11:07.114 2022 (UTC + 3:00)
System Uptime: 0 days 7:16:28.450
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800
1e3f8590 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb0d
cf7ea010=00000000000000180: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: ffffe004974c3080, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: ffffffffffffffff, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This BugCheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the object's reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5671
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 57540
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 18665
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Bugcheck.Code.DumpHeader
Value: 0x18
Key : Bugcheck.Code.Register
Value: 0x18
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 090622-10343-01.dmp
BUGCHECK_CODE: 18
BUGCHECK_P1: 0
BUGCHECK_P2: ffffe004974c3080
BUGCHECK_P3: 2
BUGCHECK_P4: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
LOCK_ADDRESS: fffff8001ec44b00 -- (!locks fffff8001ec44b00)
Resource @ nt!PiEngineLock (0xfffff8001ec44b00) Exclusively owned
Contention Count = 39
NumberOfExclusiveWaiters = 1
Threads: ffffe004a229b080-01<*>
Threads Waiting On Exclusive Access:
ffffe004993f3040
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8001ec44b00
Thread Count : 1
Thread address: 0xffffe004a229b080
Thread wait : 0x19931c
STACK_TEXT:
fffffb0d
cf7ea008 fffff800
1e424913 : 0000000000000018 00000000
00000000 ffffe004974c3080 00000000
00000002 : nt!KeBugCheckExfffffb0d
cf7ea010 fffff800
1e23334e : ffffe00493e8f670 ffffde0b
29b75c00 0000000000000000 00000000
00000000 : nt!ObfDereferenceObjectWithTag+0x1f15b3fffffb0d
cf7ea050 fffff800
1e36da34 : ffffe00493e8f670 ffffde0b
29b75c00 0000000000000001 00000000
0000000a : nt!HalPutDmaAdapter+0xefffffb0d
cf7ea080 fffff800
1e7411de : ffffe00493e8f670 ffffffff
00000000 0000000000000000 fffff800
1ec44a60 : nt!PnpRemoveLockedDeviceNode+0x248fffffb0d
cf7ea0e0 fffff800
1e740f13 : ffffe00493e8f670 fffffb0d
cf7ea160 0000000000000000 00000000
00000000 : nt!PnpDeleteLockedDeviceNode+0x4efffffb0d
cf7ea120 fffff800
1e743855 : ffffe004923cddd0 00000000
00000002 ffffe004a1c1f010 00000000
00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7fffffb0d
cf7ea1a0 fffff800
1e743694 : 0000000000000000 fffffb0d
cf7ea220 ffffe004923cddd0 00000000
00000000 : nt!PipRemoveDevicesInRelationList+0x8dfffffb0d
cf7ea1f0 fffff800
1e743129 : ffffe004a1c1f010 00000000
00000001 ffffe004a1c1f010 00000000
00000008 : nt!PnpDelayedRemoveWorker+0x114fffffb0d
cf7ea230 fffff800
1e36e504 : 0000000000000008 00000000
00000001 0000000000000000 ffffe004
93e90010 : nt!PnpChainDereferenceComplete+0xfdfffffb0d
cf7ea260 fffff800
1e742446 : 0000000000000009 fffffb0d
cf7ea359 ffffbe0fb94625a0 00000000
00000001 : nt!PnpIsChainDereferenced+0xacfffffb0d
cf7ea2e0 fffff800
1e73cd67 : fffffb0dcf7ea420 ffffe004
93e90000 fffffb0dcf7ea400 ffffbe0f
00000009 : nt!PnpProcessQueryRemoveAndEject+0x28afffffb0d
cf7ea3c0 fffff800
1e7079fe : ffffbe0fcfc44110 ffffbe0f
d01a40a0 ffffe0046fcdac00 00000000
00000000 : nt!PnpProcessTargetDeviceEvent+0xebfffffb0d
cf7ea3f0 fffff800
1e2e87f5 : ffffe004a229b080 ffffe004
a229b080 ffffe0046fcdacd0 ffffe004
a1aef0f0 : nt!PnpDeviceEventWorker+0x2cefffffb0d
cf7ea470 fffff800
1e34edc5 : ffffe004a229b080 00000000
00000080 ffffe0046fcd1080 00b00050
00000000 : nt!ExpWorkerThread+0x105fffffb0d
cf7ea510 fffff800
1e3ffbe8 : ffff9780bd691180 ffffe004
a229b080 fffff8001e34ed70 00000000
00000080 : nt!PspSystemThreadStartup+0x55fffffb0d
cf7ea560 00000000
00000000 : fffffb0dcf7eb000 fffffb0d
cf7e4000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x28SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+1f15b3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1826
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1f15b3
FAILURE_BUCKET_ID: 0x18_OVER_DEREFERENCE_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4139309c-4e9f-52f0-ac5e-4041e7a86a20}
Followup: MachineOwner
---------