Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012011-18142-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`04607000 PsLoadedModuleList = 0xfffff800`04844e50
Debug session time: Thu Jan 20 16:01:45.173 2011 (UTC - 5:00)
System Uptime: 0 days 9:32:41.015
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 18, {0, fffffa8009119a50, 2, fffffa8009119a1f}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+46411 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: fffffa8009119a50, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: fffffa8009119a1f, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This bugcheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the object’s reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x18
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000460efdc to fffff80004677740
STACK_TEXT:
fffff880`05c77a38 fffff800`0460efdc : 00000000`00000018 00000000`00000000 fffffa80`09119a50 00000000`00000002 : nt!KeBugCheckEx
fffff880`05c77a40 fffff800`046672f0 : 00000000`00000002 fffffa80`0ba7fca0 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x46411
fffff880`05c77aa0 fffff800`0466ad1c : fffffa80`0bbd1e10 00000000`00000011 fffffa80`0bbd1e10 fffff800`00000000 : nt!CcDeleteSharedCacheMap+0x1bc
fffff880`05c77b10 fffff800`0466b520 : fffff880`05c77b00 fffff880`05c77c18 00000000`00000000 fffff800`00000000 : nt!CcWriteBehind+0x5bc
fffff880`05c77bc0 fffff800`04684961 : fffffa80`06a31930 fffff880`014ca230 fffff800`0487e140 00000000`00000002 : nt!CcWorkerThread+0x1c8
fffff880`05c77c70 fffff800`0491bc06 : fffff880`08e73650 fffffa80`06b64b60 00000000`00000080 fffffa80`06a0c890 : nt!ExpWorkerThread+0x111
fffff880`05c77d00 fffff800`04655c26 : fffff880`03115180 fffffa80`06b64b60 fffffa80`0a2ffb60 fffff880`01457a90 : nt!PspSystemThreadStartup+0x5a
fffff880`05c77d40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+46411
fffff800`0460efdc cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+46411
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+46411
BUCKET_ID: X64_0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+46411
Followup: MachineOwner
---------