Hey zusammen -
bin mit meinem Latein am Ende. Beim Einstecken von USB-Sticks gibt es immer einen Bluescreen.
Habt ihr einen Plan? Mit der Crash-Dump-Auswertung kann ich leider nichts anfangen... =(
Gruß
Alex
Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Harbour\Desktop\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03015000 PsLoadedModuleList = 0xfffff800`032586d0
Debug session time: Mon Apr 21 10:32:12.581 2014 (UTC + 2:00)
System Uptime: 0 days 0:08:25.627
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 23, {e0107, fffff880033c32a8, fffff880033c2b00, fffff88000f8f079}
*** ERROR: Module load completed but symbols could not be loaded for MfeEpePc.sys
*** ERROR: Module load completed but symbols could not be loaded for MfeEpeOpal.sys
Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+69 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
FAT_FILE_SYSTEM (23)
If you see FatExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000e0107
Arg2: fffff880033c32a8
Arg3: fffff880033c2b00
Arg4: fffff88000f8f079
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880033c32a8 -- (.exr 0xfffff880033c32a8)
ExceptionAddress: fffff88000f8f079 (partmgr!PmGlobalDispatch+0x0000000000000069)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: fffff880033c2b00 -- (.cxr 0xfffff880033c2b00;r)
rax=0000000000000000 rbx=fffffa8009adca60 rcx=fffffa8005379b90
rdx=fffffa8009adca60 rsi=fffffa8009adcfb0 rdi=fffffa8005379ce0
rip=fffff88000f8f079 rsp=fffff880033c34e0 rbp=fffffa8005379ce0
r8=0000000000000003 r9=fffff88000f91560 r10=fffff6fb7dbf5000
r11=0000000000000000 r12=fffffa8005379ce0 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
partmgr!PmGlobalDispatch+0x69:
fffff880`00f8f079 48833800 cmp qword ptr [rax],0 ds:002b:00000000`00000000=????????????????
Last set context:
rax=0000000000000000 rbx=fffffa8009adca60 rcx=fffffa8005379b90
rdx=fffffa8009adca60 rsi=fffffa8009adcfb0 rdi=fffffa8005379ce0
rip=fffff88000f8f079 rsp=fffff880033c34e0 rbp=fffffa8005379ce0
r8=0000000000000003 r9=fffff88000f91560 r10=fffff6fb7dbf5000
r11=0000000000000000 r12=fffffa8005379ce0 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
partmgr!PmGlobalDispatch+0x69:
fffff880`00f8f079 48833800 cmp qword ptr [rax],0 ds:002b:00000000`00000000=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: 0000000000000000
FOLLOWUP_IP:
partmgr!PmGlobalDispatch+69
fffff880`00f8f079 48833800 cmp qword ptr [rax],0
FAULTING_IP:
partmgr!PmGlobalDispatch+69
fffff880`00f8f079 48833800 cmp qword ptr [rax],0
BUGCHECK_STR: 0x23
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
LOCK_ADDRESS: fffff8000328ebe0 -- (!locks fffff8000328ebe0)
Resource @ nt!PiEngineLock (0xfffff8000328ebe0) Exclusively owned
Contention Count = 14
NumberOfExclusiveWaiters = 1
Threads: fffffa8003fd3b50-01<*>
Threads Waiting On Exclusive Access:
fffffa8003fd3660
1 total locks, 1 locks currently held
PNP_TRIAGE:
Lock address : 0xfffff8000328ebe0
Thread Count : 1
Thread address: 0xfffffa8003fd3b50
Thread wait : 0x7e9b
LAST_CONTROL_TRANSFER: from fffff88004a01d82 to fffff8000308abc0
STACK_TEXT:
fffff880`033c34e0 fffff800`033ab699 : fffffa80`05379b90 fffff880`033c3628 fffffa80`62747346 00000000`000007ff : partmgr!PmGlobalDispatch+0x69
fffff880`033c3510 fffff800`033ab5d6 : fffffa80`000003e6 fffffa80`0a061460 00000000`00000000 00000000`000007ff : nt!FstubReadSector+0x79
fffff880`033c3590 fffff800`033ab6f5 : fffffa80`05379ce0 fffffa80`05379ce0 fffff880`033c3628 fffffa80`05379ce0 : nt!FstubDetectPartitionStyle+0x22
fffff880`033c35c0 fffff880`00f91512 : fffffa80`05379ce0 fffffa80`0a2ad3e0 fffffa80`0a2ad3e0 fffffa80`0a061460 : nt!IoReadPartitionTableEx+0x2d
fffff880`033c35f0 fffff880`00f9d5a6 : fffffa80`0a2a5000 fffffa80`00000000 fffffa80`0a2a5040 fffffa80`0a2ad900 : partmgr!PmGetDriveLayoutEx+0x5d2
fffff880`033c36f0 fffff880`00f91d50 : 00000000`ef000000 fffffa80`0a2ad930 fffffa80`05379d48 fffffa80`05379b90 : partmgr!PmIoctlGetPartitionInfoEx+0xa6
fffff880`033c3740 fffff880`04a15512 : 00000000`00070048 00000000`00070048 fffff800`0328f9f0 fffffa80`054bf000 : partmgr! ?? ::FNODOBFM::`string'+0xbeb
fffff880`033c37a0 fffff880`04a2099d : 00000000`00000000 fffffa80`0a2fcef0 00000000`00000000 fffffa80`054bf0d0 : fastfat!FatPerformDevIoCtrl+0xa2
fffff880`033c3830 fffff880`04a207e7 : fffffa80`00000030 fffffa80`098dc010 fffffa80`0a8e75c0 00000000`00000000 : fastfat!FatMountVolume+0x181
fffff880`033c3a70 fffff880`04a20740 : fffffa80`04284830 fffffa80`04c8ae01 fffffa80`04c8ae01 00000000`00000001 : fastfat!FatCommonFileSystemControl+0x57
fffff880`033c3aa0 fffff880`0118450c : fffffa80`04b219b0 fffffa80`04284830 00000000`00000001 fffffa80`04c8ae30 : fastfat!FatFsdFileSystemControl+0xac
fffff880`033c3ae0 fffff880`0117f971 : fffffa80`06fcf6d0 00000000`00000000 fffffa80`0ad58040 fffffa80`04c8ae30 : fltmgr!FltpFsControlMountVolume+0x28c
fffff880`033c3bb0 fffff800`032f64af : fffffa80`06fcf6d0 00000000`00000000 fffffa80`06fcf6d0 fffffa80`04284830 : fltmgr!FltpFsControl+0x101
fffff880`033c3c10 fffff800`0347d596 : fffffa80`0ad0c790 fffffa80`0535de00 00000000`00000001 fffffa80`0535de00 : nt!IopMountVolume+0x28f
fffff880`033c3cd0 fffff880`00fd575f : 00000000`00000000 00000000`80000016 00000000`00000000 00000000`00000000 : nt!IoVerifyVolume+0x176
fffff880`033c3d60 fffff880`00fd57db : fffffa80`0ad0c790 00000000`00000000 00000000`00000000 00000000`002d1080 : MfeEpePc+0x875f
fffff880`033c3e00 fffff880`00fd104a : 00000000`00000000 fffff800`0321a588 fffffa80`052f8c88 00000000`00000801 : MfeEpePc+0x87db
fffff880`033c3e60 fffff880`00fd29bb : fffffa80`0ad0c8e0 fffffa80`0ad045a0 00000000`00000000 fffffa80`0ae468c0 : MfeEpePc+0x404a
fffff880`033c4090 fffff880`00fd2bef : fffffa80`0ad045a0 00000000`00000000 fffffa80`0ae46770 fffffa80`0ae468c0 : MfeEpePc+0x59bb
fffff880`033c40f0 fffff880`01680820 : fffffa80`0ad04aa8 00000000`00000000 fffffa80`0ad04ae0 fffffa80`0ad04a98 : MfeEpePc+0x5bef
fffff880`033c4150 fffff880`01680a04 : fffffa80`0a76ed80 fffffa80`0ad045a0 fffffa80`03fd3b50 fffff800`033d4f0e : MfeEpeOpal+0xc820
fffff880`033c41e0 fffff880`01680540 : fffffa80`0a76ed80 fffffa80`0ad045a0 00000000`00000000 fffffa80`0a76ed80 : MfeEpeOpal+0xca04
fffff880`033c4470 fffff800`033ad759 : fffffa80`0a76ed80 fffffa80`0ad045a0 00000000`00000000 00000000`00000000 : MfeEpeOpal+0xc540
fffff880`033c44d0 fffff880`00f94a94 : fffffa80`0ad045a0 fffffa80`05379ce0 fffffa80`04025c00 00000000`00000801 : nt!IoForwardIrpSynchronously+0x75
fffff880`033c4530 fffff880`00f9e32a : 00000000`00000000 fffffa80`0ad045a0 fffffa80`0ad045a0 fffffa80`05379b90 : partmgr!PmStartDevice+0x74
fffff880`033c4600 fffff800`0344718e : fffffa80`0ad045a0 fffffa80`0ace8bd0 fffffa80`05379b90 fffff800`0318aed0 : partmgr!PmPnp+0x11a
fffff880`033c4650 fffff800`031817ad : fffffa80`0ad74b60 fffffa80`0ace8bd0 fffff800`0318aed0 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`033c4690 fffff800`03456506 : fffff800`0328e9a0 fffffa80`0461ad90 fffffa80`0ace8bd0 fffffa80`0461af38 : nt!PnpStartDevice+0x11d
fffff880`033c4750 fffff800`034567a4 : fffffa80`0461ad90 fffffa80`07bc0047 fffffa80`07bcfc50 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`033c47e0 fffff800`03479eb6 : fffffa80`0461ad90 fffffa80`07bcfc50 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`033c4810 fffff800`0347a448 : fffff800`0328c560 00000000`00000000 00000000`00000001 fffff800`032f5e08 : nt!PipProcessDevNodeTree+0x296
fffff880`033c4a80 fffff800`0318d827 : 00000001`00000003 00000000`00000000 00000000`00000001 00000000`00000000 : nt!PiProcessReenumeration+0x98
fffff880`033c4ad0 fffff800`03094261 : fffff800`0318d500 fffffa80`03fd3b01 00000000`00000000 fffffa80`03fd3b50 : nt!PnpDeviceActionWorker+0x327
fffff880`033c4b70 fffff800`033272ea : a8699af7`9fd28b49 fffffa80`03fd3b50 00000000`00000080 fffffa80`03f5a9e0 : nt!ExpWorkerThread+0x111
fffff880`033c4c00 fffff800`0307b8e6 : fffff880`031d5180 fffffa80`03fd3b50 fffff880`031dffc0 1ee0f364`4d342d06 : nt!PspSystemThreadStartup+0x5a
fffff880`033c4c40 00000000`00000000 : fffff880`033c5000 fffff880`033bf000 fffff880`033c2ee0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: partmgr!PmGlobalDispatch+69
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4f641bc1
STACK_COMMAND: .cxr 0xfffff880033c2b00 ; kb
FAILURE_BUCKET_ID: X64_0x23_partmgr!PmGlobalDispatch+69
BUCKET_ID: X64_0x23_partmgr!PmGlobalDispatch+69
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x23_partmgr!pmglobaldispatch+69
FAILURE_ID_HASH: {b76574a6-c4e5-03da-18c1-586103fe779c}
Followup: MachineOwner
---------
bin mit meinem Latein am Ende. Beim Einstecken von USB-Sticks gibt es immer einen Bluescreen.
Habt ihr einen Plan? Mit der Crash-Dump-Auswertung kann ich leider nichts anfangen... =(
Gruß
Alex
Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Harbour\Desktop\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03015000 PsLoadedModuleList = 0xfffff800`032586d0
Debug session time: Mon Apr 21 10:32:12.581 2014 (UTC + 2:00)
System Uptime: 0 days 0:08:25.627
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 23, {e0107, fffff880033c32a8, fffff880033c2b00, fffff88000f8f079}
*** ERROR: Module load completed but symbols could not be loaded for MfeEpePc.sys
*** ERROR: Module load completed but symbols could not be loaded for MfeEpeOpal.sys
Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+69 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
FAT_FILE_SYSTEM (23)
If you see FatExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000e0107
Arg2: fffff880033c32a8
Arg3: fffff880033c2b00
Arg4: fffff88000f8f079
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880033c32a8 -- (.exr 0xfffff880033c32a8)
ExceptionAddress: fffff88000f8f079 (partmgr!PmGlobalDispatch+0x0000000000000069)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: fffff880033c2b00 -- (.cxr 0xfffff880033c2b00;r)
rax=0000000000000000 rbx=fffffa8009adca60 rcx=fffffa8005379b90
rdx=fffffa8009adca60 rsi=fffffa8009adcfb0 rdi=fffffa8005379ce0
rip=fffff88000f8f079 rsp=fffff880033c34e0 rbp=fffffa8005379ce0
r8=0000000000000003 r9=fffff88000f91560 r10=fffff6fb7dbf5000
r11=0000000000000000 r12=fffffa8005379ce0 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
partmgr!PmGlobalDispatch+0x69:
fffff880`00f8f079 48833800 cmp qword ptr [rax],0 ds:002b:00000000`00000000=????????????????
Last set context:
rax=0000000000000000 rbx=fffffa8009adca60 rcx=fffffa8005379b90
rdx=fffffa8009adca60 rsi=fffffa8009adcfb0 rdi=fffffa8005379ce0
rip=fffff88000f8f079 rsp=fffff880033c34e0 rbp=fffffa8005379ce0
r8=0000000000000003 r9=fffff88000f91560 r10=fffff6fb7dbf5000
r11=0000000000000000 r12=fffffa8005379ce0 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
partmgr!PmGlobalDispatch+0x69:
fffff880`00f8f079 48833800 cmp qword ptr [rax],0 ds:002b:00000000`00000000=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: 0000000000000000
FOLLOWUP_IP:
partmgr!PmGlobalDispatch+69
fffff880`00f8f079 48833800 cmp qword ptr [rax],0
FAULTING_IP:
partmgr!PmGlobalDispatch+69
fffff880`00f8f079 48833800 cmp qword ptr [rax],0
BUGCHECK_STR: 0x23
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
LOCK_ADDRESS: fffff8000328ebe0 -- (!locks fffff8000328ebe0)
Resource @ nt!PiEngineLock (0xfffff8000328ebe0) Exclusively owned
Contention Count = 14
NumberOfExclusiveWaiters = 1
Threads: fffffa8003fd3b50-01<*>
Threads Waiting On Exclusive Access:
fffffa8003fd3660
1 total locks, 1 locks currently held
PNP_TRIAGE:
Lock address : 0xfffff8000328ebe0
Thread Count : 1
Thread address: 0xfffffa8003fd3b50
Thread wait : 0x7e9b
LAST_CONTROL_TRANSFER: from fffff88004a01d82 to fffff8000308abc0
STACK_TEXT:
fffff880`033c34e0 fffff800`033ab699 : fffffa80`05379b90 fffff880`033c3628 fffffa80`62747346 00000000`000007ff : partmgr!PmGlobalDispatch+0x69
fffff880`033c3510 fffff800`033ab5d6 : fffffa80`000003e6 fffffa80`0a061460 00000000`00000000 00000000`000007ff : nt!FstubReadSector+0x79
fffff880`033c3590 fffff800`033ab6f5 : fffffa80`05379ce0 fffffa80`05379ce0 fffff880`033c3628 fffffa80`05379ce0 : nt!FstubDetectPartitionStyle+0x22
fffff880`033c35c0 fffff880`00f91512 : fffffa80`05379ce0 fffffa80`0a2ad3e0 fffffa80`0a2ad3e0 fffffa80`0a061460 : nt!IoReadPartitionTableEx+0x2d
fffff880`033c35f0 fffff880`00f9d5a6 : fffffa80`0a2a5000 fffffa80`00000000 fffffa80`0a2a5040 fffffa80`0a2ad900 : partmgr!PmGetDriveLayoutEx+0x5d2
fffff880`033c36f0 fffff880`00f91d50 : 00000000`ef000000 fffffa80`0a2ad930 fffffa80`05379d48 fffffa80`05379b90 : partmgr!PmIoctlGetPartitionInfoEx+0xa6
fffff880`033c3740 fffff880`04a15512 : 00000000`00070048 00000000`00070048 fffff800`0328f9f0 fffffa80`054bf000 : partmgr! ?? ::FNODOBFM::`string'+0xbeb
fffff880`033c37a0 fffff880`04a2099d : 00000000`00000000 fffffa80`0a2fcef0 00000000`00000000 fffffa80`054bf0d0 : fastfat!FatPerformDevIoCtrl+0xa2
fffff880`033c3830 fffff880`04a207e7 : fffffa80`00000030 fffffa80`098dc010 fffffa80`0a8e75c0 00000000`00000000 : fastfat!FatMountVolume+0x181
fffff880`033c3a70 fffff880`04a20740 : fffffa80`04284830 fffffa80`04c8ae01 fffffa80`04c8ae01 00000000`00000001 : fastfat!FatCommonFileSystemControl+0x57
fffff880`033c3aa0 fffff880`0118450c : fffffa80`04b219b0 fffffa80`04284830 00000000`00000001 fffffa80`04c8ae30 : fastfat!FatFsdFileSystemControl+0xac
fffff880`033c3ae0 fffff880`0117f971 : fffffa80`06fcf6d0 00000000`00000000 fffffa80`0ad58040 fffffa80`04c8ae30 : fltmgr!FltpFsControlMountVolume+0x28c
fffff880`033c3bb0 fffff800`032f64af : fffffa80`06fcf6d0 00000000`00000000 fffffa80`06fcf6d0 fffffa80`04284830 : fltmgr!FltpFsControl+0x101
fffff880`033c3c10 fffff800`0347d596 : fffffa80`0ad0c790 fffffa80`0535de00 00000000`00000001 fffffa80`0535de00 : nt!IopMountVolume+0x28f
fffff880`033c3cd0 fffff880`00fd575f : 00000000`00000000 00000000`80000016 00000000`00000000 00000000`00000000 : nt!IoVerifyVolume+0x176
fffff880`033c3d60 fffff880`00fd57db : fffffa80`0ad0c790 00000000`00000000 00000000`00000000 00000000`002d1080 : MfeEpePc+0x875f
fffff880`033c3e00 fffff880`00fd104a : 00000000`00000000 fffff800`0321a588 fffffa80`052f8c88 00000000`00000801 : MfeEpePc+0x87db
fffff880`033c3e60 fffff880`00fd29bb : fffffa80`0ad0c8e0 fffffa80`0ad045a0 00000000`00000000 fffffa80`0ae468c0 : MfeEpePc+0x404a
fffff880`033c4090 fffff880`00fd2bef : fffffa80`0ad045a0 00000000`00000000 fffffa80`0ae46770 fffffa80`0ae468c0 : MfeEpePc+0x59bb
fffff880`033c40f0 fffff880`01680820 : fffffa80`0ad04aa8 00000000`00000000 fffffa80`0ad04ae0 fffffa80`0ad04a98 : MfeEpePc+0x5bef
fffff880`033c4150 fffff880`01680a04 : fffffa80`0a76ed80 fffffa80`0ad045a0 fffffa80`03fd3b50 fffff800`033d4f0e : MfeEpeOpal+0xc820
fffff880`033c41e0 fffff880`01680540 : fffffa80`0a76ed80 fffffa80`0ad045a0 00000000`00000000 fffffa80`0a76ed80 : MfeEpeOpal+0xca04
fffff880`033c4470 fffff800`033ad759 : fffffa80`0a76ed80 fffffa80`0ad045a0 00000000`00000000 00000000`00000000 : MfeEpeOpal+0xc540
fffff880`033c44d0 fffff880`00f94a94 : fffffa80`0ad045a0 fffffa80`05379ce0 fffffa80`04025c00 00000000`00000801 : nt!IoForwardIrpSynchronously+0x75
fffff880`033c4530 fffff880`00f9e32a : 00000000`00000000 fffffa80`0ad045a0 fffffa80`0ad045a0 fffffa80`05379b90 : partmgr!PmStartDevice+0x74
fffff880`033c4600 fffff800`0344718e : fffffa80`0ad045a0 fffffa80`0ace8bd0 fffffa80`05379b90 fffff800`0318aed0 : partmgr!PmPnp+0x11a
fffff880`033c4650 fffff800`031817ad : fffffa80`0ad74b60 fffffa80`0ace8bd0 fffff800`0318aed0 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`033c4690 fffff800`03456506 : fffff800`0328e9a0 fffffa80`0461ad90 fffffa80`0ace8bd0 fffffa80`0461af38 : nt!PnpStartDevice+0x11d
fffff880`033c4750 fffff800`034567a4 : fffffa80`0461ad90 fffffa80`07bc0047 fffffa80`07bcfc50 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`033c47e0 fffff800`03479eb6 : fffffa80`0461ad90 fffffa80`07bcfc50 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`033c4810 fffff800`0347a448 : fffff800`0328c560 00000000`00000000 00000000`00000001 fffff800`032f5e08 : nt!PipProcessDevNodeTree+0x296
fffff880`033c4a80 fffff800`0318d827 : 00000001`00000003 00000000`00000000 00000000`00000001 00000000`00000000 : nt!PiProcessReenumeration+0x98
fffff880`033c4ad0 fffff800`03094261 : fffff800`0318d500 fffffa80`03fd3b01 00000000`00000000 fffffa80`03fd3b50 : nt!PnpDeviceActionWorker+0x327
fffff880`033c4b70 fffff800`033272ea : a8699af7`9fd28b49 fffffa80`03fd3b50 00000000`00000080 fffffa80`03f5a9e0 : nt!ExpWorkerThread+0x111
fffff880`033c4c00 fffff800`0307b8e6 : fffff880`031d5180 fffffa80`03fd3b50 fffff880`031dffc0 1ee0f364`4d342d06 : nt!PspSystemThreadStartup+0x5a
fffff880`033c4c40 00000000`00000000 : fffff880`033c5000 fffff880`033bf000 fffff880`033c2ee0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: partmgr!PmGlobalDispatch+69
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4f641bc1
STACK_COMMAND: .cxr 0xfffff880033c2b00 ; kb
FAILURE_BUCKET_ID: X64_0x23_partmgr!PmGlobalDispatch+69
BUCKET_ID: X64_0x23_partmgr!PmGlobalDispatch+69
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x23_partmgr!pmglobaldispatch+69
FAILURE_ID_HASH: {b76574a6-c4e5-03da-18c1-586103fe779c}
Followup: MachineOwner
---------