Hier die Auswertung des DUMP FILE.
BugCheck 4E, {2, 1af41b, 21f7ff, 8}
Probably caused by : fltmgr.sys ( fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+24f )
Followup: MachineOwner
---------
0: kd> .reload
Loading Kernel Symbols
...............................................................................................................................................................
Loading unloaded module list
.....
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000001af41b, entry in list being removed
Arg3: 000000000021f7ff, highest physical page number
Arg4: 0000000000000008, reference count of entry being removed
Debugging Details:
------------------
OVERLAPPED_MODULE: peauth
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x4E
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800030ab6be to fffff8000308a700
STACK_TEXT:
fffff880`077a93d8 fffff800`030ab6be : 00000000`0000004e 00000000`00000002 00000000`001af41b 00000000`0021f7ff : nt!KeBugCheckEx
fffff880`077a93e0 fffff800`030bc607 : fffff980`30246fd0 fffff6fc`00000000 0000007f`fffffff8 00000000`00000000 : nt!MiUnlinkPageFromLockedList+0x8e
fffff880`077a9470 fffff800`030a6d26 : 00000000`00000001 fffff980`30246fd0 00000000`00000000 fffff800`03216b40 : nt!MiResolveTransitionFault+0x167
fffff880`077a9500 fffff800`030a4cf1 : 00000000`00000000 fffff800`030a47c0 7ff00000`00000000 00000000`00000001 : nt!MiDispatchFault+0x946
fffff880`077a9610 fffff800`030887ee : 00000000`00000001 fffff980`5b37efd0 00000000`00000000 fffff980`0000001d : nt!MmAccessFault+0x8f1
fffff880`077a9770 fffff800`030b0793 : fffff800`030b0707 fffff980`7346744e fffffa80`07df2640 fffff800`030b07ee : nt!KiPageFault+0x16e
fffff880`077a9908 fffff800`030b0707 : fffff980`7346744e fffffa80`07df2640 fffff800`030b07ee fffff980`5b80cb98 : nt!PromoteNode+0x47
fffff880`077a9910 fffff800`030b08a5 : fffff980`5b37efd0 fffff880`01258470 fffff980`5ba3cf10 fffff980`5bac6a60 : nt!RebalanceNode+0x77
fffff880`077a9940 fffff880`012f77c9 : fffffa80`07df2180 fffff980`5bac6a60 fffff880`077a9bf8 fffff980`5b80ca90 : nt!RtlInsertElementGenericTableFullAvl+0x101
fffff880`077a9980 fffff880`012c23df : fffff980`5bb86e40 fffffa80`07df2180 fffff980`5bdeef40 00030000`00014a9d : Ntfs!NtfsCreateFcb+0x211
fffff880`077a9a60 fffff880`012e7845 : fffff980`5bb86e40 fffff980`28dfcbc0 fffff980`5bb86e40 fffff880`077a9bb8 : Ntfs!NtfsOpenSubdirectory+0x73
fffff880`077a9b10 fffff880`01250c0d : fffff980`5bb86e40 fffff980`5bac6a60 fffff880`0abd7a10 fffffa80`077e7b00 : Ntfs!NtfsCommonCreate+0x995
fffff880`077a9cf0 fffff800`03082587 : fffff880`0abd7980 00000000`00000000 00000000`1bbbfa68 00000000`1bbbfa80 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`077a9d20 fffff800`03082541 : 00000000`00000000 fffffa80`077e7b60 fffff880`077aa000 fffff800`0309a01a : nt!KySwitchKernelStackCallout+0x27
fffff880`0abd7850 fffff800`0309a01a : 00000000`00000007 fffffa80`077e7b60 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
fffff880`0abd7870 fffff880`01250b2f : fffff880`01250bf0 fffff880`0abd7980 fffffa80`0795c400 fffff880`012f232d : nt!KeExpandKernelStackAndCalloutEx+0x29a
fffff880`0abd7950 fffff880`012ed9c0 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff980`5bac6a60 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`0abd79b0 fffff800`03530c16 : fffffa80`07df2030 fffff980`5bac6a60 00000000`00000000 00000000`00000000 : Ntfs!NtfsFsdCreate+0x1b0
fffff880`0abd7b60 fffff880`0112823f : fffff980`5bac6fb0 fffff880`0abd7c00 fffff980`5bb1ec30 fffffa80`0795c420 : nt!IovCallDriver+0x566
fffff880`0abd7bc0 fffff880`011472b9 : fffff980`5bac6a60 fffff980`02b7c800 fffff980`5bac6a00 fffffa80`088b53a0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0abd7c50 fffff800`03530c16 : fffff980`00000060 00000000`00000002 fffffa80`0801f1c8 fffff8a0`014d6840 : fltmgr!FltpCreate+0x2a9
fffff880`0abd7d00 fffff800`0338c417 : 00000000`00000004 fffff800`033abcc0 fffffa80`07e39010 fffffa80`07f98820 : nt!IovCallDriver+0x566
fffff880`0abd7d60 fffff800`0338282f : fffffa80`088b53a0 00000000`00000000 fffffa80`07e4a010 00000000`00000000 : nt!IopParseDevice+0x5a7
fffff880`0abd7ef0 fffff800`03387a5d : fffffa80`07e4a010 fffff880`0abd8050 00000000`00000240 fffffa80`06756750 : nt!ObpLookupObjectName+0x32f
fffff880`0abd7ff0 fffff800`0338e527 : 00000000`00000000 00000000`00000001 fffff880`0114eb00 fffffa80`06d13d98 : nt!ObOpenObjectByName+0x1cd
fffff880`0abd80a0 fffff800`03331ffb : fffff880`0abd8428 fffff880`00000020 00000000`00000010 fffff880`0abd8460 : nt!IopCreateFile+0x2b7
fffff880`0abd8140 fffff880`0114943c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000020 : nt!IoCreateFileEx+0xfb
fffff880`0abd81e0 fffff880`011632b6 : fffff980`018aabe0 fffff880`0abd8428 fffff880`0abd8428 fffff880`0abd8418 : fltmgr!FltCreateFileEx2+0x18c
fffff880`0abd82f0 fffff880`0117c1e1 : 00000000`00000007 fffff880`0abd8530 fffff980`03394d60 00000000`00000000 : fltmgr!FltvCreateFileEx2+0xe6
fffff880`0abd8390 fffff800`03418b65 : fffff800`03418a01 fffff880`0abd8801 fffff880`0abd85b0 fffff980`03394d60 : fileinfo!FIPfInterfaceOpen+0x409
fffff880`0abd8510 fffff800`034e7fe7 : 00000000`00000020 ffffffff`ffe91ca0 fffff880`0abd8628 00000000`00000000 : nt!PfpOpenHandleCreate+0x115
fffff880`0abd85e0 fffff800`034e85f1 : 00000000`00000000 fffff8a0`08d25ed0 fffffa80`081f7950 fffff880`00000060 : nt!PfpFileBuildReadSupport+0xe7
fffff880`0abd86d0 fffff800`034f070e : fffff8a0`00000000 fffff8a0`00000030 fffff8a0`0000009f 00000000`00000000 : nt!PfpPrefetchFilesTrickle+0x121
fffff880`0abd87d0 fffff800`034f12a7 : 00000000`00000000 fffff880`0abd8c60 fffff880`0abd89c8 fffff8a0`00acd060 : nt!PfpPrefetchRequestPerform+0x30e
fffff880`0abd8920 fffff800`034fd87e : fffff880`0abd89c8 00000000`00000001 fffffa80`0a7df650 00000000`00000000 : nt!PfpPrefetchRequest+0x176
fffff880`0abd8990 fffff800`03501fae : 00000000`00000000 00000000`02ebf670 00000000`0000004f 00000000`00000001 : nt!PfSetSuperfetchInformation+0x1ad
fffff880`0abd8a70 fffff800`03089953 : fffffa80`077e7b60 00000000`00000000 00000000`09bd0f00 00000000`09bd0ee0 : nt!NtSetSystemInformation+0xb91
fffff880`0abd8be0 00000000`77cc0daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02ebf648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cc0daa
FOLLOWUP_IP:
fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+24f
fffff880`0112823f 49837f2000 cmp qword ptr [r15+0x20],0x0
SYMBOL_STACK_INDEX: 13
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+24f
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11f
STACK_COMMAND: kb
FAILURE_BUCKET_ID: X64_0x4E_fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+24f
BUCKET_ID: X64_0x4E_fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+24f
Followup: MachineOwner
---------