bt stack trace for thread 1054 "mountvolume" kernel stack: 0x84b28000 to 0x84b2c000 user stack: 0x7efef000 to 0x7ffef000 frame caller :function + offset 0 84b2b90c (+ 48) 800669d0 invoke_command_trampoline(0x84b2b9a4) + 0x001c 1 84b2b93c (+ 12) 800df10b :arch_debug_call_with_fault_handler + 0x001b 2 84b2b948 (+ 48) 8006586c :debug_call_with_fault_handler + 0x0054 3 84b2b978 (+ 64) 80066c29 :invoke_debugger_command + 0x00b9 4 84b2b9b8 (+ 64) 80066a55 invoke_pipe_segment(debugger_command_pipe*: 0x843ea030, int32: 0, 0x0 "") + 0x0079 5 84b2b9f8 (+ 64) 80066d94 :invoke_debugger_command_pipe + 0x009c 6 84b2ba38 (+ 48) 80068790 ExpressionParser<0x84b2bae8>::_ParseCommandPipe(0x84b2bae4) + 0x0234 7 84b2ba68 (+ 64) 80067bca ExpressionParser<0x84b2bae8>::EvaluateCommand(0x8012ac60 "bt", 0x84b2bae4) + 0x02ba 8 84b2baa8 (+ 224) 80069ba4 :evaluate_debug_command + 0x0080 9 84b2bb88 (+ 64) 80064886 kernel_debugger_loop(0x84b2bc68 "vm_page_fault: unhandled page fault in kernel space at 0xdeadbeef, ip 0x8009077e ", int32: 0) + 0x0276 10 84b2bbc8 (+ 48) 80064ada kernel_debugger_internal(0x84b2bc68 "vm_page_fault: unhandled page fault in kernel space at 0xdeadbeef, ip 0x8009077e ", int32: 0) + 0x0042 11 84b2bbf8 (+ 48) 80065967 :kernel_debugger + 0x0023 12 84b2bc28 (+ 192) 80065939 :panic + 0x0029 13 84b2bce8 (+ 64) 800cbe22 :vm_page_fault + 0x013a 14 84b2bd28 (+ 80) 800dba52 page_fault_exception(iframe*: 0x84b2bd84) + 0x0176 15 84b2bd78 (+ 12) 800df4ad :int_bottom + 0x003d kernel iframe at 0x84b2bd84 (end = 0x84b2bdd4) eax 0xdeadbeef ebx 0x12 ecx 0x84b2be90 edx 0x0 esi 0x13 edi 0x81409870 ebp 0x84b2bdd4 esp 0x84b2bdb8 eip 0x8009077e eflags 0x210293 vector: 0xe, error code: 0x0 16 84b2bd84 (+ 80) 8009077e BPrivate::DiskDevice::KPartition<0xdeadbeef>::ID(BPrivate::DiskDevice::KPartition: 0x84b2be00) + 0x0006 17 84b2bdd4 (+ 64) 80094a8e [*** READ FAULT at 0xffffffff, pc: 0x800ed41b ***] kdebug>