Hi,
I am getting a BSOD with my encryption mini filter driver.
This mini filter can be configured to encrypt all files being written to a particular folder.
Now when I try installing TrendMicro AV to this encrypted folder, I get the following BSOD.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {100060040, 2, 1, fffff8000169c898}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
Followup: MachineOwner
WARNING: Whitespace at start of path element
3: kd> .reload
Loading Kernel Symbols
…
…
…
Loading User Symbols
Loading unloaded module list
…
3: kd> .reload /f /i MiniFilter.sys
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000100060040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000169c898, address which referenced memory
Debugging Details:
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800018be0e8
GetUlongFromAddress: unable to read from fffff800018be198
0000000100060040 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`0169c898 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880042e4570 – (.trap 0xfffff880042e4570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80103e5488 rbx=0000000000000000 rcx=fffff88001ecc180
rdx=fffffa80103e5488 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000169c898 rsp=fffff880042e4700 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=fffff80001809880
r11=fffff880042e4790 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff8000169c898 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:00000000
00000040=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000168cbe9 to fffff8000168d640
STACK_TEXT:
fffff880042e4428 fffff800
0168cbe9 : 000000000000000a 00000001
00060040 0000000000000002 00000000
00000001 : nt!KeBugCheckEx
fffff880042e4430 fffff800
0168b860 : fffffa800f4059b0 fffff800
016a2a7c fffffa8010401250 00000001
00060000 : nt!KiBugCheckDispatch+0x69
fffff880042e4570 fffff800
0169c898 : fffffa800f4059b0 fffff880
042e4780 fffffa800f405c78 00000000
00000000 : nt!KiPageFault+0x260
fffff880042e4700 fffff800
01694823 : fffffa80104012d8 00000000
00000000 fffffa80104012d0 fffffa80
0da31748 : nt!KiTryUnwaitThread+0x28
fffff880042e4760 fffff800
01691706 : 0000000000000000 fffff880
012f96df 0000000000000000 fffff880
042e4a01 : nt!KiSignalSynchronizationObject+0x203
fffff880042e47b0 fffff800
01971d31 : fffffa8000000000 00000000
00000000 fffffa800f405900 00000000
000001dc : nt!KeSetEvent+0x106
fffff880042e4820 fffff800
0196c9bd : 0000000000000003 00000000
00000004 fffff880042e4ca0 00000000
000007ff : nt!IopQueryXxxInformation+0x161
fffff880042e48b0 fffff800
0196cec2 : fffffa8010401250 fffff880
00000000 fffff880042e4a00 00000000
03466b80 : nt!IopQueryNameInternal+0x27d
fffff880042e4950 fffff800
019652d0 : fffff880042e4bc8 fffffa80
0f8ec1e0 fffffa80103e1400 00000000
00000000 : nt!IopQueryName+0x26
fffff880042e49a0 fffff800
0196e6f9 : fffffa8010401250 00000000
03466b80 0000000000000218 fffff880
042e4af8 : nt!ObpQueryNameString+0xb0
fffff880042e4aa0 fffff800
0168c8d3 : fffffa80103e1400 00000000
02f4f5b8 fffff880042e4bc8 00000000
00000000 : nt!NtQueryObject+0x1c7
fffff880042e4bb0 00000000
772d141a : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x13
0000000002f4f598 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x772d141a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`0169c898 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
Followup: MachineOwner
3: kd> .trap 0xfffff880042e4570
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80103e5488 rbx=0000000000000000 rcx=fffff88001ecc180
rdx=fffffa80103e5488 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000169c898 rsp=fffff880042e4700 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=fffff80001809880
r11=fffff880042e4790 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff8000169c898 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:00000000
00000040=???