Upon waking from hibernation, my system BSOD. Before putting it into hibernation I unloaded the minifilter I was testing. It fully unloaded. My driver is not in the stack trace (obviously because it was unloaded) but I’m pretty positive it has something to do with it because my system has never BSOD coming out of hibernation before. Here is the complete !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cc1e9a, The address that the exception occurred at
Arg3: fffff88003124618, Exception Record Address
Arg4: fffff88003123e70, Context Record Address
Debugging Details:
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!FsRtlLookupPerStreamContextInternal+7a
fffff800`02cc1e9a 48397010 cmp qword ptr [rax+10h],rsi
EXCEPTION_RECORD: fffff88003124618 – (.exr 0xfffff88003124618)
ExceptionAddress: fffff80002cc1e9a (nt!FsRtlLookupPerStreamContextInternal+0x000000000000007a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
CONTEXT: fffff88003123e70 – (.cxr 0xfffff88003123e70)
rax=0000000000000000 rbx=fffffa8009b8a810 rcx=0000000000000000
rdx=fffffa8009b8a848 rsi=fffffa80074be1f0 rdi=0000000000000000
rip=fffff80002cc1e9a rsp=fffff88003124850 rbp=0000000000000000
r8=0000000000000000 r9=fffffa8007f960b0 r10=0000000000000000
r11=fffff88003124840 r12=0000000000000000 r13=0000000000000001
r14=fffffa8008c1b5e0 r15=fffff88003124a90
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010217
nt!FsRtlLookupPerStreamContextInternal+0x7a:
fffff80002cc1e9a 48397010 cmp qword ptr [rax+10h],rsi ds:002b:00000000
00000010=???
Resetting default scope
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
READ_ADDRESS: 0000000000000010
FOLLOWUP_IP:
nt!FsRtlLookupPerStreamContextInternal+7a
fffff800`02cc1e9a 48397010 cmp qword ptr [rax+10h],rsi
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffff880010e8aae to fffff80002cc1e9a
STACK_TEXT:
fffff88003124850 fffff880
010e8aae : fffffa8008c1b860 fffffa80
074be1f0 fffffa80085ae980 fffff880
01209f33 : nt!FsRtlLookupPerStreamContextInternal+0x7a
fffff88003124890 fffff880
010e62a2 : fffffa80074be1f0 00000000
00000000 fffffa8000000001 00000000
00001000 : fltmgr!FltpGetStreamListCtrl+0x8e
fffff880031248f0 fffff880
010e7329 : fffff88003124a00 00000000
00000002 fffffa800a50f300 fffff8a0
03610400 : fltmgr!FltpPerformPreCallbacks+0x532
fffff880031249f0 fffff880
010e56c7 : fffffa80074bdb40 fffffa80
0a50f300 fffffa80050e3e40 00000000
00000000 : fltmgr!FltpPassThrough+0x2d9
fffff88003124a70 fffff800
02f773ce : fffffa8009615790 fffffa80
09a22160 fffff8a00361ba00 fffffa80
0a50f300 : fltmgr!FltpDispatch+0xb7
fffff88003124ad0 fffff800
02c82e54 : 0000000000000001 00000000
00000000 fffffa8004ec5c90 00000000
00000000 : nt!IopDeleteFile+0x11e
fffff88003124b60 fffff800
02f19a01 : 0000000000000000 00000000
00084081 fffffa8006ec8010 fffffa80
07d38a70 : nt!ObfDereferenceObject+0xd4
fffff88003124bc0 fffff800
02cc6311 : fffffa8006ec8018 00000000
00000001 0000000000000000 00000000
00000631 : nt!MiSegmentDelete+0xa1
fffff88003124c00 fffff800
02cc61d5 : 0000000000000000 00000000
00000080 fffffa8004eb6450 00000000
00000012 : nt!MiProcessDereferenceList+0x131
fffff88003124cc0 fffff800
02f1573a : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!MiDereferenceSegmentThread+0x10d
fffff88003124d40 fffff800
02c6a8e6 : fffff80002df4e80 fffffa80
04ed9040 fffff80002e02cc0 00000000
00000000 : nt!PspSystemThreadStartup+0x5a
fffff88003124d80 00000000
00000000 : fffff88003125000 fffff880
0311f000 fffff88003124500 00000000
00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!FsRtlLookupPerStreamContextInternal+7a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53b9f073
STACK_COMMAND: .cxr 0xfffff88003123e70 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!FsRtlLookupPerStreamContextInternal+7a
BUCKET_ID: X64_0x7E_nt!FsRtlLookupPerStreamContextInternal+7a
Followup: MachineOwner
0: kd> .cxr 0xfffff88003123e70 ; kb
rax=0000000000000000 rbx=fffffa8009b8a810 rcx=0000000000000000
rdx=fffffa8009b8a848 rsi=fffffa80074be1f0 rdi=0000000000000000
rip=fffff80002cc1e9a rsp=fffff88003124850 rbp=0000000000000000
r8=0000000000000000 r9=fffffa8007f960b0 r10=0000000000000000
r11=fffff88003124840 r12=0000000000000000 r13=0000000000000001
r14=fffffa8008c1b5e0 r15=fffff88003124a90
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010217
nt!FsRtlLookupPerStreamContextInternal+0x7a:
fffff80002cc1e9a 48397010 cmp qword ptr [rax+10h],rsi ds:002b:00000000
00000010=???
*** Stack trace for last set context - .thread/.cxr resets it
RetAddr : Args to Child : Call Site
fffff880010e8aae : fffffa80
08c1b860 fffffa80074be1f0 fffffa80
085ae980 fffff88001209f33 : nt!FsRtlLookupPerStreamContextInternal+0x7a fffff880
010e62a2 : fffffa80074be1f0 00000000
00000000 fffffa8000000001 00000000
00001000 : fltmgr!FltpGetStreamListCtrl+0x8e
fffff880010e7329 : fffff880
03124a00 0000000000000002 fffffa80
0a50f300 fffff8a003610400 : fltmgr!FltpPerformPreCallbacks+0x532 fffff880
010e56c7 : fffffa80074bdb40 fffffa80
0a50f300 fffffa80050e3e40 00000000
00000000 : fltmgr!FltpPassThrough+0x2d9
fffff80002f773ce : fffffa80
09615790 fffffa8009a22160 fffff8a0
0361ba00 fffffa800a50f300 : fltmgr!FltpDispatch+0xb7 fffff800
02c82e54 : 0000000000000001 00000000
00000000 fffffa8004ec5c90 00000000
00000000 : nt!IopDeleteFile+0x11e
fffff80002f19a01 : 00000000
00000000 0000000000084081 fffffa80
06ec8010 fffffa8007d38a70 : nt!ObfDereferenceObject+0xd4 fffff800
02cc6311 : fffffa8006ec8018 00000000
00000001 0000000000000000 00000000
00000631 : nt!MiSegmentDelete+0xa1
fffff80002cc61d5 : 00000000
00000000 0000000000000080 fffffa80
04eb6450 0000000000000012 : nt!MiProcessDereferenceList+0x131 fffff800
02f1573a : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!MiDereferenceSegmentThread+0x10d
fffff80002c6a8e6 : fffff800
02df4e80 fffffa8004ed9040 fffff800
02e02cc0 0000000000000000 : nt!PspSystemThreadStartup+0x5a 00000000
00000000 : fffff88003125000 fffff880
0311f000 fffff88003124500 00000000
00000000 : nt!KxStartSystemThread+0x16