BSOD during uninstall of CIS 3.5.57173.439 x64, on Vista Ultimate US-English , SP1, x64
Uninstall because CIS did not work properly and leaves system in absolute unsecure condition. See also:
https://forums.comodo.com/firewall_bugs/cis_3557173439_vista_x64_does_not_detect_all_active_connections-t32601.0.html
My Data:
1, CPU: Intel Q9550, Quad Core X64
2, OS: Vista Ultimate US-English , SP1, x64, with all patches available on Microsoft Update
3, Security Apps: Symantec Endpoint Protection 11 MR4, Virusscan only (no Firewall), no Windows Defender
4, How to reproduce: i didn’t because may RAID is still rebuilding
5, What’s done to resolve it: nothing yet, i’l try another uninstall after RAID rebuilding is completed
6, Configuration: Firewall in custom mode, Defense+ in Clean PC mode;
8, BSOD, see attached minidump
9, Account: Admin Account with Vista UAC enabled
Thats from WinDbg crash dump analysis:
Use !analyze -v to get detailed debugging information.
BugCheck CE, {fffffa6003b198e4, 8, fffffa6003b198e4, 0}
Loading symbols for fffffa6006bed000 cmdhlp.sys -> cmdhlp.sys *** ERROR: Module load completed but symbols could not be loaded for cmdhlp.sys Loading symbols for fffffa60
05fb4000 tdx.sys → tdx.sys
Loading symbols for fffffa60`05d81000 afd.sys → afd.sys
Probably caused by : inspect.sys ( inspect+88e4 )
Followup: MachineOwner
0: kd> !analyze -v
DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS (ce)
A driver unloaded without cancelling timers, DPCs, worker threads, etc.
The broken driver’s name is displayed on the screen.
Arguments:
Arg1: fffffa6003b198e4, memory referenced
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation
Arg3: fffffa6003b198e4, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, Mm internal code.
Debugging Details:
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002839080
fffffa6003b198e4
FAULTING_IP:
inspect+88e4
fffffa60`03b198e4 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xCE
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffffa6001dc2450 – (.trap 0xfffffa6001dc2450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=fffffa800afc3060 rcx=00000000000005bc
rdx=0000000000000000 rsi=0000000000000000 rdi=fffffa8009b4e960
rip=fffffa6003b198e4 rsp=fffffa6001dc25e8 rbp=fffffa800afc3060
r8=000000000000760e r9=fffffa800c879a11 r10=fffffa6003b198e4
r11=fffffa6001dc2728 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
<Unloaded_inspect.sys>+0x88e4:
fffffa60`03b198e4 ?? ???
Resetting default scope
IP_MODULE_UNLOADED:
inspect+88e4
fffffa60`03b198e4 ?? ???
LAST_CONTROL_TRANSFER: from fffff80002674361 to fffff80002665350
STACK_TEXT:
fffffa6001dc2358 fffff800
02674361 : 0000000000000050 fffffa60
03b198e4 0000000000000008 fffffa60
01dc2450 : nt!KeBugCheckEx
fffffa6001dc2360 fffff800
02663ed9 : 0000000000000008 00000000
00000004 0000000000000000 fffffa80
07140830 : nt!MmAccessFault+0x1371
fffffa6001dc2450 fffffa60
03b198e4 : fffffa6006bee02e fffffa80
06a09bb0 fffff8000266c7c1 00000000
00000000 : nt!KiPageFault+0x119
fffffa6001dc25e8 fffffa60
06bee02e : fffffa8006a09bb0 fffff800
0266c7c1 0000000000000000 fffffa60
012697f1 : <Unloaded_inspect.sys>+0x88e4
fffffa6001dc25f0 fffffa60
06bee929 : 0000000000000000 fffffa80
41706455 fffffa8007d4d420 00000000
00000001 : cmdhlp+0x102e
fffffa6001dc2630 fffff800
026676c5 : fffffa800d75a010 00000000
00000001 fffffa800c879860 fffffa60
05fbd5d6 : cmdhlp+0x1929
fffffa6001dc2670 fffffa60
05fb59f2 : fffffa800c879860 fffffa80
0af58800 fffffa800d75a000 fffffa80
0d75a010 : nt!IopfCompleteRequest+0x315
fffffa6001dc2730 fffffa60
05fbd686 : fffffa800c879860 fffffa80
0afc3060 fffffa800d75a010 00000000
00000034 : tdx!DbgTdxDereferenceTransportAddress+0xd2
fffffa6001dc2760 fffffa60
05fb941d : 0000000000000000 fffffa80
0afc3060 fffffa800afc31b0 fffffa80
0afa5060 : tdx!TdxDeleteTransportAddress+0x92
fffffa6001dc2790 fffffa60
06beff06 : fffffa800d75a010 fffffa80
0afc31b0 0000000000000002 00000000
00000000 : tdx!TdxTdiDispatchCleanup+0x49
fffffa6001dc27c0 fffffa60
06beff9b : fffffa800d75a010 fffffa80
0d75a128 0000000000000002 fffffa80
41786454 : cmdhlp+0x2f06
fffffa6001dc27f0 fffff800
028e42e4 : fffffa800d551c30 fffffa80
0d75a010 0000000000000000 00000000
00000013 : cmdhlp+0x2f9b
fffffa6001dc2820 fffff800
028e1950 : 0000000000000000 fffffa80
0d551c30 fffff88010d03930 00000001
656c6946 : nt!IopCloseFile+0x184
fffffa6001dc28b0 fffff800
028e1d07 : fffff88010d03930 fffffa80
00000001 fffffa80069dcc10 00000000
00000000 : nt!ObpDecrementHandleCount+0xc0
fffffa6001dc2940 fffff800
028e1ec4 : fffff88000001bc0 fffff880
00001b00 0000000000000000 00000000
00001a4c : nt!ObpCloseHandleTableEntry+0xb7
fffffa6001dc29e0 fffff800
02664df3 : fffffa8006a09bb0 fffffa60
01dc2ab0 fffffa6005da02d0 fffff800
026689ed : nt!ObpCloseHandle+0x94
fffffa6001dc2a30 fffff800
02665300 : fffffa6005da9d38 00000000
00000060 00000000c000000d 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x13
fffffa6001dc2bc8 fffffa60
05da9d38 : 0000000000000060 00000000
c000000d 0000000000000000 00000000
00000000 : nt!KiServiceLinkage
fffffa6001dc2bd0 fffffa60
05dafb71 : 0000000000000000 fffffa80
09bc6330 fffffa6005da02d0 fffff800
02784680 : afd! ?? ::NNGAKEGL::string'+0xb2c fffffa60
01dc2c60 fffffa6005d82cd7 : fffffa80
09bc6330 fffffa6005da02d0 fffffa80
06a09b00 fffff800027a28f8 : afd!AfdFreeEndpointTditl+0x21 fffffa60
01dc2c90 fffff800028cd98f : fffffa80
0b037730 fffffa800b0286b0 fffff800
027a28f8 fffffa8006a09bb0 : afd!AfdDoWork+0x67 fffffa60
01dc2cc0 fffff8000267205a : fffff800
028cd968 fffff800027a2801 fffffa80
06a09b00 0000000000000001 : nt!IopProcessWorkItem+0x27 fffffa60
01dc2cf0 fffff80002887ff3 : fffffa80
0b037730 0000000000000000 fffffa80
06a09bb0 0000000000000080 : nt!ExpWorkerThread+0x11a fffffa60
01dc2d50 fffff8000269f546 : fffffa60
01bd8180 fffffa8006a09bb0 fffffa60
01be1d40 0000000000000001 : nt!PspSystemThreadStartup+0x57 fffffa60
01dc2d80 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
inspect+88e4
fffffa60`03b198e4 ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: inspect+88e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: inspect
IMAGE_NAME: inspect.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0xCE_W_inspect+88e4
BUCKET_ID: X64_0xCE_W_inspect+88e4
Followup: MachineOwner
Thanks
Wolfgang
[attachment deleted by admin]