I get a Blue Screen 1000008e error when accessing NetWare drives on a machine with SafeBoot content encryption installed.

Dump:

Code:
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8053a902, The address that the exception occurred at
Arg3: aa15a6f0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
nt!memmove+72
8053a902 8a06            mov     al,byte ptr [esi]

TRAP_FRAME:  aa15a6f0 -- (.trap 0xffffffffaa15a6f0)
ErrCode = 00000000
eax=00000001 ebx=00000004 ecx=00000001 edx=00000001 esi=00000000 edi=aa15a799
eip=8053a902 esp=aa15a764 ebp=aa15a76c iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
nt!memmove+0x72:
8053a902 8a06            mov     al,byte ptr [esi]          ds:0023:00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  6

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  explorer.exe

LAST_CONTROL_TRANSFER:  from aa8f8565 to 8053a902

STACK_TEXT:  
aa15a76c aa8f8565 aa15a799 00000000 00000004 nt!memmove+0x72
WARNING: Stack unwind information not available. Following frames may be wrong.
aa15a8a0 aa930865 825897e0 00000004 00000000 nwfs+0x15565
aa15a8d8 aa91092c 825897e0 00000002 00000008 nwfs+0x4d865
aa15a94c aa910b71 825897e0 aa15ac78 82165458 nwfs+0x2d92c
aa15a9e8 aa911524 825897e0 aa15ac78 82165458 nwfs+0x2db71
aa15ac50 aa911d86 825897e0 aa15ac78 00000001 nwfs+0x2e524
aa15acb8 aa9011aa 825897e0 00000000 8220a788 nwfs+0x2ed86
aa15ad70 aa902c2b 005897e0 8220a788 8220a758 nwfs+0x1e1aa
aa15adf8 804ef18f 82a04030 8212fb38 8212fb38 nwfs+0x1fc2b
aa15ae08 f83886c3 8220a758 8212fb48 82d89f38 nt!IopfCallDriver+0x31
aa15ae38 804ef18f 82a128a8 8212fb38 8212fb38 fltmgr!FltpCreate+0x1d9
aa15ae48 805831fa 82a04018 8263344c aa15afe0 nt!IopfCallDriver+0x31
aa15af28 805bf444 82a04030 00000000 826333a8 nt!IopParseDevice+0xa12
aa15afa0 805bb9d0 00000000 aa15afe0 00000240 nt!ObpLookupObjectName+0x53c
aa15aff4 80576033 00000000 00000000 69600800 nt!ObOpenObjectByName+0xea
aa15b070 80576a20 aa15b46c 00000081 aa15b4a4 nt!IopCreateFile+0x407
aa15b0b8 f838a5b9 aa15b46c 00000081 aa15b4a4 nt!IoCreateFileSpecifyDeviceObjectHint+0x52
aa15b164 f838aa28 82d892b0 829faae8 aa15b46c fltmgr!FltCreateFileEx+0x113
aa15b1a8 f829b0a5 82d892b0 829faae8 aa15b46c fltmgr!FltCreateFile+0x36
aa15b1ec f82a5dc7 82d892b0 829faae8 aa15b46c SbCe+0x50a5
aa15b4fc f8379888 8217af2c aa15b51c aa15b54c SbCe+0xfdc7
aa15b55c f837b1a7 0015b598 aa15b7d0 8218c9e8 fltmgr!FltpPerformPreCallbacks+0x2d4
aa15b574 f8387c7a 0015b598 8218c9e8 8218cac4 fltmgr!FltpPassThroughFastIo+0x3b
aa15b5b8 aa329759 8218c9e8 aa15b7d0 82a128a8 fltmgr!FltpFastIoQueryOpen+0xf4
aa15b5e8 805830fe 8218c9e8 aa15b7d0 829376d0 mfehidk!DEVICEDISPATCH::DispatchPassThrough+0xb78
aa15b6d4 805bf444 82a04030 00000000 822fcd00 nt!IopParseDevice+0x916
aa15b74c 805bb9d0 00000000 aa15b78c 00000040 nt!ObpLookupObjectName+0x53c
aa15b7a0 80576fc7 00000000 00000000 e25d9c01 nt!ObOpenObjectByName+0xea
aa15b924 8054161c 0226e3e8 0226e3c0 0226e414 nt!NtQueryAttributesFile+0xf1
aa15b924 7c90e4f4 0226e3e8 0226e3c0 0226e414 nt!KiFastCallEntry+0xfc
0226e414 00000000 00000000 00000000 00000000 0x7c90e4f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nwfs+15565
aa8f8565 ??              ???

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nwfs+15565

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nwfs

IMAGE_NAME:  nwfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  467ad97c

FAILURE_BUCKET_ID:  0x8E_nwfs+15565

BUCKET_ID:  0x8E_nwfs+15565

Followup: MachineOwner
---------
I don't know if anyone has any input or experienced similar crashes in nwfs.sys which could point to a resolution?

I just know that Novell and McAfee (SafeBoot's owners) are going to blame each other for this and neither will resolve it :(