Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD on PPTP VPN connect


05 Jun 2011   #1
raoool

Windows 7 Professional SP1 64 bit
 
 
BSOD on PPTP VPN connect

Upgraded Win7 32-bit ThinkPad SL510 to Win7 64-bit (incl format). All newest drivers; Office 2010; Sunbelt Vipre Enterprise AV; etc. etc. Use several VPN connections to clients (MS PPTP, Cisco, OpenVPN) and suddenly (yes, they'd all worked) cannot get PPTP connection. Raked thru all drivers; removed OpenVPN (based on initial crash dump analyses pointing to their tap); disabled Cisco; recreated VPN connection profiles - all to no avail. Reset IP; detached Sunbelt firewall from adapter settings (BSOD happens both wireless and wired). Ready to punt and return to 32bit but hoping someone can see something I've missed. Still crashes from 'clean boot' (RACM does not run in safe mode); disabled AV etc.

Latest crash analysis as follows (minidump attached)...


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Installers\Windows7SDK\DUMPS\MEMORY05.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`02c19000 PsLoadedModuleList = 0xfffff800`02e5e650
Debug session time: Sun Jun 5 15:07:51.241 2011 (UTC - 4:00)
System Uptime: 0 days 0:42:54.020
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {91, 2, fffffa8004aac060, 0}
*** ERROR: Module load completed but symbols could not be loaded for dne64x.sys
*** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys
*** ERROR: Module load completed but symbols could not be loaded for ipnat.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+496 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
the operating system. The only supported way to extend a kernel
mode stack is by using KeExpandKernelStackAndCallout.
Arg2: 0000000000000002
Arg3: fffffa8004aac060
Arg4: 0000000000000000
Debugging Details:
------------------

BUGCHECK_STR: 0xc4_91
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: SBAMSvc.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cf03aa to fffff80002c98d00
STACK_TEXT:
fffff800`0412c018 fffff800`02cf03aa : 00000000`000000c4 00000000`00000091 00000000`00000002 fffffa80`04aac060 : nt!KeBugCheckEx
fffff800`0412c020 fffff800`02d34995 : 00000000`00000040 fffff800`02d7f23b fffff980`00000002 fffff980`21d1efc0 : nt! ?? ::FNODOBFM::`string'+0x4874
fffff800`0412c060 fffff800`02d5283d : fffff880`09ce2000 fffff880`09ceb000 fffff800`03149140 fffff980`21d1ef02 : nt!RtlEnoughStackSpaceForStackCapture+0x15
fffff800`0412c090 fffff800`02d536db : 00000000`00000003 fffffa80`044ba598 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x4d
fffff800`0412c0c0 fffff800`0312c02c : fffffa80`044ba580 00000000`00000000 fffff980`2094af50 fffff800`02d7fa21 : nt!RtlCaptureStackBackTrace+0x4b
fffff800`0412c0f0 fffff800`0312e09a : fffff980`2094af50 fffff980`21d1efc0 00000000`00000000 00000000`00000000 : nt!ViPoolLogStackCallout+0x1c
fffff800`0412c120 fffff800`0313093a : fffff980`21d1efc0 00000000`0000ff00 fffff980`2094ae20 fffff980`2094af50 : nt!ViPoolLogStackTrace+0x8a
fffff800`0412c150 fffff800`02dc37fa : 00000000`00000040 00000000`00000000 fffff980`2094af50 fffff980`2094ae20 : nt!VfFreePoolNotification+0x4a
fffff800`0412c180 fffff880`016972e9 : 00000000`00000001 00000000`00000005 00000000`00028488 fffff800`02c80a0b : nt!ExDeferredFreePool+0xdc1
fffff800`0412c230 fffff880`01783bf6 : fffff980`2094ae20 00000000`0000ffff 00000000`00000002 00000000`00001000 : ndis!NdisFreeCloneNetBufferList+0x59
fffff800`0412c260 fffff880`0191d347 : 00000000`00000000 fffffa80`03c5f200 fffff800`0412c380 fffff800`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x496
fffff800`0412c330 fffff880`0174d36f : 00000000`00000000 fffffa80`070221a0 fffff980`2053e8d0 fffff800`0312c24c : tcpip!FlSendNetBufferListChainComplete+0x37
fffff800`0412c360 fffff880`0174e128 : fffffa80`00000000 fffff980`2094ae20 00000000`00000000 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
fffff800`0412c400 fffff880`0401b2be : fffffa80`098f8970 fffffa80`0507d530 fffffa80`098f8a08 fffffa80`058fa101 : ndis!ndisMSendCompleteX+0x188
fffff800`0412c450 fffff880`0175264e : fffff980`0126ec00 fffff980`0b7bce00 fffffa80`00000000 fffff980`0b7bce00 : dne64x+0x1b2be
fffff800`0412c4e0 fffff880`0175251d : 00000000`00000000 fffff980`0b7bce20 00000000`00000000 00000000`00000000 : ndis!ndisSendCompleteWithPause+0xde
fffff800`0412c530 fffff880`0174d36f : fffff980`00000000 fffffa80`098f8970 fffffa80`058fa1a0 00000000`00000000 : ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x9d
fffff800`0412c580 fffff880`04609eb0 : fffffa80`00000000 fffff980`0b7bce20 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
fffff800`0412c620 fffff880`04605f58 : 00000000`00000000 fffffa80`0550d800 00000000`00000000 fffff800`0312c24c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
fffff800`0412c670 fffff880`04609860 : 00000000`00000000 00000000`00000000 fffff980`0b564eb0 fffff880`01692717 : nwifi!Dot11SendCompletion+0x44
fffff800`0412c6a0 fffff880`03f1d1bb : fffff980`045ded78 fffff980`044bac00 00000000`00000000 00000000`00000000 : nwifi!Pt6SendComplete+0x28
fffff800`0412c6d0 fffff880`0174d21d : fffffa80`058fa1a0 00000000`00000000 00000000`00000000 fffff800`0412c778 : vwififlt!FilterSendNetBufferListsComplete+0x10b
fffff800`0412c720 fffff880`05841bfd : fffff980`0446ed70 00000000`00000000 fffffa80`058fa1a0 fffff980`0274ced0 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff800`0412c760 fffff880`05a8dd50 : fffff980`00000000 fffff980`0274ced0 fffff980`044b8de0 fffffa80`0a6f9ee8 : NETwNs64+0xfbfd
fffff800`0412c7b0 fffff880`0584c729 : 00000000`00000000 fffffa80`05584810 fffff880`05a8d970 fffffa80`0a6f9f88 : NETwNs64+0x25bd50
fffff800`0412c890 fffff880`058491ed : 00000000`00000070 fffffa80`0a6f9f88 fffffa80`05584810 fffff980`0446ed70 : NETwNs64+0x1a729
fffff800`0412c8f0 fffff880`05a82940 : 00000000`00000000 fffff980`0274ced0 fffff980`0446ed70 fffff800`0412ca50 : NETwNs64+0x171ed
fffff800`0412c940 fffff880`05c5bdd6 : fffff980`0274ced0 fffff980`0439cd80 fffff980`0439cd80 fffff980`0274ced0 : NETwNs64+0x250940
fffff800`0412c9f0 fffff880`0174d4f1 : fffff880`00000002 fffff980`0274ced0 fffff980`0274ced0 fffffa80`058fa1a0 : NETwNs64+0x429dd6
fffff800`0412caa0 fffff880`01690624 : 00000000`00000000 fffff980`045b6c90 00000000`00000000 00000000`00000000 : ndis!ndisMSendNBLToMiniport+0xb1
fffff800`0412cb00 fffff880`03f1d585 : fffff980`045ded78 fffff980`045ded78 fffff980`0274ced0 fffff980`045ded78 : ndis!NdisFSendNetBufferLists+0x64
fffff800`0412cb40 fffff880`03f1d650 : 00000000`00000001 fffff980`0b564eb0 fffff980`0b564eb0 00000000`00000000 : vwififlt!FilterSendNetBufferListsCommon+0x32d
fffff800`0412cbc0 fffff880`01690624 : fffff980`07cbac90 fffff980`0b564eb0 00000000`00000000 fffff980`0b564eb0 : vwififlt!FilterSendNetBufferLists+0x80
fffff800`0412cc10 fffff880`04604dc2 : fffff800`0412cd78 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisFSendNetBufferLists+0x64
fffff800`0412cc50 fffff880`04605149 : fffffa80`09000000 00000000`00000000 00000000`00000000 00000000`00000000 : nwifi!Dot11TXCompletion+0x1be
fffff800`0412ccd0 fffff880`0460a5e7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff980`0b564eb0 : nwifi!Dot11FlushIntermediateSendQueue+0xb1
fffff800`0412cd20 fffff880`0460ff67 : fffff800`0400ff02 00000000`00000000 fffff980`0b564eb0 fffff980`0b564eb0 : nwifi!MP6SendNBLInternal+0x133
fffff800`0412cd70 fffff880`01690569 : fffffa80`058fa1a0 fffff880`01690624 fffff800`00000000 00000000`00000000 : nwifi!FilterSendNetBufferLists+0x7f
fffff800`0412cda0 fffff880`016d630b : fffff980`0b7bce20 fffffa80`058fa1a0 00000000`00000001 fffff800`02d536db : ndis!ndisSendNBLToFilter+0x69
fffff800`0412ce00 fffff880`016cc4eb : fffff980`21620fc0 00000000`00000001 fffff980`0b4948d0 00000000`00000000 : ndis!ndisMSendPacketsToNetBufferLists+0xcb
fffff800`0412ce80 fffff880`01751f14 : 00000000`00000000 fffff800`0412cf58 fffff980`0b4948d0 00000000`00000000 : ndis!ndisSendPacketsWithPause+0x28b
fffff800`0412cf10 fffff880`0401a8f2 : fffff980`220aefc0 fffffa80`098f8970 fffff980`2371a3d0 fffff980`220aefc0 : ndis!ndisSendWithPause+0x64
fffff800`0412cf50 fffff880`0400b016 : fffff980`2371a3d0 00000000`00000002 fffffa80`0507d530 00000000`00000082 : dne64x+0x1a8f2
fffff800`0412cfe0 fffff880`0174fdb7 : fffffa80`070221a0 fffff800`0412d0d0 fffffa80`0507d530 00000000`00000000 : dne64x+0xb016
fffff800`0412d010 fffff880`0174de07 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`016f2110 : ndis! ?? ::FJGMBFAB::`string'+0x158c
fffff800`0412d070 fffff880`01690624 : fffff980`217c4c90 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMSendNetBufferListsToPackets+0x97
fffff800`0412d130 fffff880`03ef2199 : 00000000`00000000 fffffa80`070221a0 00000000`00000000 00000000`00000000 : ndis!NdisFSendNetBufferLists+0x64
fffff800`0412d170 fffff880`01690569 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : pacer!PcFilterSendNetBufferLists+0x29
fffff800`0412d270 fffff880`0174d5d5 : 00000000`00000000 00000000`00000000 fffffa80`070221a0 00000000`00000000 : ndis!ndisSendNBLToFilter+0x69
fffff800`0412d2d0 fffff880`019211de : 00000000`00000000 00000000`0000000e fffffa80`0a25a8e0 fffff800`03128dfe : ndis!NdisSendNetBufferLists+0x85
fffff800`0412d330 fffff880`0191e3b7 : fffff880`01a319a0 00000000`00000000 fffffa80`06e40000 00000000`01a30800 : tcpip!IppFragmentPackets+0x39e
fffff800`0412d450 fffff880`01920805 : fffff980`2094ae20 fffff980`0000005c fffffa80`676e7049 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x87
fffff800`0412d510 fffff880`0191ef43 : 00000000`e0000006 00000000`0000bb00 fffffa80`00000014 fffff800`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff800`0412d630 fffff880`019223ae : 00000000`00000000 00000000`00000000 fffff880`01a319a0 00000000`00000000 : tcpip!IppSendDatagramsCommon+0x753
fffff800`0412d900 fffff880`0735535e : 00000000`0000000c fffffa80`044b9818 00470000`00000000 fffff800`03130cc6 : tcpip!IpNlpSendDatagrams+0x3e
fffff800`0412d940 fffff880`07354b5f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ipnat+0x1535e
fffff800`0412db70 fffff880`0735542d : 00000000`00000000 fffff880`ffffffff 00000000`000000ff fffff800`0412e178 : ipnat+0x14b5f
fffff800`0412dc10 fffff880`0178dc62 : 00000000`00000117 fffffa80`06b4ac60 fffff800`0412e270 00000000`00000000 : ipnat+0x1542d
fffff800`0412dc50 fffff880`01786f0c : fffffa80`096f0004 fffff800`0412e148 fffff800`0412e270 fffff980`2090cd30 : NETIO!ProcessCallout+0x1a2
fffff800`0412dd70 fffff880`019202a5 : fffffa80`0590dd78 fffff800`0412e148 00000000`00000000 fffff980`2090cd30 : NETIO!KfdClassify+0x24c
fffff800`0412e0e0 fffff880`01920f4c : fffff800`0412e670 00000000`00000004 00000000`00000004 fffff800`02c51b22 : tcpip!Ipv4pFragmentPacketHelper+0x735
fffff800`0412e4b0 fffff880`0191e3b7 : fffff880`01a319a0 00000000`00000000 fffff800`04120004 00000000`00000003 : tcpip!IppFragmentPackets+0x10c
fffff800`0412e5d0 fffff880`01920805 : fffff800`0412e7a0 00000000`00000000 fffffa80`04aac060 fffff880`01a17178 : tcpip!IppDispatchSendPacketHelper+0x87
fffff800`0412e690 fffff880`0191ef43 : fffffa80`08e10106 00000000`0000bb00 fffffa80`00000014 00000000`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff800`0412e7b0 fffff880`01923e41 : fffff800`0412ee80 00000000`00000007 fffff880`01a319a0 fffffa80`08e10110 : tcpip!IppSendDatagramsCommon+0x753
fffff800`0412ea80 fffff880`0192a04b : fffffa80`09c56520 fffff880`01a2b101 fffff800`0412ee68 fffffa80`0000000c : tcpip!IpNlpFastSendDatagram+0x7d1
fffff800`0412ee30 fffff880`0194b6d4 : 00000000`000089eb fffff800`0412edf0 fffff880`01a2b102 00000009`07230000 : tcpip!TcpTcbHeaderSend+0x47b
fffff800`0412efe0 fffff880`01926325 : fffff880`06298000 00000000`00000000 00000000`00000000 fffff800`0412f300 : tcpip!TcpFlushDelay+0x204
fffff800`0412f0c0 fffff880`0191d137 : fffffa80`05930410 fffffa80`0593bb06 fffffa80`0000bac1 00000000`0000bac1 : tcpip!TcpPreValidatedReceive+0x3e5
fffff800`0412f190 fffff880`0191ccaa : 00000000`00000000 fffff880`01a319a0 fffff800`0412f350 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff800`0412f250 fffff880`0191c2a9 : 00000000`000005dc 00000000`00000000 00000000`00000000 fffff800`0412f340 : tcpip!IppProcessDeliverList+0x5a
fffff800`0412f2f0 fffff880`018ff17f : fffff880`01a319a0 00000000`00000000 00000000`00000000 fffff800`0412f488 : tcpip!IppReceiveHeaderBatch+0x23a
fffff800`0412f3d0 fffff880`018ff7e4 : fffff880`01a319a0 00000000`00000000 fffffa80`0590dc38 00000000`00000000 : tcpip!IppLoopbackTransmit+0x38f
fffff800`0412f480 fffff880`0191e6ba : fffffa80`0590dc38 fffffa80`080e0000 fffffa80`06e4b801 00000000`00000000 : tcpip!IppLoopbackEnqueue+0x1f5
fffff800`0412f520 fffff880`01920805 : 00000000`00000000 fffff980`00000000 fffffa80`676e7000 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x38a

STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferListChain+496
fffff880`01783bf6 488b442468 mov rax,qword ptr [rsp+68h]
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+496
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
BUCKET_ID: X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
Followup: MachineOwner
---------


My System SpecsSystem Spec
.

05 Jun 2011   #2
usasma
Microsoft MVP

 
 

Dump file blames NETIO.sys - a Windows file associated with networking.
Windows files generally aren't to blame - so errors pointing to them need further investigation.

What settings did you use for Driver Verifier? Did you verify just the 3rd party drivers - or some other settings?

Without that detail, and from the single dump file - I'd have to wonder about the outdated psadd.sys driver - which is a part of the Lenovo Parties Service Access Device Driver (SMBIOS)

For a more detailed analysis, please provide this info: http://www.sevenforums.com/crashes-d...tructions.html

Also, please update these:
OLDER DRIVERS PRESENT IN THE DUMP FILES
- Create a System Restore Point prior to doing any of this. DO NOT mess with the drivers themselves - leave the Windows\System32\drivers directory alone unless we specifically direct you to it!
- Please update these drivers from the device manufacturer's website - or uninstall them from your system. Reference links are included below.
- DO NOT use Windows Update or the Update Drivers function of Device Manager.
- Please feel free to post back about any drivers that you are having difficulty locating.
- Windows Update exceptions may be noted below for Windows drivers:
Quote:
Code:

iaStor.sys      Fri Aug 07 08:23:37 2009 (4A7C1CC9)
SbFw.sys        Mon Jul 26 20:35:35 2010 (4C4E29D7)
sbtis.sys       Mon Jul 26 20:30:54 2010 (4C4E28BE)
SBFWIM.sys      Thu Apr 15 12:26:28 2010 (4BC73E34)
psadd.sys       Mon Feb 19 13:56:37 2007 (45D9F2E5)
jmcr.sys        Sun Dec 12 22:30:31 2010 (4D059357)
SBREdrv.sys     Mon Mar 22 10:54:10 2010 (4BA78492)
dump_iaStor.sys Fri Aug 07 08:23:37 2009 (4A7C1CC9)
dne64x.sys      Mon Nov 10 20:01:24 2008 (4918D964)
ibmpmdrv.sys    Tue Nov 17 22:13:20 2009 (4B036650)
sbapifs.sys     Mon Jun 14 12:20:34 2010 (4C1656D2)
NETwNs64.sys    Wed Jan 19 05:28:52 2011 (4D36BCE4)
serscan.sys     Mon Jul 13 20:35:32 2009 (4A5BD2D4)
5U877.sys       Wed Jun 17 21:21:57 2009 (4A3996B5)
RTKVHD64.sys    Thu Feb 25 04:14:31 2010 (4B863F77)
smihlp.sys      Fri Mar 13 08:47:32 2009 (49BA55E4)
http://www.carrona.org/dvrref.html#iaStor.sys
http://www.carrona.org/dvrref.html#SbFw.sys
http://www.carrona.org/dvrref.html#sbtis.sys
http://www.carrona.org/dvrref.html#SBFWIM.sys
http://www.carrona.org/dvrref.html#psadd.sys
http://www.carrona.org/dvrref.html#jmcr.sys
http://www.carrona.org/dvrref.html#SBREdrv.sys
http://www.carrona.org/dvrref.html#dump_iaStor.sys
http://www.carrona.org/dvrref.html#dne64x.sys
http://www.carrona.org/dvrref.html#ibmpmdrv.sys
http://www.carrona.org/dvrref.html#sbapifs.sys
http://www.carrona.org/dvrref.html#NETwNs64.sys
http://www.carrona.org/dvrref.html#serscan.sys
http://www.carrona.org/dvrref.html#5U877.sys
http://www.carrona.org/dvrref.html#RTKVHD64.sys
http://www.carrona.org/dvrref.html#smihlp.sys
Don't forget to turn Driver Verifier off once we're done troubleshooting!

BSOD BUGCHECK SUMMARY
Code:

Loading Dump File [C:\Users\FUBAR\_jcgriff2_\dbug\__Kernel__\060511-23134-01.dmp]
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Debug session time: Sun Jun  5 15:07:51.241 2011 (UTC - 4:00)
System Uptime: 0 days 0:42:54.020
*** WARNING: Unable to verify timestamp for dne64x.sys
*** ERROR: Module load completed but symbols could not be loaded for dne64x.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+496 )
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
BUGCHECK_STR:  0xc4_91
DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME:  SBAMSvc.exe
FAILURE_BUCKET_ID:  X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
Bugcheck code 000000C4
Arguments 00000000`00000091 00000000`00000002 fffffa80`04aac060 00000000`00000000
BiosVersion = 6JET88WW (1.46 )
BiosReleaseDate = 04/01/2011
CPUID:        "Intel(R) Core(TM)2 Duo CPU     T6670  @ 2.20GHz"
MaxSpeed:     2200
CurrentSpeed: 2194
ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
  
  
My System SpecsSystem Spec
05 Jun 2011   #3
raoool

Windows 7 Professional SP1 64 bit
 
 

Thanks for your time and inputs. Other dumps pointed to SBFWIM.SYS - a firewall component from the AV installed. Uninstalling that (NDIS Filter attached to network adapters) solved the blue screens.
My System SpecsSystem Spec
.


06 Jun 2011   #4
usasma
Microsoft MVP

 
 

Thanks for letting us know! My next guess would've been your VPN software, followed by your wifi drivers.
I didn't see any evidence of the firewall driver causing problems, but should've suspected it simply because you're having networking issues.

Good luck!
My System SpecsSystem Spec
06 Jun 2011   #5
raoool

Windows 7 Professional SP1 64 bit
 
 

Yes, I'd stepped back removing eack of the VPN clients; reloaded WiFi drivers from both Lenovo and Intel; thought I'd eliminated the firewall issue by 'unchecking' the filter in both network adapters; but crashes didn't stop until it was actually uninstalled. Quite maddening. haven't seen this many blue screens since NT3. nothing like progress. ugh

thanks again
My System SpecsSystem Spec
06 Jun 2011   #6
usasma
Microsoft MVP

 
 

That's why we don't like to use Internet Security/Security Center applications. When they fail, they fail catastrophically - and they don't give any ready clues that they're to blame.

One time (at work) I actually took the time out to find the blame on one of these - and after 4 hours of work I managed to find one trace of an Internet Security program buried deep inside the stack of one of the system processes (using Process Explorer). That was the only clue - but it took care of the problem.

Also, disabling things usually isn't a good idea - because the device usually has to load all it's drivers before it can be disabled (if disabling through the Windows Device Manager). I prefer removing all software and then physically removing the device from the system. If you can't remove it from the system, then disable in the BIOS. If you can't do that, then you're stuck with disabling in Device Manager - but if it's software is uninstalled, it's more successful to disable an Unknown Device.

Good luck!
My System SpecsSystem Spec
Reply

 BSOD on PPTP VPN connect




Thread Tools



Similar help and support threads for2: BSOD on PPTP VPN connect
Thread Forum
WAN Miniport PPTP missing Network & Sharing
how can i connect through VPN ( PPTP ) .. what steps should i do plz ? Network & Sharing
PPTP VPN Connection won't connect 619 error Network & Sharing
How to tell if router supports PPTP for VPN connections Hardware & Devices
firefox and pptp vpn Browsers & Mail
Reg PPTP VPN in Win 7 Network & Sharing

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd

All times are GMT -5. The time now is 03:54 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App