BSOD on PPTP VPN connect


  1. Posts : 3
    Windows 7 Professional SP1 64 bit
       #1

    BSOD on PPTP VPN connect


    Upgraded Win7 32-bit ThinkPad SL510 to Win7 64-bit (incl format). All newest drivers; Office 2010; Sunbelt Vipre Enterprise AV; etc. etc. Use several VPN connections to clients (MS PPTP, Cisco, OpenVPN) and suddenly (yes, they'd all worked) cannot get PPTP connection. Raked thru all drivers; removed OpenVPN (based on initial crash dump analyses pointing to their tap); disabled Cisco; recreated VPN connection profiles - all to no avail. Reset IP; detached Sunbelt firewall from adapter settings (BSOD happens both wireless and wired). Ready to punt and return to 32bit but hoping someone can see something I've missed. Still crashes from 'clean boot' (RACM does not run in safe mode); disabled AV etc.

    Latest crash analysis as follows (minidump attached)...


    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\Installers\Windows7SDK\DUMPS\MEMORY05.DMP]
    Kernel Summary Dump File: Only kernel address space is available
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
    Machine Name:
    Kernel base = 0xfffff800`02c19000 PsLoadedModuleList = 0xfffff800`02e5e650
    Debug session time: Sun Jun 5 15:07:51.241 2011 (UTC - 4:00)
    System Uptime: 0 days 0:42:54.020
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
    Loading unloaded module list
    ............
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    Use !analyze -v to get detailed debugging information.
    BugCheck C4, {91, 2, fffffa8004aac060, 0}
    *** ERROR: Module load completed but symbols could not be loaded for dne64x.sys
    *** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys
    *** ERROR: Module load completed but symbols could not be loaded for ipnat.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+496 )
    Followup: MachineOwner
    ---------
    0: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
    A device driver attempting to corrupt the system has been caught. This is
    because the driver was specified in the registry as being suspect (by the
    administrator) and the kernel has enabled substantial checking of this driver.
    If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
    be among the most commonly seen crashes.
    Arguments:
    Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
    the operating system. The only supported way to extend a kernel
    mode stack is by using KeExpandKernelStackAndCallout.
    Arg2: 0000000000000002
    Arg3: fffffa8004aac060
    Arg4: 0000000000000000
    Debugging Details:
    ------------------

    BUGCHECK_STR: 0xc4_91
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    PROCESS_NAME: SBAMSvc.exe
    CURRENT_IRQL: 2
    LAST_CONTROL_TRANSFER: from fffff80002cf03aa to fffff80002c98d00
    STACK_TEXT:
    fffff800`0412c018 fffff800`02cf03aa : 00000000`000000c4 00000000`00000091 00000000`00000002 fffffa80`04aac060 : nt!KeBugCheckEx
    fffff800`0412c020 fffff800`02d34995 : 00000000`00000040 fffff800`02d7f23b fffff980`00000002 fffff980`21d1efc0 : nt! ?? ::FNODOBFM::`string'+0x4874
    fffff800`0412c060 fffff800`02d5283d : fffff880`09ce2000 fffff880`09ceb000 fffff800`03149140 fffff980`21d1ef02 : nt!RtlEnoughStackSpaceForStackCapture+0x15
    fffff800`0412c090 fffff800`02d536db : 00000000`00000003 fffffa80`044ba598 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x4d
    fffff800`0412c0c0 fffff800`0312c02c : fffffa80`044ba580 00000000`00000000 fffff980`2094af50 fffff800`02d7fa21 : nt!RtlCaptureStackBackTrace+0x4b
    fffff800`0412c0f0 fffff800`0312e09a : fffff980`2094af50 fffff980`21d1efc0 00000000`00000000 00000000`00000000 : nt!ViPoolLogStackCallout+0x1c
    fffff800`0412c120 fffff800`0313093a : fffff980`21d1efc0 00000000`0000ff00 fffff980`2094ae20 fffff980`2094af50 : nt!ViPoolLogStackTrace+0x8a
    fffff800`0412c150 fffff800`02dc37fa : 00000000`00000040 00000000`00000000 fffff980`2094af50 fffff980`2094ae20 : nt!VfFreePoolNotification+0x4a
    fffff800`0412c180 fffff880`016972e9 : 00000000`00000001 00000000`00000005 00000000`00028488 fffff800`02c80a0b : nt!ExDeferredFreePool+0xdc1
    fffff800`0412c230 fffff880`01783bf6 : fffff980`2094ae20 00000000`0000ffff 00000000`00000002 00000000`00001000 : ndis!NdisFreeCloneNetBufferList+0x59
    fffff800`0412c260 fffff880`0191d347 : 00000000`00000000 fffffa80`03c5f200 fffff800`0412c380 fffff800`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x496
    fffff800`0412c330 fffff880`0174d36f : 00000000`00000000 fffffa80`070221a0 fffff980`2053e8d0 fffff800`0312c24c : tcpip!FlSendNetBufferListChainComplete+0x37
    fffff800`0412c360 fffff880`0174e128 : fffffa80`00000000 fffff980`2094ae20 00000000`00000000 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
    fffff800`0412c400 fffff880`0401b2be : fffffa80`098f8970 fffffa80`0507d530 fffffa80`098f8a08 fffffa80`058fa101 : ndis!ndisMSendCompleteX+0x188
    fffff800`0412c450 fffff880`0175264e : fffff980`0126ec00 fffff980`0b7bce00 fffffa80`00000000 fffff980`0b7bce00 : dne64x+0x1b2be
    fffff800`0412c4e0 fffff880`0175251d : 00000000`00000000 fffff980`0b7bce20 00000000`00000000 00000000`00000000 : ndis!ndisSendCompleteWithPause+0xde
    fffff800`0412c530 fffff880`0174d36f : fffff980`00000000 fffffa80`098f8970 fffffa80`058fa1a0 00000000`00000000 : ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x9d
    fffff800`0412c580 fffff880`04609eb0 : fffffa80`00000000 fffff980`0b7bce20 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
    fffff800`0412c620 fffff880`04605f58 : 00000000`00000000 fffffa80`0550d800 00000000`00000000 fffff800`0312c24c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
    fffff800`0412c670 fffff880`04609860 : 00000000`00000000 00000000`00000000 fffff980`0b564eb0 fffff880`01692717 : nwifi!Dot11SendCompletion+0x44
    fffff800`0412c6a0 fffff880`03f1d1bb : fffff980`045ded78 fffff980`044bac00 00000000`00000000 00000000`00000000 : nwifi!Pt6SendComplete+0x28
    fffff800`0412c6d0 fffff880`0174d21d : fffffa80`058fa1a0 00000000`00000000 00000000`00000000 fffff800`0412c778 : vwififlt!FilterSendNetBufferListsComplete+0x10b
    fffff800`0412c720 fffff880`05841bfd : fffff980`0446ed70 00000000`00000000 fffffa80`058fa1a0 fffff980`0274ced0 : ndis!NdisMSendNetBufferListsComplete+0x6d
    fffff800`0412c760 fffff880`05a8dd50 : fffff980`00000000 fffff980`0274ced0 fffff980`044b8de0 fffffa80`0a6f9ee8 : NETwNs64+0xfbfd
    fffff800`0412c7b0 fffff880`0584c729 : 00000000`00000000 fffffa80`05584810 fffff880`05a8d970 fffffa80`0a6f9f88 : NETwNs64+0x25bd50
    fffff800`0412c890 fffff880`058491ed : 00000000`00000070 fffffa80`0a6f9f88 fffffa80`05584810 fffff980`0446ed70 : NETwNs64+0x1a729
    fffff800`0412c8f0 fffff880`05a82940 : 00000000`00000000 fffff980`0274ced0 fffff980`0446ed70 fffff800`0412ca50 : NETwNs64+0x171ed
    fffff800`0412c940 fffff880`05c5bdd6 : fffff980`0274ced0 fffff980`0439cd80 fffff980`0439cd80 fffff980`0274ced0 : NETwNs64+0x250940
    fffff800`0412c9f0 fffff880`0174d4f1 : fffff880`00000002 fffff980`0274ced0 fffff980`0274ced0 fffffa80`058fa1a0 : NETwNs64+0x429dd6
    fffff800`0412caa0 fffff880`01690624 : 00000000`00000000 fffff980`045b6c90 00000000`00000000 00000000`00000000 : ndis!ndisMSendNBLToMiniport+0xb1
    fffff800`0412cb00 fffff880`03f1d585 : fffff980`045ded78 fffff980`045ded78 fffff980`0274ced0 fffff980`045ded78 : ndis!NdisFSendNetBufferLists+0x64
    fffff800`0412cb40 fffff880`03f1d650 : 00000000`00000001 fffff980`0b564eb0 fffff980`0b564eb0 00000000`00000000 : vwififlt!FilterSendNetBufferListsCommon+0x32d
    fffff800`0412cbc0 fffff880`01690624 : fffff980`07cbac90 fffff980`0b564eb0 00000000`00000000 fffff980`0b564eb0 : vwififlt!FilterSendNetBufferLists+0x80
    fffff800`0412cc10 fffff880`04604dc2 : fffff800`0412cd78 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisFSendNetBufferLists+0x64
    fffff800`0412cc50 fffff880`04605149 : fffffa80`09000000 00000000`00000000 00000000`00000000 00000000`00000000 : nwifi!Dot11TXCompletion+0x1be
    fffff800`0412ccd0 fffff880`0460a5e7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff980`0b564eb0 : nwifi!Dot11FlushIntermediateSendQueue+0xb1
    fffff800`0412cd20 fffff880`0460ff67 : fffff800`0400ff02 00000000`00000000 fffff980`0b564eb0 fffff980`0b564eb0 : nwifi!MP6SendNBLInternal+0x133
    fffff800`0412cd70 fffff880`01690569 : fffffa80`058fa1a0 fffff880`01690624 fffff800`00000000 00000000`00000000 : nwifi!FilterSendNetBufferLists+0x7f
    fffff800`0412cda0 fffff880`016d630b : fffff980`0b7bce20 fffffa80`058fa1a0 00000000`00000001 fffff800`02d536db : ndis!ndisSendNBLToFilter+0x69
    fffff800`0412ce00 fffff880`016cc4eb : fffff980`21620fc0 00000000`00000001 fffff980`0b4948d0 00000000`00000000 : ndis!ndisMSendPacketsToNetBufferLists+0xcb
    fffff800`0412ce80 fffff880`01751f14 : 00000000`00000000 fffff800`0412cf58 fffff980`0b4948d0 00000000`00000000 : ndis!ndisSendPacketsWithPause+0x28b
    fffff800`0412cf10 fffff880`0401a8f2 : fffff980`220aefc0 fffffa80`098f8970 fffff980`2371a3d0 fffff980`220aefc0 : ndis!ndisSendWithPause+0x64
    fffff800`0412cf50 fffff880`0400b016 : fffff980`2371a3d0 00000000`00000002 fffffa80`0507d530 00000000`00000082 : dne64x+0x1a8f2
    fffff800`0412cfe0 fffff880`0174fdb7 : fffffa80`070221a0 fffff800`0412d0d0 fffffa80`0507d530 00000000`00000000 : dne64x+0xb016
    fffff800`0412d010 fffff880`0174de07 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`016f2110 : ndis! ?? ::FJGMBFAB::`string'+0x158c
    fffff800`0412d070 fffff880`01690624 : fffff980`217c4c90 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMSendNetBufferListsToPackets+0x97
    fffff800`0412d130 fffff880`03ef2199 : 00000000`00000000 fffffa80`070221a0 00000000`00000000 00000000`00000000 : ndis!NdisFSendNetBufferLists+0x64
    fffff800`0412d170 fffff880`01690569 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : pacer!PcFilterSendNetBufferLists+0x29
    fffff800`0412d270 fffff880`0174d5d5 : 00000000`00000000 00000000`00000000 fffffa80`070221a0 00000000`00000000 : ndis!ndisSendNBLToFilter+0x69
    fffff800`0412d2d0 fffff880`019211de : 00000000`00000000 00000000`0000000e fffffa80`0a25a8e0 fffff800`03128dfe : ndis!NdisSendNetBufferLists+0x85
    fffff800`0412d330 fffff880`0191e3b7 : fffff880`01a319a0 00000000`00000000 fffffa80`06e40000 00000000`01a30800 : tcpip!IppFragmentPackets+0x39e
    fffff800`0412d450 fffff880`01920805 : fffff980`2094ae20 fffff980`0000005c fffffa80`676e7049 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x87
    fffff800`0412d510 fffff880`0191ef43 : 00000000`e0000006 00000000`0000bb00 fffffa80`00000014 fffff800`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
    fffff800`0412d630 fffff880`019223ae : 00000000`00000000 00000000`00000000 fffff880`01a319a0 00000000`00000000 : tcpip!IppSendDatagramsCommon+0x753
    fffff800`0412d900 fffff880`0735535e : 00000000`0000000c fffffa80`044b9818 00470000`00000000 fffff800`03130cc6 : tcpip!IpNlpSendDatagrams+0x3e
    fffff800`0412d940 fffff880`07354b5f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ipnat+0x1535e
    fffff800`0412db70 fffff880`0735542d : 00000000`00000000 fffff880`ffffffff 00000000`000000ff fffff800`0412e178 : ipnat+0x14b5f
    fffff800`0412dc10 fffff880`0178dc62 : 00000000`00000117 fffffa80`06b4ac60 fffff800`0412e270 00000000`00000000 : ipnat+0x1542d
    fffff800`0412dc50 fffff880`01786f0c : fffffa80`096f0004 fffff800`0412e148 fffff800`0412e270 fffff980`2090cd30 : NETIO!ProcessCallout+0x1a2
    fffff800`0412dd70 fffff880`019202a5 : fffffa80`0590dd78 fffff800`0412e148 00000000`00000000 fffff980`2090cd30 : NETIO!KfdClassify+0x24c
    fffff800`0412e0e0 fffff880`01920f4c : fffff800`0412e670 00000000`00000004 00000000`00000004 fffff800`02c51b22 : tcpip!Ipv4pFragmentPacketHelper+0x735
    fffff800`0412e4b0 fffff880`0191e3b7 : fffff880`01a319a0 00000000`00000000 fffff800`04120004 00000000`00000003 : tcpip!IppFragmentPackets+0x10c
    fffff800`0412e5d0 fffff880`01920805 : fffff800`0412e7a0 00000000`00000000 fffffa80`04aac060 fffff880`01a17178 : tcpip!IppDispatchSendPacketHelper+0x87
    fffff800`0412e690 fffff880`0191ef43 : fffffa80`08e10106 00000000`0000bb00 fffffa80`00000014 00000000`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
    fffff800`0412e7b0 fffff880`01923e41 : fffff800`0412ee80 00000000`00000007 fffff880`01a319a0 fffffa80`08e10110 : tcpip!IppSendDatagramsCommon+0x753
    fffff800`0412ea80 fffff880`0192a04b : fffffa80`09c56520 fffff880`01a2b101 fffff800`0412ee68 fffffa80`0000000c : tcpip!IpNlpFastSendDatagram+0x7d1
    fffff800`0412ee30 fffff880`0194b6d4 : 00000000`000089eb fffff800`0412edf0 fffff880`01a2b102 00000009`07230000 : tcpip!TcpTcbHeaderSend+0x47b
    fffff800`0412efe0 fffff880`01926325 : fffff880`06298000 00000000`00000000 00000000`00000000 fffff800`0412f300 : tcpip!TcpFlushDelay+0x204
    fffff800`0412f0c0 fffff880`0191d137 : fffffa80`05930410 fffffa80`0593bb06 fffffa80`0000bac1 00000000`0000bac1 : tcpip!TcpPreValidatedReceive+0x3e5
    fffff800`0412f190 fffff880`0191ccaa : 00000000`00000000 fffff880`01a319a0 fffff800`0412f350 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
    fffff800`0412f250 fffff880`0191c2a9 : 00000000`000005dc 00000000`00000000 00000000`00000000 fffff800`0412f340 : tcpip!IppProcessDeliverList+0x5a
    fffff800`0412f2f0 fffff880`018ff17f : fffff880`01a319a0 00000000`00000000 00000000`00000000 fffff800`0412f488 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff800`0412f3d0 fffff880`018ff7e4 : fffff880`01a319a0 00000000`00000000 fffffa80`0590dc38 00000000`00000000 : tcpip!IppLoopbackTransmit+0x38f
    fffff800`0412f480 fffff880`0191e6ba : fffffa80`0590dc38 fffffa80`080e0000 fffffa80`06e4b801 00000000`00000000 : tcpip!IppLoopbackEnqueue+0x1f5
    fffff800`0412f520 fffff880`01920805 : 00000000`00000000 fffff980`00000000 fffffa80`676e7000 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x38a

    STACK_COMMAND: kb
    FOLLOWUP_IP:
    NETIO!NetioDereferenceNetBufferListChain+496
    fffff880`01783bf6 488b442468 mov rax,qword ptr [rsp+68h]
    SYMBOL_STACK_INDEX: a
    SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+496
    FOLLOWUP_NAME: MachineOwner
    MODULE_NAME: NETIO
    IMAGE_NAME: NETIO.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
    FAILURE_BUCKET_ID: X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
    BUCKET_ID: X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
    Followup: MachineOwner
    ---------
      My Computer


  2. Posts : 5,705
    Win7 x64 + x86
       #2

    Dump file blames NETIO.sys - a Windows file associated with networking.
    Windows files generally aren't to blame - so errors pointing to them need further investigation.

    What settings did you use for Driver Verifier? Did you verify just the 3rd party drivers - or some other settings?

    Without that detail, and from the single dump file - I'd have to wonder about the outdated psadd.sys driver - which is a part of the Lenovo Parties Service Access Device Driver (SMBIOS)

    For a more detailed analysis, please provide this info: https://www.sevenforums.com/crashes-d...tructions.html

    Also, please update these:
    OLDER DRIVERS PRESENT IN THE DUMP FILES
    - Create a System Restore Point prior to doing any of this. DO NOT mess with the drivers themselves - leave the Windows\System32\drivers directory alone unless we specifically direct you to it!
    - Please update these drivers from the device manufacturer's website - or uninstall them from your system. Reference links are included below.
    - DO NOT use Windows Update or the Update Drivers function of Device Manager.
    - Please feel free to post back about any drivers that you are having difficulty locating.
    - Windows Update exceptions may be noted below for Windows drivers:
    Code:
    
    iaStor.sys      Fri Aug 07 08:23:37 2009 (4A7C1CC9)
    SbFw.sys        Mon Jul 26 20:35:35 2010 (4C4E29D7)
    sbtis.sys       Mon Jul 26 20:30:54 2010 (4C4E28BE)
    SBFWIM.sys      Thu Apr 15 12:26:28 2010 (4BC73E34)
    psadd.sys       Mon Feb 19 13:56:37 2007 (45D9F2E5)
    jmcr.sys        Sun Dec 12 22:30:31 2010 (4D059357)
    SBREdrv.sys     Mon Mar 22 10:54:10 2010 (4BA78492)
    dump_iaStor.sys Fri Aug 07 08:23:37 2009 (4A7C1CC9)
    dne64x.sys      Mon Nov 10 20:01:24 2008 (4918D964)
    ibmpmdrv.sys    Tue Nov 17 22:13:20 2009 (4B036650)
    sbapifs.sys     Mon Jun 14 12:20:34 2010 (4C1656D2)
    NETwNs64.sys    Wed Jan 19 05:28:52 2011 (4D36BCE4)
    serscan.sys     Mon Jul 13 20:35:32 2009 (4A5BD2D4)
    5U877.sys       Wed Jun 17 21:21:57 2009 (4A3996B5)
    RTKVHD64.sys    Thu Feb 25 04:14:31 2010 (4B863F77)
    smihlp.sys      Fri Mar 13 08:47:32 2009 (49BA55E4)
    
    http://www.carrona.org/dvrref.html#iaStor.sys
    http://www.carrona.org/dvrref.html#SbFw.sys
    http://www.carrona.org/dvrref.html#sbtis.sys
    http://www.carrona.org/dvrref.html#SBFWIM.sys
    http://www.carrona.org/dvrref.html#psadd.sys
    http://www.carrona.org/dvrref.html#jmcr.sys
    http://www.carrona.org/dvrref.html#SBREdrv.sys
    http://www.carrona.org/dvrref.html#dump_iaStor.sys
    http://www.carrona.org/dvrref.html#dne64x.sys
    http://www.carrona.org/dvrref.html#ibmpmdrv.sys
    http://www.carrona.org/dvrref.html#sbapifs.sys
    http://www.carrona.org/dvrref.html#NETwNs64.sys
    http://www.carrona.org/dvrref.html#serscan.sys
    http://www.carrona.org/dvrref.html#5U877.sys
    http://www.carrona.org/dvrref.html#RTKVHD64.sys
    http://www.carrona.org/dvrref.html#smihlp.sys
    Don't forget to turn Driver Verifier off once we're done troubleshooting!

    BSOD BUGCHECK SUMMARY
    Code:
    
    Loading Dump File [C:\Users\FUBAR\_jcgriff2_\dbug\__Kernel__\060511-23134-01.dmp]
    Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
    Debug session time: Sun Jun  5 15:07:51.241 2011 (UTC - 4:00)
    System Uptime: 0 days 0:42:54.020
    *** WARNING: Unable to verify timestamp for dne64x.sys
    *** ERROR: Module load completed but symbols could not be loaded for dne64x.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+496 )
    DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
    BUGCHECK_STR:  0xc4_91
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    PROCESS_NAME:  SBAMSvc.exe
    FAILURE_BUCKET_ID:  X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
    Bugcheck code 000000C4
    Arguments 00000000`00000091 00000000`00000002 fffffa80`04aac060 00000000`00000000
    BiosVersion = 6JET88WW (1.46 )
    BiosReleaseDate = 04/01/2011
    CPUID:        "Intel(R) Core(TM)2 Duo CPU     T6670  @ 2.20GHz"
    MaxSpeed:     2200
    CurrentSpeed: 2194
    ииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииииии``
      
      
      My Computer


  3. Posts : 3
    Windows 7 Professional SP1 64 bit
    Thread Starter
       #3

    Thanks for your time and inputs. Other dumps pointed to SBFWIM.SYS - a firewall component from the AV installed. Uninstalling that (NDIS Filter attached to network adapters) solved the blue screens.
      My Computer


  4. Posts : 5,705
    Win7 x64 + x86
       #4

    Thanks for letting us know! My next guess would've been your VPN software, followed by your wifi drivers.
    I didn't see any evidence of the firewall driver causing problems, but should've suspected it simply because you're having networking issues.

    Good luck!
      My Computer


  5. Posts : 3
    Windows 7 Professional SP1 64 bit
    Thread Starter
       #5

    Yes, I'd stepped back removing eack of the VPN clients; reloaded WiFi drivers from both Lenovo and Intel; thought I'd eliminated the firewall issue by 'unchecking' the filter in both network adapters; but crashes didn't stop until it was actually uninstalled. Quite maddening. haven't seen this many blue screens since NT3. nothing like progress. ugh

    thanks again
      My Computer


  6. Posts : 5,705
    Win7 x64 + x86
       #6

    That's why we don't like to use Internet Security/Security Center applications. When they fail, they fail catastrophically - and they don't give any ready clues that they're to blame.

    One time (at work) I actually took the time out to find the blame on one of these - and after 4 hours of work I managed to find one trace of an Internet Security program buried deep inside the stack of one of the system processes (using Process Explorer). That was the only clue - but it took care of the problem.

    Also, disabling things usually isn't a good idea - because the device usually has to load all it's drivers before it can be disabled (if disabling through the Windows Device Manager). I prefer removing all software and then physically removing the device from the system. If you can't remove it from the system, then disable in the BIOS. If you can't do that, then you're stuck with disabling in Device Manager - but if it's software is uninstalled, it's more successful to disable an Unknown Device.

    Good luck!
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

й Designer Media Ltd
All times are GMT -5. The time now is 11:55.
Find Us