New
#1
BSOD on PPTP VPN connect
Upgraded Win7 32-bit ThinkPad SL510 to Win7 64-bit (incl format). All newest drivers; Office 2010; Sunbelt Vipre Enterprise AV; etc. etc. Use several VPN connections to clients (MS PPTP, Cisco, OpenVPN) and suddenly (yes, they'd all worked) cannot get PPTP connection. Raked thru all drivers; removed OpenVPN (based on initial crash dump analyses pointing to their tap); disabled Cisco; recreated VPN connection profiles - all to no avail. Reset IP; detached Sunbelt firewall from adapter settings (BSOD happens both wireless and wired). Ready to punt and return to 32bit but hoping someone can see something I've missed. Still crashes from 'clean boot' (RACM does not run in safe mode); disabled AV etc.
Latest crash analysis as follows (minidump attached)...
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Installers\Windows7SDK\DUMPS\MEMORY05.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`02c19000 PsLoadedModuleList = 0xfffff800`02e5e650
Debug session time: Sun Jun 5 15:07:51.241 2011 (UTC - 4:00)
System Uptime: 0 days 0:42:54.020
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {91, 2, fffffa8004aac060, 0}
*** ERROR: Module load completed but symbols could not be loaded for dne64x.sys
*** ERROR: Module load completed but symbols could not be loaded for NETwNs64.sys
*** ERROR: Module load completed but symbols could not be loaded for ipnat.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+496 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
the operating system. The only supported way to extend a kernel
mode stack is by using KeExpandKernelStackAndCallout.
Arg2: 0000000000000002
Arg3: fffffa8004aac060
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc4_91
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: SBAMSvc.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cf03aa to fffff80002c98d00
STACK_TEXT:
fffff800`0412c018 fffff800`02cf03aa : 00000000`000000c4 00000000`00000091 00000000`00000002 fffffa80`04aac060 : nt!KeBugCheckEx
fffff800`0412c020 fffff800`02d34995 : 00000000`00000040 fffff800`02d7f23b fffff980`00000002 fffff980`21d1efc0 : nt! ?? ::FNODOBFM::`string'+0x4874
fffff800`0412c060 fffff800`02d5283d : fffff880`09ce2000 fffff880`09ceb000 fffff800`03149140 fffff980`21d1ef02 : nt!RtlEnoughStackSpaceForStackCapture+0x15
fffff800`0412c090 fffff800`02d536db : 00000000`00000003 fffffa80`044ba598 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x4d
fffff800`0412c0c0 fffff800`0312c02c : fffffa80`044ba580 00000000`00000000 fffff980`2094af50 fffff800`02d7fa21 : nt!RtlCaptureStackBackTrace+0x4b
fffff800`0412c0f0 fffff800`0312e09a : fffff980`2094af50 fffff980`21d1efc0 00000000`00000000 00000000`00000000 : nt!ViPoolLogStackCallout+0x1c
fffff800`0412c120 fffff800`0313093a : fffff980`21d1efc0 00000000`0000ff00 fffff980`2094ae20 fffff980`2094af50 : nt!ViPoolLogStackTrace+0x8a
fffff800`0412c150 fffff800`02dc37fa : 00000000`00000040 00000000`00000000 fffff980`2094af50 fffff980`2094ae20 : nt!VfFreePoolNotification+0x4a
fffff800`0412c180 fffff880`016972e9 : 00000000`00000001 00000000`00000005 00000000`00028488 fffff800`02c80a0b : nt!ExDeferredFreePool+0xdc1
fffff800`0412c230 fffff880`01783bf6 : fffff980`2094ae20 00000000`0000ffff 00000000`00000002 00000000`00001000 : ndis!NdisFreeCloneNetBufferList+0x59
fffff800`0412c260 fffff880`0191d347 : 00000000`00000000 fffffa80`03c5f200 fffff800`0412c380 fffff800`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x496
fffff800`0412c330 fffff880`0174d36f : 00000000`00000000 fffffa80`070221a0 fffff980`2053e8d0 fffff800`0312c24c : tcpip!FlSendNetBufferListChainComplete+0x37
fffff800`0412c360 fffff880`0174e128 : fffffa80`00000000 fffff980`2094ae20 00000000`00000000 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
fffff800`0412c400 fffff880`0401b2be : fffffa80`098f8970 fffffa80`0507d530 fffffa80`098f8a08 fffffa80`058fa101 : ndis!ndisMSendCompleteX+0x188
fffff800`0412c450 fffff880`0175264e : fffff980`0126ec00 fffff980`0b7bce00 fffffa80`00000000 fffff980`0b7bce00 : dne64x+0x1b2be
fffff800`0412c4e0 fffff880`0175251d : 00000000`00000000 fffff980`0b7bce20 00000000`00000000 00000000`00000000 : ndis!ndisSendCompleteWithPause+0xde
fffff800`0412c530 fffff880`0174d36f : fffff980`00000000 fffffa80`098f8970 fffffa80`058fa1a0 00000000`00000000 : ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x9d
fffff800`0412c580 fffff880`04609eb0 : fffffa80`00000000 fffff980`0b7bce20 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
fffff800`0412c620 fffff880`04605f58 : 00000000`00000000 fffffa80`0550d800 00000000`00000000 fffff800`0312c24c : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
fffff800`0412c670 fffff880`04609860 : 00000000`00000000 00000000`00000000 fffff980`0b564eb0 fffff880`01692717 : nwifi!Dot11SendCompletion+0x44
fffff800`0412c6a0 fffff880`03f1d1bb : fffff980`045ded78 fffff980`044bac00 00000000`00000000 00000000`00000000 : nwifi!Pt6SendComplete+0x28
fffff800`0412c6d0 fffff880`0174d21d : fffffa80`058fa1a0 00000000`00000000 00000000`00000000 fffff800`0412c778 : vwififlt!FilterSendNetBufferListsComplete+0x10b
fffff800`0412c720 fffff880`05841bfd : fffff980`0446ed70 00000000`00000000 fffffa80`058fa1a0 fffff980`0274ced0 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff800`0412c760 fffff880`05a8dd50 : fffff980`00000000 fffff980`0274ced0 fffff980`044b8de0 fffffa80`0a6f9ee8 : NETwNs64+0xfbfd
fffff800`0412c7b0 fffff880`0584c729 : 00000000`00000000 fffffa80`05584810 fffff880`05a8d970 fffffa80`0a6f9f88 : NETwNs64+0x25bd50
fffff800`0412c890 fffff880`058491ed : 00000000`00000070 fffffa80`0a6f9f88 fffffa80`05584810 fffff980`0446ed70 : NETwNs64+0x1a729
fffff800`0412c8f0 fffff880`05a82940 : 00000000`00000000 fffff980`0274ced0 fffff980`0446ed70 fffff800`0412ca50 : NETwNs64+0x171ed
fffff800`0412c940 fffff880`05c5bdd6 : fffff980`0274ced0 fffff980`0439cd80 fffff980`0439cd80 fffff980`0274ced0 : NETwNs64+0x250940
fffff800`0412c9f0 fffff880`0174d4f1 : fffff880`00000002 fffff980`0274ced0 fffff980`0274ced0 fffffa80`058fa1a0 : NETwNs64+0x429dd6
fffff800`0412caa0 fffff880`01690624 : 00000000`00000000 fffff980`045b6c90 00000000`00000000 00000000`00000000 : ndis!ndisMSendNBLToMiniport+0xb1
fffff800`0412cb00 fffff880`03f1d585 : fffff980`045ded78 fffff980`045ded78 fffff980`0274ced0 fffff980`045ded78 : ndis!NdisFSendNetBufferLists+0x64
fffff800`0412cb40 fffff880`03f1d650 : 00000000`00000001 fffff980`0b564eb0 fffff980`0b564eb0 00000000`00000000 : vwififlt!FilterSendNetBufferListsCommon+0x32d
fffff800`0412cbc0 fffff880`01690624 : fffff980`07cbac90 fffff980`0b564eb0 00000000`00000000 fffff980`0b564eb0 : vwififlt!FilterSendNetBufferLists+0x80
fffff800`0412cc10 fffff880`04604dc2 : fffff800`0412cd78 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisFSendNetBufferLists+0x64
fffff800`0412cc50 fffff880`04605149 : fffffa80`09000000 00000000`00000000 00000000`00000000 00000000`00000000 : nwifi!Dot11TXCompletion+0x1be
fffff800`0412ccd0 fffff880`0460a5e7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff980`0b564eb0 : nwifi!Dot11FlushIntermediateSendQueue+0xb1
fffff800`0412cd20 fffff880`0460ff67 : fffff800`0400ff02 00000000`00000000 fffff980`0b564eb0 fffff980`0b564eb0 : nwifi!MP6SendNBLInternal+0x133
fffff800`0412cd70 fffff880`01690569 : fffffa80`058fa1a0 fffff880`01690624 fffff800`00000000 00000000`00000000 : nwifi!FilterSendNetBufferLists+0x7f
fffff800`0412cda0 fffff880`016d630b : fffff980`0b7bce20 fffffa80`058fa1a0 00000000`00000001 fffff800`02d536db : ndis!ndisSendNBLToFilter+0x69
fffff800`0412ce00 fffff880`016cc4eb : fffff980`21620fc0 00000000`00000001 fffff980`0b4948d0 00000000`00000000 : ndis!ndisMSendPacketsToNetBufferLists+0xcb
fffff800`0412ce80 fffff880`01751f14 : 00000000`00000000 fffff800`0412cf58 fffff980`0b4948d0 00000000`00000000 : ndis!ndisSendPacketsWithPause+0x28b
fffff800`0412cf10 fffff880`0401a8f2 : fffff980`220aefc0 fffffa80`098f8970 fffff980`2371a3d0 fffff980`220aefc0 : ndis!ndisSendWithPause+0x64
fffff800`0412cf50 fffff880`0400b016 : fffff980`2371a3d0 00000000`00000002 fffffa80`0507d530 00000000`00000082 : dne64x+0x1a8f2
fffff800`0412cfe0 fffff880`0174fdb7 : fffffa80`070221a0 fffff800`0412d0d0 fffffa80`0507d530 00000000`00000000 : dne64x+0xb016
fffff800`0412d010 fffff880`0174de07 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`016f2110 : ndis! ?? ::FJGMBFAB::`string'+0x158c
fffff800`0412d070 fffff880`01690624 : fffff980`217c4c90 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMSendNetBufferListsToPackets+0x97
fffff800`0412d130 fffff880`03ef2199 : 00000000`00000000 fffffa80`070221a0 00000000`00000000 00000000`00000000 : ndis!NdisFSendNetBufferLists+0x64
fffff800`0412d170 fffff880`01690569 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : pacer!PcFilterSendNetBufferLists+0x29
fffff800`0412d270 fffff880`0174d5d5 : 00000000`00000000 00000000`00000000 fffffa80`070221a0 00000000`00000000 : ndis!ndisSendNBLToFilter+0x69
fffff800`0412d2d0 fffff880`019211de : 00000000`00000000 00000000`0000000e fffffa80`0a25a8e0 fffff800`03128dfe : ndis!NdisSendNetBufferLists+0x85
fffff800`0412d330 fffff880`0191e3b7 : fffff880`01a319a0 00000000`00000000 fffffa80`06e40000 00000000`01a30800 : tcpip!IppFragmentPackets+0x39e
fffff800`0412d450 fffff880`01920805 : fffff980`2094ae20 fffff980`0000005c fffffa80`676e7049 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x87
fffff800`0412d510 fffff880`0191ef43 : 00000000`e0000006 00000000`0000bb00 fffffa80`00000014 fffff800`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff800`0412d630 fffff880`019223ae : 00000000`00000000 00000000`00000000 fffff880`01a319a0 00000000`00000000 : tcpip!IppSendDatagramsCommon+0x753
fffff800`0412d900 fffff880`0735535e : 00000000`0000000c fffffa80`044b9818 00470000`00000000 fffff800`03130cc6 : tcpip!IpNlpSendDatagrams+0x3e
fffff800`0412d940 fffff880`07354b5f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ipnat+0x1535e
fffff800`0412db70 fffff880`0735542d : 00000000`00000000 fffff880`ffffffff 00000000`000000ff fffff800`0412e178 : ipnat+0x14b5f
fffff800`0412dc10 fffff880`0178dc62 : 00000000`00000117 fffffa80`06b4ac60 fffff800`0412e270 00000000`00000000 : ipnat+0x1542d
fffff800`0412dc50 fffff880`01786f0c : fffffa80`096f0004 fffff800`0412e148 fffff800`0412e270 fffff980`2090cd30 : NETIO!ProcessCallout+0x1a2
fffff800`0412dd70 fffff880`019202a5 : fffffa80`0590dd78 fffff800`0412e148 00000000`00000000 fffff980`2090cd30 : NETIO!KfdClassify+0x24c
fffff800`0412e0e0 fffff880`01920f4c : fffff800`0412e670 00000000`00000004 00000000`00000004 fffff800`02c51b22 : tcpip!Ipv4pFragmentPacketHelper+0x735
fffff800`0412e4b0 fffff880`0191e3b7 : fffff880`01a319a0 00000000`00000000 fffff800`04120004 00000000`00000003 : tcpip!IppFragmentPackets+0x10c
fffff800`0412e5d0 fffff880`01920805 : fffff800`0412e7a0 00000000`00000000 fffffa80`04aac060 fffff880`01a17178 : tcpip!IppDispatchSendPacketHelper+0x87
fffff800`0412e690 fffff880`0191ef43 : fffffa80`08e10106 00000000`0000bb00 fffffa80`00000014 00000000`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff800`0412e7b0 fffff880`01923e41 : fffff800`0412ee80 00000000`00000007 fffff880`01a319a0 fffffa80`08e10110 : tcpip!IppSendDatagramsCommon+0x753
fffff800`0412ea80 fffff880`0192a04b : fffffa80`09c56520 fffff880`01a2b101 fffff800`0412ee68 fffffa80`0000000c : tcpip!IpNlpFastSendDatagram+0x7d1
fffff800`0412ee30 fffff880`0194b6d4 : 00000000`000089eb fffff800`0412edf0 fffff880`01a2b102 00000009`07230000 : tcpip!TcpTcbHeaderSend+0x47b
fffff800`0412efe0 fffff880`01926325 : fffff880`06298000 00000000`00000000 00000000`00000000 fffff800`0412f300 : tcpip!TcpFlushDelay+0x204
fffff800`0412f0c0 fffff880`0191d137 : fffffa80`05930410 fffffa80`0593bb06 fffffa80`0000bac1 00000000`0000bac1 : tcpip!TcpPreValidatedReceive+0x3e5
fffff800`0412f190 fffff880`0191ccaa : 00000000`00000000 fffff880`01a319a0 fffff800`0412f350 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff800`0412f250 fffff880`0191c2a9 : 00000000`000005dc 00000000`00000000 00000000`00000000 fffff800`0412f340 : tcpip!IppProcessDeliverList+0x5a
fffff800`0412f2f0 fffff880`018ff17f : fffff880`01a319a0 00000000`00000000 00000000`00000000 fffff800`0412f488 : tcpip!IppReceiveHeaderBatch+0x23a
fffff800`0412f3d0 fffff880`018ff7e4 : fffff880`01a319a0 00000000`00000000 fffffa80`0590dc38 00000000`00000000 : tcpip!IppLoopbackTransmit+0x38f
fffff800`0412f480 fffff880`0191e6ba : fffffa80`0590dc38 fffffa80`080e0000 fffffa80`06e4b801 00000000`00000000 : tcpip!IppLoopbackEnqueue+0x1f5
fffff800`0412f520 fffff880`01920805 : 00000000`00000000 fffff980`00000000 fffffa80`676e7000 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x38a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferListChain+496
fffff880`01783bf6 488b442468 mov rax,qword ptr [rsp+68h]
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+496
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
BUCKET_ID: X64_0xc4_91_VRF_NETIO!NetioDereferenceNetBufferListChain+496
Followup: MachineOwner
---------