Announcement

Collapse
No announcement yet.

Blue Screen when using cisco VPN

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • Blue Screen when using cisco VPN

    I am having problems with being able to use Cisco's VPN and wireless. It will connect fine, but if I try to open MS Outlook it goes to the blue screen. I have analysed the minidump file but I am not sure what needs to be changed. If someone here could view the results and point me in the right direction it would be great. My boss is having the same issues.

    ************************************************** ****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    Use !analyze -v to get detailed debugging information.
    BugCheck 1000007F, {8, 805d3130, 0, 0}
    Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+47 )
    Followup: MachineOwner
    ---------
    1: kd> !analyze -v
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 805d3130
    Arg3: 00000000
    Arg4: 00000000
    Debugging Details:
    ------------------

    BUGCHECK_STR: 0x7f_8
    CUSTOMER_CRASH_COUNT: 2
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    PROCESS_NAME: System
    CURRENT_IRQL: 2
    LAST_CONTROL_TRANSFER: from 820ef00c to 820ef04f
    STACK_TEXT:
    805ea004 820ef00c 00000000 00000000 00000000 nt!SepSidInTokenSidHash+0x39
    805ea020 820eee16 00000000 00000000 00000000 nt!SepSidInToken+0x29
    805ea04c 820eea57 00000001 805ea1b0 805ea1b0 nt!SepNormalAccessCheck+0x6c
    805ea0f4 820ee10b 84ccfb38 00000000 00000000 nt!SepAccessCheck+0x1f7
    805ea150 82081328 84ccfb00 805ea1a0 00000001 nt!SeAccessCheck+0x1a4
    805ea58c 82f3ccc6 84ccfb38 85c68424 00000000 nt!SeAccessCheckFromState+0xe4
    805ea5cc 82f3cd08 84ccfb30 00000000 84ccfb20 NETIO!CompareSecurityContexts+0x47
    805ea5f0 82f3b2e6 00000000 84ccfb28 805ea860 NETIO!MatchValues+0xee
    805ea608 82f3b8e5 84ccfb20 805ea860 86c84ab0 NETIO!MatchCondition+0x4b
    805ea624 82f3b879 00000000 805ea9bc 805ea8e0 NETIO!FilterMatch+0x49
    805ea648 82f3b7ba 86c84ab0 805ea9bc 805ea8e0 NETIO!IndexListClassify+0x25
    805ea688 82f3b4d8 00000002 805ea9bc 805ea8e0 NETIO!FindMatchingEntries+0xd6
    805ea764 8827607a 00000030 805ea9bc 805ea8e0 NETIO!KfdClassify+0x145
    805ea78c 8825190b 805ea9bc 805ea8e0 ab388628 tcpip!WfpAleClassify+0x36
    805eaa28 88251374 849e2df8 00000030 882bf338 tcpip!WfpAlepAuthorizeSend+0x4bd
    805eab88 88276271 849e2df8 805e0002 00000011 tcpip!WfpAleAuthorizeSend+0x1e0
    805eabe4 882756fd 849e2df8 805e0002 00000011 tcpip!WfpAleConnectAcceptIndicate+0x56
    805eac54 88254bbb 805eae64 00000011 805e0002 tcpip!ProcessALEForTransportPacket+0xf3
    805eacd8 88261aae 805eae64 00000011 805e0002 tcpip!ProcessAleForNonTcpOut+0x5c
    805eae28 88260bd4 00000011 00000000 00008a00 tcpip!WfpProcessOutTransportStackIndication+0x200
    805eaeac 8826267a 00000000 85c7f094 805eb010 tcpip!IppInspectLocalDatagramsOut+0xbf
    805eaeac 00000000 00000000 85c7f094 805eb010 tcpip!IppSendDatagramsCommon+0x522

    STACK_COMMAND: kb
    FOLLOWUP_IP:
    NETIO!CompareSecurityContexts+47
    82f3ccc6 84c0 test al,al
    SYMBOL_STACK_INDEX: 6
    SYMBOL_NAME: NETIO!CompareSecurityContexts+47
    FOLLOWUP_NAME: MachineOwner
    MODULE_NAME: NETIO
    IMAGE_NAME: NETIO.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP: 49e0209d
    FAILURE_BUCKET_ID: 0x7f_8_NETIO!CompareSecurityContexts+47
    BUCKET_ID: 0x7f_8_NETIO!CompareSecurityContexts+47
    Followup: MachineOwner
    ---------
    1: kd> !analyze -v
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 805d3130
    Arg3: 00000000
    Arg4: 00000000
    Debugging Details:
    ------------------

    BUGCHECK_STR: 0x7f_8
    CUSTOMER_CRASH_COUNT: 2
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    PROCESS_NAME: System
    CURRENT_IRQL: 2
    LAST_CONTROL_TRANSFER: from 820ef00c to 820ef04f
    STACK_TEXT:
    805ea004 820ef00c 00000000 00000000 00000000 nt!SepSidInTokenSidHash+0x39
    805ea020 820eee16 00000000 00000000 00000000 nt!SepSidInToken+0x29
    805ea04c 820eea57 00000001 805ea1b0 805ea1b0 nt!SepNormalAccessCheck+0x6c
    805ea0f4 820ee10b 84ccfb38 00000000 00000000 nt!SepAccessCheck+0x1f7
    805ea150 82081328 84ccfb00 805ea1a0 00000001 nt!SeAccessCheck+0x1a4
    805ea58c 82f3ccc6 84ccfb38 85c68424 00000000 nt!SeAccessCheckFromState+0xe4
    805ea5cc 82f3cd08 84ccfb30 00000000 84ccfb20 NETIO!CompareSecurityContexts+0x47
    805ea5f0 82f3b2e6 00000000 84ccfb28 805ea860 NETIO!MatchValues+0xee
    805ea608 82f3b8e5 84ccfb20 805ea860 86c84ab0 NETIO!MatchCondition+0x4b
    805ea624 82f3b879 00000000 805ea9bc 805ea8e0 NETIO!FilterMatch+0x49
    805ea648 82f3b7ba 86c84ab0 805ea9bc 805ea8e0 NETIO!IndexListClassify+0x25
    805ea688 82f3b4d8 00000002 805ea9bc 805ea8e0 NETIO!FindMatchingEntries+0xd6
    805ea764 8827607a 00000030 805ea9bc 805ea8e0 NETIO!KfdClassify+0x145
    805ea78c 8825190b 805ea9bc 805ea8e0 ab388628 tcpip!WfpAleClassify+0x36
    805eaa28 88251374 849e2df8 00000030 882bf338 tcpip!WfpAlepAuthorizeSend+0x4bd
    805eab88 88276271 849e2df8 805e0002 00000011 tcpip!WfpAleAuthorizeSend+0x1e0
    805eabe4 882756fd 849e2df8 805e0002 00000011 tcpip!WfpAleConnectAcceptIndicate+0x56
    805eac54 88254bbb 805eae64 00000011 805e0002 tcpip!ProcessALEForTransportPacket+0xf3
    805eacd8 88261aae 805eae64 00000011 805e0002 tcpip!ProcessAleForNonTcpOut+0x5c
    805eae28 88260bd4 00000011 00000000 00008a00 tcpip!WfpProcessOutTransportStackIndication+0x200
    805eaeac 8826267a 00000000 85c7f094 805eb010 tcpip!IppInspectLocalDatagramsOut+0xbf
    805eaeac 00000000 00000000 85c7f094 805eb010 tcpip!IppSendDatagramsCommon+0x522

    STACK_COMMAND: kb
    FOLLOWUP_IP:
    NETIO!CompareSecurityContexts+47
    82f3ccc6 84c0 test al,al
    SYMBOL_STACK_INDEX: 6
    SYMBOL_NAME: NETIO!CompareSecurityContexts+47
    FOLLOWUP_NAME: MachineOwner
    MODULE_NAME: NETIO
    IMAGE_NAME: NETIO.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP: 49e0209d
    FAILURE_BUCKET_ID: 0x7f_8_NETIO!CompareSecurityContexts+47
    BUCKET_ID: 0x7f_8_NETIO!CompareSecurityContexts+47
    Followup: MachineOwner

    Thanks in advance for any help!

  • #2
    Re: Blue Screen when using cisco VPN

    Did you have find a fix for this? i am having the exact error.

    Comment


    • #3
      Re: Blue Screen when using cisco VPN

      The netio.sys seems to crash...
      please review:
      http://support.microsoft.com/kb/946776

      Also make sure you are using the latest drivers and the latest VPN client.
      Marcel
      Technical Consultant
      Netherlands
      http://www.phetios.com
      http://blog.nessus.nl

      MCITP(EA, SA), MCSA/E 2003:Security, CCNA, SNAF, DCUCI, CCSA/E/E+ (R60), VCP4/5, NCDA, NCIE - SAN, NCIE - BR, EMCPE
      "No matter how secure, there is always the human factor."

      "Enjoy life today, tomorrow may never come."
      "If you're going through hell, keep going. ~Winston Churchill"

      Comment

      Working...
      X