[vpn-help] DNS fails any time proxy is running even if notconnected
Chris Rodgers
christopher.rodgers at cardiov.ox.ac.uk
Fri Feb 19 13:57:51 CST 2010
On 18/02/2010 23:04, Matthew Grooms wrote:
> On 2/9/2010 4:31 AM, Linwood Ferguson wrote:
>
>> PS. As to the "unable to suspend" problem, I have seen that as well, not
>> consistently. And like others, if I drop the connection first it works
>> fine.
>>
>>
> We are in the process of running the MS driver test framework on the
> NDIS6 ( vista/7 ) drivers. We hope to shake out the remaining bugs
> during this testing process.
>
>
I'd like to add that I got a blue screen of death earlier this week,
which seemed to implicate this driver:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address
at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000016, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation
(only on chips which support this level of status)
Arg4: 82c54a5b, address which referenced memory
Debugging Details:
------------------
Unable to load image \SystemRoot\system32\DRIVERS\vfilter.sys, Win32
error 0n2
*** WARNING: Unable to verify timestamp for vfilter.sys
*** ERROR: Module load completed but symbols could not be loaded for
vfilter.sys
READ_ADDRESS: GetPointerFromAddress: unable to read from 82d80718
Unable to read MiSystemVaType memory at 82d60160
00000016
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSignalNotificationObject+18
82c54a5b 807f1601 cmp byte ptr [edi+16h],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: ipsecd.exe
TRAP_FRAME: 9a05af84 -- (.trap 0xffffffff9a05af84)
.trap 0xffffffff9a05af84
ErrCode = 00000000
eax=8593e620 ebx=00000000 ecx=8593e602 edx=00000000 esi=8593e628
edi=00000000
eip=82c54a5b esp=9a05aff8 ebp=9a05b004 iopl=0 nv up ei pl nz ac
pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010217
nt!KiSignalNotificationObject+0x18:
82c54a5b 807f1601 cmp byte ptr [edi+16h],1
ds:0023:00000016=??
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from 82c54a5b to 82c5e7eb
STACK_TEXT:
9a05af84 82c54a5b badb0d00 00000000 859e9be8 nt!KiTrap0E+0x2cf
9a05b004 82c7f75d 807ca120 ffffffff 8593e620
nt!KiSignalNotificationObject+0x18
9a05b02c 8b61a591 8593e620 00000000 00000000 nt!KeSetEvent+0x98
9a05b040 9022b672 8593e620 861aba88 895c21d8 ndis!NdisSetEvent+0x12
WARNING: Stack unwind information not available. Following frames may be
wrong.
9a05b054 9022ae3f 8593e618 85d5d7f0 86d293cc vfilter+0x2672
9a05b11c 9022aedf 861aba88 85d5d7f0 895c21d8 vfilter+0x1e3f
9a05b150 9022af50 861aba8c 895c21d8 00000004 vfilter+0x1edf
9a05b178 8b61259d 00000000 861aba88 00000000 vfilter+0x1f50
9a05b198 8b612623 861aba88 861aba88 00000000
ndis!ndisFilterSendNetBufferLists+0x87
9a05b1b0 8b5c5c20 86013908 861aba88 00000000
ndis!NdisFSendNetBufferLists+0x38
9a05b22c 8b612474 85708cf8 861aba88 00000000
pacer!PcFilterSendNetBufferLists+0x256
9a05b258 8b676d8c aed540e0 861aba88 00000000 ndis!ndisSendNBLToFilter+0xf2
9a05b288 8b89003e 86ed7aa8 861aba88 00000000
ndis!NdisSendNetBufferLists+0x162
9a05b2d4 8b8907c1 8a65f858 00000000 00000000 tcpip!FlSendPackets+0x416
9a05b328 8b8904d3 8b910d98 00000000 00000000 tcpip!IppFragmentPackets+0x2e2
9a05b360 8b898273 8b910d98 86c61d5c 86c61df8
tcpip!IppDispatchSendPacketHelper+0x266
9a05b400 8b89e30e 00c61d5c 00000000 85754b80
tcpip!IppPacketizeDatagrams+0x8d6
9a05b480 8b89e595 00000000 00000007 8b910d98
tcpip!IppSendDatagramsCommon+0x652
9a05b4a0 8b8816f7 86c5d410 9a05b4bc dad2661a tcpip!IpNlpSendDatagrams+0x4b
9a05b5ec 8b8ab0eb 85fabb28 00000002 00000001 tcpip!TcpTcbSend+0x85e
9a05b63c 8b88b63f 00000001 00000000 8a45255a tcpip!TcpFlushDelay+0x1f1
9a05b650 8b879ab8 00000001 00000001 00000000 tcpip!TcpExitReceiveDpc+0x61
9a05b688 8b879812 86c68f40 86c62000 00000807
tcpip!TcpPreValidatedReceive+0x29b
9a05b6a4 8b87f1d3 86c68f40 86c62000 9a05b6e0 tcpip!TcpReceive+0x2d
9a05b6b4 8b8b148e 9a05b6c8 c000023e 00000000
tcpip!TcpNlClientReceiveDatagrams+0x12
9a05b6e0 8b8b1251 8b910f88 9a05b734 c000023e
tcpip!IppDeliverListToProtocol+0x49
9a05b700 8b8b0f26 8b910d98 00000006 9a05b734
tcpip!IppProcessDeliverList+0x2a
9a05b758 8b8aeb64 8b910d98 00000006 00000000
tcpip!IppReceiveHeaderBatch+0x1f2
9a05b7ec 8b8adaf5 86d9d480 00000000 03064c00 tcpip!IpFlcReceivePackets+0xbe5
9a05b868 8b8adc66 8a65f858 8701a3a0 00000000
tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
9a05b89c 82ca7f8a 8701a3a0 bcd61096 00000000
tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
9a05b904 8b8adcee 8b8adb48 9a05b92c 00000000
nt!KeExpandKernelStackAndCalloutEx+0x132
9a05b940 8b67618d 8a65f800 8701a301 00000000
tcpip!FlReceiveNetBufferListChain+0x7c
9a05b978 8b664670 86ed7aa8 8701a3a0 00000000
ndis!ndisMIndicateNetBufferListsToOpen+0x188
9a05b9a0 8b6645e7 00000000 00000000 8701a3a0
ndis!ndisIndicateSortedNetBufferLists+0x4a
9a05bb1c 8b647f12 aed540e0 00000000 00000000
ndis!ndisMDispatchReceiveNetBufferLists+0x129
9a05bb44 8b62cba8 aed540e0 00000000 00000000
ndis!ndisMIndicateSplitNblChain+0x44
9a05bb64 8b60fca5 aed540e0 8701a3a0 00000000
ndis!ndisMIndicateReceiveNblsWithThrottling+0x2f
9a05bb80 8b63fa87 aed540e0 8701a3a0 00000000
ndis!ndisMTopReceiveNetBufferLists+0x2d
9a05bb9c 8b63fa21 873878e8 8701a3a0 00000000
ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
9a05bbb8 9022c337 873878e8 8701a3a0 00000000
ndis!NdisFIndicateReceiveNetBufferLists+0x2f
9a05bbe8 9022c85c 85dcd238 805daf90 00000036 vfilter+0x3337
9a05bc18 8b67fdaf 8710fd78 85dcd238 872679d0 vfilter+0x385c
9a05bc34 82c544bc 8710fd78 8a600d68 8a600d68 ndis!ndisDummyIrpHandler+0x6c
9a05bc4c 82e55eee 872679d0 8a600d68 8a600dd8 nt!IofCallDriver+0x63
9a05bc6c 82e567a2 8710fd78 872679d0 00000001
nt!IopSynchronousServiceTail+0x1f8
9a05bd08 82c5b42a 8710fd78 00000000 00000000 nt!NtWriteFile+0x6e8
9a05bd08 776264f4 8710fd78 00000000 00000000 nt!KiFastCallEntry+0x12a
0163fe64 00000000 00000000 00000000 00000000 0x776264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
vfilter+2672
9022b672 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: vfilter+2672
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vfilter
IMAGE_NAME: vfilter.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b048bfa
FAILURE_BUCKET_ID: 0xA_vfilter+2672
BUCKET_ID: 0xA_vfilter+2672
Best wishes,
Chris.
More information about the vpn-help
mailing list