PLantage Vista et ecran bleu

Discussion in 'LnS French Forum' started by forgetms, Nov 25, 2008.

Thread Status:
Not open for further replies.
  1. forgetms

    forgetms Registered Member

    Joined:
    Aug 2, 2003
    Posts:
    33
    Bonjour,

    j'ai de nouveau des soucis avec LnS 2.06p3 avec depuis quelques temps une augmentation des reboot intempestifs de Vista. Ce problème a toujours existé depuis que j'ai cet ordinateur mais il devient fréquent et me pose de + en + de problème (perte de travaux non sauvegardés!)
    J'ai cherché dans le forum mais je n' ai rien trouvé d'intéressant sauf:

    https://www.wilderssecurity.com/showthread.php?t=194643

    ou soso93 semble avoir eu le même problème mais il n'y a pas de solution

    J'utilise Vista Home edition premium sur un portable Fujitsu Siemens Amilo Xi 2528.
    Le problème survient toujours lors de l'acces au réseau par le WiFi (Internet ou si je veux accéder à un autre ordi de mon réseau géré avec une Livebox. (ex: impression d'un document sur une imprimante située sur un autre poste)

    Depuis 2 jours j'ai réalisé 5 analyses avec WinDbg qui me parle toujours de LnS. Suite à différents forums, j'ai mis à jour mes drivers WiFi et Ethernet (même si je n'utilise pas cette connexion en ce moment)

    Merci de votre aide

    Ci après les 5 rapports de Win Debug:



    RAPPORT N°1

    BugCheck 1000007F, {8, 805d3130, 0, 0}

    Unable to load image \SystemRoot\system32\DRIVERS\lnsfw.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for lnsfw.sys
    *** ERROR: Module load completed but symbols could not be loaded for lnsfw.sys
    Unable to load image \SystemRoot\system32\DRIVERS\NETw4v32.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for NETw4v32.sys
    *** ERROR: Module load completed but symbols could not be loaded for NETw4v32.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+2 )

    Followup: MachineOwner
    ---------

    1: kd> !analyze –v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000007F, {8, 805d3130, 0, 0}

    Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+2 )

    Followup: MachineOwner
    ---------





    RAPPORT N°2

    BugCheck 1000007F, {8, 805d3130, 0, 0}

    Unable to load image \SystemRoot\system32\DRIVERS\lnsfw.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for lnsfw.sys
    *** ERROR: Module load completed but symbols could not be loaded for lnsfw.sys
    Unable to load image \SystemRoot\system32\DRIVERS\NETw4v32.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for NETw4v32.sys
    *** ERROR: Module load completed but symbols could not be loaded for NETw4v32.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+c9 )

    Followup: MachineOwner
    ---------

    1: kd> !analyze –v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000007F, {8, 805d3130, 0, 0}

    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+c9 )

    Followup: MachineOwner
    ---------





    RAPPORT N°3

    BugCheck 1000007F, {8, 805d3130, 0, 0}

    Unable to load image \SystemRoot\system32\DRIVERS\lnsfw.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for lnsfw.sys
    *** ERROR: Module load completed but symbols could not be loaded for lnsfw.sys
    Unable to load image \SystemRoot\system32\DRIVERS\NETw4v32.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for NETw4v32.sys
    *** ERROR: Module load completed but symbols could not be loaded for NETw4v32.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+ba )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 805d3130
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x7f_8

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: System

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from 82b4e41e to 87e6f091

    STACK_TEXT:
    805e9ffc 82b4e41e 972e5d70 84714960 00000000 tcpip!FlSendNetBufferListChainComplete+0x2
    805ea030 82a834f1 87456438 84714960 00000000 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    805ea044 98f7b0ee 994ef5f0 84714960 00000000 ndis!NdisFSendNetBufferListsComplete+0x1a
    805ea068 82b4f571 98d65330 84714960 00000000 pacer!PcFilterSendNetBufferListsComplete+0xba
    805ea088 82b503eb 87456438 85a02ae8 00000000 ndis!ndisMSendCompletePacketToNetBufferLists+0x77
    805ea0ac 881f2f2b 00000000 85a02ae8 00000000 ndis!ndisMSendCompleteX+0x20b
    WARNING: Stack unwind information not available. Following frames may be wrong.
    805ea0cc 82b4f7c3 9c500000 951ccda0 00000000 lnsfw+0xf2b
    805ea0ec 82b4f624 0035d370 951ccda0 00000000 ndis!ndisSendCompleteWithPause+0xaf
    805ea110 82b4e41e 9735d370 00000000 00000000 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x7c
    805ea144 82a834f1 87350438 9501b8e0 00000000 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    805ea158 98fa382f 98da8978 9501b8e0 00000000 ndis!NdisFSendNetBufferListsComplete+0x1a
    805ea178 98fa1035 00000000 00000000 98d76008 nwifi!MP6CancelSend+0x231
    805ea19c 98fa264c 97321c08 93673248 00000000 nwifi!Dot11SendCompletion+0x2d
    805ea1b4 82b4e4dd 97321c08 93673248 00000000 nwifi!Pt6SendComplete+0x1e
    805ea1d4 8ea12b33 87350438 93673248 00000000 ndis!NdisMSendNetBufferListsComplete+0x70
    805ea1f4 8eac00f1 8720a2d0 93673248 00000000 NETw4v32+0x7b33
    805ea250 8ea15164 873b3658 847bedf0 845d5300 NETw4v32+0xb50f1
    805ea278 8ea153fa 874326c0 847bedf0 805ea2a4 NETw4v32+0xa164
    805ea288 8ea14f2a 847bedf0 847ddfb0 873bc4f0 NETw4v32+0xa3fa
    805ea2a4 8eaba77d 8720a2e8 000000d0 00000000 NETw4v32+0x9f2a
    805ea2e4 8ea0c21b 8720a2d0 93673248 93673248 NETw4v32+0xaf77d
    805ea338 82b4e5c4 873bc4f0 873bc510 00000000 NETw4v32+0x121b
    805ea360 82a83585 87350438 93673248 00000000 ndis!ndisMSendNBLToMiniport+0xb4
    805ea380 82a835a8 93673248 93673248 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    805ea398 98fa0263 98da8978 93673248 00000000 ndis!NdisFSendNetBufferLists+0x18
    805ea3c8 98fa0475 00000001 805ea56c 805ea46c nwifi!Dot11OnDisassociate+0x183
    805ea570 98fa3bf4 98d76008 87350438 98d76008 nwifi!Dot11FlushIntermediateSendQueue+0x85
    805ea594 98fa3c67 00000000 00000000 87350438 nwifi!MP6SendNBLInternal+0xe4
    805ea5ac 98fa6c13 98d76008 9501b8e0 00000000 nwifi!MP6Send+0x67
    805ea5c4 82a83638 97321c08 9501b8e0 00000000 nwifi!FilterSendNetBufferLists+0x19
    805ea5e0 82aabd9b 9501b8e0 9501b8e0 00000000 ndis!ndisSendNBLToFilter+0x87
    805ea620 82aabcc7 87350438 005ea684 00000001 ndis!ndisMSendPacketsToNetBufferLists+0x92
    805ea65c 82b4f6db 9735d370 805ea684 00000001 ndis!ndisSendPacketsWithPause+0x236
    805ea678 82b52721 9735d370 951ccda0 805ead24 ndis!ndisSendWithPause+0x48
    805ea688 881f55a6 805ea6f0 9735d370 951ccda0 ndis!NdisSend+0xf
    805ead24 82b51883 9c500000 85a02ae8 00000082 lnsfw+0x35a6
    805ead50 82b51707 805ead70 805ead70 00000000 ndis!ndisMSendPacketsXToMiniport+0xe3
    805eadb8 82a83585 87456438 84714960 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
    805eadd8 82a835a8 84714960 84714960 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    805eadf0 98f7b4ab 994ef5f0 84714960 00000000 ndis!NdisFSendNetBufferLists+0x18
    805eae6c 82a83638 98d65330 84714960 00000000 pacer!PcFilterSendNetBufferLists+0x233
    805eae88 82b4e64a 84714960 84714960 00000000 ndis!ndisSendNBLToFilter+0x87
    805eaeac 87e651f9 972e59b8 84714960 00000000 ndis!NdisSendNetBufferLists+0x4f
    805eaef0 87e653f1 972e5d70 00000000 00000806 tcpip!FlpSendPacketsHelper+0x376
    805eaf2c 87e654a9 84714960 95108094 951e4278 tcpip!Fl48pSendArpPacket+0x115
    805eaf4c 87e64e79 805eaf60 951e4278 972e5658 tcpip!Fl48SendNeighborSolicitation+0x1d
    805eaf74 87e65c6c 00000000 9729c7f0 972e5658 tcpip!Ipv4pSendNeighborSolicitation+0x64
    805eafac 87e65a87 00000000 87ed4c68 95116108 tcpip!IppSendNeighborSolicitation+0x7d
    805eafe0 87e6fc21 95116108 00000000 805eb170 tcpip!IppResolveNeighbor+0x23c
    805eafe0 00000000 95116108 00000000 805eb170 tcpip!IppFragmentPackets+0x96


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    pacer!PcFilterSendNetBufferListsComplete+ba
    98f7b0ee 5b pop ebx

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: pacer!PcFilterSendNetBufferListsComplete+ba

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: pacer

    IMAGE_NAME: pacer.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 47f6d426

    FAILURE_BUCKET_ID: 0x7f_8_pacer!PcFilterSendNetBufferListsComplete+ba

    BUCKET_ID: 0x7f_8_pacer!PcFilterSendNetBufferListsComplete+ba

    Followup: MachineOwner
    ---------






    RAPPORT N°4

    BugCheck 1000007F, {8, 805d3130, 0, 0}

    Unable to load image \SystemRoot\system32\DRIVERS\lnsfw.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for lnsfw.sys
    *** ERROR: Module load completed but symbols could not be loaded for lnsfw.sys
    Unable to load image \SystemRoot\system32\DRIVERS\NETw5v32.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for NETw5v32.sys
    *** ERROR: Module load completed but symbols could not be loaded for NETw5v32.sys
    Probably caused by : lnsfw.sys ( lnsfw+f2b )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 805d3130
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x7f_8

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: System

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from 88345232 to 825c222c

    STACK_TEXT:
    805ea004 88345232 97495da0 9756cb08 9ad78000 hal!KfRaiseIrql+0x6
    805ea01c 8f2d1f2b 877e90e8 85e02948 00000000 ndis!ndisMSendCompleteX+0x51
    WARNING: Stack unwind information not available. Following frames may be wrong.
    805ea03c 883447c3 9ad78000 97495da0 00000000 lnsfw+0xf2b
    805ea05c 88344624 0056cb08 97495da0 00000000 ndis!ndisSendCompleteWithPause+0xaf
    805ea080 8834341e 9756cb08 00000000 00000000 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x7c
    805ea0b4 882784f1 8772a438 9956f9c0 00000000 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    805ea0c8 a4c1482f 995c3948 9956f9c0 00000000 ndis!NdisFSendNetBufferListsComplete+0x1a
    805ea0e8 a4c12035 00000000 00000000 994ff008 nwifi!MP6CancelSend+0x231
    805ea10c a4c1364c 995166b0 9956f910 00000000 nwifi!Dot11SendCompletion+0x2d
    805ea124 883434dd 995166b0 9956f910 00000000 nwifi!Pt6SendComplete+0x1e
    805ea144 8ee129c4 8772a438 9956f910 00000000 ndis!NdisMSendNetBufferListsComplete+0x70
    805ea168 8eefb855 8771fea0 9956f910 00000000 NETw5v32+0x79c4
    805ea1c8 8ee15ece 8771f008 8f66f158 99538550 NETw5v32+0xf0855
    805ea1f4 8ee16213 84c26f90 84c26fb0 8f66f158 NETw5v32+0xaece
    805ea20c 8ee15675 8f66f158 84c26f90 8769ac98 NETw5v32+0xb213
    805ea228 8eef5143 8771fedc 000000d6 00000000 NETw5v32+0xa675
    805ea298 8ee0c3cb 8771fea0 9956f910 9956f910 NETw5v32+0xea143
    805ea2ec 883435c4 8769ac98 8769acc4 00000000 NETw5v32+0x13cb
    805ea314 88278585 8772a438 9956f910 00000000 ndis!ndisMSendNBLToMiniport+0xb4
    805ea334 882785a8 9956f910 9956f910 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    805ea34c a4c11263 995c3948 9956f910 00000000 ndis!NdisFSendNetBufferLists+0x18
    805ea37c a4c11475 00000001 805ea520 805ea420 nwifi!Dot11OnDisassociate+0x183
    805ea524 a4c14bf4 994ff008 8772a438 994ff008 nwifi!Dot11FlushIntermediateSendQueue+0x85
    805ea548 a4c14c67 00000000 00000000 8772a438 nwifi!MP6SendNBLInternal+0xe4
    805ea560 a4c17c13 994ff008 9956f9c0 00000000 nwifi!MP6Send+0x67
    805ea578 88278638 995166b0 9956f9c0 00000000 nwifi!FilterSendNetBufferLists+0x19
    805ea594 882a0d9b 9956f9c0 9956f9c0 00000000 ndis!ndisSendNBLToFilter+0x87
    805ea5d4 882a0cc7 8772a438 005ea638 00000001 ndis!ndisMSendPacketsToNetBufferLists+0x92
    805ea610 883446db 9756cb08 805ea638 00000001 ndis!ndisSendPacketsWithPause+0x236
    805ea62c 88347721 9756cb08 97495da0 805eacd8 ndis!ndisSendWithPause+0x48
    805ea63c 8f2d45a6 805ea6a4 9756cb08 97495da0 ndis!NdisSend+0xf
    805eacd8 88346883 9ad78000 85e02948 00000082 lnsfw+0x35a6
    805ead04 88346707 805ead24 805ead24 00000000 ndis!ndisMSendPacketsXToMiniport+0xe3
    805ead6c 88278585 877e90e8 a724e8d0 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
    805ead8c 882785a8 a724e8d0 a724e8d0 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    805eada4 98c534ab 97a65840 a724e8d0 00000000 ndis!NdisFSendNetBufferLists+0x18
    805eae20 88278638 9756c6d8 a724e8d0 00000000 pacer!PcFilterSendNetBufferLists+0x233
    805eae3c 8834364a a724e8d0 a724e8d0 00000000 ndis!ndisSendNBLToFilter+0x87
    805eae60 884601f9 97464570 a724e8d0 00000000 ndis!NdisSendNetBufferLists+0x4f
    805eaea4 884603f1 97464928 00000000 00000806 tcpip!FlpSendPacketsHelper+0x376
    805eaee0 884604a9 a724e8d0 97b4a0c4 974ba138 tcpip!Fl48pSendArpPacket+0x115
    805eaf00 8845fe79 805eaf14 974ba138 99b4d4a8 tcpip!Fl48SendNeighborSolicitation+0x1d
    805eaf28 88460c6c 00000000 92bafba8 99b4d4a8 tcpip!Ipv4pSendNeighborSolicitation+0x64
    805eaf60 88460a87 00000000 884cfc68 974b0020 tcpip!IppSendNeighborSolicitation+0x7d
    805eaf94 8846ac21 974b0020 00000000 805eb124 tcpip!IppResolveNeighbor+0x23c
    805eafd0 8846a99b 884cfc68 00000000 00000000 tcpip!IppFragmentPackets+0x96
    805eaff8 92bafba8 00000000 00000000 00000000 tcpip!IppDispatchSendPacketHelper+0x252
    005eb0a8 00000000 00000000 00000000 00000000 0x92bafba8


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    lnsfw+f2b
    8f2d1f2b ?? o_O

    SYMBOL_STACK_INDEX: 2

    SYMBOL_NAME: lnsfw+f2b

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: lnsfw

    IMAGE_NAME: lnsfw.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 47bf47a2

    FAILURE_BUCKET_ID: 0x7f_8_lnsfw+f2b

    BUCKET_ID: 0x7f_8_lnsfw+f2b

    Followup: MachineOwner







    RAPPORT N°5

    BugCheck 1000007F, {8, 805d3130, 0, 0}

    Unable to load image \SystemRoot\system32\DRIVERS\lnsfw.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for lnsfw.sys
    *** ERROR: Module load completed but symbols could not be loaded for lnsfw.sys
    Unable to load image \SystemRoot\system32\DRIVERS\NETw5v32.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for NETw5v32.sys
    *** ERROR: Module load completed but symbols could not be loaded for NETw5v32.sys
    Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+cf )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 805d3130
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x7f_8

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: System

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from 88463d33 to 88463ce2

    STACK_TEXT:
    805ea018 88463d33 9c1c0330 9c1c0248 00000000 tcpip!UdpEndSendMessages+0xf5
    805ea030 883b0c7f 9c1c0248 00000001 00000000 tcpip!UdpSendMessagesDatagramsComplete+0x22
    805ea060 884680ab 00000000 00000000 969be2d8 NETIO!NetioDereferenceNetBufferListChain+0xcf
    805ea074 8834741e 968c8008 9c1c0248 00000000 tcpip!FlSendNetBufferListChainComplete+0x1c
    805ea0a8 8827c4f1 8782d438 9c1c0248 00000000 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    805ea0bc 95ca40ee 98383c10 9c1c0248 00000000 ndis!NdisFSendNetBufferListsComplete+0x1a
    805ea0e0 88348571 98344420 9c1c0248 00000000 pacer!PcFilterSendNetBufferListsComplete+0xba
    805ea100 883493eb 8782d438 85237878 00000000 ndis!ndisMSendCompletePacketToNetBufferLists+0x77
    805ea124 8f8d4f2b 00000000 85237878 00000000 ndis!ndisMSendCompleteX+0x20b
    WARNING: Stack unwind information not available. Following frames may be wrong.
    805ea144 883487c3 9c0be000 942fce68 00000000 lnsfw+0xf2b
    805ea164 88348624 00aab1b8 942fce68 00000000 ndis!ndisSendCompleteWithPause+0xaf
    805ea188 8834741e 8faab1b8 00000000 00000000 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x7c
    805ea1bc 8827c4f1 87729438 982e5ae8 00000000 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    805ea1d0 9877482f 98354c10 982e5ae8 00000000 ndis!NdisFSendNetBufferListsComplete+0x1a
    805ea1f0 98772035 00000000 00000000 98280008 nwifi!MP6CancelSend+0x231
    805ea214 9877364c 969bec08 982fc018 00000000 nwifi!Dot11SendCompletion+0x2d
    805ea22c 883474dd 969bec08 982fc018 00000000 nwifi!Pt6SendComplete+0x1e
    805ea24c 8f2159c4 87729438 982fc018 00000000 ndis!NdisMSendNetBufferListsComplete+0x70
    805ea270 8f2fe855 87d42a58 982fc018 00000000 NETw5v32+0x79c4
    805ea2d0 8f218ece 877936c8 982dadf8 a77d4f18 NETw5v32+0xf0855
    805ea2fc 8f219213 9263ef90 9263efb0 982dadf8 NETw5v32+0xaece
    805ea314 8f218675 982dadf8 9263ef90 877a2008 NETw5v32+0xb213
    805ea330 8f2f8143 87d42a94 000000d6 00000000 NETw5v32+0xa675
    805ea3a0 8f20f3cb 87d42a58 982fc018 982fc018 NETw5v32+0xea143
    805ea3f4 883475c4 877a2008 877a2034 00000000 NETw5v32+0x13cb
    805ea41c 8827c585 87729438 982fc018 00000000 ndis!ndisMSendNBLToMiniport+0xb4
    805ea43c 8827c5a8 982fc018 982fc018 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    805ea454 98771263 98354c10 982fc018 00000000 ndis!NdisFSendNetBufferLists+0x18
    805ea484 98771475 00000001 805ea628 805ea528 nwifi!Dot11OnDisassociate+0x183
    805ea62c 98774bf4 98280008 87729438 98280008 nwifi!Dot11FlushIntermediateSendQueue+0x85
    805ea650 98774c67 00000000 00000000 87729438 nwifi!MP6SendNBLInternal+0xe4
    805ea668 98777c13 98280008 982e5ae8 00000000 nwifi!MP6Send+0x67
    805ea680 8827c638 969bec08 982e5ae8 00000000 nwifi!FilterSendNetBufferLists+0x19
    805ea69c 882a4d9b 982e5ae8 982e5ae8 00000000 ndis!ndisSendNBLToFilter+0x87
    805ea6dc 882a4cc7 87729438 005ea740 00000001 ndis!ndisMSendPacketsToNetBufferLists+0x92
    805ea718 883486db 8faab1b8 805ea740 00000001 ndis!ndisSendPacketsWithPause+0x236
    805ea734 8834b721 8faab1b8 942fce68 805eade0 ndis!ndisSendWithPause+0x48
    805ea744 8f8d75a6 805ea7ac 8faab1b8 942fce68 ndis!NdisSend+0xf
    805eade0 8834a883 9c0be000 85237878 00000082 lnsfw+0x35a6
    805eae0c 8834a707 805eae2c 805eae2c 00000000 ndis!ndisMSendPacketsXToMiniport+0xe3
    805eae74 8827c585 8782d438 9c1c0248 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
    805eae94 8827c5a8 9c1c0248 9c1c0248 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    805eaeac 95ca44ab 98383c10 9c1c0248 00000000 ndis!NdisFSendNetBufferLists+0x18
    805eaf28 8827c638 98344420 9c1c0248 00000000 pacer!PcFilterSendNetBufferLists+0x233
    805eaf44 8834764a 9c1c0248 9c1c0248 00000000 ndis!ndisSendNBLToFilter+0x87
    805eaf68 884691ae 969be2d8 9c1c0248 00000000 ndis!NdisSendNetBufferLists+0x4f
    805eafb0 88468d8c 968c8008 00000000 00000000 tcpip!FlSendPackets+0x399
    805eaff0 8846899b 884cdc68 00000000 00000000 tcpip!IppFragmentPackets+0x201
    805eaff0 00000000 884cdc68 00000000 00000000 tcpip!IppDispatchSendPacketHelper+0x252


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NETIO!NetioDereferenceNetBufferListChain+cf
    883b0c7f 5b pop ebx

    SYMBOL_STACK_INDEX: 2

    SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+cf

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME: NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 47919103

    FAILURE_BUCKET_ID: 0x7f_8_NETIO!NetioDereferenceNetBufferListChain+cf

    BUCKET_ID: 0x7f_8_NETIO!NetioDereferenceNetBufferListChain+cf

    Followup: MachineOwner
     
  2. Frederic

    Frederic LnS Developer

    Joined:
    Jan 9, 2003
    Posts:
    4,354
    Location:
    France
    Bonjour,

    Envoyez-nous (à lnssupport@soft4ever.com) le minidump du rapport N°4 pour lequel le plantage intervient directement dans lnsfw.

    Comme le plantage se produit dans le réseau, c'est normal que lnsfw soit présent dans la pile des appels systèmes (tout comme tcpip, NETw4v32, nwifi... qui apparaissent aussi à chaque fois).

    Vu la taille de cette pile d'appel au moment des différents crashs (c'est assez rare de voir autant de couches réseau empilées), je pencherais pour un débordement de pile.

    Oui, le post référencé parlais aussi de NETIO.SYS qui apparait aussi ici dans ces rapports. Par contre c'était sous x64, ce n'est pas votre cas, si ?
    Je ne sais pas ce qu'est ce driver, mais quand on fait une recherche on tombe sur pas mal de cas à ecrans bleus aussi.

    Cordialement,

    Frédéric
     
Thread Status:
Not open for further replies.