Hi Pascal,

I followed your steps, but unfortunately didn't reproduce the BSoD. Here's
my steps on my Win8.1 x64 VMware VM ( with Intel VT enabled, so it should
behave the same as a physical machine):

1) Installed VirtualBox 5.0.0 r101573, just opened the UI once, didn't
create any VMs.
2) Reinstalled Npcap 0.03 r3
3) Installed Wireshark-win64-1.99.9-58-g08e80b1.exe (without installing
WinPcap 4.1.3) from https://www.wireshark.org/download/automated/
4) reboot
5) Launch Wireshark (also tried Wireshark Legacy), but there's no crashes.

This is so weird.


Cheers,
Yang


On Tue, Aug 4, 2015 at 12:48 AM, Pascal Quantin <pascal.quan...@gmail.com>
wrote:

>
>
> 2015-08-03 17:57 GMT+02:00 Yang Luo <hslu...@gmail.com>:
>
>> Hi Pascal,
>>
>> Thanks for testing. The output of your dump is pasted below. It seems
>> that NdisFOidRequest call fails in Npcap's NPF_GetDeviceMTU routine. It is
>> in the same position with the previous SYSTEM_SERVICE_EXCEPTION BSoD. So
>> I think they may belong to the same bug. However, I didn't find what's
>> wrong with this code (go to this link if anyone is interested with the
>> code:
>> https://github.com/nmap/npcap/blob/master/packetWin7/npf/npf/Openclos.c,
>> Line: 570). WinDbg said "*An attempt was made to access a pageable (or
>> completely invalid) address at an interrupt request level (IRQL) that is
>> too high.*" But actually all arguments of NdisFOidRequest are from the
>> OPEN_INSTANCE struct and this struct is allocated in a NonPaged pool, so
>> it's hard to understand its reason.
>>
>> Another way is to reproduce this BSoD. I didn't encounter this BSoD
>> before, from the dump I only recognized that you installed VirtualBox. It
>> will be very helpful if you can provide the reproduce steps.
>>
>
> Yes I have Virtualbox 5.0 installed (which allows me to run a Windows 10
> RTM  machine on which Npcap does not crash (I could even capture some
> loopbak traffic and find - and fix - a bug in Wireshark:
> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11412).
> To reproduce the crash on this machine, it is as simple as:
> - installing Npcap
> - rebooting the laptop (I did not try without rebooting)
> - Launching Wireshark 1.99.9 development build (you can find some nightly
> installers here: https://www.wireshark.org/download/automated/ )
> - And bang it crashes immediately during Wireshark initialization
> (presumably when dumpcap tries to retrieve interfaces, but I could not
> confirm this as my PC reboots immediately)
>
>
>>
>> Cheers,
>> Yang
>>
>> Loading User Symbols
>> PEB is paged out (Peb.Ldr = 00000000`7efdf018).  Type ".hh dbgerr001" for
>> details
>> Loading unloaded module list
>> .........................
>>
>> *******************************************************************************
>> *
>>     *
>> *                        Bugcheck Analysis
>>      *
>> *
>>     *
>>
>> *******************************************************************************
>>
>> Use !analyze -v to get detailed debugging information.
>>
>> BugCheck D1, {7fefe838, 2, 0, fffff880010d86c2}
>>
>> Probably caused by : npf.sys ( npf!NPF_GetDeviceMTU+ad )
>>
>> Followup:     MachineOwner
>> ---------
>>
>> 6: kd> !analyze -v
>>
>> *******************************************************************************
>> *
>>     *
>> *                        Bugcheck Analysis
>>      *
>> *
>>     *
>>
>> *******************************************************************************
>>
>> DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
>> An attempt was made to access a pageable (or completely invalid) address
>> at an
>> interrupt request level (IRQL) that is too high.  This is usually
>> caused by drivers using improper addresses.
>> If kernel debugger is available get stack backtrace.
>> Arguments:
>> Arg1: 000000007fefe838, memory referenced
>> Arg2: 0000000000000002, IRQL
>> Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
>> Arg4: fffff880010d86c2, address which referenced memory
>>
>> Debugging Details:
>> ------------------
>>
>>
>> SYSTEM_SKU:  LENOVO_MT_20AN_BU_Think_FM_ThinkPad T440p
>>
>> SYSTEM_VERSION:  ThinkPad T440p
>>
>> BIOS_DATE:  10/21/2014
>>
>> BASEBOARD_PRODUCT:  20AN006VFR
>>
>> BASEBOARD_VERSION:  0B98401 PRO
>>
>> BUGCHECK_P1: 7fefe838
>>
>> BUGCHECK_P2: 2
>>
>> BUGCHECK_P3: 0
>>
>> BUGCHECK_P4: fffff880010d86c2
>>
>> READ_ADDRESS:  000000007fefe838
>>
>> CURRENT_IRQL:  2
>>
>> FAULTING_IP:
>> ndis!ndisFQueueRequestOnNext+a2
>> fffff880`010d86c2 0fb638          movzx   edi,byte ptr [rax]
>>
>> CPU_COUNT: 8
>>
>> CPU_MHZ: 95a
>>
>> CPU_VENDOR:  GenuineIntel
>>
>> CPU_FAMILY: 6
>>
>> CPU_MODEL: 3c
>>
>> CPU_STEPPING: 3
>>
>> DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
>>
>> BUGCHECK_STR:  0xD1
>>
>> PROCESS_NAME:  dumpcap.exe
>>
>> ANALYSIS_VERSION: 10.0.10240.9 amd64fre
>>
>> TRAP_FRAME:  fffff8800e07f2c0 -- (.trap 0xfffff8800e07f2c0)
>> NOTE: The trap frame does not contain all registers.
>> Some register values may be zeroed or incorrect.
>> rax=000000007fefe838 rbx=0000000000000000 rcx=fffffa800a6f8d00
>> rdx=fffffa8016f500c0 rsi=0000000000000000 rdi=0000000000000000
>> rip=fffff880010d86c2 rsp=fffff8800e07f450 rbp=fffff88001138110
>>  r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
>> r11=fffff8800e07f448 r12=0000000000000000 r13=0000000000000000
>> r14=0000000000000000 r15=0000000000000000
>> iopl=0         nv up ei ng nz na po nc
>> ndis!ndisFQueueRequestOnNext+0xa2:
>> fffff880`010d86c2 0fb638          movzx   edi,byte ptr [rax]
>> ds:00000000`7fefe838=??
>> Resetting default scope
>>
>> LAST_CONTROL_TRANSFER:  from fffff80003080e69 to fffff800030818c0
>>
>> STACK_TEXT:
>> fffff880`0e07f178 fffff800`03080e69 : 00000000`0000000a 00000000`7fefe838
>> 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
>> fffff880`0e07f180 fffff800`0307fae0 : 00000000`00000002 00000000`00000000
>> 00000000`00000000 00000000`c0000001 : nt!KiBugCheckDispatch+0x69
>> fffff880`0e07f2c0 fffff880`010d86c2 : fffffa80`0a6f8c80 fffff800`03215588
>> fffffa80`0a6f8c80 00000000`c0000001 : nt!KiPageFault+0x260
>> fffff880`0e07f450 fffff880`010d8cf9 : fffff880`0e07f500 fffff880`01138110
>> fffffa80`16f50000 fffff800`0309867f : ndis!ndisFQueueRequestOnNext+0xa2
>> fffff880`0e07f4c0 fffff880`01d8d1d1 : fffffa80`16f50098 fffffa80`16f50000
>> fffffa80`16f50098 00000000`00000000 : ndis!NdisFOidRequest+0xc9
>> fffff880`0e07f5a0 fffff880`01d8d51f : fffffa80`09c9b5b0 fffffa80`16cd5410
>> fffffa80`16cd5340 fffffa80`16f50000 : npf!NPF_GetDeviceMTU+0xad
>> [j:\npcap\packetwin7\npf\npf\openclos.c @ 570]
>> fffff880`0e07f5e0 fffff800`0337fb4b : 00000000`00000025 00000000`00000040
>> fffffa80`16da8c90 fffffa80`16da8d28 : npf!NPF_OpenAdapter+0xef
>> [j:\npcap\packetwin7\npf\npf\openclos.c @ 308]
>> fffff880`0e07f610 fffff800`0337bb5e : fffffa80`09c9b460 00000000`00000000
>> fffffa80`13c75750 00000000`00000001 : nt!IopParseDevice+0x14e2
>> fffff880`0e07f770 fffff800`0337c646 : 00000000`00000000 fffff880`0e07f8f0
>> fffff8a0`00000040 fffffa80`06d5d080 : nt!ObpLookupObjectName+0x784
>> fffff880`0e07f870 fffff800`0337df4c : fffffa80`16df4e60 00000000`00000000
>> fffff8a0`07bcc701 00000000`00000000 : nt!ObOpenObjectByName+0x306
>> fffff880`0e07f940 fffff800`03389574 : 00000000`001edbf8 00000000`c0100080
>> 00000000`001ee4c0 00000000`001edc10 : nt!IopCreateFile+0x2bc
>> fffff880`0e07f9e0 fffff800`03080b53 : fffffa80`16e81b50 fffff880`0e07fb60
>> fffffa80`16e81b50 fffff800`03377894 : nt!NtCreateFile+0x78
>> fffff880`0e07fa70 00000000`7701e10a : 00000000`00000000 00000000`00000000
>> 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
>> 00000000`001edb88 00000000`00000000 : 00000000`00000000 00000000`00000000
>> 00000000`00000000 00000000`00000000 : 0x7701e10a
>>
>>
>> On Mon, Aug 3, 2015 at 6:35 PM, Pascal Quantin <pascal.quan...@gmail.com>
>> wrote:
>>
>>> Hi Yang
>>>
>>> 2015-08-03 9:33 GMT+02:00 Yang Luo <hslu...@gmail.com>:
>>> >
>>> > Hi list,
>>> >
>>> > I think have fixed the BAD_POOL_CALLER BSoD in Npcap 0.03 r3 version,
>>> it turns out to be a memory double-free bug in WFP classifyFn function used
>>> for loopback packet capturing. The lastest installer is:
>>> https://svn.nmap.org/nmap-exp/yang/NPcap-LWF/npcap-nmap-0.03-r3.exe
>>> >
>>> > I have tested it under Win 8.1 x64 with VMware Workstation 11
>>> installed and Win10 x64, if you encounter any BSoDs with this version,
>>> please let me know.
>>>
>>> I just gave it a try on the Windows 7 x64 laptop that was crashing last
>>> week:
>>> - like Tyson my Wifi is no more working when installing Npcap. No issue
>>> when using shutting down Wifi and using Ethernet
>>> - I still get a BSoD when launching Wireshark. The full and mini memory
>>> dumps are available here:
>>> https://www.dropbox.com/sh/2oz00ox20kv3oe0/AACFQC83vyKS2dY7bI7hnZBOa?dl=0
>>>
>>> Cheers,
>>> Pascal.
>>>
>>>
>>> ___________________________________________________________________________
>>> Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
>>> Archives:    https://www.wireshark.org/lists/wireshark-dev
>>> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>>>              mailto:wireshark-dev-requ...@wireshark.org
>>> ?subject=unsubscribe
>>>
>>
>>
>>
>> ___________________________________________________________________________
>> Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
>> Archives:    https://www.wireshark.org/lists/wireshark-dev
>> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>>              mailto:wireshark-dev-requ...@wireshark.org
>> ?subject=unsubscribe
>>
>
>
> ___________________________________________________________________________
> Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
> Archives:    https://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>              mailto:wireshark-dev-requ...@wireshark.org
> ?subject=unsubscribe
>
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to