2015-08-03 17:57 GMT+02:00 Yang Luo <hsluoyb@xxxxxxxxx>:Hi Pascal,Thanks for testing. The output of your dump is pasted below. It seems that NdisFOidRequest call fails in Npcap's NPF_GetDeviceMTU routine. It is in the same position with the previous SYSTEM_SERVICE_EXCEPTION BSoD. So I think they may belong to the same bug. However, I didn't find what's wrong with this code (go to this link if anyone is interested with the code: https://github.com/nmap/npcap/blob/master/packetWin7/npf/npf/Openclos.c, Line: 570). WinDbg said "An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high." But actually all arguments of NdisFOidRequest are from the OPEN_INSTANCE struct and this struct is allocated in a NonPaged pool, so it's hard to understand its reason.Another way is to reproduce this BSoD. I didn't encounter this BSoD before, from the dump I only recognized that you installed VirtualBox. It will be very helpful if you can provide the reproduce steps.Yes I have Virtualbox 5.0 installed (which allows me to run a Windows 10 RTM machine on which Npcap does not crash (I could even capture some loopbak traffic and find - and fix - a bug in Wireshark: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11412).To reproduce the crash on this machine, it is as simple as:- installing Npcap- rebooting the laptop (I did not try without rebooting)- Launching Wireshark 1.99.9 development build (you can find some nightly installers here: https://www.wireshark.org/download/automated/ )- And bang it crashes immediately during Wireshark initialization (presumably when dumpcap tries to retrieve interfaces, but I could not confirm this as my PC reboots immediately)Cheers,YangLoading User SymbolsPEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for detailsLoading unloaded module list.........................******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck D1, {7fefe838, 2, 0, fffff880010d86c2}Probably caused by : npf.sys ( npf!NPF_GetDeviceMTU+ad )Followup: MachineOwner---------6: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If kernel debugger is available get stack backtrace.Arguments:Arg1: 000000007fefe838, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000000, value 0 = read operation, 1 = write operationArg4: fffff880010d86c2, address which referenced memoryDebugging Details:------------------SYSTEM_SKU: LENOVO_MT_20AN_BU_Think_FM_ThinkPad T440pSYSTEM_VERSION: ThinkPad T440pBIOS_DATE: 10/21/2014BASEBOARD_PRODUCT: 20AN006VFRBASEBOARD_VERSION: 0B98401 PROBUGCHECK_P1: 7fefe838BUGCHECK_P2: 2BUGCHECK_P3: 0BUGCHECK_P4: fffff880010d86c2READ_ADDRESS: 000000007fefe838CURRENT_IRQL: 2FAULTING_IP:ndis!ndisFQueueRequestOnNext+a2fffff880`010d86c2 0fb638 movzx edi,byte ptr [rax]CPU_COUNT: 8CPU_MHZ: 95aCPU_VENDOR: GenuineIntelCPU_FAMILY: 6CPU_MODEL: 3cCPU_STEPPING: 3DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULTBUGCHECK_STR: 0xD1PROCESS_NAME: dumpcap.exeANALYSIS_VERSION: 10.0.10240.9 amd64freTRAP_FRAME: fffff8800e07f2c0 -- (.trap 0xfffff8800e07f2c0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=000000007fefe838 rbx=0000000000000000 rcx=fffffa800a6f8d00rdx=fffffa8016f500c0 rsi=0000000000000000 rdi=0000000000000000rip=fffff880010d86c2 rsp=fffff8800e07f450 rbp=fffff88001138110r8=0000000000000000 r9=0000000000000000 r10=0000000000000000r11=fffff8800e07f448 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei ng nz na po ncndis!ndisFQueueRequestOnNext+0xa2:fffff880`010d86c2 0fb638 movzx edi,byte ptr [rax] ds:00000000`7fefe838=??Resetting default scopeLAST_CONTROL_TRANSFER: from fffff80003080e69 to fffff800030818c0STACK_TEXT:fffff880`0e07f178 fffff800`03080e69 : 00000000`0000000a 00000000`7fefe838 00000000`00000002 00000000`00000000 : nt!KeBugCheckExfffff880`0e07f180 fffff800`0307fae0 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`c0000001 : nt!KiBugCheckDispatch+0x69fffff880`0e07f2c0 fffff880`010d86c2 : fffffa80`0a6f8c80 fffff800`03215588 fffffa80`0a6f8c80 00000000`c0000001 : nt!KiPageFault+0x260fffff880`0e07f450 fffff880`010d8cf9 : fffff880`0e07f500 fffff880`01138110 fffffa80`16f50000 fffff800`0309867f : ndis!ndisFQueueRequestOnNext+0xa2fffff880`0e07f4c0 fffff880`01d8d1d1 : fffffa80`16f50098 fffffa80`16f50000 fffffa80`16f50098 00000000`00000000 : ndis!NdisFOidRequest+0xc9fffff880`0e07f5a0 fffff880`01d8d51f : fffffa80`09c9b5b0 fffffa80`16cd5410 fffffa80`16cd5340 fffffa80`16f50000 : npf!NPF_GetDeviceMTU+0xad [j:\npcap\packetwin7\npf\npf\openclos.c @ 570]fffff880`0e07f5e0 fffff800`0337fb4b : 00000000`00000025 00000000`00000040 fffffa80`16da8c90 fffffa80`16da8d28 : npf!NPF_OpenAdapter+0xef [j:\npcap\packetwin7\npf\npf\openclos.c @ 308]fffff880`0e07f610 fffff800`0337bb5e : fffffa80`09c9b460 00000000`00000000 fffffa80`13c75750 00000000`00000001 : nt!IopParseDevice+0x14e2fffff880`0e07f770 fffff800`0337c646 : 00000000`00000000 fffff880`0e07f8f0 fffff8a0`00000040 fffffa80`06d5d080 : nt!ObpLookupObjectName+0x784fffff880`0e07f870 fffff800`0337df4c : fffffa80`16df4e60 00000000`00000000 fffff8a0`07bcc701 00000000`00000000 : nt!ObOpenObjectByName+0x306fffff880`0e07f940 fffff800`03389574 : 00000000`001edbf8 00000000`c0100080 00000000`001ee4c0 00000000`001edc10 : nt!IopCreateFile+0x2bcfffff880`0e07f9e0 fffff800`03080b53 : fffffa80`16e81b50 fffff880`0e07fb60 fffffa80`16e81b50 fffff800`03377894 : nt!NtCreateFile+0x78fffff880`0e07fa70 00000000`7701e10a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`001edb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7701e10aOn Mon, Aug 3, 2015 at 6:35 PM, Pascal Quantin <pascal.quantin@xxxxxxxxx> wrote:___________________________________________________________________________Hi Yang
2015-08-03 9:33 GMT+02:00 Yang Luo <hsluoyb@xxxxxxxxx>:
>
> Hi list,
>
> I think have fixed the BAD_POOL_CALLER BSoD in Npcap 0.03 r3 version, it turns out to be a memory double-free bug in WFP classifyFn function used for loopback packet capturing. The lastest installer is: https://svn.nmap.org/nmap-exp/yang/NPcap-LWF/npcap-nmap-0.03-r3.exe
>
> I have tested it under Win 8.1 x64 with VMware Workstation 11 installed and Win10 x64, if you encounter any BSoDs with this version, please let me know.I just gave it a try on the Windows 7 x64 laptop that was crashing last week:
- like Tyson my Wifi is no more working when installing Npcap. No issue when using shutting down Wifi and using Ethernet
- I still get a BSoD when launching Wireshark. The full and mini memory dumps are available here: https://www.dropbox.com/sh/2oz00ox20kv3oe0/AACFQC83vyKS2dY7bI7hnZBOa?dl=0Cheers,
Pascal.
Sent via: Wireshark-dev mailing list <wireshark-dev@xxxxxxxxxxxxx>
Archives: https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
mailto:wireshark-dev-request@xxxxxxxxxxxxx?subject=unsubscribe
___________________________________________________________________________
Sent via: Wireshark-dev mailing list <wireshark-dev@xxxxxxxxxxxxx>
Archives: https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
mailto:wireshark-dev-request@xxxxxxxxxxxxx?subject=unsubscribe
___________________________________________________________________________
Sent via: Wireshark-dev mailing list <wireshark-dev@xxxxxxxxxxxxx>
Archives: https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
mailto:wireshark-dev-request@xxxxxxxxxxxxx?subject=unsubscribe
- References:
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Yang Luo
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Tyson Key
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Yang Luo
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Yang Luo
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Pascal Quantin
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Yang Luo
- Re: [Wireshark-dev] Npcap 0.03 call for test
- From: Pascal Quantin
- Re: [Wireshark-dev] Npcap 0.03 call for test
- Prev by Date: Re: [Wireshark-dev] Npcap 0.03 call for test
- Next by Date: Re: [Wireshark-dev] Npcap 0.03 call for test
- Previous by thread: Re: [Wireshark-dev] Npcap 0.03 call for test
- Next by thread: Re: [Wireshark-dev] Npcap 0.03 call for test
- Index(es):