Wireshark mailing list archives

Re: Npcap 0.03 call for test


From: Jim Young <jyoung () gsu edu>
Date: Mon, 3 Aug 2015 18:52:37 +0000




________________________________
From: wireshark-dev-bounces () wireshark org <wireshark-dev-bounces () wireshark org> on behalf of Pascal Quantin 
<pascal.quantin () gmail com>
Sent: Monday, August 3, 2015 12:48
To: Developer support list for Wireshark
Subject: Re: [Wireshark-dev] Npcap 0.03 call for test

Hello Yang,

Since my last comments I've been (quietly) testing the various updated Npcap releases.   I've really had nothing new to 
add to Tyson's and Pascal's comments until now.

I'm currently testing with Npcap 0.03-r3.

But unlike Pascal I do not crash when starting Wireshark.

Up until this version I could reliably blue screen my Windows 8.1 machine simply by loading a Buildbot development 
version of Wireshark (I had been testing with 1.99.9-7-g23ca456) and simply leaving the Wireshark's Qt based Welcome 
screen up.  The Qt version of Wireshark will display spark lines of traffic through the various interfaces.  I would 
simply walk away and leave the system alone.  Prior to Npcap 0.03-r3 the system would generally bluescreen within 10 to 
20 minutes (but sometimes more than an hour would pass before Windows would crash).   Most of these crashes were with 
the bug check string BAD_POOL_CALLER, but two times since last Thursday morning the crashes had the bug check string 
BAD_POOL_HEADER.  I have mini-dumps for those crashes but not a full dump.  (I've switched to collecting full dumps 
now).

From my point-of-view Npcap 0.03-r3 so far appears to be the most stable of the Npcap versions I've been testing with.

I did have the Npcap installation stall problem that I have reported in my earlier comments.  I have a theory (which I 
will be testing later today) regarding how to replicate the Npcap installer stall.

I have VirtualBox 5.0 installed on the Windows 8.1 machine but at this point I am not currently running any VMs.

Since you released the first Npcap 0.03 version (I believe) I have not seen any more dialog pop-ups about the Cisco 
AnyConnect VPN adapter (but I also have not attempted to use same in the last week or so either).  (FWIW: The Device 
Manager's Device Description for this adapter is "Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for 
Windows x64" with a Driver Date of Friday, August 30, 2013 and Driver Version of 3.1.4065.0).  I did just find this 
particular Network adapter disabled so I have re-enabled and will wait and see if any new Cisco AnyConnect VPN error 
dialogs pop up.

Since you resolved the TCP payload issues I can see the TCP payload packets that traverse the loopback interface (for 
example the payload packets when Firefox is running).

Over the next week I hope to be able to leverage some other tools to more extensively push the limits of sniffing on 
the loopback interface and also perhaps compare capture performance of Npcap version WinPcap on standard interfaces.

Best regards,

Jim Y.


2015-08-03 17:57 GMT+02:00 Yang Luo <hsluoyb () gmail com<mailto:hsluoyb () gmail com>>:
Hi Pascal,

Thanks for testing. The output of your dump is pasted below. It seems that NdisFOidRequest call fails in Npcap's 
NPF_GetDeviceMTU routine. It is in the same position with the previous SYSTEM_SERVICE_EXCEPTION BSoD. So I think they 
may belong to the same bug. However, I didn't find what's wrong with this code (go to this link if anyone is interested 
with the code: https://github.com/nmap/npcap/blob/master/packetWin7/npf/npf/Openclos.c, Line: 570). WinDbg said "An 
attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too 
high." But actually all arguments of NdisFOidRequest are from the OPEN_INSTANCE struct and this struct is allocated in 
a NonPaged pool, so it's hard to understand its reason.

Another way is to reproduce this BSoD. I didn't encounter this BSoD before, from the dump I only recognized that you 
installed VirtualBox. It will be very helpful if you can provide the reproduce steps.

Yes I have Virtualbox 5.0 installed (which allows me to run a Windows 10 RTM  machine on which Npcap does not crash (I 
could even capture some loopbak traffic and find - and fix - a bug in Wireshark: 
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11412).
To reproduce the crash on this machine, it is as simple as:
- installing Npcap
- rebooting the laptop (I did not try without rebooting)
- Launching Wireshark 1.99.9 development build (you can find some nightly installers here: 
https://www.wireshark.org/download/automated/ )
- And bang it crashes immediately during Wireshark initialization (presumably when dumpcap tries to retrieve 
interfaces, but I could not confirm this as my PC reboots immediately)

<SNIP>

On Mon, Aug 3, 2015 at 6:35 PM, Pascal Quantin <pascal.quantin () gmail com<mailto:pascal.quantin () gmail com>> wrote:

Hi Yang

2015-08-03 9:33 GMT+02:00 Yang Luo <hsluoyb () gmail com<mailto:hsluoyb () gmail com>>:

Hi list,

I think have fixed the BAD_POOL_CALLER BSoD in Npcap 0.03 r3 version, it turns out to be a memory double-free bug in 
WFP classifyFn function used for loopback packet capturing. The lastest installer is: 
https://svn.nmap.org/nmap-exp/yang/NPcap-LWF/npcap-nmap-0.03-r3.exe

I have tested it under Win 8.1 x64 with VMware Workstation 11 installed and Win10 x64, if you encounter any BSoDs 
with this version, please let me know.

I just gave it a try on the Windows 7 x64 laptop that was crashing last week:
- like Tyson my Wifi is no more working when installing Npcap. No issue when using shutting down Wifi and using Ethernet
- I still get a BSoD when launching Wireshark. The full and mini memory dumps are available here: 
https://www.dropbox.com/sh/2oz00ox20kv3oe0/AACFQC83vyKS2dY7bI7hnZBOa?dl=0

Cheers,
Pascal.

___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev () wireshark org<mailto:wireshark-dev () wireshark org>>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-request () wireshark org<mailto:wireshark-dev-request () wireshark 
org>?subject=unsubscribe


___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev () wireshark org<mailto:wireshark-dev () wireshark org>>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-request () wireshark org<mailto:wireshark-dev-request () wireshark 
org>?subject=unsubscribe

___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev () wireshark org>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-request () wireshark org?subject=unsubscribe

Current thread: