Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BSOD DPC_WATCHDOG_VIOLATION (133) in npcap!NPF_TapEx #758

Open
r4v3n6 opened this issue Oct 22, 2024 · 0 comments
Open

BSOD DPC_WATCHDOG_VIOLATION (133) in npcap!NPF_TapEx #758

r4v3n6 opened this issue Oct 22, 2024 · 0 comments

Comments

@r4v3n6
Copy link

r4v3n6 commented Oct 22, 2024

Describe the bug
After upgrading Wireshark + NPCap to latest version on two computers, both get BSOD crashes.
Both systems has been running without BSODs for years (cannot remember last time)
Not sure if something related to npcap or something else, but issue started just after npcap upgrade.
I tried to downgrade to npcap 1.78 after first crash, but it also crashed with 1.78. Not sure if crashes can cause problems to uninstall/downgrade or if same issue is with 1.78 also. Right now npcap is completely uninstalled and no crashes since.

To Reproduce
Windows 11 latest version with all windows updates
Steps to reproduce the behavior:
Wireshark (with NPCAP installed) older version, 4.2.x
Upgrade to latest Wireshark 4.4.1 (NPCap 1.79)
BSOD crash recently after the upgrade

Expected behavior
No crash

Screenshots
If applicable, add screenshots to help explain your problem.

Diagnostic information
Windows 11 Version 24H2, OS Build 26100.2152) - Release preview : KB5044384
Dell precision 3581 and HP ZBook 15 G5 with same issue
VPN connected

  • Output of DiagReport
  • Installation logs
  • If installation failed, include SetupApi.dev.log
  • If blue screen crash (BSoD), provide Windows memory dump file. This may include sensitive information that should not be posted to Github. You may email it to [email protected] instead. Reference the issue number in the subject of the email.
  • Any special hardware or software that may be relevant: VPN, firewall, antivirus, virtualization (SR-IOV passthrough, etc).

Additional context
STACK_TEXT:
ffffac01dfdb4b48 fffff8057c9b7ff9 : 0000000000000133 0000000000000001 0000000000001e00 fffff8057d5c33a0 : nt!KeBugCheckEx
nt!KeAccumulateTicks
nt!KiUpdateRunTime
nt!KiUpdateTime
nt!KeClockInterruptNotify
nt!KiCallInterruptServiceRoutine
nt!KiInterruptSubDispatchNoLockNoEtw
nt!KiInterruptDispatchNoLockNoEtw
nt!KxWaitForSpinLockAndAcquire
nt!KeAcquireSpinLockRaiseToDpc
wanarp!WanNdisReceivePackets
NDIS!ndisMIndicateNetBufferListsToOpen
NDIS!NdisFIndicateReceiveNetBufferLists
pacer!PcFilterReceiveNetBufferLists
NDIS!NdisFIndicateReceiveNetBufferLists
ffffa90b9543fb20 fffff8050f83161b : 0000000000006e38 ffffa90b9543fc70 ffff958f4f165a20 ffff958f4ba08560 : npcap!NPF_TapEx+0x91 [C:\Users\Nmap\Documents\Repos\npcap\packetWin7\npf\npf\Read.c @ 937]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant