xfu / dokan

Automatically exported from code.google.com/p/dokan
1 stars 0 forks source link

Crash in fltmgr.sys #171

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
first start a minifilter(net start passthrough),then start dokan,mirror a 
driver.
open a txt file which is under dokan mirror diver with notepad,crash.
this is stack:
fltMgr!FltpPreFsFilterOperation+0x3b
nt!FsFilterPerformCallbacks+0xa5
nt!FsRtlAcquireFileExclusiveCommon+0x173
nt!FsRtlAcquireToCreateMappedSection+0x12
nt!MmCreateSection+0x265
nt!NtCreateSection+0x12f
the call stack is the same as the one shown in a osr thread:
http://www.osronline.com/showThread.cfm?link=74100

Original issue reported on code.google.com by tangz...@gmail.com on 4 Aug 2010 at 9:52

GoogleCodeExporter commented 9 years ago
dokan library 0.5.3, wdk 7600 16385

Original comment by tangz...@gmail.com on 4 Aug 2010 at 10:00

GoogleCodeExporter commented 9 years ago
STACK_TEXT:  
81eb56a4 8288c3d8 00000000 afafafa3 00000000 nt!MmAccessFault+0x106
81eb56a4 82a99d34 00000000 afafafa3 00000000 nt!KiTrap0E+0xdc
81eb5794 82ab3a50 afafafaf 8729c66c 000000fe nt!ObpQueryNameString+0x2b
81eb57b0 8b5412b2 afafafaf 8729c66c 000000fe nt!ObQueryNameString+0x18
81eb57d8 8b53b94c afafafaf 8729c658 0ab861f1 fltmgr!FltpGetObjectName+0x24
81eb5840 8b53bc5b 85aa5600 86bfad10 86bfad10 
fltmgr!FltpFsControlMountVolume+0x76
81eb5870 82882593 85aa5600 86bfad10 82983e00 fltmgr!FltpFsControl+0x5b
81eb5888 829e5d29 82817870 86dd0b68 82817900 nt!IofCallDriver+0x63
81eb58ec 828f35eb 86dd0b68 853c9700 00000000 nt!IopMountVolume+0x1d8
81eb5924 82a91b9b 853c9780 81eb5a50 81eb59e8 nt!IopCheckVpbMounted+0x64
81eb5a08 82a71ac5 86dd0b68 8510b938 86ac0d20 nt!IopParseDevice+0x7c9
81eb5a84 82a81ed6 00000000 81eb5ad8 00000040 nt!ObpLookupObjectName+0x4fa
81eb5ae4 82a789b4 07a6cfd4 8510b938 81eb5b01 nt!ObOpenObjectByName+0x165
81eb5b60 82a7eb3a 07a6cff8 00100080 07a6cfd4 nt!IopCreateFile+0x673
81eb5ba8 96d1884e 07a6cff8 00100080 07a6cfd4 nt!NtOpenFile+0x2a
81eb5c14 828891ea 07a6cff8 00100080 07a6cfd4 bdselfpr!NewNtOpenFile+0x1c2 
[c:\repository\firewall3\branches\15.0.0.1\src\ndisim\bdfhips\ntdll.c @ 1859]
81eb5c14 77a670b4 07a6cff8 00100080 07a6cfd4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
07a6d210 00000000 00000000 00000000 00000000 0x77a670b4

bdselfpr is in passthrough mode.

Original comment by sleepwal...@yahoo.com on 12 Nov 2012 at 11:35