[ofw] Is this a known issue? (a bugcheck in Winmad)
James Yang
jyang at xsigo.com
Fri Mar 27 16:54:22 PDT 2009
Hi,
I tried to install the hca driver and occasionally got this bugcheck.
I'm wondering if this is a known issue or something else. I'm using code
based on rev 1864.
Thanks,
James
-----------------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffffa60073c2c57, The address that the exception occurred at
Arg3: fffffa6001dd8d78, Exception Record Address
Arg4: fffffa6001dd8750, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
winmad!WmIbDeviceCleanup+4b
[c:\windows-openib\src\winib-1864a\core\winmad\kernel\wm_driver.c @ 378]
fffffa60`073c2c57 4c8919 mov qword ptr [rcx],r11
EXCEPTION_RECORD: fffffa6001dd8d78 -- (.exr 0xfffffa6001dd8d78)
ExceptionAddress: fffffa60073c2c57
(winmad!WmIbDeviceCleanup+0x000000000000004b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000
CONTEXT: fffffa6001dd8750 -- (.cxr 0xfffffa6001dd8750)
rax=fffffa60073c7010 rbx=fffffa800caca7c0 rcx=0000000000000000
rdx=0000057ff3535b78 rsi=fffffa800caca4a0 rdi=fffffa800caca7f0
rip=fffffa60073c2c57 rsp=fffffa6001dd8fb0 rbp=fffffa800caca4a0
r8=fffffa60073c6140 r9=0000000000000000 r10=fffffa800875e000
r11=0000000000000000 r12=0000000000000008 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b
efl=00010286
winmad!WmIbDeviceCleanup+0x4b:
fffffa60`073c2c57 4c8919 mov qword ptr [rcx],r11
ds:002b:00000000`00000000=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
referenced memory at "0x%08lx". The memory could not be "%s".
WRITE_ADDRESS: 0000000000000000
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffffa6000a5d3f9 to fffffa60073c2c57
STACK_TEXT:
fffffa60`01dd8fb0 fffffa60`00a5d3f9 : fffffa80`0caca7c0
00000000`00000008 fffffa80`0caca4a0 fffffa80`0ca5a870 :
winmad!WmIbDeviceCleanup+0x4b
[c:\windows-openib\src\winib-1864a\core\winmad\kernel\wm_driver.c @ 378]
fffffa60`01dd9010 fffffa60`00a61e9f : fffffa80`0caca480
fffffa60`01dd9130 00000000`00f80010 fffff880`05870722 :
Wdf01000!FxObject::CallCleanup+0x45
fffffa60`01dd9040 fffffa60`00a6128e : fffffa00`c0000008
fffffa80`0caca480 00000000`00000100 fffffa80`0ae44b01 :
Wdf01000!FxObject::DisposeChildrenWorker+0x3af
fffffa60`01dd91a0 fffffa60`00a61673 : fffffa60`01dd9320
fffffa80`0caca480 fffffa80`0ae44b01 fffffa60`00a5da91 :
Wdf01000!FxObject::PerformDisposingDisposeChildrenLocked+0x1ca
fffffa60`01dd92a0 fffffa60`00a60a7b : fffffa80`0cb23350
fffffa80`0caca400 fffffa80`0ae44c50 00000000`00000004 :
Wdf01000!FxObject::PerformEarlyDisposeWorkerAndUnlock+0x203
fffffa60`01dd9370 fffffa60`00a95c6d : 00000000`00000000
fffffa80`0cb0c1c0 00000000`00000124 fffffa80`0ae44bf0 :
Wdf01000!FxObject::EarlyDispose+0x217
fffffa60`01dd9440 fffffa60`00a93cbd : 0000057f`f51bb408
fffffa80`0ae44bf0 fffffa80`0cb0c1c0 00000000`00000136 :
Wdf01000!FxPkgPnp::PnpEventRemovedCommonCode+0x285
fffffa60`01dd94b0 fffffa60`00a94dd4 : fffffa80`0cb0c1c0
fffff880`058e4044 00000000`00000000 00000000`0000000e :
Wdf01000!FxPkgFdo::PnpEventFdoRemovedOverload+0x9
fffffa60`01dd94e0 fffffa60`00a94722 : 00300030`00000124
00300030`00000136 fffffa80`0caa34b0 0000057f`f3535b78 :
Wdf01000!FxPkgPnp::PnpEnterNewState+0x2ac
fffffa60`01dd9590 fffffa60`00a94494 : fffffa60`00000000
00000000`00000001 fffff880`0497b700 00000000`00000000 :
Wdf01000!FxPkgPnp::PnpProcessEventInner+0x12a
fffffa60`01dd9660 fffffa60`00a88e70 : 00000000`00000000
00000000`00000008 fffffa60`01dd9830 00000000`0000000a :
Wdf01000!FxPkgPnp::PnpProcessEvent+0x408
fffffa60`01dd9720 fffffa60`00a86f6d : fffffa80`0a5ed330
fffffa80`0a5ed290 00000000`00000000 fffffa80`0cea46b0 :
Wdf01000!FxPkgPnp::_PnpRemoveDevice+0x94
fffffa60`01dd97a0 fffffa60`00a64865 : 00000000`00000000
fffff800`016bb102 fffffa80`0cea44c0 fffffa80`0caa34b0 :
Wdf01000!FxPkgPnp::Dispatch+0x6f5
fffffa60`01dd9890 fffffa60`00a6476b : fffffa80`0cea44c0
00000000`00000000 fffffa80`0caa34b0 00000000`c00000bb :
Wdf01000!FxDevice::Dispatch+0xa9
fffffa60`01dd98c0 fffff800`018bf72e : fffffa80`0cea44c0
00000000`00000000 fffffa60`01dd99b8 fffff800`019d46a9 :
Wdf01000!FxDevice::DispatchWithLock+0x93
fffffa60`01dd9900 fffff800`01a899e1 : fffffa80`0a4b0060
00000000`00000000 fffffa80`0cb12010 00000000`00000002 :
nt!IopSynchronousCall+0x10a
fffffa60`01dd9970 fffff800`01782266 : fffff880`006138d0
fffff880`006138d0 fffff880`006138f0 00000000`00000000 :
nt!IopRemoveDevice+0x101
fffffa60`01dd9a30 fffff800`01a89524 : fffffa80`0cb12010
00000000`00000000 00000000`00000002 fffffa80`0c9cb8d0 :
nt!PnpRemoveLockedDeviceNode+0x1a6
fffffa60`01dd9a80 fffff800`01a89640 : 00000000`00000000
fffffa80`0cb12000 fffff880`0496e7b0 fffff800`3f051397 :
nt!PnpDeleteLockedDeviceNode+0x44
fffffa60`01dd9ab0 fffff800`01a8dcf7 : 00000000`00000002
00000000`00000000 00000000`00000006 fffffa80`0cb12010 :
nt!PnpDeleteLockedDeviceNodes+0xa0
fffffa60`01dd9b20 fffff800`01a8e32c : fffffa60`01dd9cf8
fffffa80`0b559000 fffffa80`048b7b00 fffffa80`00000000 :
nt!PnpProcessQueryRemoveAndEject+0xbe7
fffffa60`01dd9c70 fffff800`0198e9c7 : 00000000`00000001
fffffa80`0b559010 fffff880`0586ca60 00000000`00000000 :
nt!PnpProcessTargetDeviceEvent+0x4c
fffffa60`01dd9ca0 fffff800`016b7066 : fffff800`018be594
fffff880`0586ca60 fffff800`017e78f8 fffffa80`048b7bb0 : nt! ??
::NNGAKEGL::`string'+0x4c0d4
fffffa60`01dd9cf0 fffff800`018cdde3 : fffffa80`0b559010
00000000`00000000 fffffa80`048b7bb0 00000000`00000080 :
nt!ExpWorkerThread+0x11a
fffffa60`01dd9d50 fffff800`016e4536 : fffffa60`01b00180
fffffa80`048b7bb0 fffffa60`01b09d40 00000000`00000001 :
nt!PspSystemThreadStartup+0x57
fffffa60`01dd9d80 00000000`00000000 : 00000000`00000000
00000000`00000000 00000000`00000000 00000000`00000000 :
nt!KiStartSystemThread+0x16
FOLLOWUP_IP:
winmad!WmIbDeviceCleanup+4b
[c:\windows-openib\src\winib-1864a\core\winmad\kernel\wm_driver.c @ 378]
fffffa60`073c2c57 4c8919 mov qword ptr [rcx],r11
FAULTING_SOURCE_CODE:
374: pdev = (WmIbDeviceGetContext(Device));
375:
376: KeAcquireGuardedMutex(&Lock);
377: RemoveEntryList(&pdev->Entry);
> 378: destroy = IsListEmpty(&DevList);
379: ctrldev = ControlDevice;
380:
381: for (entry = ProvList.Flink; entry != &ProvList; entry =
entry->Flink) {
382: prov = CONTAINING_RECORD(entry, WM_PROVIDER,
Entry);
383: WmProviderRemoveHandler(prov, pdev);
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: winmad!WmIbDeviceCleanup+4b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: winmad
IMAGE_NAME: winmad.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49790ebd
STACK_COMMAND: .cxr 0xfffffa6001dd8750 ; kb
FAILURE_BUCKET_ID: X64_0x7E_winmad!WmIbDeviceCleanup+4b
BUCKET_ID: X64_0x7E_winmad!WmIbDeviceCleanup+4b
Followup: MachineOwner
---------
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openfabrics.org/pipermail/ofw/attachments/20090327/e1da3b1e/attachment.html>
More information about the ofw
mailing list