[ofw] Is this a known issue? (a bugcheck in Winmad)

James Yang jyang at xsigo.com
Fri Mar 27 16:54:22 PDT 2009


Hi,

 

I tried to install the hca driver and occasionally got this bugcheck.
I'm wondering if this is a known issue or something else. I'm using code
based on rev 1864.

 

Thanks,

James

 

-----------------

 

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)

This is a very common bugcheck.  Usually the exception address pinpoints

the driver/function that caused the problem.  Always note this address

as well as the link date of the driver/image that contains this address.

Arguments:

Arg1: ffffffffc0000005, The exception code that was not handled

Arg2: fffffa60073c2c57, The address that the exception occurred at

Arg3: fffffa6001dd8d78, Exception Record Address

Arg4: fffffa6001dd8750, Context Record Address

 

Debugging Details:

------------------

 

 

 

 

 

 

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
referenced memory at "0x%08lx". The memory could not be "%s".

 

FAULTING_IP: 

winmad!WmIbDeviceCleanup+4b
[c:\windows-openib\src\winib-1864a\core\winmad\kernel\wm_driver.c @ 378]

fffffa60`073c2c57 4c8919          mov     qword ptr [rcx],r11

 

EXCEPTION_RECORD:  fffffa6001dd8d78 -- (.exr 0xfffffa6001dd8d78)

ExceptionAddress: fffffa60073c2c57
(winmad!WmIbDeviceCleanup+0x000000000000004b)

   ExceptionCode: c0000005 (Access violation)

  ExceptionFlags: 00000000

NumberParameters: 2

   Parameter[0]: 0000000000000001

   Parameter[1]: 0000000000000000

Attempt to write to address 0000000000000000

 

CONTEXT:  fffffa6001dd8750 -- (.cxr 0xfffffa6001dd8750)

rax=fffffa60073c7010 rbx=fffffa800caca7c0 rcx=0000000000000000

rdx=0000057ff3535b78 rsi=fffffa800caca4a0 rdi=fffffa800caca7f0

rip=fffffa60073c2c57 rsp=fffffa6001dd8fb0 rbp=fffffa800caca4a0

 r8=fffffa60073c6140  r9=0000000000000000 r10=fffffa800875e000

r11=0000000000000000 r12=0000000000000008 r13=0000000000000001

r14=0000000000000000 r15=0000000000000001

iopl=0         nv up ei ng nz na po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b
efl=00010286

winmad!WmIbDeviceCleanup+0x4b:

fffffa60`073c2c57 4c8919          mov     qword ptr [rcx],r11
ds:002b:00000000`00000000=????????????????

Resetting default scope

 

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

 

PROCESS_NAME:  System

 

CURRENT_IRQL:  0

 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
referenced memory at "0x%08lx". The memory could not be "%s".

 

WRITE_ADDRESS:  0000000000000000 

 

BUGCHECK_STR:  0x7E

 

LAST_CONTROL_TRANSFER:  from fffffa6000a5d3f9 to fffffa60073c2c57

 

STACK_TEXT:  

fffffa60`01dd8fb0 fffffa60`00a5d3f9 : fffffa80`0caca7c0
00000000`00000008 fffffa80`0caca4a0 fffffa80`0ca5a870 :
winmad!WmIbDeviceCleanup+0x4b
[c:\windows-openib\src\winib-1864a\core\winmad\kernel\wm_driver.c @ 378]

fffffa60`01dd9010 fffffa60`00a61e9f : fffffa80`0caca480
fffffa60`01dd9130 00000000`00f80010 fffff880`05870722 :
Wdf01000!FxObject::CallCleanup+0x45

fffffa60`01dd9040 fffffa60`00a6128e : fffffa00`c0000008
fffffa80`0caca480 00000000`00000100 fffffa80`0ae44b01 :
Wdf01000!FxObject::DisposeChildrenWorker+0x3af

fffffa60`01dd91a0 fffffa60`00a61673 : fffffa60`01dd9320
fffffa80`0caca480 fffffa80`0ae44b01 fffffa60`00a5da91 :
Wdf01000!FxObject::PerformDisposingDisposeChildrenLocked+0x1ca

fffffa60`01dd92a0 fffffa60`00a60a7b : fffffa80`0cb23350
fffffa80`0caca400 fffffa80`0ae44c50 00000000`00000004 :
Wdf01000!FxObject::PerformEarlyDisposeWorkerAndUnlock+0x203

fffffa60`01dd9370 fffffa60`00a95c6d : 00000000`00000000
fffffa80`0cb0c1c0 00000000`00000124 fffffa80`0ae44bf0 :
Wdf01000!FxObject::EarlyDispose+0x217

fffffa60`01dd9440 fffffa60`00a93cbd : 0000057f`f51bb408
fffffa80`0ae44bf0 fffffa80`0cb0c1c0 00000000`00000136 :
Wdf01000!FxPkgPnp::PnpEventRemovedCommonCode+0x285

fffffa60`01dd94b0 fffffa60`00a94dd4 : fffffa80`0cb0c1c0
fffff880`058e4044 00000000`00000000 00000000`0000000e :
Wdf01000!FxPkgFdo::PnpEventFdoRemovedOverload+0x9

fffffa60`01dd94e0 fffffa60`00a94722 : 00300030`00000124
00300030`00000136 fffffa80`0caa34b0 0000057f`f3535b78 :
Wdf01000!FxPkgPnp::PnpEnterNewState+0x2ac

fffffa60`01dd9590 fffffa60`00a94494 : fffffa60`00000000
00000000`00000001 fffff880`0497b700 00000000`00000000 :
Wdf01000!FxPkgPnp::PnpProcessEventInner+0x12a

fffffa60`01dd9660 fffffa60`00a88e70 : 00000000`00000000
00000000`00000008 fffffa60`01dd9830 00000000`0000000a :
Wdf01000!FxPkgPnp::PnpProcessEvent+0x408

fffffa60`01dd9720 fffffa60`00a86f6d : fffffa80`0a5ed330
fffffa80`0a5ed290 00000000`00000000 fffffa80`0cea46b0 :
Wdf01000!FxPkgPnp::_PnpRemoveDevice+0x94

fffffa60`01dd97a0 fffffa60`00a64865 : 00000000`00000000
fffff800`016bb102 fffffa80`0cea44c0 fffffa80`0caa34b0 :
Wdf01000!FxPkgPnp::Dispatch+0x6f5

fffffa60`01dd9890 fffffa60`00a6476b : fffffa80`0cea44c0
00000000`00000000 fffffa80`0caa34b0 00000000`c00000bb :
Wdf01000!FxDevice::Dispatch+0xa9

fffffa60`01dd98c0 fffff800`018bf72e : fffffa80`0cea44c0
00000000`00000000 fffffa60`01dd99b8 fffff800`019d46a9 :
Wdf01000!FxDevice::DispatchWithLock+0x93

fffffa60`01dd9900 fffff800`01a899e1 : fffffa80`0a4b0060
00000000`00000000 fffffa80`0cb12010 00000000`00000002 :
nt!IopSynchronousCall+0x10a

fffffa60`01dd9970 fffff800`01782266 : fffff880`006138d0
fffff880`006138d0 fffff880`006138f0 00000000`00000000 :
nt!IopRemoveDevice+0x101

fffffa60`01dd9a30 fffff800`01a89524 : fffffa80`0cb12010
00000000`00000000 00000000`00000002 fffffa80`0c9cb8d0 :
nt!PnpRemoveLockedDeviceNode+0x1a6

fffffa60`01dd9a80 fffff800`01a89640 : 00000000`00000000
fffffa80`0cb12000 fffff880`0496e7b0 fffff800`3f051397 :
nt!PnpDeleteLockedDeviceNode+0x44

fffffa60`01dd9ab0 fffff800`01a8dcf7 : 00000000`00000002
00000000`00000000 00000000`00000006 fffffa80`0cb12010 :
nt!PnpDeleteLockedDeviceNodes+0xa0

fffffa60`01dd9b20 fffff800`01a8e32c : fffffa60`01dd9cf8
fffffa80`0b559000 fffffa80`048b7b00 fffffa80`00000000 :
nt!PnpProcessQueryRemoveAndEject+0xbe7

fffffa60`01dd9c70 fffff800`0198e9c7 : 00000000`00000001
fffffa80`0b559010 fffff880`0586ca60 00000000`00000000 :
nt!PnpProcessTargetDeviceEvent+0x4c

fffffa60`01dd9ca0 fffff800`016b7066 : fffff800`018be594
fffff880`0586ca60 fffff800`017e78f8 fffffa80`048b7bb0 : nt! ??
::NNGAKEGL::`string'+0x4c0d4

fffffa60`01dd9cf0 fffff800`018cdde3 : fffffa80`0b559010
00000000`00000000 fffffa80`048b7bb0 00000000`00000080 :
nt!ExpWorkerThread+0x11a

fffffa60`01dd9d50 fffff800`016e4536 : fffffa60`01b00180
fffffa80`048b7bb0 fffffa60`01b09d40 00000000`00000001 :
nt!PspSystemThreadStartup+0x57

fffffa60`01dd9d80 00000000`00000000 : 00000000`00000000
00000000`00000000 00000000`00000000 00000000`00000000 :
nt!KiStartSystemThread+0x16

 

 

FOLLOWUP_IP: 

winmad!WmIbDeviceCleanup+4b
[c:\windows-openib\src\winib-1864a\core\winmad\kernel\wm_driver.c @ 378]

fffffa60`073c2c57 4c8919          mov     qword ptr [rcx],r11

 

FAULTING_SOURCE_CODE:  

   374:   pdev = (WmIbDeviceGetContext(Device));

   375: 

   376:   KeAcquireGuardedMutex(&Lock);

   377:   RemoveEntryList(&pdev->Entry);

>  378: destroy = IsListEmpty(&DevList);

   379:   ctrldev = ControlDevice;

   380: 

   381:   for (entry = ProvList.Flink; entry != &ProvList; entry =
entry->Flink) {

   382:               prov = CONTAINING_RECORD(entry, WM_PROVIDER,
Entry);

   383:               WmProviderRemoveHandler(prov, pdev);

 

 

SYMBOL_STACK_INDEX:  0

 

SYMBOL_NAME:  winmad!WmIbDeviceCleanup+4b

 

FOLLOWUP_NAME:  MachineOwner

 

MODULE_NAME: winmad

 

IMAGE_NAME:  winmad.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP:  49790ebd

 

STACK_COMMAND:  .cxr 0xfffffa6001dd8750 ; kb

 

FAILURE_BUCKET_ID:  X64_0x7E_winmad!WmIbDeviceCleanup+4b

 

BUCKET_ID:  X64_0x7E_winmad!WmIbDeviceCleanup+4b

 

Followup: MachineOwner

---------

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openfabrics.org/pipermail/ofw/attachments/20090327/e1da3b1e/attachment.html>


More information about the ofw mailing list