DPDK patches and discussions
 help / color / mirror / Atom feed
* [Bug 1201] virtphys sometimes causing bluescreen
@ 2023-03-28 13:24 bugzilla
  0 siblings, 0 replies; only message in thread
From: bugzilla @ 2023-03-28 13:24 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 8205 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=1201

            Bug ID: 1201
           Summary: virtphys sometimes causing bluescreen
           Product: DPDK
           Version: 22.11
          Hardware: x86
                OS: Windows
            Status: UNCONFIRMED
          Severity: critical
          Priority: Normal
         Component: other
          Assignee: dev@dpdk.org
          Reporter: a.pollenus@deltacast.tv
  Target Milestone: ---

Created attachment 247
  --> https://bugs.dpdk.org/attachment.cgi?id=247&action=edit
bluescreen

When using DPDK on windows server 2019 sometimes we get a bluescreen.

This bluescreen seams to be caused by virt2phys.sys

The issue has only been reproduced on Windows server 2019.

On windows 10,11 and server 2022 no bluescreen.

To reproduce this issue only test-pmd is necessary.

Bellow the crash analyse:

Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ja\Desktop\BSOD VCS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space
may not be available.

WARNING: Whitespace at start of path element

************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       .sympath cache*C:\MySymbols
Deferred                                      
srv*https://msdl.microsoft.com/download/symbols
WARNING: Whitespace at start of path element
Symbol search path is: .sympath
cache*C:\MySymbols;srv*https://msdl.microsoft.com/download/symbols;
C:\local\github\dpdk-kmods\windows\virt2phys\x64\Release
Executable search path is: 
WARNING: Whitespace at start of path element
Windows 10 Kernel Version 17763 MP (8 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Edition build lab: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff803`07eba000 PsLoadedModuleList = 0xfffff803`082d24d0
Debug session time: Fri Mar 24 13:59:11.850 2023 (UTC + 1:00)
System Uptime: 0 days 0:04:38.551
Loading Kernel Symbols
.............................................................Page 197e55 not
present in the dump file. Type ".hh dbgerr004" for details
..
................................................................
..............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000cd`0513b018).  Type ".hh dbgerr001" for
details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8030afe2542, Address of the instruction which caused the BugCheck
Arg3: ffffce0bfaf2e3f0, Address of the context record for the exception that
caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2280

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14939

    Key  : Analysis.Init.CPU.mSec
    Value: 4796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 85415

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 126

    Key  : WER.OS.Branch
    Value: rs5_release

    Key  : WER.OS.Timestamp
    Value: 2018-09-14T14:34:00Z

    Key  : WER.OS.Version
    Value: 10.0.17763.1


FILE_IN_CAB:  MEMORY.DMP

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8030afe2542

BUGCHECK_P3: ffffce0bfaf2e3f0

BUGCHECK_P4: 0

CONTEXT:  ffffce0bfaf2e3f0 -- (.cxr 0xffffce0bfaf2e3f0)
rax=ffffe78772ee6000 rbx=a787ff756b60cddd rcx=a787ff756b60cde5
rdx=ffffce0bfaf2f300 rsi=000001f55b600000 rdi=ffffe7876c3cde20
rip=fffff8030afe2542 rsp=ffffce0bfaf2ede0 rbp=00000000000001d4
 r8=0000000000000000  r9=7fffe787726cafd8 r10=7ffffffffffffffc
r11=ffffe78771bd6080 r12=ffffe78772282080 r13=ffffe7876ad78940
r14=0000000000200000 r15=000001f55b600000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
virt2phys!virt2phys_process_find_block+0xa [inlined in
virt2phys!virt2phys_translate+0xd2]:
fffff803`0afe2542 488b03          mov     rax,qword ptr [rbx]
ds:002b:a787ff75`6b60cddd=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


PROCESS_NAME:  vcs.exe

STACK_TEXT:  
ffffce0b`faf2ede0 fffff803`0afe15c6     : 00001878`8e199398 ffffce0b`faf2eeb9
ffffe787`71e66c60 00001878`8e199398 : virt2phys!virt2phys_translate+0xd2
[C:\local\github\dpdk-kmods\windows\virt2phys\virt2phys_logic.c @ 369] 
ffffce0b`faf2ee80 fffff80e`a28276fb     : ffffe787`6f7fc4a0 00000000`00000000
00000000`00000000 00001878`952876b8 :
virt2phys!virt2phys_device_EvtIoInCallerContext+0x1c6
[C:\local\github\dpdk-kmods\windows\virt2phys\virt2phys.c @ 225] 
ffffce0b`faf2ef20 fffff80e`a282704d     : ffffe787`6f7fc4a0 ffffe787`729ebb60
00000000`00000000 00000000`00000001 : Wdf01000!FxPkgIo::DispatchStep1+0x69b
[minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 324] 
ffffce0b`faf2efe0 fffff80e`a2821b73     : ffffe787`729ebb60 ffffe787`742d3810
00000000`00000000 fffff803`07f26c16 : Wdf01000!FxPkgIo::Dispatch+0x5d
[minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 119] 
ffffce0b`faf2f040 fffff803`07ee6d19     : ffffe787`742d3810 00000000`00000001
00000000`00000000 00000000`00000002 : Wdf01000!FxDevice::DispatchWithLock+0x113
[minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430] 
ffffce0b`faf2f0a0 fffff803`08493911     : ffffce0b`faf2f440 ffffe787`729ebb60
00000000`00000001 ffffe787`742d3810 : nt!IofCallDriver+0x59
ffffce0b`faf2f0e0 fffff803`08493681     : ffffe787`00000005 ffffe787`742d3810
ffffce0b`20206f49 ffffce0b`faf2f440 : nt!IopSynchronousServiceTail+0x1b1
ffffce0b`faf2f190 fffff803`08493746     : ffffe787`71bd6080 00000000`00000000
00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xe61
ffffce0b`faf2f2e0 fffff803`08085bf5     : ffffce0b`faf2f440 fffff803`0853286b
00000000`00000000 ffffe787`73efc700 : nt!NtDeviceIoControlFile+0x56
ffffce0b`faf2f350 00007ffa`8b450144     : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000cd`052fb568 00000000`00000000     : 00000000`00000000 00000000`00000000
00000000`00000000 00000000`00000000 : 0x00007ffa`8b450144


FAULTING_SOURCE_LINE: 
C:\local\github\dpdk-kmods\windows\virt2phys\virt2phys_logic.c

FAULTING_SOURCE_FILE: 
C:\local\github\dpdk-kmods\windows\virt2phys\virt2phys_logic.c

FAULTING_SOURCE_LINE_NUMBER:  369

FAULTING_SOURCE_CODE:  
   113:         struct virt2phys_block *cur;
   114: 
   115:         for (node = process->blocks.Next; node != NULL; node =
node->Next) {
   116:                 cur = CONTAINING_RECORD(node, struct virt2phys_block,
next);
>  117:                 if (cur->mdl->StartVa == virt)
   118:                         return cur;
   119:         }
   120:         return NULL;
   121: }
   122: 


SYMBOL_NAME:  virt2phys!virt2phys_translate+d2

MODULE_NAME: virt2phys

IMAGE_NAME:  virt2phys.sys

STACK_COMMAND:  .cxr 0xffffce0bfaf2e3f0 ; kb

BUCKET_ID_FUNC_OFFSET:  d2

FAILURE_BUCKET_ID:  AV_virt2phys!virt2phys_translate

OS_VERSION:  10.0.17763.1

BUILDLAB_STR:  rs5_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a5b3e3eb-f919-3986-0426-062d62e143e1}

Followup:     MachineOwner
---------

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 10385 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-03-28 13:24 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-03-28 13:24 [Bug 1201] virtphys sometimes causing bluescreen bugzilla

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).