Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add EBPF_LOG_MESSAGE_BINARY tracing macro with TraceLoggingBinary to print binary data. #3786

Closed
shpalani opened this issue Aug 23, 2024 · 1 comment · Fixed by #3781
Closed
Assignees
Labels
enhancement New feature or request P2 triaged Discussed in a triage meeting
Milestone

Comments

@shpalani
Copy link
Collaborator

Describe the bug

Request to add EBPF_LOG_MESSAGE_BINARY tracing macro with TraceLoggingBinary to print binary data.

#define TraceLoggingBinary(pValue, cbValue, ...)

  • The pValue parameter is treated as a const void* so that any kind of data can be provided.
  • The cbValue parameter is the size of the data, in bytes.
    For eg,
    #define _EBPF_LOG_MESSAGE_BINARY(trace_level, keyword, message, type, name, pValue, cbValue)

OS information

Windows 10 and above

Steps taken to reproduce bug

New macro.

Expected behavior

Print the binary data.

Actual outcome

New macro.

Additional details

No response

@shpalani shpalani added bug Something isn't working enhancement New feature or request and removed bug Something isn't working labels Aug 23, 2024
@shpalani shpalani linked a pull request Aug 23, 2024 that will close this issue
@shankarseal shankarseal added this to the 2408 milestone Aug 26, 2024
@shankarseal shankarseal added P2 triaged Discussed in a triage meeting labels Aug 26, 2024
@shankarseal shankarseal modified the milestones: 2408, 2409 Aug 28, 2024
@shankarseal shankarseal modified the milestones: 2409, 2410 Sep 30, 2024
@shpalani
Copy link
Collaborator Author

shpalani commented Oct 2, 2024

7f/Double-Fault kernel crash was observed in NetEbpfExt!net_ebpf_extension_sock_addr_authorize_recv_accept_classify

https://github.com/microsoft/ebpf-for-windows/actions/runs/11042573258?pr=3781

[12:02:16] :: Staring Test command: C:\eBPF\socket_tests.exe 
[12:02:16] :: Test hang timeout: 3600 (seconds)
[12:02:16] :: 

[vm3_ws2019] The background process reported an error with the following message: "The Hyper-V socket target process 
has ended.".
At C:\actions_runner_2019_3\_work\ebpf-for-windows\ebpf-for-windows\x64\NativeOnlyDebug\vm_run_tests.psm1:33 char:5
+     Invoke-Command -VMName $VMName -Credential $TestCredential -Scrip ...
+     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : OpenError: (vm3_ws2019:String) [], PSRemotingTransportException
    + FullyQualifiedErrorId : 2100,PSSessionStateBroken
Error: Process completed with exit code 1.

NetEbpfExt!net_ebpf_extension_sock_addr_authorize_recv_accept_classify


0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8043186ee50
Arg3: fffff80431859000
Arg4: fffff8042fdf2619

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2046

    Key  : Analysis.Elapsed.mSec
    Value: 3431

    Key  : Analysis.IO.Other.Mb
    Value: 1

    Key  : Analysis.IO.Read.Mb
    Value: 10

    Key  : Analysis.IO.Write.Mb
    Value: 28

    Key  : Analysis.Init.CPU.mSec
    Value: 1140

    Key  : Analysis.Init.Elapsed.mSec
    Value: 27472

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 252

    Key  : Analysis.Version.DbgEng
    Value: 10.0.27710.1000

    Key  : Analysis.Version.Description
    Value: 10.2408.27.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2408.27.1

    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x7f

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x7f

    Key  : Bugcheck.Code.TargetModel
    Value: 0x7f

    Key  : Driver.Version.ntkrnlmp.exe
    Value: 10.0.17763.1

    Key  : Failure.Bucket
    Value: 0x7f_8_VRF_eBPFCore!unknown_function

    Key  : Failure.Hash
    Value: {420adffa-b33e-55a0-a053-56183f201efb}

    Key  : Hypervisor.Enlightenments.Value
    Value: 1113060

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 10fbe4

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 0

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 1

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 0

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 4722876

    Key  : Hypervisor.Flags.ValueHex
    Value: 4810bc

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 0

    Key  : Hypervisor.RootFlags.Value
    Value: 0

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 0

    Key  : RdAgent.Process.Count
    Value: 0

    Key  : SMBIOS.BIOS.ReleaseDate
    Value: 05/18/2018

    Key  : SMBIOS.BIOS.Vendor
    Value: American Megatrends Inc.

    Key  : SMBIOS.MemoryDevices.BitWidths
    Value: 65535/65535

    Key  : SMBIOS.MemoryDevices.FormFactors
    Value: Unknown

    Key  : SMBIOS.MemoryDevices.Manufacturers
    Value: Microsoft

    Key  : SMBIOS.MemoryDevices.MemoryTypes
    Value: Other

    Key  : SMBIOS.MemoryDevices.PartNumbers
    Value: None

    Key  : SMBIOS.PhysicalMemoryArray.MemoryErrorCorrection
    Value: None

    Key  : SMBIOS.System.SecurityStatus
    Value: Other

    Key  : SMBIOS.System.ThermalState
    Value: Other

    Key  : SMBIOS.System.WakeUpType
    Value: Power Switch

    Key  : Stack.Best.Hash
    Value: ccccee867d82c93709c72b05c1d759a4ee7c1a60

    Key  : Statistics.Blackboxes.TDR.Sections
    Value: 11

    Key  : Statistics.Firmware.Type
    Value: BIOS

    Key  : Statistics.LastEvent.Exception.Code
    Value: 0x7F

    Key  : Statistics.LastEvent.Process.Image
    Value: Idle

    Key  : Statistics.LastEvent.Process.Modules.Count
    Value: 190

    Key  : Statistics.LastEvent.Process.Threads.Count
    Value: 4

    Key  : Statistics.LastEvent.Thread.IRQL
    Value: 2

    Key  : Statistics.Network.NDIS.LastPnPEvent.SecondsAgo
    Value: 177

    Key  : Statistics.Processes.Count
    Value: 104

    Key  : Statistics.Processes.Max.Instances.Count
    Value: 67

    Key  : Statistics.Processes.Max.Instances.Image
    Value: svchost.exe

    Key  : Statistics.Processors.Count
    Value: 4

    Key  : Statistics.Processors.Id.Architecture
    Value: X64

    Key  : Statistics.Processors.Id.FMS
    Value: 6,79,1

    Key  : Statistics.Processors.Id.PartNumber
    Value:     

    Key  : Statistics.Processors.Id.Vendor
    Value: GenuineIntel

    Key  : Statistics.WHEA.Sources.NMI.Errors
    Value: 1

    Key  : Timeline.OS.Boot.DeltaSec
    Value: 690

    Key  : Timeline.Zulu
    Value: 2024-09-26T19:02:23.79Z

    Key  : WER.OS.Branch
    Value: rs5_release

    Key  : WER.OS.Platform
    Value: Windows

    Key  : WER.OS.Version
    Value: 10.0.17763.1


BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: fffff8043186ee50

BUGCHECK_P3: fffff80431859000

BUGCHECK_P4: fffff8042fdf2619

FILE_IN_CAB:  MEMORY.DMP

VIRTUAL_MACHINE:  HyperV

FAULTING_THREAD:  fffff8042f8e1400

TRAP_FRAME:  fffff8043186ee50 -- (.trap 0xfffff8043186ee50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000989680 rbx=0000000000000000 rcx=fffff7828001a478
rdx=00000000000000da rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042fdf2619 rsp=fffff80431859000 rbp=fffffffffc87db3d
 r8=fffff80431859250  r9=fffff80431859248 r10=fffff8042f511c40
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
hal!HalpQueryPerformanceCounter+0x1d [inlined in hal!KeQueryPerformanceCounter+0x49]:
fffff804`2fdf2619 e8f2010000      call    hal!HalpTimerGetInternalData (fffff804`2fdf2810)
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


PROCESS_NAME:  System

STACK_TEXT:  
fffff804`3186ed08 fffff804`2f5c2669     : 00000000`0000007f 00000000`00000008 fffff804`3186ee50 fffff804`31859000 : nt!KeBugCheckEx [minkernel\ntos\ke\amd64\procstat.asm @ 140] 
fffff804`3186ed10 fffff804`2f5bd6a8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 [minkernel\ntos\ke\amd64\trap.asm @ 3724] 
fffff804`3186ee50 fffff804`2fdf2619     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2a8 [minkernel\ntos\ke\amd64\trap.asm @ 1237] 
fffff804`31859000 fffff804`2f511c4d     : ffffc681`63d02000 00000000`00989680 00000000`00006ec8 ffffc681`4a3f3500 : hal!KeQueryPerformanceCounter+0x49 [minkernel\hals\lib\timers\common\timer.c @ 525] 
fffff804`31859030 fffff804`2f463469     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpGetPerfCounter+0xd [minkernel\ntos\etw\etwp.h @ 433] 
fffff804`31859060 fffff804`2f464693     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`31859248 : nt!EtwpReserveTraceBuffer+0xf9 [minkernel\ntos\etw\tracelog.c @ 1255] 
fffff804`318590f0 fffff804`2f475e7c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpEventWriteFull+0x3e3 [minkernel\ntos\etw\evntlog.c @ 2721] 
fffff804`31859460 fffff804`2f4ebfeb     : 00000000`00000000 00000000`00000000 fffff804`2e94dde4 fffff804`3185b250 : nt!EtwWriteEx+0x17c [minkernel\ntos\etw\evntlog.c @ 3573] 
fffff804`31859570 fffff804`2e8d1459     : fffff804`2e95f040 fffff804`2e94ddd9 fffff804`31859600 fffff804`3185af40 : nt!EtwWriteTransfer+0x2b [minkernel\ntos\etw\evntlog.c @ 3499] 
fffff804`318595c0 fffff804`2e900c09     : fffff804`2e95f040 fffff804`2e94ddd9 00000000`00000000 00000000`00000000 : eBPFCore+0x1459
fffff804`31859630 fffff804`2e92d741     : fffff804`00000005 fffff804`00000007 fffff804`2e947490 ffffc681`6a82ce50 : eBPFCore+0x30c09
fffff804`3185b0a0 fffff804`2e9143fa     : ffffc681`6a82cdc0 00000000`00000001 fffff804`3185b470 fffff804`3185b428 : eBPFCore+0x5d741
fffff804`3185b0f0 fffff804`2e913fe5     : ffffc681`54fd4ec0 fffff804`3185b470 fffff804`3185b428 fffff804`3185b210 : eBPFCore+0x443fa
fffff804`3185b1e0 fffff804`2e975ac3     : ffffc681`54fd4ec0 fffff804`3185b470 fffff804`3185b428 00000000`00000000 : eBPFCore+0x43fe5
fffff804`3185b270 fffff804`2e976d6e     : ffffc681`6a85cfb0 fffff804`3185b470 fffff804`3185b428 fffff804`3185b670 : NetEbpfExt+0x5ac3
fffff804`3185b2c0 fffff804`2e97c985     : fffff804`3185b470 00000000`00000000 fffff804`3185b428 00000000`00000000 : NetEbpfExt+0x6d6e
fffff804`3185b3b0 fffff806`4b849808     : fffff804`3185bdc0 ffffc681`45e95ad0 ffffc681`48545b10 00000000`00000000 : NetEbpfExt+0xc985
fffff804`3185b570 fffff806`4b84b939     : 00000000`0000002c fffff804`3185bdc0 ffffc681`4a35d060 ffffc681`48545b10 : NETIO!ProcessCallout+0x6e8 [minio\netio\wfp\filterengine\notify.c @ 587] 
fffff804`3185b700 fffff806`4b848441     : ffffc681`49ccb840 fffff804`3185bdc0 00000000`00000004 fffff804`3185ba60 : NETIO!ArbitrateAndEnforce+0xba9 [minio\netio\wfp\filterengine\classify.c @ 1802] 
fffff804`3185b8a0 fffff804`31a4bed5     : 00000000`00000000 00000000`0000002c ffffc681`4865f940 00000000`0000002c : NETIO!KfdClassify+0x561 [minio\netio\wfp\filterengine\classify.c @ 882] 
fffff804`3185bcb0 fffff804`31a4a94e     : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeReceive+0xcf5 [minio\netio\wfp\sys\ale\authimpl.c @ 4687] 
fffff804`3185c2a0 fffff804`31a23825     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAleAuthorizeReceive+0x68e [minio\netio\wfp\sys\ale\auth.c @ 3237] 
fffff804`3185c750 fffff804`31a27d6c     : 00000000`00000000 fffff804`00000011 00000000`00000002 00000000`00000000 : tcpip!ProcessALEForTransportPacket+0x595 [minio\netio\wfp\sys\shims\transip\trans_shims.c @ 3984] 
fffff804`3185ca20 fffff804`31a26390     : ffffc681`0000e914 00000000`00000018 ffffc681`472e42c0 00000000`0000004d : tcpip!WfpProcessInTransportStackIndication+0xc6c [minio\netio\wfp\sys\shims\transip\trans_shims.c @ 8285] 
fffff804`3185cec0 fffff804`31a4d68f     : fffff804`3185d120 ffffc681`472e42c0 ffffc681`4bcf9d70 00000000`00000000 : tcpip!InetInspectReceiveDatagram+0x2c0 [minio\netio\transport\common\inetinspect.c @ 631] 
fffff804`3185d020 fffff804`31a4caaf     : 00000000`00000000 ffffc681`4bcf9b40 fffff804`3185d560 00000000`00000044 : tcpip!UdpDeliverDatagrams+0x13f [minio\netio\transport\udp\receive.c @ 601] 
fffff804`3185d460 fffff804`31a4c5d0     : fffff804`30a9bb80 ffffc681`48473780 ffffc681`45ffd780 ffffc681`47629050 : tcpip!UdpReceiveDatagrams+0x4cf [minio\netio\transport\udp\receive.c @ 1014] 
fffff804`3185d950 fffff804`31a0df92     : 00000000`00000001 00000000`00000000 fffff804`00000000 00000000`00000000 : tcpip!UdpNlClientReceivePreValidatedDatagrams+0x10 [minio\netio\transport\udp\network.c @ 98] 
fffff804`3185d980 fffff804`31a0db42     : fffff804`3185daa0 00000000`00000000 00000000`00000000 00000000`00000003 : tcpip!IppDeliverListToProtocol+0x62 [minio\netio\network\sys\deliver.c @ 295] 
fffff804`3185da50 fffff804`31a0ce3a     : ffffc681`472ea000 fffff804`3185db59 ffffc681`48473900 00000000`00000000 : tcpip!IppProcessDeliverList+0x62 [minio\netio\network\sys\deliver.c @ 1085] 
fffff804`3185dac0 fffff804`31a0e303     : fffff804`31bfc280 ffffc681`472408e0 00000000`00000000 ffffc681`4865f900 : tcpip!IppReceiveHeaderBatch+0x22a [minio\netio\network\sys\deliver.c @ 1556] 
fffff804`3185dbc0 fffff804`31a51745     : ffffc681`486fbeb0 ffffc681`48473780 00000000`3185dd01 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x323 [minio\netio\network\sys\receive.c @ 1438] 
fffff804`3185dce0 fffff804`31a6c037     : ffffc681`486fbeb0 ffffc681`4870a9b0 fffff804`31a53111 fffff804`3185e101 : tcpip!IpFlcReceivePreValidatedPackets+0x965 [minio\netio\network\sys\receive.c @ 2332] 
fffff804`3185df00 fffff804`2f465118     : fffff804`3185e1f0 00000000`00000002 fffff804`2f8e1400 fffff804`3185e170 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127 [minio\netio\framing\sys\packet.c @ 2251] 
fffff804`3185e040 fffff804`2f46508d     : fffff804`31a6bf10 fffff804`3185e170 ffffc681`45b8bb90 ffffc681`45fd9b01 : nt!KeExpandKernelStackAndCalloutInternal+0x78 [minkernel\ntos\ke\stacksup.c @ 613] 
fffff804`3185e0b0 fffff804`31a5042e     : ffffc681`45fd5ba0 fffff804`3185e189 ffffc681`45fd5b30 fffff806`4b368e56 : nt!KeExpandKernelStackAndCalloutEx+0x1d [minkernel\ntos\ke\stacksup.c @ 514] 
fffff804`3185e0f0 fffff806`4b6e2781     : 00000000`0007c0c8 fffff804`31f8292b 00000000`00000000 ffffc681`45fd9840 : tcpip!FlReceiveNetBufferListChain+0x2be [minio\netio\framing\sys\packet.c @ 2382] 
fffff804`3185e2f0 fffff806`4b6e239d     : ffffc681`43fb8501 00500030`2fcb0008 ffff9db2`00000000 ffffc681`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0x221 [minio\ndis\sys\receive.c @ 1762] 
fffff804`3185e3c0 fffff806`4b6e4d2f     : fffff804`31f8e401 00000000`00000000 fffff804`00000000 00000000`00000001 : NDIS!ndisMTopReceiveNetBufferLists+0x23d [minio\ndis\sys\receive.c @ 2957] 
fffff804`3185e450 fffff804`30a98291     : ffffc681`48473780 ffffc681`4847b6d0 00000000`00000007 ffffc681`54423080 : NDIS!NdisMIndicateReceiveNetBufferLists+0x25f [minio\ndis\sys\receive.c @ 1013] 
fffff804`3185e5d0 fffff804`30a9ba83     : ffffc681`4847b6d0 ffffc681`47629050 ffffc681`481fb900 ffffc681`4762d850 : netvsc!ReceivePacketMessage+0x231 [onecore\vm\dv\net\nvsc\rndis\rndismp6\receive.c @ 767] 
fffff804`3185e740 fffff804`30231b3e     : 00000000`00000020 00000000`0000001e 00000000`00000000 00000000`00000048 : netvsc!NvscKmclProcessPacket+0x293 [onecore\vm\dv\net\nvsc\driver\netvsc.c @ 1890] 
fffff804`3185e7e0 fffff804`30231707     : 00000000`0000001e 00000000`00000002 fffff804`00000000 ffffc681`45b11010 : vmbkmcl!InpFillAndProcessQueue+0x24e [onecore\vm\dv\vmbus\kmcl\incoming.c @ 3032] 
fffff804`3185e870 fffff804`305b1111     : 00000000`00000000 ffff9f01`55113200 ffffc681`45be5728 00000000`00000002 : vmbkmcl!KmclpVmbusIsr+0xc7 [onecore\vm\dv\vmbus\kmcl\channel.c @ 2985] 
fffff804`3185e8b0 fffff804`2f462da7     : fffff804`2e3eef80 fffff804`3185ea10 ffffc681`45bcab00 fffff804`2e3ec180 : vmbus!ChildInterruptDpc+0x101 [onecore\vm\dv\vmbus\xpart\child.c @ 714] 
fffff804`3185e910 fffff804`2f4623ee     : 00000000`00000012 00000000`00989680 fffff804`2f8e1400 00000000`000066c3 : nt!KiExecuteAllDpcs+0x2e7 [minkernel\ntos\ke\dpcsup.c @ 1325] 
fffff804`3185ea50 fffff804`2f5b494a     : 00000000`00000000 fffff804`2e3ec180 00000000`00000000 fffff804`2f8e1400 : nt!KiRetireDpcList+0x1ae [minkernel\ntos\ke\dpcsup.c @ 1576] 
fffff804`3185ec60 00000000`00000000     : fffff804`3185f000 fffff804`31859000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a [minkernel\ntos\ke\amd64\idle.asm @ 167] 


SYMBOL_NAME:  eBPFCore+1459

MODULE_NAME: eBPFCore

IMAGE_NAME:  eBPFCore.sys

IMAGE_VERSION:  0.20.0.0

DXGANALYZE_ANALYSIS_TAG_PORT_GLOBAL_INFO_STR:  Hybrid_FALSE

DXGANALYZE_ANALYSIS_TAG_ADAPTER_INFO_STR:  GPU0_VenId0x1414_DevId0x8d_WDDM1.3_NotActive;GPU2_VenId0x0_DevId0x0_WDDM1.3_Active_Post;

STACK_COMMAND:  .process /r /p 0xfffff8042f8de9c0; .thread 0xfffff8042f8e1400 ; kb

BUCKET_ID_FUNC_OFFSET:  1459

FAILURE_BUCKET_ID:  0x7f_8_VRF_eBPFCore!unknown_function

OS_VERSION:  10.0.17763.1

BUILDLAB_STR:  rs5_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {420adffa-b33e-55a0-a053-56183f201efb}

FAILURE_ID_REPORT_LINK: https://go.microsoft.com/fwlink/?linkid=2150386&FailureSearchText=420adffa-b33e-55a0-a053-56183f201efb

Followup:     MachineOwner
---------


0: kd> kf
 #   Memory  Child-SP          RetAddr               Call Site
00           fffff804`3186ed08 fffff804`2f5c2669     nt!KeBugCheckEx [minkernel\ntos\ke\amd64\procstat.asm @ 140] 
01         8 fffff804`3186ed10 fffff804`2f5bd6a8     nt!KiBugCheckDispatch+0x69 [minkernel\ntos\ke\amd64\trap.asm @ 3724] 
02       140 fffff804`3186ee50 fffff804`2fdf2619     nt!KiDoubleFaultAbort+0x2a8 [minkernel\ntos\ke\amd64\trap.asm @ 1237] 
03           (Inline Function) --------`--------     hal!HalpQueryPerformanceCounter+0x1d [minkernel\hals\lib\timers\common\timer.c @ 2703] 
04         0 fffff804`31859000 fffff804`2f511c4d     hal!KeQueryPerformanceCounter+0x49 [minkernel\hals\lib\timers\common\timer.c @ 525] 
05        30 fffff804`31859030 fffff804`2f463469     nt!EtwpGetPerfCounter+0xd [minkernel\ntos\etw\etwp.h @ 433] 
06        30 fffff804`31859060 fffff804`2f464693     nt!EtwpReserveTraceBuffer+0xf9 [minkernel\ntos\etw\tracelog.c @ 1255] 
07        90 fffff804`318590f0 fffff804`2f475e7c     nt!EtwpEventWriteFull+0x3e3 [minkernel\ntos\etw\evntlog.c @ 2721] 
08       370 fffff804`31859460 fffff804`2f4ebfeb     nt!EtwWriteEx+0x17c [minkernel\ntos\etw\evntlog.c @ 3573] 
09       110 fffff804`31859570 fffff804`2e8d1459     nt!EtwWriteTransfer+0x2b [minkernel\ntos\etw\evntlog.c @ 3499] 
0a        50 fffff804`318595c0 fffff804`2e900c09     eBPFCore!_tlgWriteTransfer_EtwWriteTransfer+0xb9 [C:\Program Files (x86)\Windows Kits\10\Include\10.0.22621.0\shared\TraceLoggingProvider.h @ 3017] 
0b        70 fffff804`31859630 fffff804`2e92d741     eBPFCore!ebpf_log_message_utf8_string+0x4529 [D:\a\ebpf-for-windows\ebpf-for-windows\libs\shared\tracelog.c @ 423] 
0c      1a70 fffff804`3185b0a0 fffff804`2e9143fa     eBPFCore!ebpf_program_invoke+0x111 [D:\a\ebpf-for-windows\ebpf-for-windows\libs\execution_context\ebpf_program.c @ 1559] 
0d        50 fffff804`3185b0f0 fffff804`2e913fe5     eBPFCore!_ebpf_link_instance_invoke_batch_with_context_header+0x6a [D:\a\ebpf-for-windows\ebpf-for-windows\libs\execution_context\ebpf_link.c @ 634] 
0e        f0 fffff804`3185b1e0 fffff804`2e975ac3     eBPFCore!_ebpf_link_instance_invoke_with_context_header+0x75 [D:\a\ebpf-for-windows\ebpf-for-windows\libs\execution_context\ebpf_link.c @ 583] 
0f        90 fffff804`3185b270 fffff804`2e976d6e     NetEbpfExt!_net_ebpf_extension_hook_invoke_single_program+0x53 [D:\a\ebpf-for-windows\ebpf-for-windows\netebpfext\net_ebpf_ext_hook_provider.c @ 212] 
10        50 fffff804`3185b2c0 fffff804`2e97c985     NetEbpfExt!net_ebpf_extension_hook_invoke_programs+0x20e [D:\a\ebpf-for-windows\ebpf-for-windows\netebpfext\net_ebpf_ext_hook_provider.c @ 272] 
11        f0 fffff804`3185b3b0 fffff806`4b849808     NetEbpfExt!net_ebpf_extension_sock_addr_authorize_recv_accept_classify+0x2e5 [D:\a\ebpf-for-windows\ebpf-for-windows\netebpfext\net_ebpf_ext_sock_addr.c @ 1573] 
12       1c0 (Inline Function) --------`--------     NETIO!ValidateClassifyOutFromCallout+0x160 [minio\netio\wfp\filterengine\notify.c @ 243] 
13         0 fffff804`3185b570 fffff806`4b84b939     NETIO!ProcessCallout+0x6e8 [minio\netio\wfp\filterengine\notify.c @ 587] 
14       190 fffff804`3185b700 fffff806`4b848441     NETIO!ArbitrateAndEnforce+0xba9 [minio\netio\wfp\filterengine\classify.c @ 1802] 
15       1a0 fffff804`3185b8a0 fffff804`31a4bed5     NETIO!KfdClassify+0x561 [minio\netio\wfp\filterengine\classify.c @ 882] 
16       410 (Inline Function) --------`--------     tcpip!WfpAleClassify+0x33 [minio\netio\wfp\sys\ale\classify.c @ 332] 
17         0 fffff804`3185bcb0 fffff804`31a4a94e     tcpip!WfpAlepAuthorizeReceive+0xcf5 [minio\netio\wfp\sys\ale\authimpl.c @ 4687] 
18       5f0 fffff804`3185c2a0 fffff804`31a23825     tcpip!WfpAleAuthorizeReceive+0x68e [minio\netio\wfp\sys\ale\auth.c @ 3237] 
19       4b0 (Inline Function) --------`--------     tcpip!WfpAleConnectAcceptIndicate+0xeb [minio\netio\wfp\sys\shims\transip\trans_shims.c @ 2385] 
1a         0 fffff804`3185c750 fffff804`31a27d6c     tcpip!ProcessALEForTransportPacket+0x595 [minio\netio\wfp\sys\shims\transip\trans_shims.c @ 3984] 
1b       2d0 (Inline Function) --------`--------     tcpip!ProcessAleForNonTcpIn+0x12f [minio\netio\wfp\sys\shims\transip\trans_shims.c @ 6970] 
1c         0 fffff804`3185ca20 fffff804`31a26390     tcpip!WfpProcessInTransportStackIndication+0xc6c [minio\netio\wfp\sys\shims\transip\trans_shims.c @ 8285] 
1d       4a0 fffff804`3185cec0 fffff804`31a4d68f     tcpip!InetInspectReceiveDatagram+0x2c0 [minio\netio\transport\common\inetinspect.c @ 631] 
1e       160 (Inline Function) --------`--------     tcpip!InetInspectReceiveUdpDatagram+0x37 [minio\netio\transport\common\inetinspect.c @ 733] 
1f         0 (Inline Function) --------`--------     tcpip!UdpInspectDatagramAndCreateMessageIndication+0x3b [minio\netio\transport\udp\receive.c @ 270] 
20         0 fffff804`3185d020 fffff804`31a4caaf     tcpip!UdpDeliverDatagrams+0x13f [minio\netio\transport\udp\receive.c @ 601] 
21       440 fffff804`3185d460 fffff804`31a4c5d0     tcpip!UdpReceiveDatagrams+0x4cf [minio\netio\transport\udp\receive.c @ 1014] 
22       4f0 fffff804`3185d950 fffff804`31a0df92     tcpip!UdpNlClientReceivePreValidatedDatagrams+0x10 [minio\netio\transport\udp\network.c @ 98] 
23        30 fffff804`3185d980 fffff804`31a0db42     tcpip!IppDeliverListToProtocol+0x62 [minio\netio\network\sys\deliver.c @ 295] 
24        d0 fffff804`3185da50 fffff804`31a0ce3a     tcpip!IppProcessDeliverList+0x62 [minio\netio\network\sys\deliver.c @ 1085] 
25        70 fffff804`3185dac0 fffff804`31a0e303     tcpip!IppReceiveHeaderBatch+0x22a [minio\netio\network\sys\deliver.c @ 1556] 
26       100 fffff804`3185dbc0 fffff804`31a51745     tcpip!IppFlcReceivePacketsCore+0x323 [minio\netio\network\sys\receive.c @ 1438] 
27       120 (Inline Function) --------`--------     tcpip!IpFlcReceivePackets+0x12 [minio\netio\network\sys\receive.c @ 1519] 
28         0 fffff804`3185dce0 fffff804`31a6c037     tcpip!IpFlcReceivePreValidatedPackets+0x965 [minio\netio\network\sys\receive.c @ 2332] 
29       220 fffff804`3185df00 fffff804`2f465118     tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x127 [minio\netio\framing\sys\packet.c @ 2251] 
2a       140 fffff804`3185e040 fffff804`2f46508d     nt!KeExpandKernelStackAndCalloutInternal+0x78 [minkernel\ntos\ke\stacksup.c @ 613] 
2b        70 fffff804`3185e0b0 fffff804`31a5042e     nt!KeExpandKernelStackAndCalloutEx+0x1d [minkernel\ntos\ke\stacksup.c @ 514] 
2c        40 (Inline Function) --------`--------     tcpip!NetioExpandKernelStackAndCallout+0x60 [minio\netio\inc\netiostack.h @ 235] 
2d         0 fffff804`3185e0f0 fffff806`4b6e2781     tcpip!FlReceiveNetBufferListChain+0x2be [minio\netio\framing\sys\packet.c @ 2382] 
2e       200 fffff804`3185e2f0 fffff806`4b6e239d     NDIS!ndisMIndicateNetBufferListsToOpen+0x221 [minio\ndis\sys\receive.c @ 1762] 
2f        d0 (Inline Function) --------`--------     NDIS!ndisIndicateSortedNetBufferLists+0x46 [minio\ndis\sys\receive.c @ 838] 
30         0 (Inline Function) --------`--------     NDIS!ndisMDispatchReceiveNetBufferListsInternal+0x202 [minio\ndis\sys\receive.c @ 1234] 
31         0 fffff804`3185e3c0 fffff806`4b6e4d2f     NDIS!ndisMTopReceiveNetBufferLists+0x23d [minio\ndis\sys\receive.c @ 2957] 
32        90 (Inline Function) --------`--------     NDIS!ndisInvokeNextReceiveHandler+0x47 [minio\ndis\sys\lwfilter.c @ 2572] 
33         0 (Inline Function) --------`--------     NDIS!ndisMIndicateReceiveNetBufferListsInternal+0x1b0 [minio\ndis\sys\receive.c @ 898] 
34         0 fffff804`3185e450 fffff804`30a98291     NDIS!NdisMIndicateReceiveNetBufferLists+0x25f [minio\ndis\sys\receive.c @ 1013] 
35       180 fffff804`3185e5d0 fffff804`30a9ba83     netvsc!ReceivePacketMessage+0x231 [onecore\vm\dv\net\nvsc\rndis\rndismp6\receive.c @ 767] 
36       170 (Inline Function) --------`--------     netvsc!RndisMIndicateReceive+0xb7 [onecore\vm\dv\net\nvsc\rndis\rndismp6\receive.c @ 499] 
37         0 (Inline Function) --------`--------     netvsc!NvscVersion1HandleRndisSendMessage+0x23b [onecore\vm\dv\net\nvsc\driver\netvsc.c @ 2660] 
38         0 fffff804`3185e740 fffff804`30231b3e     netvsc!NvscKmclProcessPacket+0x293 [onecore\vm\dv\net\nvsc\driver\netvsc.c @ 1890] 
39        a0 (Inline Function) --------`--------     vmbkmcl!InpProcessQueue+0x1be [onecore\vm\dv\vmbus\kmcl\incoming.c @ 2929] 
3a         0 fffff804`3185e7e0 fffff804`30231707     vmbkmcl!InpFillAndProcessQueue+0x24e [onecore\vm\dv\vmbus\kmcl\incoming.c @ 3032] 
3b        90 (Inline Function) --------`--------     vmbkmcl!InpRunQueueAtDpcLevel+0x1e [onecore\vm\dv\vmbus\kmcl\incoming.c @ 4883] 
3c         0 (Inline Function) --------`--------     vmbkmcl!InInterruptArrived+0x7d [onecore\vm\dv\vmbus\kmcl\incoming.c @ 4429] 
3d         0 fffff804`3185e870 fffff804`305b1111     vmbkmcl!KmclpVmbusIsr+0xc7 [onecore\vm\dv\vmbus\kmcl\channel.c @ 2985] 
3e        40 (Inline Function) --------`--------     vmbus!ChReceiveChannelInterrupt+0x32 [onecore\vm\dv\vmbus\channels\interrupt.c @ 166] 
3f         0 (Inline Function) --------`--------     vmbus!XPartReceiveInterrupt+0x56 [onecore\vm\dv\vmbus\xpart\baseclass.c @ 2217] 
40         0 (Inline Function) --------`--------     vmbus!PncScanEventFlags+0xf8 [onecore\vm\dv\vmbus\xpart\pnc.c @ 1116] 
41         0 fffff804`3185e8b0 fffff804`2f462da7     vmbus!ChildInterruptDpc+0x101 [onecore\vm\dv\vmbus\xpart\child.c @ 714] 
42        60 fffff804`3185e910 fffff804`2f4623ee     nt!KiExecuteAllDpcs+0x2e7 [minkernel\ntos\ke\dpcsup.c @ 1325] 
43       140 fffff804`3185ea50 fffff804`2f5b494a     nt!KiRetireDpcList+0x1ae [minkernel\ntos\ke\dpcsup.c @ 1576] 
44       210 fffff804`3185ec60 00000000`00000000     nt!KiIdleLoop+0x5a [minkernel\ntos\ke\amd64\idle.asm @ 167] 

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request P2 triaged Discussed in a triage meeting
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants