Uploaded image for project: 'Core ReactOS'
  1. Core ReactOS
  2. CORE-14850

MM unimplemented code path assertion FALSE

    XMLWordPrintable

Details

    • Bug
    • Resolution: Duplicate
    • Major
    • None
    • NTCore
    • None
    • ReactOS 0.4.10-dev (Build 20180725-0.4.10-dev-381-g63ec2ab)
      Commit 63ec2abf0dd6aed34e125bc95cebebb0634eafeb
      MSVC build.

    Description

      While sending the crash report to MS for the crash encountered in CORE-14849, the following unimplemented code path in MM was hit:

      "nt!MiQueryAddressState"

      1561
                      /* This means it's committed */
      1562
                      State = MEM_COMMIT;
      1563
       
      1564
                      /* We don't support these */
      1565
                      ASSERT(Vad->u.VadFlags.VadType != VadDevicePhysicalMemory);
      1566
                      ASSERT(Vad->u.VadFlags.VadType != VadRotatePhysical);
      1567
                      ASSERT(Vad->u.VadFlags.VadType != VadAwe);
      1568
       
      1569
                      /* Get protection state of this page */
      1570
                      Protect = MiGetPageProtection(PointerPte);
      1571
       
      1572
                      /* Check if this is an image-backed VAD */
      1573
                      if ((TempPte.u.Soft.Valid == 0) &&
      1574
                          (TempPte.u.Soft.Prototype == 1) &&
      1575
                          (Vad->u.VadFlags.PrivateMemory == 0) &&
      1576
                          (Vad->ControlArea))
      1577
                      {
      1578
                          DPRINT1("Not supported\n");
      1579
                          ASSERT(FALSE);
      1580
                      }

      The corresponding backtrace is:

      (ntoskrnl\kd64\kdinit.c:73) -----------------------------------------------------
      (ntoskrnl\kd64\kdinit.c:74) ReactOS 0.4.10-dev (Build 20180725-0.4.10-dev-381-g63ec2ab) (Commit 63ec2abf0dd6aed34e125bc95cebebb0634eafeb)
      (ntoskrnl\kd64\kdinit.c:75) 1 System Processor [511 MB Memory]
      (ntoskrnl\kd64\kdinit.c:79) Command Line: DEBUG DEBUGPORT=VBOX SOS
      (ntoskrnl\kd64\kdinit.c:80) ARC Paths: multi(0)disk(0)rdisk(0)partition(1) \ multi(0)disk(0)rdisk(0)partition(1) \ReactOS\
      Connected to Windows Server 2003 3790 x86 compatible target at (Thu Jul 26 00:47:48.974 2018 (UTC + 2:00)), ptr64 FALSE
      Kernel Debugger connection established.
      Symbol search path is: D:\rosbuilds\x86_VC10\msvc_pdb;C:\Symbols;srv*C:\Symbols*https://msdl.microsoft.com/download/symbols;D:\rosbuilds\x86_VC10_Setup\msvc_pdb;C:\Users\ReactOS\Desktop\cmake
      Executable search path is: 
      Windows Server 2003 Kernel Version 3790 UP Checked x86 compatible
      Built by: 20180725-0.4.10-dev-381-g63ec2ab.MSVC_16.0.40219.1
      Machine Name:
      Kernel base = 0x80400000 PsLoadedModuleList = 0x805b3268
      System Uptime: not available
      (ntoskrnl\ke\i386\cpu.c:450) Supported CPU features : KF_V86_VIS KF_RDTSC KF_CR4 KF_CMOV KF_GLOBAL_PAGE KF_LARGE_PAGE KF_MTRR KF_CMPXCHG8B KF_MMX KF_WORKING_PTE KF_PAT KF_FXSR KF_FAST_SYSCALL KF_XMMI   KF_XMMI64    
      (ntoskrnl\ke\i386\cpu.c:722) Prefetch Cache: 64 bytes	L2 Cache: 262144 bytes	L2 Cache Line: 64 bytes	L2 Cache Associativity: 8
      (hal\halx86\acpi\halacpi.c:782) ACPI Timer at: 4008h (EXT: 256)
      (hal\halx86\acpi\halacpi.c:890) ACPI 2.0 Detected. Tables: [RSDT] [FACP] 
      ..
      ..
      shellpath.c:1513: _SHGetUserProfileDirectoryW returning C:\Documents and Settings\Administrator
      shellpath.c:1513: _SHGetUserProfileDirectoryW returning C:\Documents and Settings\Administrator
      (ntoskrnl\ex\sysinfo.c:825) Process B0F23B40 (regtlibv12.exe:000006A8) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0EF0AD8 (regtlibv12.exe:000006B8) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0F25448 (regtlibv12.exe:000006C8) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0EC0D88 (regtlibv12.exe:000006D8) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0EA7978 (regtlibv12.exe:000006E8) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0EA2D88 (regtlibv12.exe:000006F8) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0EA76E0 (regtlibv12.exe:00000708) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0ED5BA8 (regtlibv12.exe:00000718) is a zombie
      (ntoskrnl\ex\sysinfo.c:825) Process B0EF3C60 (regtlibv12.exe:00000728) is a zombie
      (dll\win32\kernel32\client\fiber.c:355) FlsAlloc: Got lpCallback 0x7902EABF, UNIMPLEMENTED!
      (dll\win32\kernel32\client\fiber.c:355) FlsAlloc: Got lpCallback 0x63D713EE, UNIMPLEMENTED!
      fixme:(D:\rossrc\reactos\dll\win32\usp10\opentype.c:1262)   TODO: subtype 1 (Simple context glyph substitution)
      fixme:(D:\rossrc\reactos\dll\win32\riched20\editor.c:3542) EM_SETMARGINS: stub
      fixme:(D:\rossrc\reactos\dll\win32\riched20\editor.c:3542) EM_SETMARGINS: stub
      fixme:(D:\rossrc\reactos\dll\win32\ole32\compobj.c:4040) (00000000,-1,00000000,00000000,0,3,00000000,0,00000000) - stub!
      (win32ss\user\ntuser\desktop.c:1484) err: UMWP calling IDWP
      (ntoskrnl\mm\ARM3\virtual.c:1578) Not supported
      Assertion d:\rossrc\reactos\ntoskrnl\mm\arm3\virtual.c(1579): FALSE
      nt!MiQueryAddressState+0x25b:
      804b4afb cd2c            int     2Ch
      kd> .reload
      Connected to Windows Server 2003 3790 x86 compatible target at (Thu Jul 26 00:55:38.785 2018 (UTC + 2:00)), ptr64 FALSE
      Loading Kernel Symbols
      ..........................................................
      Loading User Symbols
      .........................................................
      kd> kp
      ChildEBP RetAddr  
      f840abe4 804b5241 nt!MiQueryAddressState(void * Va = 0x00300000, struct _MMVAD * Vad = 0xb0b0b210, struct _EPROCESS * TargetProcess = 0xb0e9ca40, unsigned long * ReturnedProtect = 0xf840ac84, void ** NextVa = 0xf840ac50)+0x25b [d:\rossrc\reactos\ntoskrnl\mm\arm3\virtual.c @ 1579]
      f840aca4 804b7cc0 nt!MiQueryMemoryBasicInformation(void * ProcessHandle = 0x000003c4, void * BaseAddress = 0x00257000, void * MemoryInformation = 0x0144fed0, unsigned long MemoryInformationLength = 0x1c, unsigned long * ReturnLength = 0x0144fd84)+0x611 [d:\rossrc\reactos\ntoskrnl\mm\arm3\virtual.c @ 1914]
      f840acf4 804ffdab nt!NtQueryVirtualMemory(void * ProcessHandle = 0x000003c4, void * BaseAddress = 0x00257000, _MEMORY_INFORMATION_CLASS MemoryInformationClass = MemoryBasicInformation (0), void * MemoryInformation = 0x0144fed0, unsigned long MemoryInformationLength = 0x1c, unsigned long * ReturnLength = 0x0144fd84)+0x110 [d:\rossrc\reactos\ntoskrnl\mm\arm3\virtual.c @ 4336]
      f840ad1c 804ff44f nt!KiSystemCallTrampoline(void * Handler = 0x804b7bb0, void * Arguments = 0x0144fd68, unsigned long StackBytes = 0x18)+0x1b [d:\rossrc\reactos\ntoskrnl\include\internal\i386\ke.h @ 748]
      f840ad5c 80403e23 nt!KiSystemServiceHandler(struct _KTRAP_FRAME * TrapFrame = 0xf840ad64, void * Arguments = 0x0144fd68)+0x22f [d:\rossrc\reactos\ntoskrnl\ke\i386\traphdlr.c @ 1813]
      f840ad5c 7c92e3ce nt!KiFastCallEntry+0x8c
      0144fd88 00000000 ntdll!KiFastSystemCallRet

      Attachments

        Issue Links

          Activity

            People

              bug zilla Bug Zilla
              hbelusca hbelusca
              Votes:
              1 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: