I can confirm problem with periodic crash and reboot 2008 R2 server when use 
freerdp 0.8.2
Reboots rare, probably one per 20-100 hours with 24x7 use, most likely at high 
load (over 90% memory in use)

--

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\Minidump\110111-15312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

WARNING: Inaccessible path: 'c:\windows\i386'
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: Server, suite: TerminalServer
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0161f000 PsLoadedModuleList = 0xfffff800`01864670
Debug session time: Tue Nov  1 11:38:36.417 2011 (UTC + 4:00)
System Uptime: 4 days 2:37:52.964
Loading Kernel Symbols
...............................................................
..........................................................
Loading User Symbols
Loading unloaded module list
........................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa8045a84248, 1, fffff88004239f54, 0}


Could not read faulting driver name
Probably caused by : RDPWD.SYS ( RDPWD!memcpy+64 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8045a84248, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88004239f54, If non-zero, the instruction address which referenced 
the bad memory
        address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800018ce100
 fffffa8045a84248 

FAULTING_IP: 
RDPWD!memcpy+64
fffff880`04239f54 488901          mov     qword ptr [rcx],rax

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

BUGCHECK_STR:  0x50

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8801f479aa0 -- (.trap 0xfffff8801f479aa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=01000000000003ee rbx=0000000000000000 rcx=fffffa8045a84248
rdx=000000000050710b rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004239f54 rsp=fffff8801f479c38 rbp=0000000000000001
 r8=000000000000001e  r9=0000000000000003 r10=fffff8a027c861e8
r11=fffffa8045a84248 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
RDPWD!memcpy+0x64:
fffff880`04239f54 488901          mov     qword ptr [rcx],rax 
ds:9bf4:fffffa80`45a84248=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800016479fc to fffff8000169bc40

STACK_TEXT:  
fffff880`1f479938 fffff800`016479fc : 00000000`00000050 fffffa80`45a84248 
00000000`00000001 fffff880`1f479aa0 : nt!KeBugCheckEx
fffff880`1f479940 fffff800`01699d6e : 00000000`00000001 fffffa80`45a84248 
fffffa80`45f8b300 fffff8a0`0c9ef270 : nt! ?? ::FNODOBFM::`string'+0x4611f
fffff880`1f479aa0 fffff880`04239f54 : fffff880`0421f7cf fffff880`1f479d60 
00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`1f479c38 fffff880`0421f7cf : fffff880`1f479d60 00000000`00000000 
00000000`00000000 fffffa80`43bacc68 : RDPWD!memcpy+0x64
fffff880`1f479c40 fffff880`042379fc : fffff8a0`151c29b0 00000000`00000022 
00000000`00000019 00000000`00000002 : RDPWD!SM_MCSSendDataCallback+0x303
fffff880`1f479c80 fffff880`04236354 : fffff880`1f479dc0 fffff8a0`27c861e8 
00000000`00000000 fffffa80`45f8b340 : RDPWD!HandleAllSendDataPDUs+0x188
fffff880`1f479d30 fffff880`04235f64 : 00000000`00000031 fffffa80`45f8b345 
00000006`0000001f fffff880`04204079 : RDPWD!RecognizeMCSFrame+0x28
fffff880`1f479d70 fffff880`01bf11f8 : fffff8a0`27cae000 fffffa80`45662930 
fffffa80`45658720 fffff880`04202e00 : RDPWD!MCSIcaRawInputWorker+0x3d4
fffff880`1f479e10 fffff880`042028d0 : 00000000`00000000 fffff880`1f479f30 
fffff880`1f479f28 fffff800`0167c4db : termdd!IcaRawInput+0x50
fffff880`1f479e40 fffff880`04201d85 : 00000000`00000001 fffffa80`45c1f738 
00000000`00000000 00000000`00000000 : 
tssecsrv!CRawInputDM::PassDataToServer+0x2c
fffff880`1f479e70 fffff880`042017c2 : fffffa80`41379528 fffffa80`00000000 
00000000`00000031 fffff800`00000000 : tssecsrv!CFilter::FilterIncomingData+0xc9
fffff880`1f479f10 fffff880`01bf11f8 : fffff880`009c6180 fffffa80`453fc6f0 
00000000`00000000 00000000`00000000 : tssecsrv!ScrRawInput+0x82
fffff880`1f479f80 fffff880`043f14c5 : fffffa80`41379510 fffffa80`45f8b108 
00000000`00000000 fffffa80`41379510 : termdd!IcaRawInput+0x50
fffff880`1f479fb0 fffff880`01bf1f3e : fffffa80`45f8b0d0 fffffa80`406e44c0 
fffffa80`457100d0 fffffa80`2155a870 : tdtcp!TdInputThread+0x465
fffff880`1f47a830 fffff880`01bf0ae3 : fffffa80`4424c310 fffffa80`2155a870 
fffffa80`137eff80 fffffa80`457100d0 : termdd!IcaDriverThread+0x5a
fffff880`1f47a860 00000000`00000000 : 00000000`00000000 00000000`00000000 
00000000`00000000 00000000`00000000 : termdd!IcaDeviceControlStack+0x827


STACK_COMMAND:  kb

FOLLOWUP_IP: 
RDPWD!memcpy+64
fffff880`04239f54 488901          mov     qword ptr [rcx],rax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  RDPWD!memcpy+64

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: RDPWD

IMAGE_NAME:  RDPWD.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7ab45

FAILURE_BUCKET_ID:  X64_0x50_RDPWD!memcpy+64

BUCKET_ID:  X64_0x50_RDPWD!memcpy+64

Followup: MachineOwner
---------






------------------------------------------------------------------------------
RSA® Conference 2012
Save $700 by Nov 18
Register now!
http://p.sf.net/sfu/rsa-sfdev2dev1
_______________________________________________
Freerdp-devel mailing list
Freerdp-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freerdp-devel

Reply via email to